Frederick Scholl

Opinions expressed by ICN authors are their own.

Frederick Scholl is a thought leader in information security. He has security practitioner experience and credentials as an educator. He consults on security governance, risk management and compliance issues.

He helps clients reduce costs, mitigate business risks and improve customer satisfaction by developing security strategies and security policies, creating security awareness programs, planning and implementing security controls and planning and implementing security remediation programs.

For more information, visit the Monarch Information Networks website or follow him on Twitter (@fwscholl).

The opinions expressed in this blog are those of Frederick Scholl and do not necessarily represent those of IDG Communications Inc. or its parent, subsidiary or affiliated companies.

Protecting trade secrets: technology solutions you can use

Understanding root causes of trade secret breaches

Understanding root causes of trade secret breaches

The third part of a series on stopping trade secret theft in your organization.

Protecting business assets

Protecting business assets

Identifying business assets and connecting your security program to them.

Engage the world

Engage the world

Personal strategies for information security leaders to better engage with the business.

Using the new NIST standards in private industry

Using the new NIST standards in private industry

Updating the content of NIST 800-53 and NIST 800-37 risk management standards. They are now more aligned with private industry requirements.

Where to spend your next security dollar

Where to spend your next security dollar

Use executive security education to build your security program.

Stopping trade secret theft in your organization, part 2

Stopping trade secret theft in your organization, part 2

A brief primer on trade secret law for security professionals.

Secure systems and the three little pigs

Secure systems and the three little pigs

How to create a secure systems development practice in spite of Agile, DevOps and changing threats

Stopping trade secret theft in your organization

Stopping trade secret theft in your organization

Start of four-part series on trade secret theft. Understanding what a trade secret is. Scope of the trade secret theft problem. Role of cyber security in trade secret theft.

Cybersecurity: What does the board want?

Cybersecurity: What does the board want?

Summary of the 2017 NACD Cyber-risk Handbook and its recommendations for directors. Action items for CISOs.

Better security through storytelling

Better security through storytelling

Using stories to communicate for Agile, DevOps, and C-Level executive use cases.

Government to be more engaged with security in 2017

Government to be more engaged with security in 2017

Cybersecurity will be a top priority for governments, in order to protect citizens from attacks on lifestyle.

Load More