Departing Chief Information Security Officer Bob Turner shares some intergalactic perspectives on the past 6 years of cybersecurity defense, and signals our readiness for the battles ahead.
CISO’s Perspective – Cybersecurity Blog
Thought leadership from Bob Turner, UW-Madison Chief Information Security Officer
Our New Year’s Resolution: Improve our IT security posture
We are not immune to things going on in the rest of the world. Criminal hackers are well funded and becoming more sophisticated. So what can IT departments do to be more secure?
Waking Up To 2021
Perspectives from Chief Information Security Officer Bob Turner: When we woke up on Jan 1, we still had many of the same problems we faced in 2020. Where we go from here is up to us.
The colors of cybersecurity
Perspectives from Chief Information Security Officer Bob Turner: Let’s make the change and toss the old terms and invite new, accurate and non-offensive ways to express who we are and what we do.
Looking for opportunity in COVID-19
Perspectives from Chief Information Security Officer Bob Turner: While COVID-19 has brought challenges, it also brings great opportunities to rethink the way we work.
Remembering the Byrds
In the song “Turn! Turn! Turn!” the ’60s folk group the Byrds sang of the inevitable cycle of change. The Office of Cybersecurity is experiencing such change in the departure of 2 key colleagues.
The importance of Cybersecurity Awareness Month
October is a time to celebrate security people, processes, teams and initiatives. It’s also a time to reflect on some of those fundamental pieces of information protection and cybersecurity.
The CISO’s Perspective: That awful moment when you hear “Auuuugh!!! Where’s my data?!?”
Data loss can happen – large or small, unstructured or formatted, simple files or complex databases.
The CISO’s Perspective: Remembering the Magnificent Seven
CISO Bob Turner honors 7 victims of 9/11 whom he knew personally.
Defending the Endpoint! Improving Management, Security & Mobile Devices
CISO Bob Turner says something must be done to better manage and secure data and data access points.