Eric Vanderburg

Last updated
Eric Vanderburg
Eric Vanderburg 2011.jpg
Vanderburg at Jurinnov headquarters in Cleveland, 2011
Born
CitizenshipAmerican
Alma mater University of Fairfax
Kent State University
Occupation(s)Author, Business Leader
TCDI
Known for storage networking, security

Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio. [1] [2]

Contents

Vanderburg is Vice President of Cybersecurity at TCDI [3] and an author and speaker on information security. He has been interviewed on TV [4] and radio [5] to discuss information security and he presents and conferences and seminars [6] [7] [8] and has participated in panels on information security. [9]

Education

Vanderburg attended Kent State University earning both a bachelor of Science in Technology and a Masters in Business Administration. [10] He also has a Master of Business Administration (MBA), and pursued a doctorate in information assurance. [11]

Life and career

Vanderburg has been interested in technology from an early age, often reading through computer manuals in his library, thus allowing himself to learn "some basics of programming". [12] After spending some time with hackers and "Internet deviants" in the early 1990s, he managed to turn his interest in IT security into a career, and since the late 1990s his interest has primarily been that of cybersecurity within the business world. [12] [11] He has also spoken about the development of DevOps in the business world. [13] [14] [15] [16]

Vanderburg founded Independent Systems Consulting, [17] an IT consulting firm, in 1997, [18] which he ran for almost ten years. He then joined Jurinnov in 2006 where he directed IT, digital forensics, and cybersecurity consulting teams. [18] [19] [20] [21] In 2009, he built a network operations center at Jurinnov's headquarters to monitor data center operations and to perform transaction monitoring of key business and client systems. [22] In 2016, Vanderburg became Vice President of Cybersecurity at TCDI [3] when TCDI acquired Jurinnov. He is also a TechMin Network board member. [23]

Vanderburg was involved with Hitachi Data Systems in testing their Essential NAS product [24] which he compared to the Netapp FAS3000 NAS [25] [26] and he partnered with Lateral Data in using their Viewpoint eDiscovery tool to perform large-scale litigation document review. [27] He worked with Venio on their litigation review tool with early case assessment (ECA), [28] and has worked with companies including Dell, Carbonite, BitDefender, Microsoft and AT&T. [11]

Vanderburg has served as an expert witness in cases involving digital preservation, [29] electronic communication, [30] access control and confidential information disclosure, [31] database management systems, [32] and directory services. [33]

Academic contributions

Eric Vanderburg delivering the commencement address to the graduating class of 2010 at Vatterott College Vatterott Commencement 2010 Vanderburg.jpg
Eric Vanderburg delivering the commencement address to the graduating class of 2010 at Vatterott College

Vanderburg taught courses in security, database management systems, and computer networking at Remington College's Cleveland-West campus as an instructor and chair of the Computer Networking Technology program. He served as an adjunct instructor in the Computer Information Systems department at Lorain County Community College in Elyria, Ohio. [34] [35] Vanderburg has delivered commencement speeches at the Vatterott College Cleveland campus 2010 commencement [36] and Remington College Cleveland-West campus's final graduation in 2013. He has also taught web-based courses for professional development for eForensics Magazine. [37] Vanderburg has served on the advisory boards for Remington College, Vatterott College, Lincoln School of Technology and Cuyahoga Community College Workforce and Economic Development Division (WEDD). [38]

Publications and bibliography

Vanderburg has published in CIO Magazine, [39] eForensics Magazine, [40] Network World, [41] Computer World, [42] Networks Asia [43] Certification Magazine, [44] [45] PC Security World, [46] CSO Magazine, [47] ARN, [48] TechWorld, [49] and McGladrey Technology News Brief [50] Vanderburg also maintains a blog called Security Thinking Cap. [51] [52]

Bibliography

See also

Related Research Articles

<span class="mw-page-title-main">Computer security</span> Protection of computer systems from information disclosure, theft or damage

Computer security, cybersecurity, digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Trend Micro</span> Japanese multinational cyber security company

Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, & cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.

Fortinet, Inc. is a cybersecurity company with headquarters in Sunnyvale, California. The company develops and sells security solutions like firewalls, endpoint security and intrusion detection systems. Fortinet has offices located all over the world.

<span class="mw-page-title-main">UST (company)</span> American technology company

UST, formerly known as UST GLOBAL, is a provider of digital technology and transformation, information technology and services, headquartered in Aliso Viejo, California, United States. Stephen Ross founded UST in 1998 in Laguna Hills. The company has offices in the Americas, EMEA, APAC, and India.

Dimension Data is a company specialising in information technology services. Based in Johannesburg, South Africa, the company maintains operations on every inhabited continent. Dimension Data focuses on services including IT consulting, technical and support services, and managed services. The company is the official technology partner of the Tour de France, the Vuelta a España and also sponsored a team of the same name. In 2010, the company was fully acquired by Nippon Telegraph and Telephone (NTT). On 1 July 2019, all Dimension Data operations, excluding those in the Middle East and Africa, became part of NTT Ltd.

ManTech International Corporation is an American defense contracting firm based in Herndon, Virginia. It was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is a portmanteau formed through the combination of "management" and "technology."

<span class="mw-page-title-main">Splunk</span> American technology company

Splunk Inc. is an American software company based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated data via a web-style interface. Its software helps capture, index and correlate real-time data in a searchable repository, from which it can generate graphs, reports, alerts, dashboards and visualizations.

<span class="mw-page-title-main">IT infrastructure</span> Set of information technology components that are the foundation of an IT service

Information technology infrastructure is defined broadly as a set of information technology (IT) components that are the foundation of an IT service; typically physical components, but also various software and network components.

<span class="mw-page-title-main">Merit Network</span> Global LTE

Merit Network, Inc., is a nonprofit member-governed organization providing high-performance computer networking and related services to educational, government, health care, and nonprofit organizations, primarily in Michigan. Created in 1966, Merit operates the longest running regional computer network in the United States.

Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and power projection thanks to comparatively advanced technology and a large military budget. Cyber warfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.

<span class="mw-page-title-main">Palo Alto Networks</span> American technology company

Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.

A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, personal computer devices, or smartphones. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. Depending on the context, cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states, individuals, groups, societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack.

Analytica is a consulting and information technology firm serving US public and private sector enterprises focused on national security, law enforcement, health care and financial services. The company specializes in implementing on-premises and cloud computing solutions for information management, Cyber security, big data, data analytics, and business intelligence. Analytica is a member of NYU Governance Lab's Open Data 500 Project, as one of 500 U.S. companies profiled for their involvement in implementing Open Data initiatives for public sector organizations to address requirements under the Digital Accountability and Transparency Act.

Infrastructure as code (IaC) is the process of managing and provisioning computer data center resources through machine-readable definition files, rather than physical hardware configuration or interactive configuration tools. The IT infrastructure managed by this process comprises both physical equipment, such as bare-metal servers, as well as virtual machines, and associated configuration resources. The definitions may be in a version control system, rather than maintaining the code through manual processes. The code in the definition files may use either scripts or declarative definitions, but IaC more often employs declarative approaches.

In cybersecurity, cyber self-defense refers to self-defense against cyberattack. While it generally emphasizes active cybersecurity measures by computer users themselves, cyber self-defense is sometimes used to refer to the self-defense of organizations as a whole, such as corporate entities or entire nations. Surveillance self-defense is a variant of cyber self-defense and largely overlaps with it. Active and passive cybersecurity measures provide defenders with higher levels of cybersecurity, intrusion detection, incident handling and remediation capabilities. Various sectors and organizations are legally obligated to adhere to cyber security standards.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.

Checkmarx is an enterprise application security company headquartered in Atlanta, Georgia in the United States. Founded in 2006, the company provides application security testing (AST) solutions that embed security into every phase of the software development lifecycle (SDLC), an approach to software testing known as "shift everywhere."

References

  1. Dixon Murray, Teresa (September 27, 2012). "Banks can't prevent cyber attacks like those hitting PNC, Key, U.S. Bank this week". The Plain Dealer.
  2. Coventry, Andrea (4 November 2014). "An Interview with Dr. Eric Vanderburg". Considered Bookshelf. Retrieved 4 November 2014.
  3. 1 2 our expert – Eric Vanderburg, eforensicsmag.org
  4. Jackson, Curtis (February 28, 2011). "Corporate espionage on the rise in Northeast Ohio". NewsNet 5 Cleveland. Archived from the original on 2014-06-09.
  5. "The Sound of Ideas: Cyber Security and Your Information". NPR. November 5, 2013. Archived from the original on 2014-12-22.
  6. "Information Security Summit 2012 Conference Agenda" (PDF). Information Security Summit. Retrieved 27 October 2014.
  7. "Membership News". The Union Club Newsletter: 4. May 2013.
  8. "Information Security Summit 2014 Fall Agenda" (PDF). 12th annual Information Security Summit. Retrieved 30 October 2014.
  9. "Jumpstart - Cyber Security: Can your company afford to breach?". Jumpstart Network. Archived from the original on 29 October 2014. Retrieved 28 October 2014.
  10. "Effectively gathering facts following a data breach". Outlook Series. Constituent Works. January 15, 2013.
  11. 1 2 3 Khan, Sheheryar (21 July 2017). "How to Become a Cyber Security Expert?". Pure VPN. Retrieved 3 August 2017.
  12. 1 2 Cocking, Simon (19 August 2016). "Cybersecurity is a global challenge, data security insights with Eric Vanderburg". Irish Tech News. Retrieved 3 August 2017.
  13. "How to get DevOps right - JAX DevOps". JAX DevOps. 17 March 2017. Retrieved 3 August 2017.
  14. "The first-aid DevOps toolkit: What does it contain? - JAXenter". JAXenter. 4 April 2017. Retrieved 3 August 2017.
  15. "Should containers be part of the DevOps genome? - JAXenter". JAXenter. 10 April 2017. Retrieved 3 August 2017.
  16. "It's a cultural movement, it's a magic bullet, it's a catalyst. It's DevOps - JAXenter". JAXenter. 27 March 2017. Retrieved 3 August 2017.
  17. "About Us - Independent Systems Consulting". Independent Systems Consulting. Retrieved 27 October 2014.
  18. 1 2 Worrell, Curt (October 5, 2014). "CLP 024 – Eric Vanderburg: Cybersecurity – Protect Your Lifestyle Business". Confessions of a Lifestyle Preneur. Archived from the original on October 22, 2014.
  19. "JurInnov Rated a Top-Twenty Electronic Discovery Service Provider in 2007 Socha-Gelbmann Survey". Socha Consulting LLC. Retrieved 17 October 2014.
  20. "JurInnov Ltd. Honored As The 2010 Ringtail Partner Consultants Of The Year". The Street. 2011-03-17. Retrieved 17 October 2014.
  21. "Inc Profile - JURINNOV". Inc. Retrieved 17 October 2014.
  22. "JurInnov Increases Document Review Efficiency". PRWeb. ocus PRW Holdings, LLC. Retrieved 28 October 2014.
  23. "Our Team". TechMin. Retrieved 3 August 2017.
  24. "Hitachi Announces New Line-Up of Advanced NAS Services". Hitachi Data Systems. HDS. March 4, 2008. Archived from the original on 2014-11-07.
  25. Raffo, Dave (March 4, 2008). "Hitachi turns its attention to file services, discovery". Tech Target. Search Storage.
  26. "Hitachi advanced NAS services". Data Storage Connection. Jameson Publishing. March 17, 2008.
  27. Koblentz, Evan (June 17, 2011). "JurInnov Adding Lower-Cost E-Discovery Wares". Law Technology News. ALM Media Properties.
  28. "E-Discovery Software Provider Venio Systems Announces New Partnership with JurInnov". Venio Systems. Archived from the original on 2014-11-09. Retrieved 2014-10-27.
  29. C4Polymers, Inc., v. Huntington National Bank, ET AL,993N.E.2d(Ohio Com. PleasMarch 14, 2014).
  30. Gorilla Store LTD, ET AL v. Michael Thompson,993N.E.2d(Ohio Com. PleasNovember 11, 2014).
  31. Invista North America S.À R.L., and Auriga Polymers, Inc., v. M&G Corporation and M&G Polymers USA, LLC,75A.(D. Del.February 19, 2013).
  32. Slapikas v. First American Title Insurance Company,75A.2d(W.D. Pa.June 25, 2008).
  33. Frank Gates Managed Care Services v. Ohio Bureau of Workers' Compensation,993N.E.2d(Ohio Com. PleasAugust 17, 2012).
  34. "Eric Vanderburg at Lorain County Community College". LeadFerret. Retrieved 14 October 2014.
  35. "LCCC Faculty Staff Directory - V". Lorain County Community College. Archived from the original on 19 November 2007. Retrieved 19 January 2008.
  36. Implementing a Best Practice Risk Assessment Methodology. GRIN Publishing. May 22, 2013.{{cite book}}: |website= ignored (help)
  37. "Packet Analysis with Wireshark and PCAP analysis tools (W1)". eForensics Magazine. Retrieved 24 October 2014.
  38. "Cuyahoga Community College Workforce and Economic Development Division". tri-c.edu. Archived from the original on 23 July 2013. Retrieved 13 August 2013.
  39. "Author CIO Eric Vanderburg". cio.com. Retrieved 22 June 2014.
  40. "Meet our Expert - Eric Vanderburg". eforensicsmag.com. 23 September 2012. Retrieved 22 June 2014.
  41. "When to call for help after a data breach". Network World. IDG Communications, Inc. January 10, 2013.
  42. "Stories by Eric Vanderburg, director of information systems and security at JurInnov". Computer World. Retrieved 27 October 2014.
  43. "Four keys to successful BYOD". Networks Asia. Questex Media Group. February 16, 2012.
  44. "Eric Vanderburg, Author at Certification Magazine". Certification Magazine. Vallejo Media Group.
  45. Chapin, Rick (October 17, 2008). CCNA v2.0 Review: Critical Concepts of the 640-802 CCNA Exam. Global Knowledge.
  46. "Fail Secure – The right way to fail". PC Security World. February 18, 2013. Archived from the original on October 27, 2014. Retrieved October 27, 2014.
  47. "Eric Vanderburg - Author at CSO Magazine". CSO Magazine. Retrieved 2 September 2014.
  48. "Eric Vanderburg, CISSP, and director of Information Systems and Security at consultancy JurInnov - Author - ARN". ARN. IDG Communications.
  49. "Eric Vanderburg - Author - Techworld". TechWorld. Tech World.
  50. "Articles from Eric Vanderburg, CISSP,, director of Information Systems, Security at consultancy JurInnov". McGladrey Technology News Brief. McGladrey. Archived from the original on 7 November 2014. Retrieved 7 November 2014.
  51. "10 Must-Follow InfoSec Bloggers 2015". Thycotic. 12 November 2015. Retrieved 3 August 2017.
  52. "The Top 20 Cloud Security Blogs of 2015". Skyhigh. 21 December 2015. Retrieved 3 August 2017.