Interviews/Podcasts



  • Cyber Risk Quantification Explained: How to Turn Security into Business Decisions with Vishal Mashi - Mar 2026
           Zephon - Source
  • Aligning Cyber Risk with Business Goals with Victor Monga - Mar 2026
           AI and GRC Podcast - Source
  • US Risks Slipping Backward When It Comes to Cyber Talent, Skills - Nov 2025
           Dice.com - Source
  • Next Generation Ransomware and Endpoint Defense - Oct 2025
           Cyber Defense Media Group - Source
  • Demystifying Cyber Insurance: A Strategic Toolkit for CISOs Navigating Risk, Coverage, and Claims with Dr. Dustin Sachs, DCS - May 2025
           CyberRisk Collaborative - Source

Essays/Articles



  • Quantifying Cyber Risk: Leveraging CRQ and FAIR for Informed Insurance Decisions- Mar 2026
           Medium.com - Source
  • Lost in Translation: Mastering the Lingua Franca of Cybersecurity and Business- Jan 2026
           Medium.com - Source
  • The (formerly) Unsung Incident Response Plan- Jul 2023
           Medium.com - Source
  • In Cyber Insurance, It’s More Than Technical Controls- Jun 2023
           Medium.com - Source
  • Case Study: Conducting a Risk Assessment for an Electrical Utility- Mar 2023
           International Conference on Cyber Warfare and Security/ACI - Source
  • More Essays/Articles
  • An Examination of SaaS Use Cases- Nov 2022
           Medium.com - Source
  • Security Considerations With Working Remotely- Oct 2022
           System Weakness - Source
  • The Effects of Technological Change on Organizations and Employees- Oct 2022
           Medium.com - Source
  • The importance of understanding SaaS licensing models- Oct 2022
           Medium.com - Source
  • Becoming Comfortable Being Uncomfortable- Sep 2022
           Medium.com - Source
  • The Importance of Roles in Change Management- Sep 2022
           Medium.com - Source
  • A Journey Through Leadership- Aug 2022
           Medium.com - Source
  • Your Mission Statement Must Be Based On Your Values- Aug 2022
           Medium.com - Source
  • Adaptive Leadership in Times of Change- Jul 2022
            Startup & Leadership - Source
  • If I Were Going to Pivot to a Career in Business Continuity Management…- Jul 2022
           Medium.com - Source
  • Application Security Assessments as Risk Management- Jun 2022
           System Weakness - Source
  • Case Study: Business Continuity Planning for a Guitar Maker- Jun 2022
           Medium.com - Source
  • Disaster Recovery: A Practical Exercise- May 2022
           Medium.com - Source
  • Case Study: Nissan’s Revival Plan- May 2022
           Medium.com - Source
  • Understanding Rewards and Motivations in Employees- May 2022
           Medium.com - Source
  • Monitoring Economic Systems in Times of Unrestricted Warfare- Apr 2022
           Medium.com - Source
  • Life in a Time of Constant Change- Apr 2022
           Medium.com - Source
  • A Comparison in Leadership Styles: Bezos and Fraser- Mar 2022
           Medium.com - Source
  • Case Study: Nokia’s Use of Cross-Functional Teams- Mar 2022
           Medium.com - Source
  • Leadership in Cybersecurity: An Examination of a Transformational Leader with Vision- Feb 2022
           Medium.com - Source
  • Protecting All of the Layers- Jan 2022
           System Weakness - Source
  • Viruses, Worms, and Trojans Horses...oh my!- Dec 2021
           System Weakness - Source
  • Understanding the Relationship between CWE and CAPEC Through Two Scenarios- Dec 2021
           Medium.com - Source
  • An Examination of Select Controls for Enforcing the CIA Triad- Nov 2021
           Medium.com - Source
  • Is Outsourcing IT Systems to the Cloud Worth the Audit Hassle?- Oct 2021
           Medium.com - Source
  • Using MITRE's ATT&CK® Framework to Protect Mobile Devices- Oct 2021
           Medium.com - Source
  • External Reviews of Your Risk Management Function? Yes Please.- Oct 2021
           Medium.com - Source
  • COBIT or ISO 27k: Knowing Their Role Will Help Your Organization- Sep 2021
           LinkedIn.com - Source
  • Case Study: TJ Maxx's Data Breach- Sep 2021
           Medium.com - Source
  • Section 230 Needs to be Adapted for Changing Times- Sep 2021
           Medium.com - Source
  • An Ethical Analysis of the Sony Hack Response- Sep 2021
           Medium.com - Source
  • Addressing the Digital Divide- Aug 2021
           Medium.com - Source
  • Case Study: AWS and Capital One- May 2021
           System Weakness - Source
  • No, it’s not cyberterrorism.- Feb 2015
           Cyber Defense Magazine - Source
  • Cyberterrorism as a Strategy (Four-part Series)- Nov 2014
           Infosec Institute - Source
  • Ethical challenges of the internet of things.- Jan 2014
    with Angela Orebaugh
           SC Magazine - Source
  • The Ethics of Monitoring Your Employees- Sep 2013
           Infosec Island (Originally) - Source
  • New Training Model for Advanced Persistent Threat Detection and Mitigation- Jun 2013
           Infosec Island - Source
  • Why a technically competent cyber workforce is not enough- Mar 2013
    with Sean Kern, Ken Peifer, Greg Touhill, Doug Capellman, Geoff Hancock, Royce Holden, Ajay Porous,Vishwas Rudramurthy, Arjun Singh, Ragna Sveinsdottir, Jeff Teo, George Valencia, and Sameer Valiyani
           Cyber Security Forum Initiative - Source
  • Location, Location, Location: It Works in Risk Management- Mar 2012
           Infosec Island - Source
  • Conducting a Penetration Test/Vulnerability Analysis to Improve an Organization’s Information Security Posture- Oct 2010
    with Rhett Marsh
           Applied Network Solutions - Source
  • Using Enterprise Security Architectures to Align Business Goals and IT Security within an Organization- Apr 2010
    with Rhett Marsh
           Applied Network Solutions - Source
  • Measuring Risk Using Existing Frameworks- Jan 2005
    with Fran Neilsen
           Taylor and Francis - Source
  • What does the CSI/FBI survey really tell us?- Jan 2003
           Computer Security Journal - Source
  • Just Because You Aren't Sick Doesn't Mean You Are Healthy- Jan 2003
           Government Security News - Source

Presentations



  • From Cyber Noise to Resilient Enterprises: Why Identity and Visibility Decide Outcomes - Mar 2026
    ManageEngine Shield NXG 2026, Presenter, ManageEngine
  • Leveraging the SABSA Model to Align Business Requirements with Security Controls - Mar 2026
    CyberRisk Collaborative LA Chapter Dinner, Presenter, CyberRisk Alliance
  • Building Robust Security Systems for Modern Organizations - Sep 2025
    2025 Fal.con, Presenter, CrowdStrike
  • Risk Management, Enterprise Security Architecture, and Business Continuity - Jul 2025
    Cyber Breakfast Club - Denver, Presenter, Cyber Breakfast Club
  • What Insurance Companies See When They Look At Your Cyber Program - May 2025
    ISACA Los Angeles Spring Conference, Presenter, ISACA Los Angeles
  • More Presentations
  • Elevating IT Risk to the Boardroom - Nov 2024
    Let's Talk Security Forum, Panelist, Let's Talk Secuirty
  • Incident Response Readiness - Feb 2024
    ISACA Orange County Webinar, Moderator, Virtually Testing Foundation
  • Zero Trust -  Another Security Buzzword or a Real Paradigm Shift? - Jan 2024
    2024 Enterprise Leadership Network Mini-Retreat, Moderator, ELN3
  • Cyber Risk Management will be a Top Priority for Business Leaders - Sep 2023
    2023 September Cybersecurity, Privacy and Data Protection Retreat, Moderator, Executive Leadership Network
  • Human error is still one of the primary reasons for the data breach - Jul 2023
    2023 July Cybersecurity, Privacy and Data Protection Retreat, Moderator, Executive Leadership Network
  • Showcasing the Super Engineer and Super Architect of the Future In The Context of MSSP and MSP Resilience - Jun 2023
    Managed Security Services Forum - Los Angeles, Panelist, MSSF
  • The Demand for Cyber Insurance is Going to Increase, But it’s Going to Become Harder to Get - May 2023
    2023 May Cybersecurity, Privacy and Data Protection Retreat, Moderator, Executive Leadership Network
  • Case Study: Conducting a Risk Assessment for an Electrical Utility - Mar 2023
    18th International Conference on Cyber Warfare and Security (ICCWS23), Presenter, ACI
  • Phishing Continues to Be a Problem - Sep 2022
    Cybersecurity, Privacy & Data Protection Retreat, Panelist, Sub-Four Capital
  • Addressing Today’s Top Five Cloud Security Challenges - Sep 2022
    Cybersecurity, Privacy & Data Protection Retreat , Moderator, Sub-Four Capital
  • GRC Extends Beyond the “Four Walls” of the Enterprise - Jul 2022
    Cybersecurity, Privacy & Data Protection Retreat, Panelist, Sub-Four Capital
  • Addressing Data Poverty to Combat Online Fraud is in Everyone’s Interest - Nov 2021
    2021 Cybersecurity, Privacy & Data Protection Retreat, Panelist, Sub-Four Capital
  • Building More Secure Applications - Oct 2021
    US Department of Transportation Cybersecurity Awareness Month, Presenter, US Department of Transportation
  • Ensuring Security in Global Cloud Environments - Jun 2021
    Content Protection Summit - Europe, Presenter, Content Delivery and Security Association (CDSA)
  • Security Careers - Feb 2020
    ToroHack Security Conference, Panelist, California State University - Dominguez Hills
  • Enterprise Vulnerability Management - Mar 2019
    Layer 8 Cybersecurity Conference, Speaker, California State University - Northridge
  • Certification and Accreditation as Part of Homeland Security - Jun 2006
    Security Awareness Week Training Session, Panelist, US Department of Transportation
  • ICS Certification and Accreditation Support System - Apr 2004
    Security Manager's Forum, Speaker, National Institute of Standards and Technology
  • Lessons Learned from the Common Criteria Process - Oct 2003
    Information Assurance Technical Framework Forum, Speaker, National Security Agency
  • Risk Considerations in the Development of a Security Operations Center: Maximizing Your Benefit (with Maria Horton) - Mar 2003
    NebraskaCERT Conference, Speaker, NebraskaCERT