Authors

Kathleen Moriarty

24

Articles

447

Likes on articles

About the author

Kathleen Moriarty, technology strategist and board advisor, helping companies lead through disruption. Adjunct Professor at Georgetown SCS, also offering two corporate courses on Security Architecture and Architecture for the SMB Market. Formerly as the Chief Technology Officer, Center for Internet Security Kathleen defined and led the technology strategy, integrating emerging technologies. Prior to CIS, Kathleen held a range of positions over 13 years at Dell Technologies, including the Security Innovations Principal in Dell Technologies Office of the CTO and Global Lead Security Architect for EMC Office of the CTO working on ecosystems, standards, risk management and strategy. In her early days with RSA/EMC, she led consulting engagements interfacing with hundreds of organisations on security and risk management, gaining valuable insights, managing risk to business needs. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Keynote speaker, podcast guest, frequent blogger bridging a translation gap for technical content, conference committee member, and quoted on publications such as CNBC and Wired. Kathleen achieved over twenty five years of experience driving positive outcomes across Information Technology Leadership, short and long-term IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Published Work: - Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, July 2020.

Automated Assurance on a Path to Becoming Practical

Automated Assurance on a Path to Becoming Practical

7 min read

Cloud native architecture is a game changer for security at scale. Whether used on-premises or in the cloud, capabilities to ease the management of IT assets are improving. And while there’s a long way to go in simplifying interfaces and reducing skill-set barriers – this too will come in time.

Article tags:

80 You have liked this article 0 times.
0
As the Balance of Security Controls Shifts, Where Does Responsibility Rest?

As the Balance of Security Controls Shifts, Where Does Responsibility Rest?

4 min read

Ongoing debates on encryption and privacy highlight the complex dance between industry standards and policy. The outcome of these security and surveillance tussles remains open, reflecting the evolving relationship between technology and governance.

Article tags:

63 You have liked this article 0 times.
0
How to Secure Your Online Identity with Security Keys

How to Secure Your Online Identity with Security Keys

19 min read

Passkeys are appearing more and more in tech news, with support for them increasing. Since many administrators test out new technologies themselves first, we at CIS embarked on a short project to see what happened when an intern with our CTO team had the opportunity to implement passkeys.

Article tags:

15 You have liked this article 0 times.
1
Separating FUD from Practical for Post-Quantum Cryptography

Separating FUD from Practical for Post-Quantum Cryptography

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 You have liked this article 0 times.
0
A Role for ISACs in Software Supply Chain Assurance

A Role for ISACs in Software Supply Chain Assurance

8 min read

In the context of efforts to reduce the attack surface of applications, systems, and networks, developing approaches for assessing software security continues to be an important endeavour. In this article, Kathleen Moriarty maps out different models for software assurance and asks what a role Infor…

Article tags:

16 You have liked this article 0 times.
0
Threat Integration: Lessons of Indicator and Incident Exchange

Threat Integration: Lessons of Indicator and Incident Exchange

10 min read

Integration of shared indicators of compromise is very difficult when the responsibility is distributed out to organisations who are then left with the task of turning those indicators into defensive actions or blocking rules. In this article, Kathleen Moriarty shares lessons learned for indicator …

Article tags:

11 You have liked this article 0 times.
0

Showing 24 article(s)

Previous
1 2 3
Next