ºÝºÝߣshows by User: evanderburg / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: evanderburg / Thu, 02 Aug 2018 12:15:05 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: evanderburg GDPR, Data Privacy and Cybersecurity - MIT Symposium /slideshow/gdpr-data-privacy-and-cybersecurity-mit-symposium/108349920 mitcdosymposium2018dataprotectiongruber-vanderburg-180802121505
GDPR, Data Privacy, and Cybersecurity presented by Eric Vanderburg and Stephanie Gruber at the MIT Chief Data Officer Information Quality Symposium on July 20, 2018. ]]>

GDPR, Data Privacy, and Cybersecurity presented by Eric Vanderburg and Stephanie Gruber at the MIT Chief Data Officer Information Quality Symposium on July 20, 2018. ]]>
Thu, 02 Aug 2018 12:15:05 GMT /slideshow/gdpr-data-privacy-and-cybersecurity-mit-symposium/108349920 evanderburg@slideshare.net(evanderburg) GDPR, Data Privacy and Cybersecurity - MIT Symposium evanderburg GDPR, Data Privacy, and Cybersecurity presented by Eric Vanderburg and Stephanie Gruber at the MIT Chief Data Officer Information Quality Symposium on July 20, 2018. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mitcdosymposium2018dataprotectiongruber-vanderburg-180802121505-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> GDPR, Data Privacy, and Cybersecurity presented by Eric Vanderburg and Stephanie Gruber at the MIT Chief Data Officer Information Quality Symposium on July 20, 2018.
GDPR, Data Privacy and Cybersecurity - MIT Symposium from Eric Vanderburg
]]>
853 6 https://cdn.slidesharecdn.com/ss_thumbnails/mitcdosymposium2018dataprotectiongruber-vanderburg-180802121505-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Modern Security the way Equifax Should Have /slideshow/modern-safety-measures-to-protect-your-companys-data-from-the-next-equifax-breach/81721504 vanderburg-modernsafetymeasurestoprotectyourcompanysdatafrom-171107190029
Robin Systems VP of Products Razi Sharir sits down with Cybersecurity Expert Eric Vandenburg for a chat about modern datacenter and hybrid cloud security challenges and considerations in the context of Equifax breach.]]>

Robin Systems VP of Products Razi Sharir sits down with Cybersecurity Expert Eric Vandenburg for a chat about modern datacenter and hybrid cloud security challenges and considerations in the context of Equifax breach.]]>
Tue, 07 Nov 2017 19:00:29 GMT /slideshow/modern-safety-measures-to-protect-your-companys-data-from-the-next-equifax-breach/81721504 evanderburg@slideshare.net(evanderburg) Modern Security the way Equifax Should Have evanderburg Robin Systems VP of Products Razi Sharir sits down with Cybersecurity Expert Eric Vandenburg for a chat about modern datacenter and hybrid cloud security challenges and considerations in the context of Equifax breach. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vanderburg-modernsafetymeasurestoprotectyourcompanysdatafrom-171107190029-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Robin Systems VP of Products Razi Sharir sits down with Cybersecurity Expert Eric Vandenburg for a chat about modern datacenter and hybrid cloud security challenges and considerations in the context of Equifax breach.
Modern Security the way Equifax Should Have from Eric Vanderburg
]]>
246 3 https://cdn.slidesharecdn.com/ss_thumbnails/vanderburg-modernsafetymeasurestoprotectyourcompanysdatafrom-171107190029-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg /slideshow/cybercrime-and-cyber-threats-cbla-eric-vanderburg-81206853/81206853 cbla-cybercrimeandcyberthreats-october2017-171025184129
Cybercrime and cyber threats: A glimpse of cybersecurity's opponent. Presented by Eric Vanderburg and the CBLA on October 25, 2017. ]]>

Cybercrime and cyber threats: A glimpse of cybersecurity's opponent. Presented by Eric Vanderburg and the CBLA on October 25, 2017. ]]>
Wed, 25 Oct 2017 18:41:29 GMT /slideshow/cybercrime-and-cyber-threats-cbla-eric-vanderburg-81206853/81206853 evanderburg@slideshare.net(evanderburg) Cybercrime and Cyber Threats - CBLA - Eric Vanderburg evanderburg Cybercrime and cyber threats: A glimpse of cybersecurity's opponent. Presented by Eric Vanderburg and the CBLA on October 25, 2017. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cbla-cybercrimeandcyberthreats-october2017-171025184129-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cybercrime and cyber threats: A glimpse of cybersecurity&#39;s opponent. Presented by Eric Vanderburg and the CBLA on October 25, 2017.
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg from Eric Vanderburg
]]>
513 1 https://cdn.slidesharecdn.com/ss_thumbnails/cbla-cybercrimeandcyberthreats-october2017-171025184129-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg /slideshow/rims-2017-cybersecurity-incident-response-strategies-and-tactics-2017105/80569254 rims2017cybersecurityincidentresponsestrategiesandtactics-2017-10-5-171008031509
Timothy Opsitnick and Eric Vanderburg of TCDI presented at the Risk Management Society's 2017 Northeast Ohio Regional Conference on Cybersecurity incident response strategies and tactics. ]]>

Timothy Opsitnick and Eric Vanderburg of TCDI presented at the Risk Management Society's 2017 Northeast Ohio Regional Conference on Cybersecurity incident response strategies and tactics. ]]>
Sun, 08 Oct 2017 03:15:09 GMT /slideshow/rims-2017-cybersecurity-incident-response-strategies-and-tactics-2017105/80569254 evanderburg@slideshare.net(evanderburg) Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg evanderburg Timothy Opsitnick and Eric Vanderburg of TCDI presented at the Risk Management Society's 2017 Northeast Ohio Regional Conference on Cybersecurity incident response strategies and tactics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/rims2017cybersecurityincidentresponsestrategiesandtactics-2017-10-5-171008031509-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Timothy Opsitnick and Eric Vanderburg of TCDI presented at the Risk Management Society&#39;s 2017 Northeast Ohio Regional Conference on Cybersecurity incident response strategies and tactics.
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Vanderburg from Eric Vanderburg
]]>
10423 4 https://cdn.slidesharecdn.com/ss_thumbnails/rims2017cybersecurityincidentresponsestrategiesandtactics-2017-10-5-171008031509-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Forensics and Cybersecurity /slideshow/mobile-forensics-and-cybersecurity/79322430 mobileforensicsandcybersecurity2017-8-30-170831132202
Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise. ]]>

Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise. ]]>
Thu, 31 Aug 2017 13:22:02 GMT /slideshow/mobile-forensics-and-cybersecurity/79322430 evanderburg@slideshare.net(evanderburg) Mobile Forensics and Cybersecurity evanderburg Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobileforensicsandcybersecurity2017-8-30-170831132202-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Mobile device usage has skyrocketed in enterprises and so have the risks. Eric Vanderburg and Trevor Tucker discuss the evidentiary value of mobile forensics, its limitations, and how cybersecurity can ensure the processes, procedures, and controls necessary to protect mobile devices and organizational data. This helps companies and attorneys to be better prepared for investigations and associated legal implications of mobile use in the enterprise.
Mobile Forensics and Cybersecurity from Eric Vanderburg
]]>
7956 3 https://cdn.slidesharecdn.com/ss_thumbnails/mobileforensicsandcybersecurity2017-8-30-170831132202-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 March ISACA Security Challenges with the Internet of Things - Eric Vanderburg /slideshow/2017-march-isaca-security-challenges-with-the-internet-of-things/73259071 2017march-isacasecuritychallengeswiththeinternetofthings-170317163738
Presentation given by Eric Vanderburg at ISACA on IoT security challenges. ]]>

Presentation given by Eric Vanderburg at ISACA on IoT security challenges. ]]>
Fri, 17 Mar 2017 16:37:38 GMT /slideshow/2017-march-isaca-security-challenges-with-the-internet-of-things/73259071 evanderburg@slideshare.net(evanderburg) 2017 March ISACA Security Challenges with the Internet of Things - Eric Vanderburg evanderburg Presentation given by Eric Vanderburg at ISACA on IoT security challenges. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017march-isacasecuritychallengeswiththeinternetofthings-170317163738-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation given by Eric Vanderburg at ISACA on IoT security challenges.
2017 March ISACA Security Challenges with the Internet of Things - Eric Vanderburg from Eric Vanderburg
]]>
10789 8 https://cdn.slidesharecdn.com/ss_thumbnails/2017march-isacasecuritychallengeswiththeinternetofthings-170317163738-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ransomware: 2016's Greatest Malware Threat /slideshow/ransomware-2016s-greatest-malware-threat/70247202 ransomware2016threat-161218174202
Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself. ]]>

Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself. ]]>
Sun, 18 Dec 2016 17:42:02 GMT /slideshow/ransomware-2016s-greatest-malware-threat/70247202 evanderburg@slideshare.net(evanderburg) Ransomware: 2016's Greatest Malware Threat evanderburg Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ransomware2016threat-161218174202-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Ransomware has troubled many individuals and companies and it has been called the greatest malware threat of 2016. Learn how it works and how to protect yourself.
Ransomware: 2016's Greatest Malware Threat from Eric Vanderburg
]]>
321 10 https://cdn.slidesharecdn.com/ss_thumbnails/ransomware2016threat-161218174202-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Emerging Technologies: Japan’s Position /slideshow/emerging-technologies-japans-position/63470440 emergingtechnologies-japansposition-160627044213
Emerging Technologies: Japan’s Position]]>

Emerging Technologies: Japan’s Position]]>
Mon, 27 Jun 2016 04:42:12 GMT /slideshow/emerging-technologies-japans-position/63470440 evanderburg@slideshare.net(evanderburg) Emerging Technologies: Japan’s Position evanderburg Emerging Technologies: Japan’s Position <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emergingtechnologies-japansposition-160627044213-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position from Eric Vanderburg
]]>
85 4 https://cdn.slidesharecdn.com/ss_thumbnails/emergingtechnologies-japansposition-160627044213-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Principles of technology management /slideshow/principles-of-technology-management/63470310 principlesoftechnologymanagement-160627043635
Principles of Technology Management]]>

Principles of Technology Management]]>
Mon, 27 Jun 2016 04:36:35 GMT /slideshow/principles-of-technology-management/63470310 evanderburg@slideshare.net(evanderburg) Principles of technology management evanderburg Principles of Technology Management <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/principlesoftechnologymanagement-160627043635-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Principles of Technology Management
Principles of technology management from Eric Vanderburg
]]>
353 4 https://cdn.slidesharecdn.com/ss_thumbnails/principlesoftechnologymanagement-160627043635-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Japanese railway technology /slideshow/japanese-railway-technology/63470206 japaneserailwaytechnology-160627043057
Japanese Railway Technology ]]>

Japanese Railway Technology ]]>
Mon, 27 Jun 2016 04:30:57 GMT /slideshow/japanese-railway-technology/63470206 evanderburg@slideshare.net(evanderburg) Japanese railway technology evanderburg Japanese Railway Technology <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/japaneserailwaytechnology-160627043057-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Japanese Railway Technology
Japanese railway technology from Eric Vanderburg
]]>
402 6 https://cdn.slidesharecdn.com/ss_thumbnails/japaneserailwaytechnology-160627043057-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Evaluating japanese technological competitiveness /slideshow/evaluating-japanese-technological-competitiveness/63470092 evaluatingjapanesetechnologicalcompetitiveness-160627042615
Evaluating Japanese Technological Competitiveness]]>

Evaluating Japanese Technological Competitiveness]]>
Mon, 27 Jun 2016 04:26:15 GMT /slideshow/evaluating-japanese-technological-competitiveness/63470092 evanderburg@slideshare.net(evanderburg) Evaluating japanese technological competitiveness evanderburg Evaluating Japanese Technological Competitiveness <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/evaluatingjapanesetechnologicalcompetitiveness-160627042615-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Evaluating Japanese Technological Competitiveness
Evaluating japanese technological competitiveness from Eric Vanderburg
]]>
54 4 https://cdn.slidesharecdn.com/ss_thumbnails/evaluatingjapanesetechnologicalcompetitiveness-160627042615-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Japanese current and future technology management challenges /slideshow/japanese-current-and-future-technology-management-challenges/63470001 japanesecurrentandfuturetechnologymanagementchallenges-160627042009
Japanese Current and Future Technology Management Challenges]]>

Japanese Current and Future Technology Management Challenges]]>
Mon, 27 Jun 2016 04:20:09 GMT /slideshow/japanese-current-and-future-technology-management-challenges/63470001 evanderburg@slideshare.net(evanderburg) Japanese current and future technology management challenges evanderburg Japanese Current and Future Technology Management Challenges <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/japanesecurrentandfuturetechnologymanagementchallenges-160627042009-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Japanese Current and Future Technology Management Challenges
Japanese current and future technology management challenges from Eric Vanderburg
]]>
35 4 https://cdn.slidesharecdn.com/ss_thumbnails/japanesecurrentandfuturetechnologymanagementchallenges-160627042009-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Technology management in Japan: Robotics /slideshow/technology-management-in-japan-robotics/63469924 technologymanagementinjapan-robotics-160627041435
Technology management in Japan: Robotics]]>

Technology management in Japan: Robotics]]>
Mon, 27 Jun 2016 04:14:35 GMT /slideshow/technology-management-in-japan-robotics/63469924 evanderburg@slideshare.net(evanderburg) Technology management in Japan: Robotics evanderburg Technology management in Japan: Robotics <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/technologymanagementinjapan-robotics-160627041435-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Technology management in Japan: Robotics
Technology management in Japan: Robotics from Eric Vanderburg
]]>
342 5 https://cdn.slidesharecdn.com/ss_thumbnails/technologymanagementinjapan-robotics-160627041435-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Incident response table top exercises /slideshow/incident-response-table-top-exercises/63469708 incidentresponsetabletopexercises-160627035751
Incident response table top exercises June 19, 2008]]>

Incident response table top exercises June 19, 2008]]>
Mon, 27 Jun 2016 03:57:51 GMT /slideshow/incident-response-table-top-exercises/63469708 evanderburg@slideshare.net(evanderburg) Incident response table top exercises evanderburg Incident response table top exercises June 19, 2008 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsetabletopexercises-160627035751-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Incident response table top exercises June 19, 2008
Incident response table top exercises from Eric Vanderburg
]]>
152 4 https://cdn.slidesharecdn.com/ss_thumbnails/incidentresponsetabletopexercises-160627035751-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem /slideshow/the-prescription-for-protection-avoid-treatment-errors-to-the-malware-problem/63108355 theprescriptionforprotection-publicversion-160615185523
Malware is an ailment many companies suffer from but the prescription for protection is simpler than you think. In this presentation, Vanderburg and Salamakha apply the five rights for avoiding drug errors to the malware problem at the Advanced Persistent Threats Summit. 1) Right client – Authentication 2) Right route – Gaps and strategies 3) Right drug – Security controls 4) Right dose – Security/business balance 5) Right time – Staying up to date. Stay healthy, stay safe. ]]>

Malware is an ailment many companies suffer from but the prescription for protection is simpler than you think. In this presentation, Vanderburg and Salamakha apply the five rights for avoiding drug errors to the malware problem at the Advanced Persistent Threats Summit. 1) Right client – Authentication 2) Right route – Gaps and strategies 3) Right drug – Security controls 4) Right dose – Security/business balance 5) Right time – Staying up to date. Stay healthy, stay safe. ]]>
Wed, 15 Jun 2016 18:55:23 GMT /slideshow/the-prescription-for-protection-avoid-treatment-errors-to-the-malware-problem/63108355 evanderburg@slideshare.net(evanderburg) The Prescription for Protection - Avoid Treatment Errors To The Malware Problem evanderburg Malware is an ailment many companies suffer from but the prescription for protection is simpler than you think. In this presentation, Vanderburg and Salamakha apply the five rights for avoiding drug errors to the malware problem at the Advanced Persistent Threats Summit. 1) Right client – Authentication 2) Right route – Gaps and strategies 3) Right drug – Security controls 4) Right dose – Security/business balance 5) Right time – Staying up to date. Stay healthy, stay safe. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/theprescriptionforprotection-publicversion-160615185523-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware is an ailment many companies suffer from but the prescription for protection is simpler than you think. In this presentation, Vanderburg and Salamakha apply the five rights for avoiding drug errors to the malware problem at the Advanced Persistent Threats Summit. 1) Right client – Authentication 2) Right route – Gaps and strategies 3) Right drug – Security controls 4) Right dose – Security/business balance 5) Right time – Staying up to date. Stay healthy, stay safe.
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem from Eric Vanderburg
]]>
546 6 https://cdn.slidesharecdn.com/ss_thumbnails/theprescriptionforprotection-publicversion-160615185523-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud Storage and Security: Solving Compliance Challenges /slideshow/cloud-storage-and-security-solving-compliance-challenges/62584215 cloudsecuritywebinardeckscedits-160531170334
Fredrik Forslund, Director of Cloud & Data Center Erasure Solutions at Blancco Technology Group explores cloud storage compliance challenges and solutions with seasoned security and compliance experts, Giulio Coraggio, Partner at DLA Piper, and Eric Vanderburg, Director of Information Systems & Security at Jurinnov LLC. What You’ll Learn: Common pain points associated with storing, managing and protecting data in the private cloud Key scenarios when cloud security may be compromised Regulatory requirements that must be met whenever data is stored in the cloud Best practices to minimize data security risks and regulatory compliance violations ]]>

Fredrik Forslund, Director of Cloud & Data Center Erasure Solutions at Blancco Technology Group explores cloud storage compliance challenges and solutions with seasoned security and compliance experts, Giulio Coraggio, Partner at DLA Piper, and Eric Vanderburg, Director of Information Systems & Security at Jurinnov LLC. What You’ll Learn: Common pain points associated with storing, managing and protecting data in the private cloud Key scenarios when cloud security may be compromised Regulatory requirements that must be met whenever data is stored in the cloud Best practices to minimize data security risks and regulatory compliance violations ]]>
Tue, 31 May 2016 17:03:34 GMT /slideshow/cloud-storage-and-security-solving-compliance-challenges/62584215 evanderburg@slideshare.net(evanderburg) Cloud Storage and Security: Solving Compliance Challenges evanderburg Fredrik Forslund, Director of Cloud & Data Center Erasure Solutions at Blancco Technology Group explores cloud storage compliance challenges and solutions with seasoned security and compliance experts, Giulio Coraggio, Partner at DLA Piper, and Eric Vanderburg, Director of Information Systems & Security at Jurinnov LLC. What You’ll Learn: Common pain points associated with storing, managing and protecting data in the private cloud Key scenarios when cloud security may be compromised Regulatory requirements that must be met whenever data is stored in the cloud Best practices to minimize data security risks and regulatory compliance violations <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cloudsecuritywebinardeckscedits-160531170334-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Fredrik Forslund, Director of Cloud &amp; Data Center Erasure Solutions at Blancco Technology Group explores cloud storage compliance challenges and solutions with seasoned security and compliance experts, Giulio Coraggio, Partner at DLA Piper, and Eric Vanderburg, Director of Information Systems &amp; Security at Jurinnov LLC. What You’ll Learn: Common pain points associated with storing, managing and protecting data in the private cloud Key scenarios when cloud security may be compromised Regulatory requirements that must be met whenever data is stored in the cloud Best practices to minimize data security risks and regulatory compliance violations
Cloud Storage and Security: Solving Compliance Challenges from Eric Vanderburg
]]>
468 6 https://cdn.slidesharecdn.com/ss_thumbnails/cloudsecuritywebinardeckscedits-160531170334-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hacktivism: Motivations, Tactics and Threats /evanderburg/hacktivism-motivations-tactics-and-threats hacktivism-hacktivismsummit-november2015v4-151111204026-lva1-app6892
Presented at the Republican National Convention Hacktivism Summit on November 6, 2015 by Eric Vanderburg, Director of Cybersecurity at JURINNOV. ]]>

Presented at the Republican National Convention Hacktivism Summit on November 6, 2015 by Eric Vanderburg, Director of Cybersecurity at JURINNOV. ]]>
Wed, 11 Nov 2015 20:40:26 GMT /evanderburg/hacktivism-motivations-tactics-and-threats evanderburg@slideshare.net(evanderburg) Hacktivism: Motivations, Tactics and Threats evanderburg Presented at the Republican National Convention Hacktivism Summit on November 6, 2015 by Eric Vanderburg, Director of Cybersecurity at JURINNOV. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hacktivism-hacktivismsummit-november2015v4-151111204026-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at the Republican National Convention Hacktivism Summit on November 6, 2015 by Eric Vanderburg, Director of Cybersecurity at JURINNOV.
Hacktivism: Motivations, Tactics and Threats from Eric Vanderburg
]]>
2066 8 https://cdn.slidesharecdn.com/ss_thumbnails/hacktivism-hacktivismsummit-november2015v4-151111204026-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Correct the most common web development security mistakes - Eric Vanderburg /slideshow/common-security-mistakes/44941102 commonsecuritymistakes-150220142626-conversion-gate02
]]>

]]>
Fri, 20 Feb 2015 14:26:26 GMT /slideshow/common-security-mistakes/44941102 evanderburg@slideshare.net(evanderburg) Correct the most common web development security mistakes - Eric Vanderburg evanderburg <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/commonsecuritymistakes-150220142626-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Correct the most common web development security mistakes - Eric Vanderburg from Eric Vanderburg
]]>
754 1 https://cdn.slidesharecdn.com/ss_thumbnails/commonsecuritymistakes-150220142626-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Deconstructing website attacks - Eric Vanderburg /slideshow/deconstructing-website-attacks/44941063 deconstructingwebsiteattacks-150220142511-conversion-gate02
How to website attacks take place, what causes them and how can you protect yourself? Learn this and more in this presentation.]]>

How to website attacks take place, what causes them and how can you protect yourself? Learn this and more in this presentation.]]>
Fri, 20 Feb 2015 14:25:10 GMT /slideshow/deconstructing-website-attacks/44941063 evanderburg@slideshare.net(evanderburg) Deconstructing website attacks - Eric Vanderburg evanderburg How to website attacks take place, what causes them and how can you protect yourself? Learn this and more in this presentation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/deconstructingwebsiteattacks-150220142511-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to website attacks take place, what causes them and how can you protect yourself? Learn this and more in this presentation.
Deconstructing website attacks - Eric Vanderburg from Eric Vanderburg
]]>
493 4 https://cdn.slidesharecdn.com/ss_thumbnails/deconstructingwebsiteattacks-150220142511-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Countering malware threats - Eric Vanderburg /slideshow/countering-malware-threats/44831681 counteringmalwarethreats-150218082216-conversion-gate02
Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself.]]>

Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself.]]>
Wed, 18 Feb 2015 08:22:16 GMT /slideshow/countering-malware-threats/44831681 evanderburg@slideshare.net(evanderburg) Countering malware threats - Eric Vanderburg evanderburg Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/counteringmalwarethreats-150218082216-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Malware is a significant threat as it provides a way for an attacker to use your machine for nefarious means or take data from you and those connected to you. Learn how to combat this threat and protect yourself.
Countering malware threats - Eric Vanderburg from Eric Vanderburg
]]>
501 1 https://cdn.slidesharecdn.com/ss_thumbnails/counteringmalwarethreats-150218082216-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-evanderburg-48x48.jpg?cb=1679511342 Eric Vanderburg is a Christian cybersecurity leader, consultant, author, and thought leader. Vanderburg leads the cybersecurity consulting division at TCDI. TCDI's cybersecurity division provides companies with peace of mind in our digital world by protecting the confidentiality, integrity, and availability of data and critical systems. TCDI security practitioners, analysts, engineers and forensic investigators apply their unique skills to create confidence in your information systems and policies. In addition to being the Vice President of Cybersecurity at TCDI , Eric is also the Vice Chairman of the board of directors for the Technology Ministry Network, a nonprofit that equips those i... securitythinkingcap.com https://cdn.slidesharecdn.com/ss_thumbnails/mitcdosymposium2018dataprotectiongruber-vanderburg-180802121505-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/gdpr-data-privacy-and-cybersecurity-mit-symposium/108349920 GDPR, Data Privacy and... https://cdn.slidesharecdn.com/ss_thumbnails/vanderburg-modernsafetymeasurestoprotectyourcompanysdatafrom-171107190029-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/modern-safety-measures-to-protect-your-companys-data-from-the-next-equifax-breach/81721504 Modern Security the wa... https://cdn.slidesharecdn.com/ss_thumbnails/cbla-cybercrimeandcyberthreats-october2017-171025184129-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cybercrime-and-cyber-threats-cbla-eric-vanderburg-81206853/81206853 Cybercrime and Cyber T...