Sign in to view Jerry’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Jerry’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Atlanta, Georgia, United States
Sign in to view Jerry’s full profile
Jerry can introduce you to 5 people at Adversarial Risk Management
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
11K followers
500+ connections
Sign in to view Jerry’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jerry
Jerry can introduce you to 5 people at Adversarial Risk Management
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Jerry
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Jerry’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Articles by Jerry
-
An open letter to a fresh cybersecurity hire
An open letter to a fresh cybersecurity hire
Congratulations on your first cybersecurity job! Whether you are just entering the workforce or pivoting to a new…
175
19 Comments -
Vulnerability management is dead. But GRC is hiring...Aug 22, 2022
Vulnerability management is dead. But GRC is hiring...
I used to have a TVM team. Threat & Vulnerability Management.
93
7 Comments -
How much AppSec is too much?Aug 19, 2022
How much AppSec is too much?
I've been using the term "West Coast CISO" a lot lately. While it feels like CISOs used to be either…
73
15 Comments -
The value of the True Positive.Jun 22, 2022
The value of the True Positive.
As originally published on Vectra's Unfiltered at https://www.unfilteredcxo.
54
2 Comments -
Making Sense of Geographic Network and Travel RestrictionsFeb 25, 2022
Making Sense of Geographic Network and Travel Restrictions
There is a lot of confusion when it comes to cybersecurity "geo restrictions" on networks, and just as much when it…
61
4 Comments -
IOCs aren't for blocking - they are for control validationFeb 5, 2022
IOCs aren't for blocking - they are for control validation
There is a misconception out there that security departments should be ingesting feeds of Indicators of Compromise…
312
37 Comments -
Patching is OverratedJan 31, 2022
Patching is Overrated
Patching became a household term during the Equifax security breach and Congressional hearings. While IT maintenance…
160
31 Comments -
Cybersecurity for Investor Relations and Corporate GovernanceJan 6, 2022
Cybersecurity for Investor Relations and Corporate Governance
In addition to new rulemaking and interpretive guidance on cybersecurity from the SEC, public companies are seeing…
131
10 Comments -
Cybersecurity in the Three Lines ModelDec 27, 2021
Cybersecurity in the Three Lines Model
Since 2010, the Three Lines of Defense model has been widely adopted as an authoritative framework for operational and…
742
60 Comments -
It's not the 2FA.. it's the 1TP!!!Oct 1, 2020
It's not the 2FA.. it's the 1TP!!!
Multifactor authentication (MFA / 2FA) is arguably the most powerful security control deployed over the past 20 years…
93
14 Comments
Activity
11K followers
-
Jerry Perullo shared thisJack Dorsey just cut 40% of Block's workforce. Is he unlocking AI-driven efficiency, or repositioning ahead of a structural collapse in tech company P/E multiples? Closer to home, is Claude Code Security threatening the wider cyber marketplace, or just exposing point solutions whose valuations were built on shallow moats and unrealistic growth assumptions? And did the headlines care - or notice - as Anthropic structured its for-profit business into a public benefit corporation (PBC)? Pundits wondering if Dario Amodei was shirking his fiduciary duties by holding fast in the face of the Pentagon may have to get used to the new definition - and its no longer limited to maximizing shareholder return. All that and.. yet we somehow also fit in debunking - nah, "contextualizing" Airsnitch and ETH Zürich's paper on password manager flaws. Come and get it! https://lnkd.in/e-ASNpxj #CISO #cybersecurity #airsnitch #anthropic #block #dorsey #claude #amodei #pentagon #saas #TVM #adversarialJerry Perullo shared thisNew episode alert! This week, Jerry Perullo, Mario Duarte, and Sounil Yu discuss how Anthropic is doubling down on Claude Code Security while the federal government pushes hard to swap Claude for OpenAI, raising serious questions about trust, guardrails, and supply-chain risk. Meanwhile, AirSnitch shows how cross-layer Wi‑Fi identity desync lets attackers shrug off client isolation and stage full MITM sessions, even on home routers. Get it now at https://lnkd.in/ehnviqP6 or listen on any Podcast app!S4E14 – Federal Gov vs. Anthropic, 40% layoff at Blocks due to AIS4E14 – Federal Gov vs. Anthropic, 40% layoff at Blocks due to AI
-
Jerry Perullo shared thisLast week while I was off skiing w the fam, our intrepid podcast producer Tillson Galloway dropped S4E13 of The Adversarial Podcast! It's not one to be missed. With Sounil Yu joining from Germany at the Munich Security Conference, Mario Duarte and I jumped on some super relevant current topics such as: - “AI security” fails when models inherit 20 years of industry panic. Left alone, LLMs treat every alert as DEFCON-1. Constraining AI with seasoned incident rubrics produces calmer, more deterministic outcomes and better executive decisions. - A 15-minute technical conversation beats 300 control questions. Security maturity shows up in reasoning, tradeoffs, and execution speed, not checkbox artifacts. - The real AI moat isn’t the model, it’s the scaffolding. Context engineering, procedural constraints, and execution discipline are what actually compound.| Enjoy in all the usual places including my favorite - https://lnkd.in/gzHCrxQmJerry Perullo shared thisNew podcast is up! This week, Jerry Perullo, Mario Duarte, and Sounil Yu discuss hiring AI specialists and recent threat intelligence about adversarial use of AI and residential proxies. Get it now at https://lnkd.in/epzdb8h8, https://lnkd.in/ejwwTEPv or any podcast app!S4E13 – Munich Security Conference, Gemini used by criminals, priority shifts at CISAS4E13 – Munich Security Conference, Gemini used by criminals, priority shifts at CISA
-
Jerry Perullo shared thisThis week we spent a lot of time on Bu Bounties - if there is one thing the three of us agree on it’s the value there. Then as usual we pivoted hard, this time to a Federal Reserve comm instructing cyber bank examiners to chill out. All that and more - jump in and enjoy! https://lnkd.in/d4nNYA8PJerry Perullo shared thisNew episode is up! Join Mario Duarte, Jerry Perullo, and Sounil Yu as they discuss how AI-generated bug bounty reports killed curl's bug bounty program, expensive security controls that don't work, and more! Get it on YouTube, adversarial.com/podcast, or any podcast app! https://lnkd.in/eXjNXBnsAdversarial Podcast S4E12 – Curl shuts down bug bounty, expensive but ineffective security controlsAdversarial Podcast S4E12 – Curl shuts down bug bounty, expensive but ineffective security controls
-
Jerry Perullo shared thisWhat Iran’s internet shutdowns taught us about enterprise security... Today's episode of The Adversarial Podcast sparked a conversation that hit uncomfortably close to home for security leaders. Watching how information escapes authoritarian control systems is a mirror for how employees route around enterprise security. A few takeaways worth chewing on: • Extreme control doesn’t equal real security Internet blackouts and surveillance create fear, not safety. In companies, overly restrictive controls do the same thing: they drive workarounds. • Controls mostly catch “stupid,” not clever Whether it’s a nation-state or a Fortune 500, people who need to get around controls usually can. DLP, logging, and monitoring are often retrospective - not preventative. • Detection is oversold; enforcement is rare We love to say “we’re monitoring.” In reality, logs are used after something goes wrong. Deterrence only works when consequences are real—and in enterprises, they rarely are. • Privacy tools are misunderstood VPNs, Tor, and anonymization matter when the adversary is a hostile state. For the average person or company, they’re often a distraction, and sometimes increase risk. • Culture is a security control Running security like an authoritarian regime damages trust, hiring, and velocity. Most people would rather work in “Norway” than “North Korea.” • Most breaches aren’t hacks - they’re logins Password reuse and weak authentication still dominate real-world incidents. MFA and password managers beat most shiny tools. • Prioritize the threat that actually matters Not every company should obsess over data exfiltration. For many, extortion and operational disruption are the real risks. • Architecture beats policy If employees can casually access and export sensitive data, the problem isn’t awareness - it’s system design. • Less awareness, done better If you get four seconds of attention per year, focus on the few things that actually move the needle. “See something, say something” still works. Security isn’t about maximum control. It’s about intentional tradeoffs aligned to real threats. It's a good one - https://lnkd.in/gzHCrxQm #adversarial #podcast #iran #protests #starlink #CyberSecurity #RiskManagement #CISO #Governance #SecurityCulture #awarenessJerry Perullo shared this🚨New episode alert! 🚨 This week, Jerry Perullo, Mario Duarte, and Sounil Yu discuss the Iranian Internet blackout, whether cybersecurity practitioners should focus on geopolitical threat intelligence, and more! Check it out on YouTube, podcast apps, or at https://lnkd.in/gCaGUuDG! https://lnkd.in/epJ853ndAdversarial Podcast S4E11 – Iran Internet blackout, threat intelligence, cyber framework alignmentAdversarial Podcast S4E11 – Iran Internet blackout, threat intelligence, cyber framework alignment
-
Jerry Perullo shared thisI'm going to be in Vegas in a couple of weeks at AWS re:Invent, speaking at Cloudflare's Trust Forward side summit on Wednesday night with Ramy & The Drossman (best band name ever). I've done something like this with Cloudflare before, and I can say their events are awesome - intellectually legitimate, insightful, candid, and no fluff. While we might enjoy a beer or two, we won't be talking just college football and golf handicaps here. Packets. Realistic GenAI acceptable use policies. Probabilistic compliance with deterministic rules. That sort of thing. I'd love to catch up with my security and technology friends in town! Bring it via: https://lnkd.in/geqtq3bM
-
Jerry Perullo shared thisCloudflare experienced a rare outage yesterday, and as has been the case since inception senior leadership and specifically Matthew Prince went on to not only put on a clinic in mea culpa and taking responsibility, but also in just sheer engineering competence. It's one thing to say "we screwed up," and it's what differentiates the top 5% of enterprises. But it's a totally separate and unicorny thing for anyone at the company, no less the CEO, to stop the presses and dig this deep and masterclass their own infrastructure to this level. The ops challenge for a CEO of any scale - no less a $70b market cap company - is usually to ensure operational excellence DESPITE not being able to comprehend all the minutia any more. But what if you COULD grok it all.. somehow? Sit back and see: https://lnkd.in/gZU-mhxV
-
Jerry Perullo shared thisWe dug through some recent reports on "Adversarial AI" to differentiate conflicted hype from reality, and confirmed the world isn't on fire quite yet. We also stepped through some interesting comparisons between a State of Nevada ransomware incident and the Jaguar Land Rover saga, and so much more! Enjoy!Jerry Perullo shared thisNew episode is out! This week, Jerry Perullo, Mario Duarte, and Sounil Yu talk about AI ransomware FUD, the Louvre's cyber audit, Nevada's response to ransomware, and more! Check it out out at https://lnkd.in/ejwwTEPv, on YouTube, or on any podcast app! https://lnkd.in/e8tE73zqAdversarial Podcast S4E07 – The password is "Louvre", AI ransomware, Nevada stands up to ransomwareAdversarial Podcast S4E07 – The password is "Louvre", AI ransomware, Nevada stands up to ransomware
-
Jerry Perullo shared thisI spent yesterday at an Amazon's ATL2 Fulfillment Center at an NACD (National Association of Corporate Directors) event on AI governance. Thank you Cindy Baerman, Marina Finnegan, and the Atlanta Chapter for an outstanding event at a mind-blowing facility - and Bill Durham and Amazon Web Services (AWS) for the content and tour! With a rare occasion to actually drive somewhere, I got to listen to the latest episode of The Adversarial Podcast, which we released that very morning. It sounds weird to listen to your own podcast, but it's genuinely my favorite. There are a few gems in there that escaped the release notes including: On CRQ and FAIR: "Our F5 devices have management interfaces exposed to the internet... assigning a dollar value to that is asinine." And on the SOC2 industry: "It used to cost you $80,000 for a load of crap, and now it costs you $6000 for a load of crap... that is a net positive!" I encourage you to dig in for a really candid, no-sponsor (aka unconflicted) take from 3 retired CISOs-turned Founders on the cybersecurity world. adversarial.com/podcast
-
Jerry Perullo shared thisLove these guys - absolutely crushing a critical space with innovation, customer service, and execution. If you happen to use email at your business you should check them out.Jerry Perullo shared thisExcited to share we (Sublime Security) raised $150M in Series C funding to accelerate our roadmap and global impact. Our adversaries operate like businesses with objectives and resource constraints. With AI, constraints like time and skill are gone, enabling faster and more sophisticated, varied, and targeted attacks at scale with higher returns. We built Sublime to stop this next generation of attacks and fight fire with fire. Over the past year, we launched our first two Agents for autonomously triaging threats and auto-adapting detection coverage. Over the coming months, we'll continue to invest in our team of Agents to do more for our customers, with the transparency and control that enhances work instead of creating friction. I'm incredibly grateful for the trust and support of our customers, partners, team, and investors. We're just getting started. Russell Moore, Georgian Cack Wilhelm, IVP Jahanvi Sardana, Shardul Shah, Index Ventures Dan Nguyen-Huu, Jon Sakoda, Decibel Partners Sam Lessin, Will Quist, Slow Ventures Jared Sleeper, Avenir Dick Costolo, Adam Bain, David Fischer, 01 Advisors Nick Sands, Citi Ventures Dmitri Alperovitch, Jon Oberheide, Nicole Perlroth Read the full announcement here: https://lnkd.in/epR84qcMSublime raises $150M Series C to arm defenders for the post-LLM world · Blog · Sublime SecuritySublime raises $150M Series C to arm defenders for the post-LLM world · Blog · Sublime Security
-
Jerry Perullo liked thisJerry Perullo liked thisMet Gambit and won @ Hacklanta all in one day. Had a blast building CounterStack with Abrar Sarwar, john sang, and David Salas Carrascal! We built a cybersecurity platform that simplifies an organization's complex cybersecurity posture into a single poker hand, enabling users to pit their organization against different threats in a gamified environment. You can check out our project here at https://counterstack.dev/ A huge thank you to our mentors, Devin Hicks, Nick San George, Yulduz M., NUR HAQUE and Robert Jordshaugen, MBA for their valuable insights. Between the laughs and the feedback, you all helped push the project into its final version. A special shoutout to Jerry Perullo, Emran H., Corey Hall, and Demecos Chambers for pushing us to think beyond the hackathon and helping us map out how CounterStack can actually grow into something real. And finally, massive props to joey zhang and progsu for pulling this amazing event together in just 5 weeks.
-
Jerry Perullo liked thisJerry Perullo liked thisI just made history. -attended my first hackathon at gsu’s biggest hackathon in recent time, hacklanta (progsu’s first hackathon chapter) -won first place -helped set up this huge event -built counterstack with Abrar Sarwar Luigi Fernandez, and David Salas Carrascal to take home the win -learned a lot about cyber security and all the things that go into a good product -learned that being bold and willingness to put the work in will always pay dividends hacklanta was built in 5 weeks, with countless sleepless nights, and a determination to make an impact. so to all of the progsu exec team personally, I’ve seen all the work you guys put in and I am so proud of each and everyone of you for being a part of this event. thank you for being goated people and keep shining wherever you go special shoutout to: joey zhang for making this whole thing possible, and for being a BEAST. I truly don’t know anyone who works harder than you. thank you for bringing me on the board to contribute to something so awesome, I really appreciate you for giving me the chance to meet so many awesome people and build something cool lastly, thank you to Jerry Perullo, Emran H., andy, Yulduz M., Devin Hicks, Nick San George and Marc Donatien Jr. for sitting down with us and giving us advice, couldn’t have done it without yall our project counterstack is a cyber security tool used to make learning complex cybersecurity concepts more intuitive, fun and simple. check it out at counterstack.dev #hacklanta #hackathon #win
-
Jerry Perullo liked thisJerry Perullo liked thisTwo things that struck me about RSA this year: 1. AI security is meaningless. There is an emerging recognition from security teams and vendors alike that we need to drop down a level of abstraction and stop talking about “AI Security” or “Agent Security”. Remember past waves of technology transformation such as Internet, Mobile, or Cloud. Each one of these started off with the similarly meaningless appeals, for example, to have “Internet security”. At the time no-one knew what this meant either. It took dropping down a level of abstraction for us to make progress. Understanding the need for firewalls, intrusion detection, web server security, browser security, application security, penetration testing, and so on yielded such clarity. We are just starting to see the same happen with AI/Agentic security. The vendors that make sense of the right (not necessarily analyst driven) categories will win. The companies that shape this with vendors and for themselves will also win. 2. The quiet before the storm. Perhaps I’m being overly dramatic but I was surprised with the generally relaxed tone about the impending wave of vulnerabilities and the extent of industrialized attackers coming in the coming quarters. Everyone seems to know vulnerability management isn’t where it needs to be in most companies and what’s coming will pile on the pressure. This was contrasted with the recent [Un]prompted conference, also in San Francisco, where there was a palpable sense of amazement, and concern, at the utility of current models for vulnerability research and exploitation. I still think things are going to get wild: https://lnkd.in/eGqg4npb
-
Jerry Perullo liked thisJerry Perullo liked this⭐ On Thursday of RSA, we take a break and spend time together at what we call the CISO UnConfrence. This marked our 3rd annual and it did not disappoint. ⭐ We spend the day talking strategy, what works, and what doesn't. We challenge each other and create a space where we can openly and transparently talk about challenges and encourage each other. ❤️ I am so grateful to be able to spend the day with such amazing leaders. ❤️ Thank you everyone for the authentic participation and thank you Bryan Payne for hosting us a the Adobe HQ. Nate Lee your picture was too good not to share. 😉 Josh Yavor TC NiedzialkowskiDevin ErtelStan L.Ryan GurneyAssaf KerenMatthew MyrickMatt HillaryKyle TobenerAaron StanleySara LazarusChuck KeslerJoanna ChenJerry PerulloAndrew BechererScott KisserBen CalvertAdam ArellanoDamian HasseSteve ZalewskiScott RobertsAndy SteingrueblKristen BeneduceNils PuhlmannDavid BradburyEsteban GutierrezBrandon SterneYaron LeviAanchal GuptaNate LeeElliot ColquhounMartin Choluj Bob LordKurt SauerJohn KennedyYassir Abousselham Bil Corry
-
Jerry Perullo liked thisTeamPCP compromised very popular telnyx library. Beware of the exposure. Implement controls before it is too late.Jerry Perullo liked this🚨 RL Research Alert! Look out for compromised versions 4.87.1 and 4.87.2 of telnyx PyPI package with more than 3.75 million downloads. https://lnkd.in/d9GF3y_S It is the latest victim in the ongoing TeamPCP supply chain campaign. Previous victims include Trivy, Checkmarx and LiteLLM. Ultimate goal is exfiltration of cloud secrets like observed in previous attacks. Malicious code is added to telnyx/_client.py file. New C2 server is 83[.]142.209.203telnyx@4.87.2 - PyPI | ReversingLabs Spectra Assure Communitytelnyx@4.87.2 - PyPI | ReversingLabs Spectra Assure Community
-
Jerry Perullo liked thisJerry Perullo liked thisEveryone’s talking AI + Cyber + Iran. I did too this week with my dear friend Jon Fortt, CNBC. But the part I actually remember? .. Swapping stories about our boys .. Re-learning music .. Celebrating life milestones We spend so much time preparing for what’s next. We forget to notice what’s already here. #WhatMakesYouHuman?
Experience & Education
-
Adversarial Risk Management
*******
-
*** *********** *******
****
-
******* ********* ** **********
********* ** *** ********
-
******* ***** ********** * ** **** ******** ******* ** ********
*** *** undefined
-
-
********** ** ******** ********** *******
******** ** ******* * ** ***** ******** *******
-
View Jerry’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Publications
-
The Definitive Cybersecurity Guide for Directors and Officers
New York Stock Exchange and Palo Alto Networks
Patents
-
Multi-signature verification network
Issued US 10621579B2
See patentThis patent describes a novel method for applying on-chain multi-signature verification to create a payment system satisfying several unique criteria. First, it removes reliance on any single depository institution to hold customer assets. Second, it provides an alternative revenue stream for traditional depository institutions aligned with their investment banking experience. Finally, it minimizes fraud by aligning the interests of the financial institutions with those of the consumer. The…
This patent describes a novel method for applying on-chain multi-signature verification to create a payment system satisfying several unique criteria. First, it removes reliance on any single depository institution to hold customer assets. Second, it provides an alternative revenue stream for traditional depository institutions aligned with their investment banking experience. Finally, it minimizes fraud by aligning the interests of the financial institutions with those of the consumer. The system creates a competitive algorithmic market to assess and compete to acquire transaction risk at the individual payment level in real-time. Consumers begin a transaction; multiple banks assess the risk with micro latency similar to high frequency trading systems; and the consumer picks the best rate and has the transaction guaranteed against fraud - automatically if they wish.
View Jerry’s full profile
-
See who you know in common
-
Get introduced
-
Contact Jerry directly
Other similar profiles
Explore more posts
-
Mark Wiener
BizCom Global • 3K followers
Looking forward to bringing this session to the 2026 North Carolina Cybersecurity Symposium. Live Cyber Crisis Simulation – Watch Leadership Under Fire is designed to show what really happens when plans collide with pressure. This is not about tools or checklists. It is about how leaders think, communicate, and make decisions when an incident is unfolding in real time. In this live, unscripted simulation, participants step into executive roles during a fictional AI-driven cyber incident, while the audience actively influences the scenario. The value is in seeing the decision making, missteps, course corrections, and coordination challenges that emerge under stress. It gives a rare, honest view into the organizational side of incident response that most people never get to observe. The goal is simple. Build executive muscle memory. Strengthen cross-functional alignment. Improve communication when it matters most. This session is especially relevant for leaders responsible for risk, operations, technology, legal exposure, and business continuity who want to move from theory to real readiness. #NCCyber #CybersecurityLeadership #IncidentResponse #OperationalResilience #ExecutiveReadiness
17
1 Comment -
Gary Vause, II
SWISS UMEF University of… • 2K followers
📍Polk County, Florida: My Birthplace, and Now a Digital Risk Case Study By Professor Gary Vause, II Founder & CEO, Vause Computer Systems, LLC I was born and raised in Polk County, Florida—a place rich in culture, community, and history. But today, as a cybersecurity strategist and AI governance researcher, I return not just with memories, but with deep concern. In my recent research, I’ve used Polk County, Florida as a case study to measure the readiness of local municipalities for AI integration, digital security, and public trust infrastructure. The results are alarming: 🚨 Key Findings: 🔴 Outdated Infrastructure The county’s 18 municipalities operate with decades-old systems, networks, and processes, vulnerable to modern cyberattacks and digital failures. 🔴 Lack of Skilled Personnel Across city governments, I found underskilled IT personnel unequipped to handle today’s complex digital threats, data breaches, and emerging technologies. 🔴 No AI Strategy Shockingly, none of the 18 cities in Polk County has developed an AI strategy, roadmap, or ethical implementation framework. This means residents are unprepared for the wave of automation, digital services, and decision-making tools being adopted elsewhere. 🔴 No Best Practices in Place There are little to no standardized digital governance best practices in effect. Each city is navigating blindly—without collaborative leadership or shared cybersecurity standards. ❗The Bigger Picture: A National Warning If this is happening in Polk County—my birthplace—then it’s likely happening in hundreds of communities across America. And that leads to a bold assertion from my research: “If local municipalities across the United States mirror Polk County’s digital weaknesses, it will be nearly impossible for America to achieve global AI dominance.” This is not just about technology. It's about public safety, economic resilience, and democratic accountability. 🧠 A Solution Aligned with Executive Order 14179 In January 2025, President Trump signed Executive Order 14179: Removing Barriers to American Leadership in Artificial Intelligence. This order recognizes that outdated systems and unprepared governments are holding back the nation’s AI leadership. EO 14179 calls for: Digital infrastructure modernization Bias-free AI systems Public trust safeguards Ethical, transparent governance These are precisely the gaps Polk County—and so many others—must address now. 💡 A Call to Action As the CEO of Vause Computer Systems, LLC, my team and I are working to bring AI governance frameworks, cybersecurity roadmaps, and digital readiness assessments to local governments that are falling behind. Let’s modernize together—for our communities, country, and future in the global AI landscape. #PolkCountyDigitalCrisis #ExecutiveOrder14179 #AIReadiness #DigitalInfrastructure #PublicTrust #VauseComputerSystems #SmartGovernment #CybersecurityNow #ProfessorGaryVause #DigitalJustice
8
-
Matt Kelly
Strategic editorial leader… • 19K followers
So you’re wondering how to reframe your whole #GRC program to rest upon a foundation of solid #cybersecurity, rather than responding endlessly to more regulatory demands and risk management frameworks? What a coincidence, I moderated a webinar on that topic just the other day, and took lots of notes. Was really struck how much this is a people- and strategy-centered challenge, more than a tech challenge. #compliance #audit #privacy https://lnkd.in/e3y29KZG
17
2 Comments -
Briana D. Sullivan
iolite secure • 1K followers
A former boss once said: the best partners might be the ones who’ve just recovered from an incident. Chances are, they’ve invested the time, energy, and thought into making sure it never happens again. What stood out to me in the latest NIST recommendations was the emphasis on continuous improvement. The faster a company reacts, the faster it recovers, and the faster it recovers, the faster it can react. I love seeing something as traditionally static as a framework recognize the importance of agility and iteration.
11
-
Tom Eston
Snyk • 3K followers
🤔Is AI the future of human relationships? In our newest podcast episode, Scott Wright, CISA and I discuss the intriguing potential of AI friends as imagined by Mark Zuckerberg. How will AI shape our social circles in the future? Also, catch up on the latest news about 23andMe's recent troubles. Tune in for a thought-provoking session! Links to listen and subscribe below! #podcast #cybersecurity #privacy #ai
9
1 Comment -
Eran Kahana
University of Minnesota Law… • 6K followers
Major upgrade to my AI vendor assessment app. Core Capabilities 🚩 Multi-factor criticality tier scoring with auto-calculated risk classification 🚩 Dual-layer risk controls evaluating both vendor and organizational safeguards 🚩 18 assessment sections covering security, compliance, AI governance, and business continuity 🚩 Real-time risk scoring with weighted likelihood, impact, and control strength analysis 🚩 Compliance framework mapping to NIST CSF, ISO 27001, SOC 2, GDPR, and EU AI Act 🚩 AI-specific governance including model lifecycle, transparency, and human oversight 🚩 JSON and Excel export for reporting and audit documentation User Experience UI features 🚩 Collapsible accordion layout for focused, section-by-section work 🚩 Sidebar navigation with instant scroll-to-section access 🚩 Live progress tracking showing overall and per-section completion 🚩 Compliance badges on every section header for quick framework reference 🚩 Responsive design optimized for desktop and mobile screens 🚩 Clean, professional interface 🚩 Interactive risk sliders with real-time score updates and visual breakdowns 🚩 Conditional form logic that reveals relevant fields based on your inputs Partial screenshot below ----- If you're interested in a demo, please DM me.
7
2 Comments -
Allan Friedman, PhD
TPO Group • 5K followers
CISA has published a draft of the new CISA SBOM Minimum Elements! The 2021 NTIA Minimum Elements were an important step to help create a common specification of what should be in an SBOM. CISA is proposing an updated, clarified version that can be aligned with existing tools and support use cases. They are actively seeking feedback, so please share, review, and send them your thoughts! https://lnkd.in/eRm_zxT2
201
13 Comments -
Andres Agostini
McKinsey & Company • 15K followers
"Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework by Cynthia Brumfield and Brian Haugli detonates the conventional boundaries of digital defense, delivering a strategic war map for navigating the volatile frontlines of cyber warfare. This isn’t a guide—it’s a tactical doctrine forged for executives, technologists, and cyber sentinels who refuse to be blindsided. It weaponizes the NIST Cybersecurity Framework into a five-pronged arsenal—Identify, Protect, Detect, Respond, Recover—each forged with operational precision and strategic foresight. Cyber risk isn’t patched here—it’s architected, embedded, and elevated into the core infrastructure of organizational survival. Detection becomes anticipatory reconnaissance, continuity transforms into command resilience, and governance evolves into cyber leadership. Technologies aren’t tools—they’re tactical extensions of executive will. This book doesn’t teach defense—it instills dominance, turning risk into a programmable variable and resilience into a systemic reflex. It’s not just mastery—it’s cyber sovereignty." By Professor Doctor Andres Agostini -- https://lnkd.in/e4KvyE8
1
-
David A. Bader, PhD
New Jersey Institute of… • 7K followers
🚨 The regulatory chaos in cybersecurity is staggering: 45 different incident reporting requirements across 22 federal agencies, with 49-79% of parameters in direct conflict. We need urgent reform and CISA modernization for today's AI-enabled threat landscape. My thoughts in @TechNewsWorld 👇 https://bit.ly/45V77km #Cybersecurity #CISA #RegulatoryReform #AIThreats
20
1 Comment -
Tom Conkle
Optic Cyber Solutions • 3K followers
Today I’ll be presenting along with @KellyHood on “CMMC in Practice: What Assessors Look for and How to Prepare” for the @ISACA Central Maryland Chapter. The timing couldn’t be better. The #CMMC final rule has officially been published, and the countdown to implementation is on. Starting November 10, CMMC requirements will begin appearing in DoD contracts. In this virtual training we will be sharing all about: - What assessors are really looking for during certification - Common red flags that can derail the process - How to make sure your evidence is audit-ready - The latest on CMMC timelines and the phased roll-out Whether you’re just starting your CMMC journey or gearing up for an assessment, you’ll walk away with practical guidance to avoid compliance pitfalls and move forward with confidence. Register to join us! https://lnkd.in/egryVJEj #ISACA #ISACACMC #Maryland #OpticCyber
18
2 Comments -
Charlene Deaver-Vazquez
CyberRiskModels.com • 2K followers
Managing risk is a challenge, no doubt. When you’re managing risk, part of what you need to do is not just track it, but understand and aggregate the potential impact of the risks you’re focused on. These aren’t your everyday control risks. We’re talking about the big ones—third-party attacks, vulnerabilities in your network, black swan events with low probability but high impact, and emerging threats like AI misuse or insider threats. These are the risks that belong in your risk register. And managing them isn’t just about listing them—it’s about understanding how they relate to your business. In my book, The CISO Playbook: Mastering Risk Quantification, I talk about aligning risks to the business. That means mapping each risk to one of four key areas: business objectives, critical projects, key assets, or essential functions. This alignment is crucial because it helps you prioritize. If a risk threatens one of these four areas, it should be top of mind. This is where “what if” analysis comes in. What if one of these risks materialized? What if two did? What if they occurred in close succession, or were related? What if they happened simultaneously? Read the full post here https://lnkd.in/e-BEJCaP #cybersecurity #riskmanagement #CISO #CIO #CyberRisk #riskregister
2
2 Comments -
Ivan Mauricio Cabezas Troyano
Universidad de San… • 1K followers
Beyond the political tone of the document—which opens by comparing today’s AI race to the Cold War Space Race—I won’t wade into geopolitics. Instead, I’d like to spotlight two mandates within the “𝗕𝘂𝗶𝗹𝗱 𝗔𝗺𝗲𝗿𝗶𝗰𝗮𝗻 𝗔𝗜 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲” pillar—better known as “𝘉𝘶𝘪𝘭𝘥, 𝘉𝘢𝘣𝘺, 𝘉𝘶𝘪𝘭𝘥” —that center on security by design. 𝗕𝗼𝗹𝘀𝘁𝗲𝗿 𝗖𝗿𝗶𝘁𝗶𝗰𝗮𝗹 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 As AI grows more capable in software and cybersecurity, it will empower both attackers and defenders. Operators of critical infrastructure—often working with limited budgets—can gain an edge by adopting AI‑driven security tools. Yet those very systems become high‑value targets themselves. Any AI deployed in safety‑critical or homeland‑security settings must therefore be secure‑by‑design: robust, resilient, self‑monitoring, and able to detect threats such as data poisoning or adversarial‑example attacks. 𝗣𝗿𝗼𝗺𝗼𝘁𝗲 𝗦𝗲𝗰𝘂𝗿𝗲‑𝗯𝘆‑𝗗𝗲𝘀𝗶𝗴𝗻 𝗔𝗜 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝗶𝗲𝘀 𝗮𝗻𝗱 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀 Because AI models are vulnerable to adversarial inputs and privacy attacks, their reliability—especially in national‑security contexts—hinges on rigorous AI assurance. The U.S. government is making that assurance a core mandate: every system it depends on must be developed and deployed with strong safeguards against malicious or spurious data. 𝗪𝗵𝘆 𝗶𝘁 𝗺𝗮𝘁𝘁𝗲𝗿𝘀: If you’re building or integrating AI for critical operations, these security‑by‑design principles aren’t optional—they’re fast becoming table stakes. Worth a close read to see how they map to your current engineering practices. Let’s keep the conversation going. #AI #SecureByDesign #Cybersecurity #AIPolicy
1
-
Professor Tim
University of Michigan-Flint… • 5K followers
Remember my post on vibe-coding is a trap! Fyi: watch-out “value sharing” / outcome-based deals: OpenAI has signaled that for high-impact, IP-creating use cases (e.g., drug discovery, materials, finance/trading), they may push for bespoke contracts that include profit-share or upside participation, not just usage fees.
3
1 Comment -
Martin Nkoyi Beele
Oasis Vision Organization • 7K followers
NIST SP 800-30 Rev. 1 Guide to assessing risk NIST SP 800-30 is a publication that provides guidance on performing risk assessments. It outlines strategies for identifying, analyzing, and remediating risks. Organizations use NIST SP 800-30 to gain insights into the potential likelihood and severity of risks—helping them make informed decisions about allocating resources, implementing controls, and prioritizing remediation efforts. This four page document is adapted from NIST SP 800-30 Rev. 1. The term "Rev. 1" signifies that it is the first updated version of this publication. NIST occasionally revises its documents to incorporate new information, reflect changes in technology and regulatory requirements, or address feedback. Note: NIST's Computer Security Resources Center contains more information on SP 800-30 Rev. 1.
1
-
Andrew Shea
Enterprise Risk… • 5K followers
The CRFQ NIST 8286 IR webinar series provides a discussion of the origins of the NIST 8286 IR, a roadmap for integrating Cyber and ERM risk and how to use the resulting momentum to evolve risk governance with the board of directors.. The webinar series cover the four parts of the NIST 8286 IR: April 15, 1 PM CST Part A,D: National Institute of Standards and Technology (NIST) 8286 origins and objectives; Adding Quantitative to Qualitative Analysis and Risk Registers and Reporting. Discussion of FAIR, FAIR-CAM and other approaches for a singular integrated approach for financial impact determination and mitigation analysis. Stephen Quinn, NIST. Jack Jones, FAIR Institutebit.ly/4j2ldpi April 22, 1 PM CST Part B Adding cyber effectively and proportionally to ERM as a basis for generating risk appetite statements , risk boundaries, triggers, risk ownership & capital Loss reserve planning. Jack Jones, FAIR Institute and Dr. Bob Mark former CRO and founder of Black Diamond bit.ly/43T48tq April 29, 1 PM CST Part C Describes how information, as recorded in cybersecurity risk registers (CSRRs), may be integrated as part of a holistic approach to ensuring that risks to information and technology are properly considered for the enterprise risk portfolio management. Board Reporting & Messaging, Impact on Financial Metrics & Planning. Keyaan Williams, former CISO and Dr. Bob Mark former CRO AND Founder of Black Diamond. bit.ly/4lv3Gb2
11
1 Comment -
Richard Staynings
Cylera • 26K followers
Jen Easterly, former director of CISA and now a strategic advisory board member for Huntress, is focusing on boosting cyber resilience for small and medium enterprises. These organizations often face sophisticated attacks but lack the resources to defend themselves. During her CISA tenure, Easterly championed initiatives such as the Joint Cyber Defense Collaborative and persistent threat hunting. These measures strengthened federal capabilities and deepened operational collaboration with the private sector, enabling rapid sharing of threat intelligence and faster mitigation of risks. In light of the shift from espionage to disruptive attacks on critical infrastructure, Easterly urges all organizations, regardless of size, to prioritize resilience - preparing for, responding to, and recovering from incidents - and to demand secure-by-design technology from vendors. "Every business, large and small, should consider themselves vulnerable. It's all about resilience. How do you understand the threat, prepare for it, be able to respond to it and then recover so that you can mitigate and drive down risk," she said. https://lnkd.in/gejpe3CB
4
-
Justin Leapline
Distilled Security Podcast • 5K followers
“PCI SSC has seen comments…” 👀 -Assessor Newsletter, June 2025 A few weeks ago, I raised a flag about FAQ 1597 and the related infographic, where the language suggested that acceptance of lower-risk vulnerabilities wasn’t on the table. That post gained great traction and sparked important conversations in the community. Well, the PCI Security Standards Council has now responded. In their June 2025 Assessor Newsletter, they stated: ✅ Clarification (main bullet points summarized): - “Addressed” ≠ “Resolved.” - Examples of "addressed" where not an exhaustive list. - Low-risk vulnerabilities can be accepted—if justified by a Targeted Risk Analysis (TRA). - Addressing a vulnerability may mean fixing it, compensating for it, disabling it, or accepting the risk. - The TRA must be reviewed annually to ensure it still reflects the environment and risk tolerance. This clarification is welcome—but also tacit acknowledgment that feedback from assessors and the broader community (yes, some of those comments they saw were from you all) helped make it happen. 📌 Next step for the Council: Update FAQ 1597 and the DSS itself at some point to reflect this broader interpretation. The ambiguity in the official text still risks confusion and audit inconsistencies. As of this posting date, the only place this clarification exists is within the assessor newsletter. 🤨 One nitpick I will call out though— the Council called out that their original definition of “addressed” wasn’t all inclusive. However, words matter. For a reminder, this was the definition: Addressed - the entity determines whether to resolve the vulnerability or to mitigate the risk by addressing the vulnerability in another way (e.g., with a compensating control or by disabling a vulnerable service) So to be clear, their definition says resolve OR mitigate. How were we to infer that acceptance is acceptable!?! 🤷♂️ If you’re a QSA or manage PCI in your organization, this is a significant development. It gives you back the flexibility to treat low-risk issues rationally, as long as your TRA process is strong. Thank you to Viviana W. for letting me know about the publication within the newsletter! #PCIDSS #CyberSecurity #QSA #VulnerabilityManagement #GRC #PCICompliance #InfoSec #AssessorLife
214
19 Comments
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content