Authors
Author image

Kathleen Moriarty

25

Articles

478

Likes on articles

About the author

Kathleen Moriarty, founder of SecurityBiaS is technology strategist and board advisor, working with SaaS providers on security to Build-in at Scale benefiting both the provider and their customer base. Adjunct Professor at Georgetown SCS, teaching Security Architecture and Design and Cyber Threat Intelligence. Formerly as the Chief Technology Officer, Center for Internet Security Kathleen defined and led the technology strategy, integrating emerging technologies working with under resourced organisations. Prior to CIS, Kathleen held a range of positions over 13 years at Dell Technologies, including the Security Innovations Principal in Dell Technologies Office of the CTO and Global Lead Security Architect for EMC Office of the CTO working on ecosystems, standards, risk management and strategy. In her early days with RSA/EMC, she led consulting engagements interfacing with hundreds of organisations on security and risk management, gaining valuable insights, managing risk to business needs. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Keynote speaker, podcast guest, frequent blogger bridging a translation gap for technical content, conference committee member, and quoted on publications such as CNBC and Wired. Kathleen achieved over twenty five years of experience driving positive outcomes across Information Technology Leadership, short and long-term IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. Kathleen holds a Master of Science Degree in Computer Science from Rensselaer Polytechnic Institute, as well as, a Bachelor of Science Degree in Mathematics from Siena College. Published Work: - Transforming Information Security: Optimizing Five Concurrent Trends to Reduce Resource Drain, July 2020.

iStock-1368200975

Threat Integration: Lessons of Indicator and Incident Exchange

10 min read

Integration of shared indicators of compromise is very difficult when the responsibility is distributed out to organisations who are then left with the task of turning those indicators into defensive actions or blocking rules. In this article, Kathleen Moriarty shares lessons learned for indicator …

Article tags:

11 Likes are disabled for this article.
0
simple-security

Making Security Simple for Organisations Big and Small

5 min read

Calls for security to be built-in and managed over time are growing. Kathleen Moriarty takes a looks back at a recent panel discussion on “Making Security Simpler” and the hopeful messages that came out of it for the transformation of Internet security for organisations in the coming years.

Article tags:

12 Likes are disabled for this article.
0
authorisation

Authentication and Authorisation Using Single Sign-On

5 min read

To prevent attacks, there's a push for multi-factor authentication. This is a vital step and should be considered if your organisation hasn't yet made the transition. But while MFA adds protections, how you implement single sign-on, authorisation, and/or federation requires consideration.

Article tags:

12 Likes are disabled for this article.
0
maze

Why Are Authentication and Authorisation So Difficult?

12 min read

Let’s say you’re tasked with selecting a strong authentication solution for your organisation. Where do you begin? This article is the first of a series that will explore authentication and authorisation technologies in the context of recent exploits and developing trends.

Article tags:

14 Likes are disabled for this article.
0
msp security

The Role of Service Providers in Transforming Security

8 min read

With various types of attacks utilising managed service providers to gain access to multiple targets, it's important to ask how those service providers can help improve security for enterprise environments. Although taking measures in this area requires a lot of effort, the recent increase in attac…

Article tags:

16 Likes are disabled for this article.
0
attestation_sets.png

Remote Attestation Enabling Posture Assessment for Automated GRC

5 min read

Attestation…simplified! This post explains how attestation can provide system-level remediation and resiliency. It can be conducted remotely and at scale, ensuring transparency of compliance with industry security controls and benchmarks.

Article tags:

22 Likes are disabled for this article.
0
Trusted Assurance Simplified

Trusted Assurance Simplified

5 min read

In the third of this series of guest posts, Kathleen Moriarty talks about the importance of posture assessment - the process of evaluating organisation or system security - and looks at solutions for simplifying that process that could help organisations achieve higher levels of trusted assurance.

Article tags:

13 Likes are disabled for this article.
0
Where Does Zero Trust Begin and Why is it Important?

Where Does Zero Trust Begin and Why is it Important?

11 min read

In the second of a series of guests posts on information security, Kathleen Moriarty of the Center for Internet Security (CIS) takes a close look at the benefits of zero trust architectures and what their increased adoption means for the industry.

Article tags:

15 Likes are disabled for this article.
0

Showing 25 article(s)