Authors

Kathleen Moriarty

22

Articles

253

Likes on articles

About the author

Kathleen Moriarty, technology strategist and board advisor, helping companies lead through disruption. Adjunct Professor at Georgetown SCS, also offering two corporate courses on Security Architecture and Architecture for the SMB Market. Formerly as the Chief Technology Officer, Center for Internet Security Kathleen defined and led the technology strategy, integrating emerging technologies. Prior to CIS, Kathleen held a range of positions over 13 years at Dell Technologies, including the Security Innovations Principal in Dell Technologies Office of the CTO and Global Lead Security Architect for EMC Office of the CTO working on ecosystems, standards, risk management and strategy. In her early days with RSA/EMC, she led consulting engagements interfacing with hundreds of organisations on security and risk management, gaining valuable insights, managing risk to business needs. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Keynote speaker, podcast guest, frequent blogger bridging a translation gap for technical content, conference committee member, and quoted on publications such as CNBC and Wired. Kathleen achieved over twenty five years of experience driving positive outcomes across Information Technology Leadership, short and long-term IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Published Work: - Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, July 2020.

Links & Social

Published tags

How to Secure Your Online Identity with Security Keys

How to Secure Your Online Identity with Security Keys

19 min read

Passkeys are appearing more and more in tech news, with support for them increasing. Since many administrators test out new technologies themselves first, we at CIS embarked on a short project to see what happened when an intern with our CTO team had the opportunity to implement passkeys.

Article tags:

11 You have liked this article 0 times.
1
Separating FUD from Practical for Post-Quantum Cryptography

Separating FUD from Practical for Post-Quantum Cryptography

6 min read

A practical approach to avoid falling into fear, uncertainty, and doubt (FUD) around post-quantum cryptography breaks down into three steps. Find out more in this guest post from Kathleen Moriarty, CTO of the Center for Internet Security.

Article tags:

10 You have liked this article 0 times.
0
A Role for ISACs in Software Supply Chain Assurance

A Role for ISACs in Software Supply Chain Assurance

8 min read

In the context of efforts to reduce the attack surface of applications, systems, and networks, developing approaches for assessing software security continues to be an important endeavour. In this article, Kathleen Moriarty maps out different models for software assurance and asks what a role Infor…

Article tags:

16 You have liked this article 0 times.
0
Threat Integration: Lessons of Indicator and Incident Exchange

Threat Integration: Lessons of Indicator and Incident Exchange

10 min read

Integration of shared indicators of compromise is very difficult when the responsibility is distributed out to organisations who are then left with the task of turning those indicators into defensive actions or blocking rules. In this article, Kathleen Moriarty shares lessons learned for indicator …

Article tags:

11 You have liked this article 0 times.
0
Making Security Simple for Organisations Big and Small

Making Security Simple for Organisations Big and Small

5 min read

Calls for security to be built-in and managed over time are growing. Kathleen Moriarty takes a looks back at a recent panel discussion on “Making Security Simpler” and the hopeful messages that came out of it for the transformation of Internet security for organisations in the coming years.

Article tags:

12 You have liked this article 0 times.
0
Authentication and Authorisation Using Single Sign-On

Authentication and Authorisation Using Single Sign-On

5 min read

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 You have liked this article 0 times.
0

Showing 22 article(s)

Previous
1 2 3
Next