dlohrmann

About Dan Lohrmann

Dan Lohrmann is Field CISO for Presidio. He is an author, blogger, and global keynote speaker on security and technology topics. While serving in Michigan government, he was named SC Magazine CSO of the Year, Governing Magazine Public Official of the Year, and Computerworld Magazine Premier 100 IT Leader. He can be reached on Twitter @govcso

Smart Grid Security: Is Trouble Coming?

WASHINGTON DC - The U.S. Department of Energy released an alarming report in January 2017, saying that the U.S. electric grid is in imminent danger from a cyberattack. So where have we been, where are we now, and where are we going regarding smart grid security? In the department’s landmark Quadrennial Energy Review, it warned that

By |2017-03-20T11:06:49-04:00March 20th, 2017|Cyber Defense, Guest Columns|

How Do You Determine If A News Site Is Fake?

ROYAL OAK - Cybersecurity expert Dan Lohrmann from Security Mentor talks about a column he wrote on fake news and fake apps, a huge issue that made big headlines during the 2016 Presidential election. Facebook and other social media sites are now flagging fake news sites to make sure you don’t click on them, many

By |2017-02-28T21:42:47-05:00February 28th, 2017|Cyber Defense, M2 TechCast, Podcasts|

How Secure Is The U.S. Smart Grid?

GRAND LEDGE - Over the past several months, alarm bells have been going off regarding potential attacks against the U.S. electrical grid. Consider these recent media headlines: The Wall Street Journal: Cyberattacks Raise Alarm for U.S. Power Grid — Excerpt: “Cyberattacks that have knocked out electric utilities in Ukraine, including one suspected hack earlier this

By |2017-02-28T16:11:16-05:00February 28th, 2017|Cyber Defense, Guest Columns|

Trust And Risks Both Growing in Government Clouds

GRAND LEDGE - As the 2017 RSA Security Conference kicked off in San Francisco, Intel Security released the results of its second annual survey on cloud security practices. The report outlines the current state of cloud adoption, the primary concerns with private and public cloud services, security implications, and the evolving impact of shadow IT

By |2017-02-23T20:13:25-05:00February 23rd, 2017|Cyber Defense|

What to Do About Fake News and Fake Apps?

LANSING - Fake news is now headline news. Add in fake apps and fake websites, and many organizations have a huge credibility problem. Let’s explore what you can do for real. Hoaxes have been around forever. From online pictures of seven-headed snakes to Russian President Putin riding a bear, most people know better and move on

By |2017-02-13T14:26:34-05:00February 13th, 2017|Featured, Guest Columns|

Cybersecurity Expert Lohrmann: What Will Be Trump’s Cybersecurity Strategy?

ROYAL OAK - What will be President Trump’s cybersecurity strategy? Cybersecurity expert Dan Lohrmann with Security Mentor offers his thoughts in this M2 TechCast podcast. Even though Lohrmann notes the new cybersecurity strategist Rudy Giuliani has very limited cybersecurity background, he is encouraged that Giuliani will manage the nation’s cybersecurity strategy well. Lohrmann likes the

By |2017-02-01T14:13:17-05:00February 1st, 2017|Cyber Defense, M2 TechCast, Podcasts|

Lohrmann – 2016: The Year Hackers Stole The Show, With A Cause

ROYAL OAK - Cybersecurity expert Dan Lohrmann talks about the cyber year in review and what’s likely to happen in 2017. He said 2016 was the year when hacktivism stole the show. Lohrmann said the new movie Rogue One: A Star Wars Story is well-timed — epitomizing outsiders banding together to bring down the powerful

By |2017-01-11T14:17:10-05:00January 11th, 2017|Cyber Defense, Podcasts|

2016: The Year Hackers Stole The Show — With A Cause

OKEMOS - 2016 was the year hacktivists disrupted cyberspace as never before. And offline, hacker activities were much more unsettling to the international status quo. With the mix of fake news, leaked insider information to the press, and claims and counterclaims by public officials, the result was an undermining of news media and government source

By |2016-12-19T21:51:42-05:00December 19th, 2016|Cyber Defense, Featured|

Cybersecurity Expert Lohrmann Talks Voting Machine Hacks, Ransomeware Attacks

ROYAL OAK - Cybersecurity expert Dan Lohrmann talks about the ongoing challenge of ransomware, the DDoS attacks around the world, including in the United States that have brought down some major eCommerce websites. Lohrmann also talked about a recent article he wrote that said the recounts in Michigan and Wisconsin are unlikely to reveal cyber

By |2016-12-06T20:57:21-05:00December 6th, 2016|Cyber Defense, Featured, M2 TechCast, Podcasts|

The Trouble With Recounts in the Name of Hacking

GRAND LEDGE - With suspicions of hacking, Jill Stein is asking for a recount of the votes cast in Wisconsin, Pennsylvania and Michigan. This is a bad idea. Here are 10 reasons why. Jill Stein is raising plenty of money via her website to the pay for the government recount efforts in Wisconsin, Pennsylvania and

By |2016-11-28T19:05:49-05:00November 28th, 2016|Featured, Guest Columns|