Sense of Security written by C. Warren Axelrod

C. Warren Axelrod

C. Warren Axelrod is the Chief Privacy Officer and Business Information Security Officer for a financial services company, where he interfaces with the firm’s business units to identify and assess privacy and security risks and mitigate them, to have employees become familiar with security policies, standards, and procedures, and to ensure that they are followed.

Warren was honored with the prestigious Information Security Executive (ISE) Luminary Leadership Award 2007. He also received a Computerworld Premier 100 IT Leaders Award in 2003 and his department’s implementation of an intrusion detection system was given a Best in Class award.

He represented financial services information security interests at the Y2K command center in Washington, DC during the century date rollover. He is a founder of the FS/ISAC (Financial Services Information Sharing and Analysis Center) and served two terms on its Board of Managers. He testified at a Congressional Hearing in 2001 on cyber security.

Warren has published two books on computer management and numerous articles on a variety of information technology and information security topics, including computer and network security, contingency planning, and computer-related risks. His third book, “Outsourcing Information Security,” was published by Artech House in September 2004.

He holds a PhD in managerial economics from the Johnson Graduate School of Management at Cornell University and honors bachelors and masters degrees in electrical engineering, economics and statistics from the University of Glasgow, Scotland. He is certified as a CISSP and CISM.

Cybersecurity Fails … Government Not Keeping Up

– I was reading Andrew Ross Sorkin’s article “Flying Taxis, New Exciting Stealth Mode” on the front page of Business Day in the March 13, 2018 New York Times (more about that later) when I noticed (in the adjacent column … an advantage of reading the paper version) an article by Ben…

Crossing Privacy’s Red Line

– Recent revelations about the exfiltration of the personal data of some 50 million Facebook users and the use of the data by Cambridge Analytica to influence the 2016 presidential election have dominated the news. While I did not anticipate the egregiousness of what may have actually been done, I…

Cybersecurity vs. Convenience

– We have long recognized that adhering to stringent cybersecurity policy is not convenient for those who use systems that incorporate strong security methods. But how does convenience compare in value to the high costs and tiresome burdens emanating from security breaches, many of which could have…

Privacy Losses Led to Secrecy Fails

– In yet another example of damaging unintended consequences, we learned that connecting your Fitbit or other fitness device, or indeed any Internet-connectable device (even a pacemaker!) will likely reveal your location. Much of the time that may not be so important, although disclosing your…

Did NIST Plagiarize My Security-Privacy Venn Diagram?

– .. or did I copy theirs? Or did someone else come up with it before either of us did? Nowadays, it’s really hard, if not impossible, to determine which came first. All I know is that the Venn diagram, which shows the intersection between privacy and security, and which is Figure 1 in my article…