A major contributor to this article appears to have a close connection with its subject.(August 2017) |
Eric Vanderburg | |
---|---|
Born | Parma, Ohio, U.S. |
Citizenship | American |
Alma mater | University of Fairfax Kent State University |
Occupation(s) | Author, Business Leader TCDI |
Known for | storage networking, security |
Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio. [1] [2]
Vanderburg is Vice President of Cybersecurity at TCDI [3] and an author and speaker on information security. He has been interviewed on TV [4] and radio [5] to discuss information security and he presents and conferences and seminars [6] [7] [8] and has participated in panels on information security. [9]
Vanderburg attended Kent State University earning both a bachelor of Science in Technology and a Masters in Business Administration. [10] He also has a Master of Business Administration (MBA), and pursued a doctorate in information assurance. [11]
Vanderburg has been interested in technology from an early age, often reading through computer manuals in his library, thus allowing himself to learn "some basics of programming". [12] After spending some time with hackers and "Internet deviants" in the early 1990s, he managed to turn his interest in IT security into a career, and since the late 1990s his interest has primarily been that of cybersecurity within the business world. [12] [11] He has also spoken about the development of DevOps in the business world. [13] [14] [15] [16]
Vanderburg founded Independent Systems Consulting, [17] an IT consulting firm, in 1997, [18] which he ran for almost ten years. He then joined Jurinnov in 2006 where he directed IT, digital forensics, and cybersecurity consulting teams. [18] [19] [20] [21] In 2009, he built a network operations center at Jurinnov's headquarters to monitor data center operations and to perform transaction monitoring of key business and client systems. [22] In 2016, Vanderburg became Vice President of Cybersecurity at TCDI [3] when TCDI acquired Jurinnov. He is also a TechMin Network board member. [23]
Vanderburg was involved with Hitachi Data Systems in testing their Essential NAS product [24] which he compared to the Netapp FAS3000 NAS [25] [26] and he partnered with Lateral Data in using their Viewpoint eDiscovery tool to perform large-scale litigation document review. [27] He worked with Venio on their litigation review tool with early case assessment (ECA), [28] and has worked with companies including Dell, Carbonite, BitDefender, Microsoft and AT&T. [11]
Vanderburg has served as an expert witness in cases involving digital preservation, [29] electronic communication, [30] access control and confidential information disclosure, [31] database management systems, [32] and directory services. [33]
Vanderburg taught courses in security, database management systems, and computer networking at Remington College's Cleveland-West campus as an instructor and chair of the Computer Networking Technology program. He served as an adjunct instructor in the Computer Information Systems department at Lorain County Community College in Elyria, Ohio. [34] [35] Vanderburg has delivered commencement speeches at the Vatterott College Cleveland campus 2010 commencement [36] and Remington College Cleveland-West campus's final graduation in 2013. He has also taught web-based courses for professional development for eForensics Magazine. [37] Vanderburg has served on the advisory boards for Remington College, Vatterott College, Lincoln School of Technology and Cuyahoga Community College Workforce and Economic Development Division (WEDD). [38]
Vanderburg has published in CIO Magazine, [39] eForensics Magazine, [40] Network World, [41] Computer World, [42] Networks Asia [43] Certification Magazine, [44] [45] PC Security World, [46] CSO Magazine, [47] ARN, [48] TechWorld, [49] and McGladrey Technology News Brief [50] Vanderburg also maintains a blog called Security Thinking Cap. [51] [52]
Computer security is the protection of computer software, systems and networks from threats that can lead to unauthorized information disclosure, theft or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Trend Micro Inc. is an American-Japanese cyber security software company. The company has globally dispersed R&D in 16 locations across every continent excluding Antarctica. The company develops enterprise security software for servers, containers, and cloud computing environments, networks, and end points. Its cloud and virtualization security products provide automated security for customers of VMware, Amazon AWS, Microsoft Azure, and Google Cloud Platform.
UST, formerly known as UST Global, is a provider of digital technology and transformation, information technology and services, headquartered in Aliso Viejo, California, United States. Stephen Ross founded UST in 1998 in Laguna Hills. The company has offices in the Americas, EMEA, APAC, and India.
Dimension Data was a company specialising in information technology services. Based in Johannesburg, South Africa, the company maintained operations on every inhabited continent. Dimension Data focused on services including IT consulting, technical and support services, and managed services. The company was the official technology partner of the Tour de France, the Vuelta a España and also sponsored a team of the same name. In 2010, the company was fully acquired by Nippon Telegraph and Telephone (NTT). On 1 July 2019, all Dimension Data operations, excluding those in the Middle East and Africa, became part of NTT Ltd.
Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.
ManTech International Corporation is an American defense contracting firm based in Herndon, Virginia. It was co-founded in 1968 by Franc Wertheimer and George J. Pedersen. The company uses technology to help government and industry clients. The company name "ManTech" is a portmanteau formed through the combination of "management" and "technology."
Merit Network, Inc., is a nonprofit member-governed organization providing high-performance computer networking and related services to educational, government, health care, and nonprofit organizations, primarily in Michigan. Created in 1966, Merit operates the longest running regional computer network in the United States.
Veracode is an application security company based in Burlington, Massachusetts. Founded in 2006, it provides SaaS application security that integrates application analysis into development pipelines.
Cyberwarfare is the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes. As a major developed economy, the United States is highly dependent on the Internet and therefore greatly exposed to cyber attacks. At the same time, the United States has substantial capabilities in both defense and offensive power projection thanks to comparatively advanced technology and a large military budget. Cyberwarfare presents a growing threat to physical systems and infrastructures that are linked to the internet. Malicious hacking from domestic or foreign enemies remains a constant threat to the United States. In response to these growing threats, the United States has developed significant cyber capabilities.
Control system security, or automation and control system (ACS) cybersecurity, is the prevention of interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.
CTERA Networks is a privately held enterprise software company headquartered in New York and Israel. The company has regional offices in the UK, Italy, France, Spain, Germany, and Australia. As of 2021, the company is designated as the leading vendor in distributed cloud file storage by GigaOm.
Palo Alto Networks, Inc. is an American multinational cybersecurity company with headquarters in Santa Clara, California. The core product is a platform that includes advanced firewalls and cloud-based offerings that extend those firewalls to cover other aspects of security. The company serves over 70,000 organizations in over 150 countries, including 85 of the Fortune 100. It is home to the Unit 42 threat research team and hosts the Ignite cybersecurity conference. It is a partner organization of the World Economic Forum.
Tarah Marie Wheeler is an American technology and cybersecurity author, public speaker, computer security professional, and executive. She is currently CEO of Red Queen Dynamics and Senior Fellow of Global Cyber Policy at the Council on Foreign Relations, and she is the author of Women in Tech.
The Center for Internet Security (CIS) is a US 501(c)(3) nonprofit organization, formed in October 2000. Its mission statement professes that the function of CIS is to " help people, businesses, and governments protect themselves against pervasive cyber threats."
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.
Raheem Beyah is an American computer engineer, researcher, and educator. As of January 15, 2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean, he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic, Inc.
Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries, and redefining trust parameters for improved security in the cloud.
{{cite book}}
: |website=
ignored (help)