Mitchell Parker

Opinions expressed by ICN authors are their own.

Mitchell Parker, CISSP, is the Executive Director, Information Security and Compliance, at Indiana University Health in Indianapolis. Mitch is currently working on redeveloping the Information Security program at IU Health, and regularly works with multiple non-technology stakeholders to improve it. He also speaks regularly at multiple conferences and workshops, including HIMSS, IEEE TechIgnite, and Internet of Medical Things.

Mitch has a Bachelor's degree in Computer Science from Bloomsburg University, a MS in Information Technology Leadership from LaSalle University, and his MBA from Temple University.

The opinions expressed in this blog are those of Mitchell Parker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Insider threats: From McDonald’s Monopoly to today, how to address how little has changed

What security companies – and all of us – can learn from the Deadspin debacle

What security companies – and all of us – can learn from the Deadspin debacle

The recent news of the exodus of the entire editorial staff of the popular sports and culture website Deadspin sent reverberations throughout the media. But two of the biggest lessons to be learned from Deadspin’s downfall should...

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

What Andrew Luck’s retirement can teach infosec leaders

What Andrew Luck’s retirement can teach infosec leaders

Andrew Luck was an incredible quarterback who performed at very high levels despite numerous hits and injuries. At the age of 29, he walked away from the sport he loved and untold millions of dollars. This action, and the reaction...

Thoughts from Defcon 27 – This is why I do what I do

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...

‘Stranger Things,’ data provenance, intelligent systems and data conversion

‘Stranger Things,’ data provenance, intelligent systems and data conversion

Season 3 of “Stranger Things” takes us back to 1985 in Hawkins, Indiana, and the magic of the Starcourt Mall. An underlying theme of this show is how the side effects of technology research can lead to adverse consequences. This...

Father’s Day and good role models

Father’s Day and good role models

Father’s Day is a day to celebrate those who take up the role of being one to their children, whether or not they are the biological one, or even the same gender. We need to recognize those who take up that role non-traditionally. We...

‘Nuff said!

‘Nuff said!

The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As...

What can we learn about infosec from the Varsity Blues college admissions scandal?

What can we learn about infosec from the Varsity Blues college admissions scandal?

The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...

Combatting drama and barriers in the infosec community

Combatting drama and barriers in the infosec community

At its onset, the infosec community was very inclusive and welcoming…when others were not. Over the years, we’ve forgotten where we came from and why. Self-appointed gatekeepers leaders of who belongs in the community (or not) have...

Conspiracy theories and cognitive dissonance…and how to combat them

Conspiracy theories and cognitive dissonance…and how to combat them

Can information security leaders help overcome the challenges wrought by a public that's increasingly ready to believe – and act on – even the wildest conspiracy theories?

Load More