Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Eric Vanderburg

President at Nexus Cyber

Cleveland, United States

Eric Vanderburg is a visionary leader with decades of experience in cybersecurity. He has worked with global clients, securing complex enterprise systems, handling cyber incidents, and functioning as a virtual CISO for businesses. Vanderburg is cyber renaissance man. His experience includes being a licensed private investigator, expert witness, professor, and public speaker. He is sought out for his insight on cybersecurity, privacy, data protection, and storage and has published books on storage networking and cloud computing with McGraw Hill and Summer Sage Books. He taught cybersecurity at CSU Law, serves on various non-profit boards, and coaches chess. Eric is passionate about sharing cybersecurity and technology news, insights and best practices. He regularly presents on security topics and publishes insightful articles.
Vanderburg has an MBA from Kent State University and several undergraduate degrees. He has also obtained over 40 security and technology certifications. He regularly presents on security topics and publishes insightful articles. You can find him throughout the day posting valuable and informative content on his social media channels.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Cleveland, Ohio
Speaking Topics: Cybersecurity, AI, Cloud

Eric Vanderburg Points
Academic 0
Author 39
Influencer 659
Speaker 0
Entrepreneur 0
Total 698

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Minimum Project Size: $5,000+
Average Hourly Rate: $300+
Number of Employees: 51-250
Company Founded Date: Undisclosed

Areas of Expertise

AI 30.04
AR/VR
Big Data 30.06
Business Continuity
Cloud
Culture
Cybersecurity 31.00
Digital Transformation 30.01
Emerging Technology
GRC
HealthTech
IoT
IT Leadership
Legal and IP 30.18
Privacy 30.15
Risk Management 30.04

Industry Experience

Aerospace & Defense
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Industrial Machinery & Components
Manufacturing
Professional Services
Retail
Telecommunications
Travel & Transportation
Utilities

Publications

39 Article/Blogs
The Privacy Gray Area: How Unregulated Data Exposes Your Health
Import from medium.com
December 05, 2025
Most people think their health information is safely locked behind HIPAA, guarded by hospitals, doctors, and insurance companies. But that confidence is misplaced. The truth is that the most sensitive details about your health — the kind you assume only your doctor knows — are often gath

See publication

Tags: Cybersecurity

Hack Friday: How to Shop Without Getting Scammed
Import from medium.com
November 27, 2025
Black Friday used to be defined by lines snaking around parking lots at four in the morning, overflowing carts, and frantic hunts for televisions marked down to unbelievable prices. Now the chaos has moved online. Instead of bruises and cart collisions, consumers face something far more damaging: ac

See publication

Tags: Cybersecurity

AI as a Creative Partner: Why Hybrid and Synthetic Media Are Here to Stay
Import from medium.com
November 17, 2025
Image by Janeb13 from PixabayArtificial intelligence is provoking one of the loudest creative debates in decades. Depending on who you ask, it’s either the beginning of a cultural renaissance or the end of human originality. The truth is far less dramatic and far more practical: AI is a tool ??

See publication

Tags: Cybersecurity

Airlines Are Missing a Critical Opportunity Amid the Government Shutdown
Import from medium.com
November 10, 2025
Image by JUNO KWON from PixabayAs the government shutdown drags on, air traffic controllers across the nation are keeping the skies safe without a paycheck. These professionals, essential to every flight that takes off or lands, have continued working under mounting financial stress. Many have been

See publication

Tags: Cybersecurity

Perception Under Fire: The Evolution of Reputation in a Synthetic Age
Import from medium.com
November 03, 2025
Image by Lukas Gassner from PixabayReputation has always mattered in business, but never before has it been so immediate or so fragile. When opinions form in seconds and misinformation travels at the speed of a share, an organization’s public image can shift overnight. The same networks that conn

See publication

Tags: Cybersecurity, Agile

Automation vs. Accountability: Vibe Coding and the Tea Breach
Import from medium.com
August 05, 2025
AI wrote the code. Hackers wrote the consequences. That’s the grim reality many organizations are now facing as they rush to embrace AI‑assisted development without proper oversight. In late July 2025, Tea, a women‑only dating advice and experience‑sharing app, became the center of a major c

See publication

Tags: Cybersecurity

Rethinking Cybersecurity: Why Traditional Defenses No Longer Cut It in the Modern Threat Landscape
Import from medium.com
March 27, 2025
In today’s hyperconnected world, digital transformation has become both a business imperative and a double-edged sword. As organizations embrace cloud computing, AI, and remote work, they unknowingly expand their attack surfaces and expose themselves to increasingly sophisticated cyber threats. Ye

See publication

Tags: Cybersecurity

Soft Skills Revolution: Emotional Intelligence and Cybersecurity
Import from medium.com
November 04, 2024
Photo by Edmond Dantès from PexelsCybersecurity is a critical concern for organizations of all sizes. As cyber threats grow in complexity and frequency, the need for robust defense mechanisms has never been more pressing. While technical skills and knowledge of security protocols are a given, ther

See publication

Tags: Cybersecurity

AI in Action: Mastering Data Management from Start to Finish
Import from medium.com
October 25, 2024
Image by Gerd Altmann from PixabayData is one of the most valuable assets for organizations, fueling everything from day-to-day operations to long-term strategy. However, managing data across its lifecycle — collection, storage, processing, analysis, sharing, and disposal — has grown in

See publication

Tags: Cybersecurity

AI-Driven Automation in SOC Operations
Import from medium.com
October 23, 2024
Image by wastedgeneration from PixabayAI can revolutionize SOC operations by automating a range of tasks, allowing analysts to focus on higher-priority incidents and strategic initiatives. Here’s how AI-driven automation improves SOC efficiency:1. Automated Threat Intelligence GatheringOne of the

See publication

Tags: Cybersecurity

AI-Driven Automation in SOC Operations
Medium
October 22, 2024
One of the most time-consuming tasks for SOC analysts is gathering and analyzing threat intelligence from various sources, including threat feeds, security logs, and network traffic data. AI-powered tools can automate this process by continuously scanning and aggregating data from internal and external sources, enriching it with context, and identifying patterns that may indicate potential threats.

See publication

Tags: Big Data, Cybersecurity

AI and Cyber Deception — The New Frontier in Proactive Defense
Import from medium.com
October 21, 2024
AI and Cyber Deception — The New Frontier in Proactive DefenseImage by Gerd Altmann from PixabayIn the evolving cybersecurity landscape, companies are constantly searching for innovative ways to stay ahead of cybercriminals. Traditional defense mechanisms, such as firewalls, intrusion detecti

See publication

Tags: Cybersecurity

Decentralized Defense — How AI Safeguards Your Cloud Data
Import from medium.com
October 18, 2024
Decentralized Defense — How AI Safeguards Your Cloud DataAs organizations dive headfirst into the cloud, lured by its unmatched scalability, flexibility, and cost efficiency, securing these virtual landscapes has skyrocketed to the top of the priority list. However, this digital migration isn

See publication

Tags: Cybersecurity

Explainable AI in Cybersecurity — Ensuring Transparency in Decision-Making
Import from medium.com
October 15, 2024
Explainable AI in Cybersecurity — Ensuring Transparency in Decision-MakingImage by Cliff Hang from PixaBayAs artificial intelligence (AI) continues to reshape cybersecurity, it also brings significant challenges. One of the most prominent is the “black box” nature of many AI models, espec

See publication

Tags: Cybersecurity, AI

AI and Zero Trust Architecture: Reinventing Security Models
Import from medium.com
October 10, 2024
Image by Pete Linforth from PixabayCybersecurity threats continue to evolve in complexity, and traditional security models are proving less effective. Modern organizations, with their increasingly distributed workforces, reliance on cloud services, and complex supply chains, require a new approach

See publication

Tags: Cybersecurity, Supply Chain

How Cybercriminals Are Exploiting ChatGPT: The Dark Side of AI
Import from medium.com
October 10, 2024
Image courtesy of Cliff1126 at PixabayAs artificial intelligence (AI) technologies like ChatGPT continue to advance, they are revolutionizing industries, improving productivity, and transforming human-machine interactions. ChatGPT, an AI-powered language model developed by OpenAI, has garnered wide

See publication

Tags: Cybersecurity, AI

AI and Privacy: Assessing the Risk, Unveiling the Truth
Import from medium.com
October 08, 2024
Image by Kohji Asakawa from PixabayAs artificial intelligence (AI) continues to permeate industries, businesses are leveraging its capabilities for automation, decision-making, and predictive analytics. However, with great power comes great responsibility, particularly when it comes to privacy. AI

See publication

Tags: Cybersecurity, Privacy, Predictive Analytics

Boosting Cyber Defenses — How AI Empowers Cybersecurity Teams
Import from medium.com
October 03, 2024
Boosting Cyber Defenses — How AI Empowers Cybersecurity TeamsThe increasing sophistication of cyber threats has necessitated the adoption of advanced tools and techniques to protect organizations from a wide array of attacks. Artificial Intelligence (AI) has emerged as a transformative technol

See publication

Tags: Cybersecurity, AI

Coronavirus and Remote Work Considerations
LinkedIn
May 08, 2020
As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure. There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. Below is a list of tips and recommendations to help ensure you are doing your part to help keep your company’s data secure.

See publication

Tags: Cybersecurity, COVID19

The mechanics of cybersecurity maturity
LinkedIn
February 03, 2020
As an organization becomes more conscious and engaged in protecting information, it progresses along a path of cybersecurity maturity. I like to describe this path in five stages, starting with reactive and ending with realization organizations. This model is helpful because it demonstrates how cybersecurity is refined in an organization. Most importantly, it shows that cybersecurity maturity takes time to be part of an established organization and how an organization can transform from viewing cybersecurity as a cost to an investment. Let's see how it works

See publication

Tags: Cybersecurity, Risk Management

Monitoring is a key cybersecurity competency
Import from medium.com
October 02, 2018
Technology has accelerated the pace of almost everything we do. The same is true for the speed of cyber attacks. Technology has decreased the time it takes for a small, localized cybersecurity event to balloon into a serious security incident. A single compromised password or one wrong click can ign

See publication

6 Steps for Data Confidence in a Digital World
LinkedIn
August 06, 2018
Companies today are critically dependent upon their data. It is the lifeblood of operations and is relied upon for strategic and tactical decision-making. Data doesn’t just support the business - it is the business of a growing number of companies such as search, social media, integrators, and marketing companies. With such a heavy reliance upon data, it is vital for companies to have confidence or trust in their data.

See publication

Tags: Big Data, Cybersecurity, Digital Transformation

5 Threat Management Challenges and Opportunities
Import from medium.com
June 21, 2018
As we look back on a succession of headlines about data breaches and security lapses at some of the world’s largest companies, we find a consistent theme. Attackers have continued to improve their techniques requiring companies to compensate and raise the bar on cybersecurity. However, there are s

See publication

Protecting Data for the Next Generation of Applications
Import from medium.com
June 14, 2018
As we look to the future, our reliance on data is only going to increase. Technologies such as IoT, AI, robotics, and virtual reality are going to fundamentally change the way we work and live. Each of these technologies is based on a lot of data that will need to be protected, not only from unautho

See publication

Tags: Big Data, Cybersecurity, Robotics

Four Steps to Effective Cybersecurity Logging
Import from medium.com
June 11, 2018
Logs are crucial elements to breach investigations. However, some investigations suffer from a lack of logs. In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines. Some o

See publication

Thinkers360 Credentials

2 Badges

Blog

Opportunities

Contact Eric Vanderburg

Book Eric Vanderburg for Speaking

Book a Video Meeting

Media Kit

Share Profile

Contact Info

  Profile

Eric Vanderburg


Latest Activity

Search
How do I climb the Thinkers360 thought leadership leaderboards?
What enterprise services are offered by Thinkers360?
How can I run a B2B Influencer Marketing campaign on Thinkers360?