
James Carder
James Carder has over 20 years of experience working in corporate IT security and consulting for the Fortune 500 and U.S. Government. At LogRhythm, he develops and maintains the company’s security governance model and risk strategies, protects the confidentiality, integrity and availability of information assets, and oversees both threat and vulnerability management as well as the Security Operations Center (SOC). He also directs the mission and strategic vision for the LogRhythm Labs machine data intelligence, strategic integrations, threat research and intelligence, and compliance research teams.
Previously, he served as Director of Security Informatics at Mayo Clinic and had oversight of the threat intelligence, incident response, security operations center, and offensive security groups. He was responsible for protecting, detecting, and responding to a network that consisted of financial systems, industrial control systems, medical devices, and patients. Prior to Mayo Clinic, Mr. Carder served as a Senior Manager at MANDIANT, where he led professional services and incident response engagements. He’s led criminal and national security related investigations at the city, state and federal levels, including those involving the theft of credit card information and other intellectual property, hacktivism, and Advanced Persistent Threats (APT). Mr. Carder is a sought-after and frequent speaker at cyber security events and is a noted author of several cyber security publications.
James holds a bachelor’s of science in Computer Information Systems from Walden University, an MBA from the University of Minnesota’s Carlson School of Management, and is a Certified Information Systems Security Professional (CISSP).
The opinions expressed in this blog are those of James Carder and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How to approach a Zero Trust security model for your enterprise
Implementing a Zero Trust model to protect your enterprise's critical systems could be worth the trouble.

How to hire top cybersecurity talent for your company
As cyber threats continue to grow in volume and intensity, companies need top-tier cybersecurity talent to successfully fend off these attacks.

The reality of ransomware
Why every CISO needs to consider a ransomware infection as a likely scenario to include in their business continuity and disaster recovery plans. There are some unique challenges when responding to a ransomware attack that could...