Ben Rothke

Contributor

Want to Join?
Opinions expressed by ICN authors are their own.

Ben Rothke, CISSP, CISM, CISA is a senior eGRC consultant with the Nettitude Group and has over 15 years of industry experience in information systems security and privacy.

His areas of expertise are in risk management and mitigation, security and privacy regulatory issues, design and implementation of systems security, encryption, cryptography and security policy development.

Ben is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill). He writes security and privacy book reviews for Slashdot and Security Management and is a former columnist for Information Security, Unix Review and Solutions Integrator magazines.

He is a frequent speaker at industry conferences, such as RSA and MISTI, holds numerous industry certifications and is a member of ASIS, Society of Payment Security Professionals and InfraGard.

He holds the following certifications: CISM, CISA, CGEIT, CRISC, CISM, CISSP, SMSP, PCI QSA.

The opinions expressed in this blog are those of Ben Rothke and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Where Chicken Little meets information security

Information security lessons from Theranos

Information security lessons from Theranos

An explosive new book Bad Blood: Secrets and Lies in a Silicon Valley Startup wasn’t written about security awareness, but it could have been.

It was 35 days to GDPR, and a lot of sleepless nights

It was 35 days to GDPR, and a lot of sleepless nights

GDPR went live on May 25, 2018. A month before the implementation date, attendees at the RSA Conference struggled with being fully ready.

RSA 2018 conference recap

RSA 2018 conference recap

Memories from the greatest information security show on earth.

Another night at the information security museum

Another night at the information security museum

Firms need to put fundamental information security processes in place to ensure they don’t become ransomware victims. It’s not that difficult, people.

Making the most of your time at the RSA 2018 conference

Making the most of your time at the RSA 2018 conference

A guide to the RSA 2018 conference. Going to RSA 2018? Failing to plan is planning to fail.

Understanding Gartner, and its limitations

Understanding Gartner, and its limitations

Using a Gartner MQ is a great way to get an initial list of some of the products in the particular space. But it is not the definitive list by any stretch of the imagination.

The ultimate information security book for Halloween

The ultimate information security book for Halloween

The General Data Protection Regulation (GDPR) may sound bland, but it’s the biggest, baddest and most powerful data security regulation ever created. Be afraid...be very afraid.

The rise of the cheap information security officer

The rise of the cheap information security officer

When it comes to hiring a CISO, firms get what they pay for. And they’ll have to live with the consequences when they try to be security misers.

Just say no to Facebook quizzes

Just say no to Facebook quizzes

Clickbait by any other name is just the same. These quizzes take your personal information, and leave with cookies and malware.

The 1 thing clickbait sites don’t want you to know will leave you breathless

German philosopher Arthur Schopenhauer said that “one can never read too little of bad or too much of good books: bad books are intellectual poison; they destroy the mind. Take Schopenhauer’s advice – don’t click.

Night at the information security museum

Night at the information security museum

Museum physical security incidents provide an excellent learning mechanism for information security teams. With that, I’d like to look at three major museum incidents and provide a lesson learned from each for information security...

Load More