Michael Gregg

Last updated

Michael Gregg
Nationality American
Education LeTourneau University (MBA)
Cornell University (Technology Leadership)
Villanova University (Certificate, IT Project Management)
Occupation(s) Computer security specialist, author, educator
Employer(s) Palo Alto Networks; North Dakota Information Technology; Superior Solutions, Inc.; Villanova University
Known for Cybersecurity leadership, public testimony
Notable workInside Network Security Assessment, Build Your Own Security Lab

Michael Gregg is an American computer security expert, author, and educator known for his leadership in public- and private-sector cybersecurity initiatives. He has written or co-authored more than twenty books on information security, including Inside Network Security Assessment and Build Your Own Security Lab. [1] Gregg is the CEO of Superior Solutions, Inc. and was appointed Chief Information Security Officer for the state of North Dakota. He has also testified before the United States Congress on cybersecurity and identity theft. [2] [3]

Contents

Education

According to his LinkedIn profile and congressional biography, Gregg holds two associate degrees, a bachelor's degree, and a master's degree. [4] [5] His education includes:

Gregg has served as lead faculty for the online cybersecurity program at Villanova University, where he developed and taught courses in penetration testing, digital forensics, and secure design. [5] He is also listed as a cybersecurity program advisor for DeVry University in Houston. [5] [4]

Professional certifications

CertificationAbbreviationDescriptionCitation
Certified Information Systems Security ProfessionalCISSPSenior-level cybersecurity credential [4]
Certified Information Security ManagerCISMGovernance and management-level cybersecurity credential [1]
Certified Information Systems AuditorCISAAuditing, control, and assurance for information systems [4]
Certified in the Governance of Enterprise ITCGEITEnterprise IT governance credential [1]
Systems Security Certified PractitionerSSCPIntermediate-level cybersecurity operations credential [1]
GIAC Security EssentialsGSECReal-world cybersecurity skills credential [1]
CompTIA Advanced Security PractitionerCASPAdvanced enterprise security certification [1]
Microsoft Certified Systems EngineerMCSEMicrosoft server and infrastructure architecture [6]
Cisco Certified Network AssociateCCNARouting and switching certification [1]
Certified Novell AdministratorCNANovell systems administration [1]
CIW Security AnalystCIWWeb and network security fundamentals [1]
CompTIA Network+Network+Foundational networking and infrastructure [1]
CompTIA A+A+Entry-level IT support and troubleshooting [1]
Certified Ethical HackerCEHPenetration testing and offensive security [1]
Computer Hacking Forensic InvestigatorCHFIDigital forensics and cybercrime analysis [1]
Microsoft Certified TrainerMCTAuthorized Microsoft instructor credential [6]
Certified Technical TrainerCTT+Instructor performance and delivery credential [6]
TruSecure ICSA Certified Security AssociateTICSAEntry-level vendor-neutral security cert (retired) [1]

Career

As of March 2025, Gregg serves as Chief Information Officer and Director of Field Strategy for Palo Alto Networks, where he leads strategic cybersecurity initiatives for public-sector and enterprise clients. [5]

From 2020 to early 2025, Gregg held several leadership roles within North Dakota Information Technology (NDIT). He was appointed Chief Information Security Officer (CISO) in June 2021 and previously served as Director of Cybersecurity Operations. As CISO, he built a 65-member team, established the state's first Cyber Fusion Center, and expanded endpoint protection from 20,000 to 250,000 devices. He implemented agile methodologies, including SIPOC diagrams and Scrum, to improve workflow velocity, and launched a third-party risk management framework that reduced remediation costs by 80 percent. [7] [8]

Prior to joining North Dakota state government, Gregg was Global Chief Information Security Director for International Container Terminal Services from 2017 to 2020. He led the development of a global cybersecurity program across operations on five continents, deploying vulnerability management tools, a security operations center (SOC), mobile device management, multi-factor authentication, and global security awareness campaigns. He also oversaw incident response, technical controls for IT/OT environments, and created CAPEX/OPEX security budgets. [5]

From 2007 to 2017, Gregg was CISO at Superior Solutions, Inc., a Houston-based consulting firm serving Fortune 500 companies and public agencies. His work included security assessments, incident response planning, and compliance strategies for health care, telecommunications, financial services, and property management clients. He helped secure government systems following cyberattacks and implemented HIPAA-compliant mobile access solutions. [9]

Concurrently, from 2004 to 2017, Gregg served as Lead of the Cybersecurity Program at Villanova University. He designed a multi-course professional certification curriculum, selected subject matter experts, and taught advanced cybersecurity topics as an adjunct professor. [5]

Gregg is a frequent keynote speaker at national and international cybersecurity conferences, including the (ISC)² Security Leadership Conference, Hacker Halted, and GovWare.

Media coverage

Michael Gregg has been featured as a cybersecurity expert across numerous national media outlets. He has appeared on television segments for Fox News, CBS News, ABC News, NBC News, CNN, CNBC , and ESPN , discussing topics such as webcam hacking, cell phone security, browser hijacking, and cyber fraud. In addition to television and radio appearances, Gregg has contributed articles and expert commentary to publications including The New York Times , HuffPost , Kiplinger , and TechTarget . His expertise has also been highlighted in online profiles, podcasts, and congressional briefings, establishing him as a recognized authority in cybersecurity. [10]

Appearances and print

Media outletTitle/topicTypeCitation
The New York Times“Phone hacking threat is low but it does exist”Article [11]
HuffPost“5 Ways HealthCare.gov Could Get Hacked”Article [12]
Kiplinger“5 Tips for Safe Online Shopping”Article [13]
Fox News“Webcam Hacking – Michael Gregg”TV segment [14]
CBS News“Cell phone hacking”TV segment [15]
CNBC“Cyber threats facing US companies”TV segment [16]
SecureWorld“Spotlight on Cybersecurity Leaders: Michael Gregg”Online profile [17]

Podcasts

Gregg has been featured as a guest on several cybersecurity-focused podcasts, where he has discussed risk management, workforce development, and public-sector innovation.

Gregg discusses his career path, leadership style, and cyber priorities as a state-level CISO.
Listen on Apple Podcasts
A conversation on layered cybersecurity strategies, endpoint management, and defense in depth.
Listen on Apple Podcasts
Gregg explores strategies to secure executive support for cybersecurity initiatives in large organizations.
Listen on Cyber Risk Management
Gregg explains the evolution of APTs and how organizations can prepare for advanced cyber threats.
Watch on YouTube

Congressional testimony

On January 16, 2014, Gregg testified before the United States House Committee on Science, Space, and Technology during the hearing HealthCare.gov: Consequences of Stolen Identity. [18] Appearing alongside cybersecurity professionals David Kennedy and Waylon Krush, he explained how breaches could compromise personal health records.

According to SecuritySift, Gregg explained that a successful breach could allow unauthorized access to personal data, with the worst consequences occurring after the initial compromise. [19]

He warned that linking federal and state exchanges created a broad attack surface, recommending encrypted data storage, multi-factor authentication, continuous vulnerability assessments, and targeted incident response planning. [20] The Houston Chronicle reported that Gregg cautioned about the potential “real-world damage” if security flaws were left unresolved. [21]

Awards and honors

Professional memberships

Publications

TitlePublisherISBN
CISSP Exam Cram Questions (2nd ed.)Que Publishing978‑0‑7897‑3807‑3
CISSP Exam Cram (2nd ed.)Que Publishing978‑0‑7897‑3806‑6
CISSP Exam Cram (1st ed.)Que Publishing978‑0‑7897‑3446‑4
Inside Network Security AssessmentSams Publishing978‑0‑672‑32809‑1
Certified Ethical Hacker Exam PrepQue Publishing978‑0‑7897‑3531‑7
Hack the StackSyngress Publishing978‑1‑59749‑109‑9
Syngress Force 2006 Emerging Threat AnalysisSyngress978‑1‑59749‑056‑6
Security Administrator Street Smarts (2nd ed.)Sybex978‑0‑470‑40485‑0
Security+ Study GuideSyngress978‑1‑59749‑153‑2
CHFI Study GuideSyngress978‑1‑59749‑197‑6
InfoSecurity 2008 Threat AnalysisSyngress978‑1‑59749‑224‑9
CompTIA Security+ Certification KitWiley978‑0‑470‑40486‑7
CISA Exam PrepQue Publishing978‑0‑7897‑3573‑7
Build Your Own Security LabWiley978‑0‑470‑17986‑4

Legacy and impact

Gregg has contributed to state-level cybersecurity efforts through the development of the Joint‑Cybersecurity Operations Command (J‑CSOC), an initiative that originated in North Dakota and expanded into a multi-state cyber threat intelligence network. The program facilitates information sharing and coordination among state governments on cybersecurity matters. [27] [28]

In 2024, Gregg was recognized by Government Technology magazine as part of its Doers, Dreamers & Drivers list, which cited his work incorporating artificial intelligence into cybersecurity operations and supporting the creation of cybersecurity apprenticeship programs focused on workforce development. [29]

His work has been referenced in discussions on public-sector approaches to digital infrastructure, emphasizing intergovernmental collaboration and strategies to address workforce shortages in cybersecurity.

References

  1. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 "Pearson IT Certification" . Retrieved June 24, 2025.
  2. HealthCare.gov: Consequences of Stolen Identity. U.S. Government Printing Office. 2014.
  3. "Hearing transcript". GovInfo.
  4. 1 2 3 4 "Congressional bio" (PDF). U.S. House of Representatives. Retrieved June 24, 2025.
  5. 1 2 3 4 5 6 7 8 9 "Michael Gregg – LinkedIn". LinkedIn. Retrieved June 24, 2025.
  6. 1 2 3 "Microsoft Press Store" . Retrieved June 24, 2025.
  7. "Michael Gregg named North Dakota CISO". Security Magazine. Retrieved June 24, 2025.
  8. "GovTech profile". Government Technology. Retrieved June 24, 2025.
  9. "InformIT author bio". InformIT. Retrieved June 24, 2025.
  10. "Superior Solutions News – Media Coverage". Superior Solutions. Retrieved June 24, 2025.
  11. "Phone hacking threat is low but it does exist". The New York Times.
  12. "5 Ways HealthCare.gov Could Get Hacked". HuffPost.
  13. "5 Tips for Safe Online Shopping". Kiplinger.
  14. "Webcam Hacking – Michael Gregg". YouTube.
  15. "Cell phone hacking – CBS News". Superior Solutions.
  16. "Cyber threats facing US companies". CNBC.
  17. "Spotlight on Cybersecurity Leaders: Michael Gregg". SecureWorld.
  18. "Hearing transcript". GovInfo.
  19. "Securing Healthcare.gov – summary of testimony". SecuritySift.
  20. "HealthCare.gov written testimony". GovInfo.
  21. "Houston IT expert testifies about HealthCare.gov security". Houston Chronicle.
  22. "Spotlight on Cybersecurity Leaders: Michael Gregg". SecureWorld.
  23. "Michael Gregg receives CISO award and White House invitation". LinkedIn.
  24. "GovTech Top 25 Profile – Michael Gregg". GovTech.
  25. "Michael Gregg – Ponemon Institute Fellow". Ponemon Institute.
  26. 1 2 "Michael Gregg – TechTarget contributor profile". TechTarget.
  27. "ND‑founded multi‑state cyber command expands".
  28. "GovTech profile".
  29. "GovTech Top 25 Doers, Dreamers & Drivers". North Dakota Information Technology.