Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Eric Vanderburg
Vice President of Cybersecurity at TCDI
Cleveland, United States
Eric Vanderburg is the Vice President of Cybersecurity at TCDI where he and his cybersecurity team protect companies from cyber threats, investigate data breaches, and provide guidance on security governance and compliance. Vanderburg has an MBA from Kent State University and several undergraduate degrees. He has also obtained over 40 security and technology certifications.
Eric Vanderburg is a well-known author, blogger, and a thought leader. He is best known for his insight on cybersecurity, privacy, data protection, and storage and has published books on storage networking and cloud computing. Vanderburg is passionate about sharing cybersecurity and technology news, insights and best practices. He regularly presents on security topics and publishes insightful articles. You can find him throughout the day posting valuable and informative content on his social media channels.
Available For: Authoring, Consulting, Influencing, Speaking Travels From: Cleveland, Ohio
Eric Vanderburg
Points
Academic
0
Author
32
Influencer
659
Speaker
0
Entrepreneur
0
Total
691
Points based upon Thinkers360 patent-pending algorithm.
Soft Skills Revolution: Emotional Intelligence and Cybersecurity
Import from medium.com
November 04, 2024
Photo by Edmond Dantès from PexelsCybersecurity is a critical concern for organizations of all sizes. As cyber threats grow in complexity and frequency, the need for robust defense mechanisms has never been more pressing. While technical skills and knowledge of security protocols are a given, ther
AI in Action: Mastering Data Management from Start to Finish
Import from medium.com
October 25, 2024
Image by Gerd Altmann from PixabayData is one of the most valuable assets for organizations, fueling everything from day-to-day operations to long-term strategy. However, managing data across its lifecycle — collection, storage, processing, analysis, sharing, and disposal — has grown in
AI-Driven Automation in SOC Operations
Import from medium.com
October 23, 2024
Image by wastedgeneration from PixabayAI can revolutionize SOC operations by automating a range of tasks, allowing analysts to focus on higher-priority incidents and strategic initiatives. Here’s how AI-driven automation improves SOC efficiency:1. Automated Threat Intelligence GatheringOne of the
AI-Driven Automation in SOC Operations
Medium
October 22, 2024
One of the most time-consuming tasks for SOC analysts is gathering and analyzing threat intelligence from various sources, including threat feeds, security logs, and network traffic data. AI-powered tools can automate this process by continuously scanning and aggregating data from internal and external sources, enriching it with context, and identifying patterns that may indicate potential threats.
AI and Cyber Deception — The New Frontier in Proactive Defense
Import from medium.com
October 21, 2024
AI and Cyber Deception — The New Frontier in Proactive DefenseImage by Gerd Altmann from PixabayIn the evolving cybersecurity landscape, companies are constantly searching for innovative ways to stay ahead of cybercriminals. Traditional defense mechanisms, such as firewalls, intrusion detecti
Decentralized Defense — How AI Safeguards Your Cloud Data
Import from medium.com
October 18, 2024
Decentralized Defense — How AI Safeguards Your Cloud DataAs organizations dive headfirst into the cloud, lured by its unmatched scalability, flexibility, and cost efficiency, securing these virtual landscapes has skyrocketed to the top of the priority list. However, this digital migration isn
Explainable AI in Cybersecurity — Ensuring Transparency in Decision-Making
Import from medium.com
October 15, 2024
Explainable AI in Cybersecurity — Ensuring Transparency in Decision-MakingImage by Cliff Hang from PixaBayAs artificial intelligence (AI) continues to reshape cybersecurity, it also brings significant challenges. One of the most prominent is the “black box” nature of many AI models, espec
AI and Zero Trust Architecture: Reinventing Security Models
Import from medium.com
October 10, 2024
Image by Pete Linforth from PixabayCybersecurity threats continue to evolve in complexity, and traditional security models are proving less effective. Modern organizations, with their increasingly distributed workforces, reliance on cloud services, and complex supply chains, require a new approach
How Cybercriminals Are Exploiting ChatGPT: The Dark Side of AI
Import from medium.com
October 10, 2024
Image courtesy of Cliff1126 at PixabayAs artificial intelligence (AI) technologies like ChatGPT continue to advance, they are revolutionizing industries, improving productivity, and transforming human-machine interactions. ChatGPT, an AI-powered language model developed by OpenAI, has garnered wide
AI and Privacy: Assessing the Risk, Unveiling the Truth
Import from medium.com
October 08, 2024
Image by Kohji Asakawa from PixabayAs artificial intelligence (AI) continues to permeate industries, businesses are leveraging its capabilities for automation, decision-making, and predictive analytics. However, with great power comes great responsibility, particularly when it comes to privacy. AI
Boosting Cyber Defenses — How AI Empowers Cybersecurity Teams
Import from medium.com
October 03, 2024
Boosting Cyber Defenses — How AI Empowers Cybersecurity TeamsThe increasing sophistication of cyber threats has necessitated the adoption of advanced tools and techniques to protect organizations from a wide array of attacks. Artificial Intelligence (AI) has emerged as a transformative technol
Coronavirus and Remote Work Considerations
LinkedIn
May 08, 2020
As the rapidly developing Coronavirus situation continues to unfold, many employees may soon be required to work from home to help minimize exposure. There are important cybersecurity considerations when working remotely that, if ignored, place your entire organization at risk. Remote work can be done securely with the proper procedures, training, and technology in place. Below is a list of tips and recommendations to help ensure you are doing your part to help keep your company’s data secure.
The mechanics of cybersecurity maturity
LinkedIn
February 03, 2020
As an organization becomes more conscious and engaged in protecting information, it progresses along a path of cybersecurity maturity. I like to describe this path in five stages, starting with reactive and ending with realization organizations. This model is helpful because it demonstrates how cybersecurity is refined in an organization. Most importantly, it shows that cybersecurity maturity takes time to be part of an established organization and how an organization can transform from viewing cybersecurity as a cost to an investment. Let's see how it works
Monitoring is a key cybersecurity competency
Import from medium.com
October 02, 2018
Technology has accelerated the pace of almost everything we do. The same is true for the speed of cyber attacks. Technology has decreased the time it takes for a small, localized cybersecurity event to balloon into a serious security incident. A single compromised password or one wrong click can ign
6 Steps for Data Confidence in a Digital World
LinkedIn
August 06, 2018
Companies today are critically dependent upon their data. It is the lifeblood of operations and is relied upon for strategic and tactical decision-making. Data doesn’t just support the business - it is the business of a growing number of companies such as search, social media, integrators, and marketing companies. With such a heavy reliance upon data, it is vital for companies to have confidence or trust in their data.
Tags: Big Data, Cybersecurity, Digital Transformation
5 Threat Management Challenges and Opportunities
Import from medium.com
June 21, 2018
As we look back on a succession of headlines about data breaches and security lapses at some of the world’s largest companies, we find a consistent theme. Attackers have continued to improve their techniques requiring companies to compensate and raise the bar on cybersecurity. However, there are s
Protecting Data for the Next Generation of Applications
Import from medium.com
June 14, 2018
As we look to the future, our reliance on data is only going to increase. Technologies such as IoT, AI, robotics, and virtual reality are going to fundamentally change the way we work and live. Each of these technologies is based on a lot of data that will need to be protected, not only from unautho
Four Steps to Effective Cybersecurity Logging
Import from medium.com
June 11, 2018
Logs are crucial elements to breach investigations. However, some investigations suffer from a lack of logs. In such cases, the company must assume the worst if no evidence can be brought to the contrary. This may require sending notifications to an entire customer base or paying large fines. Some o
Doing Business in a Data-Driven World
Import from medium.com
May 29, 2018
The modern company thrives on data, yet some are also drowning in it. The data that we find so precious could be holding us back rather than driving us forward for data must be managed and interpreted for it to be turned into actionable insights. Data management complexity increases as data sizes ...
Legal and Ethical Obligations in Cybersecurity
Import from medium.com
May 21, 2018
I recently presented at the Duke Law EDRM on Cybersecurity and Law Firm Understanding Legal and Ethical Obligations. Some questions were asked that we did not have time to answer so I am answering them here for those who are interested.How often should a company perform penetration testing?It is qui
Four Pillars of Data Protection for the Modern Enterprise
Import from medium.com
May 04, 2018
Data, a crucial asset for the modern business, is under attack. Data breaches, ransomware, employee theft, and mistakes can each cause significant harm to your company, customers, and reputation. There are four pillars of data protection for the modern enterprise. They consist of assessment, governa
Data Protection Challenges in Preserving Company Value
Import from medium.com
April 18, 2018
Data is the building block of the modern business. It is essential for daily operations and ongoing commercial operations, but more importantly, data is often what distinguishes companies in our modern digital economy. Data is so vital that its loss can destroy your business. Sadly, many have seen t
GDPR: Success Strategies for Redefining Your Business
Import from medium.com
March 19, 2018
The General Data Protection Regulation (GDPR) is set to go into effect on May 25, 2018, and yet many companies are still wondering if GDPR applies to them. The short answer is that it probably does. The GDPR requirements are incredibly broad, impacting any organization that stores data on Europeans.
Four Steps to Patch Management Success
Import from medium.com
March 15, 2018
The need for patch management has repeatedly been demonstrated in recent years as companies large and small suffered data breaches due to unpatched vulnerabilities. The patch management function of applying patches to remediate known vulnerabilities may seem simple, but even one unpatched computer c
5 Secrets to Survive the Encryption Apocalypse
Import from medium.com
March 15, 2018
The zombie apocalypse is frequently mentioned in literature and pop culture. Some have even taken steps to protect against this fictitious threat. However, there is a threat that is much more likely and very devastating to businesses and individuals alike. I am referring to the encryption apocalypse
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?