Disclaimer: The opinions of the columnists are their own and not necessarily those of their employer.

Sense of Security written by C. Warren Axelrod

C. Warren Axelrod

C. Warren Axelrod is the Chief Privacy Officer and Business Information Security Officer for a financial services company, where he interfaces with the firm’s business units to identify and assess privacy and security risks and mitigate them, to have employees become familiar with security policies, standards, and procedures, and to ensure that they are followed.

Warren was honored with the prestigious Information Security Executive (ISE) Luminary Leadership Award 2007. He also received a Computerworld Premier 100 IT Leaders Award in 2003 and his department’s implementation of an intrusion detection system was given a Best in Class award.

He represented financial services information security interests at the Y2K command center in Washington, DC during the century date rollover. He is a founder of the FS/ISAC (Financial Services Information Sharing and Analysis Center) and served two terms on its Board of Managers. He testified at a Congressional Hearing in 2001 on cyber security.

Warren has published two books on computer management and numerous articles on a variety of information technology and information security topics, including computer and network security, contingency planning, and computer-related risks. His third book, “Outsourcing Information Security,” was published by Artech House in September 2004.

He holds a PhD in managerial economics from the Johnson Graduate School of Management at Cornell University and honors bachelors and masters degrees in electrical engineering, economics and statistics from the University of Glasgow, Scotland. He is certified as a CISSP and CISM.

Campaign Lessons Learned—Part 2: Big Data vs Polls

– As children, we were frequently admonished by irate adults to “Do as I say, not as I do!” whenever we questioned why we couldn’t do what they themselves did. It was often difficult to reconcile in our own minds why there should be this dichotomy. Well, examining the results of the recent…

Auto Autos—Take the Fork

– “When you come to a fork in the road, take it” is a saying made famous by the late, great Yogi Berra. It came to mind when I saw an article “Self-driving cars reach a fork in the road, and automakers take different routes” by Ashley Halsey III and Michael Laris in the August 24, […]…

Campaign Lessons Learned—Part 1: Email Security

– Author’s note: This is the first of several columns about lessons that should have been learned from cybersecurity mistakes and nefarious activities that dominated, and likely changed the outcome of the 2016 presidential campaign. If there is one outstanding cybersecurity lesson that the U.S.…

Alleged Russian Hacks … Is This Cybersecurity’s Tipping Point?

– The Washington Post, in a December 9, 2016 article “Secret CIA assessment says Russia was trying to help Trump win White House” by Adam Entous, Ellen Nakashima and Greg Miller, leaked a CIA report claiming that the Russians had manipulated the U.S. election by hacking into both Democratic and…

BAH, BAH, Black Sheep

– Two strikes against BAH (Booz Allen Hamilton)! First, Edward Joseph Snowden. Second, Harold Thomas Martin III. Both BAH contractors working for the NSA (National Security Agency). Will another strike against BAH mean that they are out … out of the cybersecurity contracting business, that is? No,…