Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Eric Vanderburg

Vice President of Cybersecurity at TCDI

Cleveland, United States

Eric Vanderburg is the Vice President of Cybersecurity at TCDI where he and his cybersecurity team protect companies from cyber threats, investigate data breaches, and provide guidance on security governance and compliance. Vanderburg has an MBA from Kent State University and several undergraduate degrees. He has also obtained over 40 security and technology certifications.
Eric Vanderburg is a well-known author, blogger, and a thought leader. He is best known for his insight on cybersecurity, privacy, data protection, and storage and has published books on storage networking and cloud computing. Vanderburg is passionate about sharing cybersecurity and technology news, insights and best practices. He regularly presents on security topics and publishes insightful articles. You can find him throughout the day posting valuable and informative content on his social media channels.

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Cleveland, Ohio

Eric Vanderburg Points
Academic 0
Author 32
Influencer 659
Speaker 0
Entrepreneur 0
Total 691

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed

Areas of Expertise

AI
AR/VR
Big Data 30.10
Cloud
COVID19 30.27
Cybersecurity 31.08
Digital Transformation 30.01
HealthTech
IoT
Legal and IP 30.22
Privacy 30.08
Risk Management 30.08

Industry Experience

Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Manufacturing
Telecommunications
Travel & Transportation
Utilities

Publications

32 Article/Blogs
Soft Skills Revolution: Emotional Intelligence and Cybersecurity
Import from medium.com
November 04, 2024
Photo by Edmond Dantès from PexelsCybersecurity is a critical concern for organizations of all sizes. As cyber threats grow in complexity and frequency, the need for robust defense mechanisms has never been more pressing. While technical skills and knowledge of security protocols are a given, ther

See publication

Tags: Cybersecurity

AI in Action: Mastering Data Management from Start to Finish
Import from medium.com
October 25, 2024
Image by Gerd Altmann from PixabayData is one of the most valuable assets for organizations, fueling everything from day-to-day operations to long-term strategy. However, managing data across its lifecycle — collection, storage, processing, analysis, sharing, and disposal — has grown in

See publication

Tags: Cybersecurity

AI-Driven Automation in SOC Operations
Import from medium.com
October 23, 2024
Image by wastedgeneration from PixabayAI can revolutionize SOC operations by automating a range of tasks, allowing analysts to focus on higher-priority incidents and strategic initiatives. Here’s how AI-driven automation improves SOC efficiency:1. Automated Threat Intelligence GatheringOne of the

See publication

Tags: Cybersecurity

AI-Driven Automation in SOC Operations
Medium
October 22, 2024
One of the most time-consuming tasks for SOC analysts is gathering and analyzing threat intelligence from various sources, including threat feeds, security logs, and network traffic data. AI-powered tools can automate this process by continuously scanning and aggregating data from internal and external sources, enriching it with context, and identifying patterns that may indicate potential threats.

See publication

Tags: Big Data, Cybersecurity

AI and Cyber Deception — The New Frontier in Proactive Defense
Import from medium.com
October 21, 2024
AI and Cyber Deception — The New Frontier in Proactive DefenseImage by Gerd Altmann from PixabayIn the evolving cybersecurity landscape, companies are constantly searching for innovative ways to stay ahead of cybercriminals. Traditional defense mechanisms, such as firewalls, intrusion detecti

See publication

Tags: Cybersecurity

Decentralized Defense — How AI Safeguards Your Cloud Data
Import from medium.com
October 18, 2024
Decentralized Defense — How AI Safeguards Your Cloud DataAs organizations dive headfirst into the cloud, lured by its unmatched scalability, flexibility, and cost efficiency, securing these virtual landscapes has skyrocketed to the top of the priority list. However, this digital migration isn

See publication

Tags: Cybersecurity

Explainable AI in Cybersecurity — Ensuring Transparency in Decision-Making
Import from medium.com
October 15, 2024
Explainable AI in Cybersecurity — Ensuring Transparency in Decision-MakingImage by Cliff Hang from PixaBayAs artificial intelligence (AI) continues to reshape cybersecurity, it also brings significant challenges. One of the most prominent is the “black box” nature of many AI models, espec

See publication

Tags: Cybersecurity

AI and Zero Trust Architecture: Reinventing Security Models
Import from medium.com
October 10, 2024
Image by Pete Linforth from PixabayCybersecurity threats continue to evolve in complexity, and traditional security models are proving less effective. Modern organizations, with their increasingly distributed workforces, reliance on cloud services, and complex supply chains, require a new approach

See publication

Tags: Cybersecurity

How Cybercriminals Are Exploiting ChatGPT: The Dark Side of AI
Import from medium.com
October 10, 2024
Image courtesy of Cliff1126 at PixabayAs artificial intelligence (AI) technologies like ChatGPT continue to advance, they are revolutionizing industries, improving productivity, and transforming human-machine interactions. ChatGPT, an AI-powered language model developed by OpenAI, has garnered wide

See publication

Tags: Cybersecurity

AI and Privacy: Assessing the Risk, Unveiling the Truth
Import from medium.com
October 08, 2024
Image by Kohji Asakawa from PixabayAs artificial intelligence (AI) continues to permeate industries, businesses are leveraging its capabilities for automation, decision-making, and predictive analytics. However, with great power comes great responsibility, particularly when it comes to privacy. AI

See publication

Tags: Cybersecurity

Boosting Cyber Defenses — How AI Empowers Cybersecurity Teams
Import from medium.com
October 03, 2024
Boosting Cyber Defenses — How AI Empowers Cybersecurity TeamsThe increasing sophistication of cyber threats has necessitated the adoption of advanced tools and techniques to protect organizations from a wide array of attacks. Artificial Intelligence (AI) has emerged as a transformative technol

See publication

Tags: Cybersecurity

Coronavirus and Remote Work Considerations
LinkedIn
May 08, 2020
As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure. There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. Below is a list of tips and recommendations to help ensure you are doing your part to help keep your company’s data secure.

See publication

Tags: Cybersecurity, COVID19

The mechanics of cybersecurity maturity
LinkedIn
February 03, 2020
As an organization becomes more conscious and engaged in protecting information, it progresses along a path of cybersecurity maturity. I like to describe this path in five stages, starting with reactive and ending with realization organizations. This model is helpful because it demonstrates how cybersecurity is refined in an organization. Most importantly, it shows that cybersecurity maturity takes time to be part of an established organization and how an organization can transform from viewing cybersecurity as a cost to an investment. Let's see how it works

See publication

Tags: Cybersecurity, Risk Management

Monitoring is a key cybersecurity competency
Import from medium.com
October 02, 2018
Technology has accelerated the pace of almost everything we do. The same is true for the speed of cyber attacks. Technology has decreased the time it takes for a small, localized cybersecurity event to balloon into a serious security incident. A single compromised password or one wrong click can ign

See publication

6 Steps for Data Confidence in a Digital World
LinkedIn
August 06, 2018
Companies today are critically dependent upon their data. It is the lifeblood of operations and is relied upon for strategic and tactical decision-making. Data doesn’t just support the business - it is the business of a growing number of companies such as search, social media, integrators, and marketing companies. With such a heavy reliance upon data, it is vital for companies to have confidence or trust in their data.

See publication

Tags: Big Data, Cybersecurity, Digital Transformation

5 Threat Management Challenges and Opportunities
Import from medium.com
June 21, 2018
As we look back on a succession of headlines about data breaches and security lapses at some of the world’s largest companies, we find a consistent theme. Attackers have continued to improve their techniques requiring companies to compensate and raise the bar on cybersecurity. However, there are s

See publication

Protecting Data for the Next Generation of Applications
Import from medium.com
June 14, 2018
As we look to the future, our reliance on data is only going to increase. Technologies such as IoT, AI, robotics, and virtual reality are going to fundamentally change the way we work and live. Each of these technologies is based on a lot of data that will need to be protected, not only from unautho

See publication

Tags: Big Data, Cybersecurity

Four Steps to Effective Cybersecurity Logging
Import from medium.com
June 11, 2018
Logs are crucial elements to breach investigations. However, some investigations suffer from a lack of logs. In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines. Some o

See publication

Doing Business in a Data-Driven World
Import from medium.com
May 29, 2018
The modern company thrives on data, yet some are also drowning in it. The data that we find so precious could be holding us back rather than driving us forward for data must be managed and interpreted for it to be turned into actionable insights. Data management complexity increases as data sizes ...

See publication

Tags: Analytics, Big Data, Cybersecurity

Legal and Ethical Obligations in Cybersecurity
Import from medium.com
May 21, 2018
I recently presented at the Duke Law EDRM on Cybersecurity and Law Firm Understanding Legal and Ethical Obligations. Some questions were asked that we did not have time to answer so I am answering them here for those who are interested.How often should a company perform penetration testing?It is qui

See publication

Tags: Cybersecurity, Legal and IP

Four Pillars of Data Protection for the Modern Enterprise
Import from medium.com
May 04, 2018
Data, a crucial asset for the modern business, is under attack. Data breaches, ransomware, employee theft, and mistakes can each cause significant harm to your company, customers, and reputation. There are four pillars of data protection for the modern enterprise. They consist of assessment, governa

See publication

Tags: Cybersecurity

Data Protection Challenges in Preserving Company Value
Import from medium.com
April 18, 2018
Data is the building block of the modern business. It is essential for daily operations and ongoing commercial operations, but more importantly, data is often what distinguishes companies in our modern digital economy. Data is so vital that its loss can destroy your business. Sadly, many have seen t

See publication

Tags: Cybersecurity

GDPR: Success Strategies for Redefining Your Business
Import from medium.com
March 19, 2018
The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans.

See publication

Tags: Cybersecurity, Privacy

Four Steps to Patch Management Success
Import from medium.com
March 15, 2018
The need for patch management has repeatedly been demonstrated in recent years as companies large and small suffered data breaches due to unpatched vulnerabilities. The patch management function of applying patches to remediate known vulnerabilities may seem simple, but even one unpatched computer c

See publication

Tags: Cybersecurity

5 Secrets to Survive the Encryption Apocalypse
Import from medium.com
March 15, 2018
The zombie apocalypse is frequently mentioned in literature and pop culture. Some have even taken steps to protect against this fictitious threat. However, there is a threat that is much more likely and very devastating to businesses and individuals alike. I am referring to the encryption apocalypse

See publication

Tags: Cybersecurity

Thinkers360 Credentials

1 Badge

Blog

Opportunities

Contact Eric Vanderburg

Book Eric Vanderburg for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Eric Vanderburg


Latest Activity