Sign in to view Daniel’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Daniel’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Litchfield Park, Arizona, United States
Sign in to view Daniel’s full profile
Daniel can introduce you to 10+ people at Exponent
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
16K followers
500+ connections
Sign in to view Daniel’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Daniel
Daniel can introduce you to 10+ people at Exponent
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Daniel
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Daniel’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Daniel
-
Congratulations Michael Echols
Congratulations Michael Echols
Congratulations to my good friend Mr. Michael Echols who was just nominated for the 2016 CSO of the Year award.
52
14 Comments
Activity
16K followers
-
Daniel Shuler, CISSP, PMP reposted thisCactusCON is two weeks out and it’s worth showing up, no matter where you are in your security career. If you’re breaking in, there are solid “how to get a job” sessions. If you’re a practitioner, you’ll find talks that sharpen real-world skills. If you’re a leader, the CISO Village is genuinely valuable. The best part: it plugs you directly into the Arizona cybersecurity community. If you’re local or coming in remotely, you owe it to yourself to go!Daniel Shuler, CISSP, PMP reposted thisCactusCon is happening in two weeks! Do you have your tickets?! This is going to be amazing! You don't want to miss it! The CISO village is back and going to be better than ever! There are some amazing workshops that you can join to solve some of the complex problems we're seeing as cybersecurity leaders with other leaders! David Colombo is also going to join as our keynote speaker. Thank you to all the truly awesome people who have helped make this year become even better! Andrew Wilson, Michael Manrod, Lester Godsey, Daniel Shuler, CISSP, PMP, Lock Langdon, Dina Mathers, Mark Dallmeier, Ed Vasko, CISSP, C/CISO
-
Daniel Shuler, CISSP, PMP shared thisThanks for the Opportunity! A huge thank you to Fern for hosting me on his podcast and facilitating such a wonderful conversation. Fern R., you're an ANIMAL! It was an incredible experience to share insights and discuss some of the fundamentals of security, but also some fringe topics that really made me think. Special thanks to Michael Manrod and Michael Echols for convincing me to do the podcast and connecting me with Fern. Your support and encouragement made this possible! Looking forward to more engaging discussions in the future! #inthethickofIT
-
Daniel Shuler, CISSP, PMP shared this👉 Getting a data center set up can be a complicated process, requiring extensive design, construction, and safety requirements. Learn how to meet these challenges and more in Exponent’s next live webinar “Key Considerations in Data Center Design & Construction” Wednesday, May 14, 2025, 10 a.m. - 11:30 a.m. PDT. Details and registration form here: https://hubs.li/Q03jptcC0 #Exponent #Webinar #Utilities #ConstructionConsulting #Engineering #DataCenterDesign #DataCenterKey Considerations in Data Center Design & ConstructionKey Considerations in Data Center Design & Construction
-
Daniel Shuler, CISSP, PMP reposted thisDaniel Shuler, CISSP, PMP reposted thisAnybody want to come on our new gameshow hosted by Andy Jordan, called Who Wants to be a CISO? Ok, there is no gameshow, but we have something even better at the CactusCon #CISO track. Welcome to the learning experience where you will have an action-packed day of learning to help you understand what it takes to transition into, succeed in, and advance within the #CISO ranks. Since the original CactusCon days at Dave & Buster's Inc., many of us that were in the early stages of our careers, now have years of experience and are looking to how to stop complaining about security programs, and how instead to start shaping and directing them. If that is you, this is your track. We will take over the largest ballroom in the Marriott Hotels Delta Hotel in Mesa Saturday 2/15 for a series of panels and "science fair" style workshops that will build skills and understanding related to what it takes to be a CISO. We hope you will join us for this experience for learning, networking, and fun next month!! Select Get Tickets and scroll down to the bottom for CISO Event. https://lnkd.in/gKTm-CvU Special thanks to Andrew Wilson, Christine Wilson, and the CactusCon leadership for making this dream possible; to Andy Jordan for the leadership and vision to make this happen, and to Christian, Dina, Daniel, Ed, Kim, Lester, Mark, Pete, Ryan, and others - for supporting CactusCon #CISO village both in 2024 and 2025!!
-
Daniel Shuler, CISSP, PMP shared thisThe event last year was great, but it can be better with YOU as a speaker!Daniel Shuler, CISSP, PMP shared thisLast year @ CactusCon, I worked with a couple other cybersecurity leaders and friends to establish the CISO Village. I've always felt that being a CISO/Security Leader is complex and nuanced. However, I've learned through my own experience, that every CISO is different. Every organization has different needs. So in order to learn how to be better, I've always wanted to learn many of the different approaches that can be used to establish, mature, and transform cybersecurity programs. So I'd love to learn more from you! I've always envisioned this like an 8th grade science fair where each person is building a volcano. Sure, at the core level, they're all volcano made of vinegar and baking soda. However, how each person build it is different. So many people came up last year and said they wanted to be part of the CISO Village last year. THIS IS YOUR CHANCE! Please share your ideas and stories about what made your "volcano" amazing. Please submit your CFP! https://lnkd.in/gnSRWC26 Let's grow together about how we can grow our cybersecurity programs #CactusCon #CISOVillage #Cybersecurity #CISO #NewGenesisSolutions #CyberProgramDevelopment #Leadership
-
Daniel Shuler, CISSP, PMP shared thisDaniel Shuler, CISSP, PMP shared thisEven if you don’t know the Exponent name, you know our work. As behind-the-scenes experts for some of the world’s biggest disasters and recalls, we’ve analyzed everything from building collapses to chemical spills to high-profile product failures. Today, we combine that knowledge with a vast array of scientific and engineering expertise to help our clients build future-focused solutions for their most profoundly unique, unprecedented, and urgent challenges. To show how we’re helping create a safer, healthier, more sustainable, world, Exponent is excited to announce the launch of a new website. Learn more here: https://hubs.li/Q01Jp5Ht0 #Exponent #BringIttotheExperts #BringIt
-
Daniel Shuler, CISSP, PMP shared this#proofpointhalloween Thank you Adam. Well done today. Thank you Proofpoint, the kids had a great time!!
-
Daniel Shuler, CISSP, PMP shared thisIt's great to work for a company that can make an impact. #TogetherWeCanMakeAnImpact #TheExponentImpactDaniel Shuler, CISSP, PMP shared thisAt #Exponent, we are committed to the #Advancement of #Science, #Diversity and #Investment in #OurPeople, and #Safety and the #Environment. Click to learn how Exponent and our staff are making an impact. https://lnkd.in/gnat3RJ #TogetherWeCanMakeAnImpact #WeAreExponent #Exponent #WhenYouNeedToKnow
-
Daniel Shuler, CISSP, PMP shared thisI am looking for a partner. Someone to join forces with and take Exponent to the next level. #careeropportunities #joblistings
-
Daniel Shuler, CISSP, PMP liked thisDaniel Shuler, CISSP, PMP liked thisHello World! 🤩 🚀 🤗 If you’ve spoken with me over the past year and asked about Gambit Security, you’ve probably heard me say this more than once: PTV: People. Technology. Vision. It’s almost impossible to find all three in one place - yet somehow, Gambit does. A group of incredibly smart, humble, hard-working people, reinventing how companies protect what matters most: keep the business running - no matter what I joined as the first business hire - before a single customer - flying back and forth with what I genuinely believe is one of the best founding teams out there - then coming back home to people who kept pushing the technology forward. That journey led to our Series A - raising $60M+ led by Cyberstarts Kleiner Perkins and Spark Capital From day one, Cyberstarts brought real partnership and remarkable professionalism. Lior’s sharp guidance is incomparable. And to Pete and Adam - the combination of a world-class former CISO and an Ex-Okta CRO has been instrumental. They’ve become much more than “partners.” To everyone who believed in us before anything existed - Aaron, Jason, Hunter, Ed, Andrew, Iain, Tom, Olga, Meital, Nelson, Inbal, Fern - Thank You! Lastly - Alon, Sa'ar, May, and Matt - thank you for the trust, the friendship, and the leadership. I’m honored to be on this journey with you. Let’s make history 🚀
-
Daniel Shuler, CISSP, PMP liked thisDaniel Shuler, CISSP, PMP liked thisWhat a week on the West Coast- and a powerful reminder of why this community is so special. Grateful (and honestly a little in awe) of the brilliant, generous humans who show up for each other again and again. A quick stop in San Jose turned into hugs and deep conversations with friends from the The CISO Society. Huge thanks to Jason Cenamor and team for building a space where no matter what city you land in, you’re among friends. Then it was a sprint from SFO to an unforgettable evening with Rich Mason and friends- incredible food, a stunning home backdrop, and even better conversation. We dug into CISO CYA and the growing importance of legal defensibility, in a rapidly changing world. Big appreciation to Orrick, Herrington & Sutcliffe LLP and Redapt, Inc. for convening such a thoughtful group around a topic that matters more than ever. The energy carried straight into the Waste Management Phoenix Open, reconnecting with old colleagues, making new friends, and capping the night with a small dinner at Nobu Scottsdale where conversations went deeper and connections got stronger. And the week still wasn’t done. The CISO Village at CactusCon was incredible. Huge shoutout to Andy Jordan - CISSP, CISM for bringing that vision to life. We workshopped, we learned, we shared. Best part? Watching the next generation get involved. My daughter fully embraced the hacker spirit - selling Girl Scouts of the USA cookies to my friends, joining CactusCon Kids, picking locks, and soldering her own badge. 💚 Cybersecurity is hard. Leadership can be heavy. But weeks like this remind me: we don’t do it alone. Community is the real force multiplier. Vamsi Kaipa Chris Bollerud, MBA, CISSP, CISM Puneet Thapliyal Chris Kirschke Randolph Barr Manoj Apte Michael Elmore James Costello Tonia D. Jason Lish Justin Somaini Mannie Romero, MBA, OSCP, GPEN, CISSP-ISSEP, GCFE, GCSA Morgan Reed Tim Roemer Kris Weathermon Fern R. Daniel Shuler, CISSP, PMP David Colombo Dina Mathers Joe Vadakkan Jean Shapiro, CISM Tiaira Fitzgerald Cassidy Trowbridge Dara Gibson Han Cho Kuruvilla Mathew Christopher Mendoza Matt Clark Michael Manrod Lester Godsey Lock Langdon Dominique Nazario Nalneesh Gaur Patrick Rooney
-
Daniel Shuler, CISSP, PMP liked thisDaniel Shuler, CISSP, PMP liked thisJoin Bindi, Tim, and I for our first session in 2026, Tomorrow morning!
-
Daniel Shuler, CISSP, PMP liked thisDaniel Shuler, CISSP, PMP liked thisArizona Tech Leaders, this one matters. The SIM Arizona #Board and I are excited to announce the 2026 SIM Arizona #SwingforSTEM #Golf Tournament, our very first event of its kind. We invite the Arizona technology community to help us set the tone. 📅 April 24, 2026 📍 The Orange Tree Golf Resort 📍 Scottsdale, AZ Register HERE: https://lnkd.in/dwYyYXxJ ⛳️This is not just another networking event or a day on the course. It is a statement about who we are as leaders and what we choose to invest in. Every dollar raised will support STEM education and scholarships, opening doors for students who will shape the future of our industry and our state. 🎓🔬💻 Whether you are a CIO, CISO, other technology leader, or an industry partner, there is a place for you. Golf with us. Sponsor a student. Bring your team. Or simply show up in support of the mission. If you believe in strengthening Arizona’s tech ecosystem and giving back in a meaningful, tangible way, we would love to see you there. Let’s make this inaugural event one to remember and the first of many. 🚀 #SIMArizona #SwingForSTEM #ArizonaTech #TechLeadership #TechForGood #STEMEducation #CommunityImpact
-
Daniel Shuler, CISSP, PMP liked thisDaniel Shuler, CISSP, PMP liked this⛳️ As the host city of the WM Phoenix Open, “The People’s Open,” the City of Scottsdale takes on the responsibility of operating a city-within-a-city, at scale, in real time, and with zero margin for error. This week, I had the privilege of co-hosting a #WMPO Technology Leaders Behind-the-Scenes tour that highlighted how Scottsdale delivers the full technology public safety stack required to support more than one million guests during tournament week. What makes this possible is the extraordinary collaboration across our organization. Scottsdale #Police, #Fire, #IT, and #EmergencyManagement teams work as one, coordinating real-time data, communications, infrastructure, drone operations, and first-responder response in one of the most dynamic sporting event environments in the world. My colleagues and I were honored to welcome an incredible group of peers on the tour, including SIM Arizona and ArizonaCIO community members, as well as other public- and private-sector technology leaders from across the region. The dialogue and shared insights reinforced the value of partnership, applied leadership and expertise, and learning from real-world operations. Proud of how Scottsdale shows up as a host city. Grateful for the teams who make it happen and the leaders who joined us behind the scenes. This is technology in action - and teamwork at its best! #WeareScottsdale #WMPO #ThePeoplesOpen #PublicSafety #GovTech #Events #PublicPrivatePartnership #TechnologyLeadership #CIO #SIMArizona #InspireCIO
-
Daniel Shuler, CISSP, PMP liked thisCactusCON is two weeks out and it’s worth showing up, no matter where you are in your security career. If you’re breaking in, there are solid “how to get a job” sessions. If you’re a practitioner, you’ll find talks that sharpen real-world skills. If you’re a leader, the CISO Village is genuinely valuable. The best part: it plugs you directly into the Arizona cybersecurity community. If you’re local or coming in remotely, you owe it to yourself to go!Daniel Shuler, CISSP, PMP liked thisCactusCon is happening in two weeks! Do you have your tickets?! This is going to be amazing! You don't want to miss it! The CISO village is back and going to be better than ever! There are some amazing workshops that you can join to solve some of the complex problems we're seeing as cybersecurity leaders with other leaders! David Colombo is also going to join as our keynote speaker. Thank you to all the truly awesome people who have helped make this year become even better! Andrew Wilson, Michael Manrod, Lester Godsey, Daniel Shuler, CISSP, PMP, Lock Langdon, Dina Mathers, Mark Dallmeier, Ed Vasko, CISSP, C/CISO
Experience & Education
-
Exponent
***** *********** ******** *******
-
******** ******** ********* *******
******* ******* * ******** ***** ******* ******** *** *********** ***** ********
-
******* ********** ********
***** *********** ******** *******
-
******* ************* **********
********** ****** *********** ********** Magna Cum Laude
-
View Daniel’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
-
-
-
CISSP
International Information Systems Security Certification Consortium (ISC2)
-
Volunteer Experience
-
Member
West Valley Mavericks
- Present 13 years 4 months
Philanthropic Organization helping raise funds and awareness for West Valley Charities.
-
Board of Trustees
Abrazo Community Health Network
- Present 12 years 4 months
Health
Ensuring high-quality health care is provided to the citizens of the West Valley.
Honors & Awards
-
NACo Achievement Award
National Association of Counties
Office of Enterprise Technology Capability Maturity Model
Abstract:
The need to measure performance is necessary to demonstrate successful deployment of strategy and solutions. The Maricopa County Office of Enterprise Technology (OET) has established a Capability Maturity Model based on its Cyber Security strategy to provide effectiveness measurements that demonstrate the ability to address Cyber Security threats. The Capability Maturity Model breaks down the components established in…Office of Enterprise Technology Capability Maturity Model
Abstract:
The need to measure performance is necessary to demonstrate successful deployment of strategy and solutions. The Maricopa County Office of Enterprise Technology (OET) has established a Capability Maturity Model based on its Cyber Security strategy to provide effectiveness measurements that demonstrate the ability to address Cyber Security threats. The Capability Maturity Model breaks down the components established in the Cyber Security Strategy and by using best practice standards identified by the National Institute of Standards and Technology (NIST), leverages questionnaires that measure performance. The assessment program is also applied to other Maricopa County Information Technology departments to establish an overall indication of performance in measuring risk to the County’s technology infrastructure. -
NACo Achievement Award
National Association of Counties
Office of Enterprise Technology Cyber Security Strategy
Abstract:
Cyber security risks, while not visible to the human eye, are abounding in data networks and on information systems. These risks are not easily understood by the non-practioner because of the maturity of the general Cyber Security practice as a whole. Cyber security risks are identified by understanding how likely it is that threats will exploit vulnerabilities to create impacts. As a result, the Cyber Security risks…Office of Enterprise Technology Cyber Security Strategy
Abstract:
Cyber security risks, while not visible to the human eye, are abounding in data networks and on information systems. These risks are not easily understood by the non-practioner because of the maturity of the general Cyber Security practice as a whole. Cyber security risks are identified by understanding how likely it is that threats will exploit vulnerabilities to create impacts. As a result, the Cyber Security risks are quantified by understanding the threats, vulnerabilities, and impacts that would have a visible consequence to the organization. Cyber Security threats are actors (computer or human) that serve to exploit vulnerabilities to create undesired impacts.
Languages
-
English
-
Recommendations received
-
LinkedIn User
“When it comes to understanding the needs of security within Healthcare environment, Daniel is a visionary leader that has the capabilities of designing and implementing holistic solutions that meet the balance between security and user requirements / functions. He is an honest, ethical individual always looking out for what is best for the organization. There are a lot of people that are not able to forecast security needs, yet Daniel has shown he is able to plan for the future, while saving the organization time and reduce overall costs.”
5 people have recommended Daniel
Join now to viewView Daniel’s full profile
-
See who you know in common
-
Get introduced
-
Contact Daniel directly
Other similar profiles
-
Larry Dennis, CISSP, CRISC, CCISO
Larry Dennis, CISSP, CRISC, CCISO
Information Security Consultant
4K followersHampton Roads, Virginia Metropolitan Area
Explore more posts
-
Richard Staynings
Cylera • 26K followers
The Environmental Protection Agency is working with water and wastewater utilities to identify critical devices that may be exposed to cybersecurity threats. The efforts come as the EPA warns utilities may not be fully aware of their risk exposures stemming from a reliance on third-party vendors. The EPA last week released a new “cybersecurity procurement checklist” and several other cyber guides geared toward water and wastewater utilities. The EPA is responsible for overseeing cybersecurity in the water and wastewater sector. In the last year, the EPA began searching for and identifying internet-exposed operational technology devices used by water and wastewater systems, the EPA’s Cole Dutton said on a recent webinar hosted by Censys. Dutton is a water and wastewater cybersecurity analyst in the water infrastructure and cyber resilience division at the EPA’s Office of Ground Water and Drinking Water. “What I have found in this year of discovery, and as we get into our next year in this platform, is there is a general lack of asset awareness across the water sector,” Dutton said during the Oct. 21 webinar. “Many of the times when we’ve performed outreach and notifications, the systems just did not know that they had those devices internet-exposed.” The Cybersecurity and Infrastructure Security Agency has warned that hackers could take advantage of exposed human-machine interfaces in the water sector to potentially disrupt water treatment processes, posing a major safety concern. https://lnkd.in/gj4bCZnj
10
-
Mark E.S. Bernard, Trusted Advisor to BoD and Executive Team
Innovative cybersecurity… • 33K followers
ISO/IEC 27001 ISMS provides an excellent framework standard for information governance. I created the ISMS Reference Architecture to map 140 program management control points to seven critical program management procedures, governance, risk management, continual improvement, internal audit, program communications, training and awareness, information handling.
27
-
Tobias Musser
MNS Group • 12K followers
CMMC Level 2 Assessment Objective: External Connections (Controlled Unclassified Information [CUI] Data) PRACTICE: Organizations must verify and control/limit connections to and use of external systems. ASSESSMENT: External systems are systems or components of systems for which organizations typically have no direct supervision and authority over the application of security requirements and controls, or the determination of the effectiveness of implemented controls on those systems. Organizations have to control and manage connections between the company network and outside networks as well as access to corporate networks from personally owned devices. Be prepared! Your assessor could ask to 🔍 EXAMINE access control policy. 🗣 INTERVIEW personnel with responsibilities for defining terms and conditions for use of external systems to access organizational systems. 📝 TEST mechanisms implementing terms and conditions on use of external systems. (CMMC Assessment Guide: Level 2 Version 2.13, page 58) #CMMC #DoD #cybersecurity #NIST #InformationSecurity #assessment #defense
65
-
Richard Staynings
Cylera • 26K followers
A foreign threat actor infiltrated the Kansas City National Security Campus (KCNSC), a key manufacturing site within the National Nuclear Security Administration (NNSA), exploiting unpatched Microsoft SharePoint vulnerabilities, according to a source involved in an August incident response at the facility. The breach targeted a plant that produces the vast majority of critical non-nuclear components for US nuclear weapons under the NNSA, a semi-autonomous agency within the Department of Energy (DOE) that oversees the design, production, and maintenance of the nation’s nuclear weapons. Honeywell Federal Manufacturing & Technologies (FM&T) manages the Kansas City campus under contract to the NNSA. https://lnkd.in/giNSG9P5
22
1 Comment -
Allan Friedman, PhD
TPO Group • 5K followers
CISA has published a draft of the new CISA SBOM Minimum Elements! The 2021 NTIA Minimum Elements were an important step to help create a common specification of what should be in an SBOM. CISA is proposing an updated, clarified version that can be aligned with existing tools and support use cases. They are actively seeking feedback, so please share, review, and send them your thoughts! https://lnkd.in/eRm_zxT2
201
13 Comments -
Alan L. Soares
Siemens Energy • 30K followers
🚨 NIST releases updated guidance on cybersecurity incident response! The new NIST SP 800-61 Revision 3, published in April 2025, introduces significant updates and is now aligned with the NIST Cybersecurity Framework (CSF) 2.0. 📌 Key highlights: - Integration of incident response into overall cybersecurity risk management (CSF 2.0); - Greater emphasis on preparation, detection, and effective recovery; - Support for automation (SOAR) and cyber threat intelligence (CTI); - Encourages collaboration across internal teams and external partners; - Adds focus on performance metrics, compliance, and continuous improvement; - Addresses modern threats like APTs, ransomware, and deepfakes. This release positions incident response as a strategic organizational capability, not just a technical function—strengthening cyber resilience. 📄 Read more: https://lnkd.in/dKdNw47W
16
5 Comments -
CyberMaterial
24K followers
🚨 Breaking into GRC Cybersecurity? This 2025 guidebook is a must-read for aspiring professionals in Governance, Risk, and Compliance (GRC). Whether you're just starting out or pivoting into the cybersecurity field, this personalized guide by A.S. covers: ✅ Key GRC components ✅ Roles & skills for GRC pros ✅ Risk management strategies ✅ Compliance frameworks like GDPR, HIPAA, PCI DSS, NIST ✅ Tools like Splunk, LogicManager, OneTrust, and RSA Archer ✅ Best practices to stay compliant and resilient Perfect for students, entry-level professionals, and career changers in cybersecurity. 📘Credits @A.S. 🔁Recommended by CyberMaterial #Cybersecurity #GRC #RiskManagement #Compliance #Infosec #NIST #HIPAA #GDPR #SecurityCareers #CyberTalent #Governance #CyberJobs #CyberSkills
27
-
Evan Lee
TANDMM • 4K followers
CISA just told federal agencies to remove end-of-support edge devices from their networks. Firewalls. VPNs. Routers. Anything unsupported and exposed. Good! But here’s the real question, what happens between now and replacement? - Procurement takes months. - ATO cycles take longer. - Production environments cannot always swap hardware overnight. Let's be honest, Inventory is not control. Policy is not containment. If a vulnerable edge device is still reachable, it is still an entry point. The stronger question is not: “Is it patched?” It is: “Is it reachable right now?” There is only one way to truly eliminate exposure during transition windows. Physically remove reachability. If you are navigating BOD 26-02 and need a way to eliminate exposure immediately while replacement plans catch up, message me.
19
1 Comment -
Dr. Darren Death
Export-Import Bank of the… • 25K followers
In my new article published by ICIT, Executing the RMF as an Engineering Discipline, not a Paperwork Exercise, I discuss how the Risk Management Framework must function as part of engineering, not as a compliance process. RMF was created to align design, implementation, and operations so that control performance is demonstrated through verified system behavior rather than documentation. The article explains how integrating RMF into development pipelines, architecture decisions, and operational telemetry allows authorization decisions to reflect real conditions in production. When security is designed, tested, and monitored as part of engineering, the framework delivers what it was meant to provide. Systems maintain authorization by demonstrating continued security in operation. Read the full article on ICIT: https://lnkd.in/eup93tvi #cybersecurity #technology
19
-
Dan Lohrmann
Presidio • 45K followers
Cyber Attack Impacting Oregon Environmental Department The Oregon Department of Environmental Quality has reported a cyber attack that is affecting communications and operations including vehicle inspections. Some services will be shuttered through the weekend. #Oregon #cyber #cybersecurity #cyberattack #government https://lnkd.in/exc6as2w
14
3 Comments -
Jonathan Risto P. Eng
Most exposure programs don’t… • 3K followers
I’ve been thinking about exposure management less as a tooling problem and more as a systems problem. When discovery grows faster than mobilization capacity, exposure doesn’t just increase — it compounds. That accumulation is exposure debt.
16
2 Comments -
Horizon3.ai
27K followers
Your #EDR Healthcheck doesn’t end with findings — it drives measurable outcomes. ✔️ Maximize ROI: Benchmark performance before renewals or migrations. ⚡ Accelerate response: Correlate attacks with logs for faster tuning. 🧾 Prove compliance: Map real evidence to SOC 2, NIST, and CIS frameworks. That’s how leading teams transform EDR validation into business value. 🔗 Turn validation into outcomes: https://lnkd.in/g--XVzre #EndpointSecurity #OffensiveSecurity #pentesting
14
-
Aviatrix
50K followers
Encryption has become the new compliance frontier. HIPAA, PCI DSS 4.0, GDPR, and NIS2 all now require encryption across clouds and hybrid environments. If your security still stops at the perimeter, it’s time to rethink your architecture. See how frameworks are converging around Zero Trust Maturity Model 2.0 and what that means for your architecture. 👉 https://loom.ly/3Wh7sLg Benson George #ZeroTrust #Encryption #Compliance #Aviatrix
7
-
International Telecommunication Union
111K followers
As digital transformation accelerates, so do cybersecurity threats. Strengthen national resilience and manage cyber risk with a robust national cybersecurity strategy. Download the Guide for actionable frameworks + guidance to develop this strategy https://ncsguide.org/
202
3 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content