Mitchell Parker

Opinions expressed by ICN authors are their own.

Mitchell Parker, CISSP, is the Executive Director, Information Security and Compliance, at Indiana University Health in Indianapolis. Mitch is currently working on redeveloping the Information Security program at IU Health, and regularly works with multiple non-technology stakeholders to improve it. He also speaks regularly at multiple conferences and workshops, including HIMSS, IEEE TechIgnite, and Internet of Medical Things.

Mitch has a Bachelor's degree in Computer Science from Bloomsburg University, a MS in Information Technology Leadership from LaSalle University, and his MBA from Temple University.

The opinions expressed in this blog are those of Mitchell Parker and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

What Andrew Luck’s retirement can teach infosec leaders

Thoughts from Defcon 27 – This is why I do what I do

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...

‘Stranger Things,’ data provenance, intelligent systems and data conversion

‘Stranger Things,’ data provenance, intelligent systems and data conversion

Season 3 of “Stranger Things” takes us back to 1985 in Hawkins, Indiana, and the magic of the Starcourt Mall. An underlying theme of this show is how the side effects of technology research can lead to adverse consequences. This...

Father’s Day and good role models

Father’s Day and good role models

Father’s Day is a day to celebrate those who take up the role of being one to their children, whether or not they are the biological one, or even the same gender. We need to recognize those who take up that role non-traditionally. We...

‘Nuff said!

‘Nuff said!

The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As...

What can we learn about infosec from the Varsity Blues college admissions scandal?

What can we learn about infosec from the Varsity Blues college admissions scandal?

The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...

Combatting drama and barriers in the infosec community

Combatting drama and barriers in the infosec community

At its onset, the infosec community was very inclusive and welcoming…when others were not. Over the years, we’ve forgotten where we came from and why. Self-appointed gatekeepers leaders of who belongs in the community (or not) have...

Conspiracy theories and cognitive dissonance…and how to combat them

Conspiracy theories and cognitive dissonance…and how to combat them

Can information security leaders help overcome the challenges wrought by a public that's increasingly ready to believe – and act on – even the wildest conspiracy theories?

Real life, why people escape it – and bringing them back

Real life, why people escape it – and bringing them back

Security isn’t just about technology - that's only 10% of the total solution. Most of what we try and do is build awareness and communication between our team members and the rest of the company. And that requires being active social...

Why hacking leads to less security respect

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

Defense, security and the real enemies

Defense, security and the real enemies

The end of the Cold War meant that the countries that threatened American democracy and our way of life didn’t go away. They adapted to use technology to attack us instead. Now that the extent of these attacks is being made known, we...

Load More