Illumio Blog
Find me on:
June 17, 2019

Defending Critical Infrastructure Data Protects Your Bottom Line, The Economy – and Lives

Former Head of Cybersecurity Strategy

The shipping and energy infrastructure around us can be pretty inspiring. It reflects years of labor by our men and women, the scale of our economy, the power of our ingenuity. If you sit for a while and watch the ships coming in and out of harbor, you feel connected to history and the wider world. Yet cargo is not the only thing that’s moving.

Read more »

cybersecurity

May 28, 2019

On Squirrels, Proportionality, and China

Former Head of Cybersecurity Strategy

It’s been a busy May in the cyberworld. Israel’s military strike on Hamas hackers in Gaza was the biggest news, but the Department of Defense’s Report on China Military Power and a Department of Energy finding that the grid may have suffered a DDoS deserve mention too.

Read more »

cybersecurity

April 19, 2019

The Future of Digital Risk and Cybersecurity: A POV from West Point

Former Head of Cybersecurity Strategy

Last week I attended the U.S. Military Academy’s 55th annual senior leader conference at West Point to talk about the future of digital risk and cybersecurity. The conference was focused on the future of security in the Indo-Pacific region and brought together leaders from the across the United States to deliberate about the future. I’d not been to West Point since I was a kid and after serving for seven years in the Defense Department it felt like coming home. I also got in a few runs on the Hudson River by the campus – something I’d recommend any runner do. The fog rolled in over the river, up the parapets, and onto the green riverbeds and fields adjacent to the water. It reminded me of running in England’s Lakes District almost fifteen years ago.

Read more »

cybersecurity

March 26, 2019

The Habit of Strategic Planning for Your Cybersecurity Future

Former Head of Cybersecurity Strategy

Oftentimes, it is said, we fight the last war. It happens when strategists fail to account for changes in the security environment, like the birth of the machine gun, the tank, or the improvised explosive device – technological innovations that altered how conflicts unfold.

Today in cybersecurity, organizations are still overly focused on securing the perimeter – on keeping intruders out of a network. While perimeter defense is a key part of the total security stack, it is not sufficient for effective cybersecurity.

Read more »

cybersecurity

March 12, 2019

Findings from RSAC 2019: The World's Biggest Cybersecurity Investment is Starting to Pay Off

Former Head of Cybersecurity Strategy

It was a rich week at RSA Conference 2019, the nerd prom of the cybersecurity world. Thousands descended on San Francisco’s Moscone Center from all over the world. They came, they saw, they cyber-conquered. On my side, I joined Dr. Chase Cunningham for a discussion at Illumio’s customer dinner; attended the U.S.-Australia track 1.5 dialogue with representatives from the two countries’ governments and industry; listened to General Paul Nakasone (U.S. Army), the Commander of U.S. Cyber Command and the Director of the NSA, address the masses at RSAC; and met with colleagues from the national security community I’d not seen since leaving D.C. in 2015. It was a great week. 

Here are a few of my takeaways:

Read more »

cybersecurity