James Carder


Opinions expressed by ICN authors are their own.

James Carder has over 20 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity and availability of information assets, and oversees both threat and vulnerability management as well as the Security Operations Center (SOC). He also directs the mission and strategic vision for the LogRhythm Labs machine data intelligence, strategic integrations, threat research and intelligence, and compliance research teams.

Previously, he served as Director of Security Informatics at Mayo Clinic and had oversight of the threat intelligence, incident response, security operations center, and offensive security groups. He was responsible for protecting, detecting, and responding to a network that consisted of financial systems, industrial control systems, medical devices, and patients. Prior to Mayo Clinic, Mr. Carder served as a Senior Manager at MANDIANT, where he led professional services and incident response engagements. He’s led criminal and national security related investigations at the city, state and federal levels, including those involving the theft of credit card information and other intellectual property, hacktivism, and Advanced Persistent Threats (APT). Mr. Carder is a sought-after and frequent speaker at cyber security events and is a noted author of several cyber security publications.

James holds a bachelor’s of science in Computer Information Systems from Walden University, an MBA from the University of Minnesota’s Carlson School of Management, and is a Certified Information Systems Security Professional (CISSP).

The opinions expressed in this blog are those of James Carder and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

GDPR compliance in a nutshell

No Pain, No Gain? Seven Common CISO Pain Points and How to Fix Them

Hackers and the latest malicious unleashing aren’t the only headaches CISOs have to deal with. LogRhythm’s Chief Information Security Officer, James Carder, explains seven common pain paints – from endless meetings to inflated egos –...

How to approach a Zero Trust security model for your enterprise

How to approach a Zero Trust security model for your enterprise

Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

How to hire top cybersecurity talent for your company

How to hire top cybersecurity talent for your company

As cyber threats continue to grow in volume and intensity, companies need top-tier cybersecurity talent to successfully fend off these attacks.

Five factors to consider when establishing a Security Operations Centre

With the number of serious cyber threats on the rise, many businesses are evaluating the benefits of having a dedicated security operations centre (SOC).

The reality of ransomware

The reality of ransomware

Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...

Load More