Ben Rothke

Want to Join?
Opinions expressed by ICN authors are their own.

Ben Rothke, CISSP, CISM, CISA is a senior eGRC consultant with the Nettitude Group and has over 15 years of industry experience in information systems security and privacy.

His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design and implementation of systems security, encryption, cryptography and security policy development.

Ben is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill). He writes security and privacy book reviews for Slashdot and Security Management and is a former columnist for Information Security, Unix Review and Solutions Integrator magazines.

He is a frequent speaker at industry conferences, such as RSA and MISTI, holds numerous industry certifications and is a member of ASIS, Society of Payment Security Professionals and InfraGard.

He holds the following certifications: CISM, CISA, CGEIT, CRISC, CISM, CISSP, SMSP, PCI QSA.

The opinions expressed in this blog are those of Ben Rothke and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Just say no to Facebook quizzes

The 1 thing clickbait sites don’t want you to know will leave you breathless

German philosopher Arthur Schopenhauer said that “one can never read too little of bad or too much of good books: bad books are intellectual poison; they destroy the mind. Take Schopenhauer’s advice – don’t click.

Night at the information security museum

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

Introducing the Cybersecurity Canon

Introducing the Cybersecurity Canon

Last month David Bisson wrote a blog post 10 Must-Read Books for Information Security Professionals, where he asked information security professionals their must-read book. There’s a number of books listed there that are definitely...

To pay, or not to pay, that is the ransomware question

To pay, or not to pay, that is the ransomware question

The FBI says don’t pay. Should you heed their advice?

Making the most of your time at the RSA 2017 conference

Making the most of your time at the RSA 2017 conference

A guide to the RSA 2017 conference. Going to RSA 2017? Failing to plan is planning to fail.

My obligatory 2017 predictions

My obligatory 2017 predictions

Tis the information security season to make predictions about what security year 2017 will bring.

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Hillary Clinton might have been a pretty good president had she used Pretty Good Privacy

Had Presidential candidate Hillary Clinton employed basic email security techniques, she’d be President-elect.

Who is the information security preferred candidate? A look at presidential election 2016

Who is the information security preferred candidate? A look at presidential election 2016

Trump or Clinton. Which of the 2 leading candidates is best from an information security perspective? Should a CISO prefer one over the other?

Cyber self-defense for kids (and parents too)

Cyber self-defense for kids (and parents too)

Today is the last day of national cyber security awareness month, but not too late for Ben Rothke, CISSP, QSA, Senior Security Consultant, Herjavec Group to provide some tips for parents and children.

A tale of two PCI attestation documents

A tale of two PCI attestation documents

Is your PCI service provider willing to easily share their AoC? That’s a good sign.

PCI DSS – it takes a village

PCI DSS – it takes a village

David Mundhenk and Ben Rothke show how the PCI Security Standards Council really wants PCI to succeed. Much to the chagrin of The National Retail Federation.

Load More