SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
INTERVIEW
ERIC VANDERBURG
CYBER SECURITY, PRIVACY, AND TECH LEADER.
INTERVIEW HIGHLIGHTS
However, that being said, it is becoming increasingly obvious that our world
is Each time I fail, I use that as an opportunity to evaluate how I can do better.
 In this way, I am continually improving.  The encouragement of my wife has
been very important.  She encourages me to keep going when I hit setbacks. 
Every success is born out of other
failures.
INTERVIEW HIGHLIGHTS
And they should employ it in a variety of fashions such as encrypting their hard
drives, archive storage, communications, and browsing.  Some think that
encryption means you have something you are ashamed of and, therefore, if
you use encryption, you must be doing something wrong. 
People should use encryption.
INTERVIEW HIGHLIGHTS
None of us would consider leaving the house naked.  Those who dream of it
usually wake with anxiety and fear.  We clothe ourselves, not because we are
ashamed, but because that is a private part of our self that we do not want to
share with just anyone.  In the same way, our data and personal information is
private to us.  We do not need to share it with others so we must clothe it in
encryption. 
Our privacy is important and not
something we want to lose.
INTERVIEW HIGHLIGHTS
Encrypt data on storage devices using hard disk encryption.  The most sensitive
files should use file-based encryption on top of drive encryption.  Keep keys in
a safe place.  You could physically print them out and store them in a safe.
 Encrypt your browsing by using a VPN and ensure that you are connected over
HTTPS/TLS when entering information online. 
To secure your data, you must first
understand where it is and how
and when it is shared.
INTERVIEW HIGHLIGHTS
The same technologies that secure businesses and provide organizational value
are used to attack businesses and reduce organizational value.  For example,
machine learning is used to identify malicious attacks by companies, but
attackers use it to identify more likely targets and entry points. 
Cyber security has always been a
bit of an arms race because
technology works both ways.
INTERVIEW HIGHLIGHTS
The burgeoning IoT adoption rate will require larger and more distributed
monitoring systems, more complex vulnerability management solutions, and
automation and orchestration to make the management of so many devices
feasible for the average company. 
By 2020 there will be 31 billion
devices connected to the internet
including IoT devices.
INTERVIEW HIGHLIGHTS
Consumers should also understand what information is collected by companies
so that they can make an informed decision as to whether they will use the
product.  Adoption of the privacy provisions in the GDPR will go a long way to
establishing more transparency of the information collected and it will give
consumers more control over how that information is used and when it is
removed or transferred. 
It is important to review privacy
policies to understand how your
information will be used.
INTERVIEW HIGHLIGHTS
The changes to the privacy rules and net neutrality will not change this.  The
Internet’s primary purpose will remain.  However, consumers still bear part of
the burden to protect their information so using a VPN to connect to the
Internet is an easy, cost-effective way to protect privacy. 
The Internet will still be a place of
innovation and hub for
exchanging information.
INTERVIEW HIGHLIGHTS
And they are essential for understanding and securing organizational systems
and data.  However, they are only part of the solution.  Organizations must
consider more than just technology.  Processes and people must be addressed
through governance and training initiatives to provide a holistic, balanced
approach. 
Firewalls, IDS/IPS,
Antivirus/antimalware, and SIEM
are part of an overall
cybersecurity framework.
ON PUREVPN BLOG.
R E A D C O M P L E T E
I N T E R V I E W
Click Here.

Más contenido relacionado

La actualidad más candente

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
Ame Elliott
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 

La actualidad más candente (20)

Cyber Hygiene
Cyber HygieneCyber Hygiene
Cyber Hygiene
 
Cert Overview
Cert OverviewCert Overview
Cert Overview
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016Continuous Compliance 14.9.2016
Continuous Compliance 14.9.2016
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Designing Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UXDesigning Trustable Products: Microinteractions Matter for Secure UX
Designing Trustable Products: Microinteractions Matter for Secure UX
 
BYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with businessBYOD - Mobility - Protection: security partnering with business
BYOD - Mobility - Protection: security partnering with business
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Public Wi-Fi security 101
Public Wi-Fi security 101Public Wi-Fi security 101
Public Wi-Fi security 101
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 

Similar a Interview With Eric Vanderburg, Cyber Security & Privacy Expert

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Sherry Jones
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 

Similar a Interview With Eric Vanderburg, Cyber Security & Privacy Expert (20)

The CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be crypticThe CypherWire - Encryption doesn't have to be cryptic
The CypherWire - Encryption doesn't have to be cryptic
 
Law Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Team black
Team blackTeam black
Team black
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
PBL Encryption project.pptx
PBL Encryption project.pptxPBL Encryption project.pptx
PBL Encryption project.pptx
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Interview With Eric Vanderburg, Cyber Security & Privacy Expert

  • 1. INTERVIEW ERIC VANDERBURG CYBER SECURITY, PRIVACY, AND TECH LEADER.
  • 2. INTERVIEW HIGHLIGHTS However, that being said, it is becoming increasingly obvious that our world is Each time I fail, I use that as an opportunity to evaluate how I can do better.  In this way, I am continually improving.  The encouragement of my wife has been very important.  She encourages me to keep going when I hit setbacks.  Every success is born out of other failures.
  • 3. INTERVIEW HIGHLIGHTS And they should employ it in a variety of fashions such as encrypting their hard drives, archive storage, communications, and browsing.  Some think that encryption means you have something you are ashamed of and, therefore, if you use encryption, you must be doing something wrong.  People should use encryption.
  • 4. INTERVIEW HIGHLIGHTS None of us would consider leaving the house naked.  Those who dream of it usually wake with anxiety and fear.  We clothe ourselves, not because we are ashamed, but because that is a private part of our self that we do not want to share with just anyone.  In the same way, our data and personal information is private to us.  We do not need to share it with others so we must clothe it in encryption.  Our privacy is important and not something we want to lose.
  • 5. INTERVIEW HIGHLIGHTS Encrypt data on storage devices using hard disk encryption.  The most sensitive files should use file-based encryption on top of drive encryption.  Keep keys in a safe place.  You could physically print them out and store them in a safe.  Encrypt your browsing by using a VPN and ensure that you are connected over HTTPS/TLS when entering information online.  To secure your data, you must first understand where it is and how and when it is shared.
  • 6. INTERVIEW HIGHLIGHTS The same technologies that secure businesses and provide organizational value are used to attack businesses and reduce organizational value.  For example, machine learning is used to identify malicious attacks by companies, but attackers use it to identify more likely targets and entry points.  Cyber security has always been a bit of an arms race because technology works both ways.
  • 7. INTERVIEW HIGHLIGHTS The burgeoning IoT adoption rate will require larger and more distributed monitoring systems, more complex vulnerability management solutions, and automation and orchestration to make the management of so many devices feasible for the average company.  By 2020 there will be 31 billion devices connected to the internet including IoT devices.
  • 8. INTERVIEW HIGHLIGHTS Consumers should also understand what information is collected by companies so that they can make an informed decision as to whether they will use the product.  Adoption of the privacy provisions in the GDPR will go a long way to establishing more transparency of the information collected and it will give consumers more control over how that information is used and when it is removed or transferred.  It is important to review privacy policies to understand how your information will be used.
  • 9. INTERVIEW HIGHLIGHTS The changes to the privacy rules and net neutrality will not change this.  The Internet’s primary purpose will remain.  However, consumers still bear part of the burden to protect their information so using a VPN to connect to the Internet is an easy, cost-effective way to protect privacy.  The Internet will still be a place of innovation and hub for exchanging information.
  • 10. INTERVIEW HIGHLIGHTS And they are essential for understanding and securing organizational systems and data.  However, they are only part of the solution.  Organizations must consider more than just technology.  Processes and people must be addressed through governance and training initiatives to provide a holistic, balanced approach.  Firewalls, IDS/IPS, Antivirus/antimalware, and SIEM are part of an overall cybersecurity framework.
  • 11. ON PUREVPN BLOG. R E A D C O M P L E T E I N T E R V I E W Click Here.