Phil Quade

Contributor

Opinions expressed by ICN authors are their own.

Phil Quade serves as Fortinet’s Chief Information Security Officer and brings more than three decades of cybersecurity and networking experience working across foreign, government and commercial industry sectors at the National Security Agency (NSA) and U.S. Senate. Phil has responsibility for Fortinet's information security, leads strategy and expansion of Fortinet's Federal and Critical Infrastructure business, and serves as a strategic consultant to Fortinet's C-Level enterprise customers.

Prior to Fortinet, Phil was the NSA Director's Special Assistant for Cyber and Chief of the NSA Cyber Task Force, with responsibility for the White House relationship in Cyber. Previously, Phil also served as the Chief Operating Officer of the Information Assurance Directorate at the NSA, managing day-to-day operations, strategy, and relationships in cybersecurity.

The opinions expressed in this blog are those of Phil Quade and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Data is the oil of the 21st century

Using Artificial Intelligence to Rebalance the Cyber Criminal Advantage

Using Artificial Intelligence to Rebalance the Cyber Criminal Advantage

There is a troubling convergence of trends across the cybersecurity landscape that I have been watching closely. If not addressed, I suspect they could wreak deeper levels of damage and volatility than any we have already seen....

You can’t protect what you can’t see

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information.

The future: it ain’t what it used to be

The future: it ain’t what it used to be

The problem with the future—as baseball legend Yogi Berra, the founders of the internet and any CISO or CTO can assure you—is that, increasingly, it ain’t what it used to be.

For a moonshot, you need more than just the moon

For a moonshot, you need more than just the moon

At one time, we were challenged to ask not what our country could do for us but what we could do for our country. It is time that the leading organizations in digital technology come together once again to ask the same.

5 steps to enable you to stare back in the face of inevitable compromise

5 steps to enable you to stare back in the face of inevitable compromise

How to deal with the safe guess that your company has been breached.

Cybersecurity’s believe it or not

Cybersecurity’s believe it or not

The increasing—and increasingly devastating—threats we all face are growing rapidly, whether we truly believe them or not.

Migrating to the Cloud Without an All-at-Once or All-or-Nothing Approach

Migrating to the Cloud Without an All-at-Once or All-or-Nothing Approach

In May, the President signed an Executive Order aimed at enhancing cybersecurity at Federal government agencies.  Of its handful of mandates, migration of computing resources to the cloud is likely to have the most sweeping...

How Sutton’s Law applies to cybersecurity today

How Sutton’s Law applies to cybersecurity today

If chasing threats are not the best allocation of an organization’s security resources, what is?

You don’t need a weatherman to know which way the wind blows

You don’t need a weatherman to know which way the wind blows

In the physical world—where threats collide against civic infrastructures, highway engineering and uneven home construction—understanding and fleeing impending destruction is often the best we can do in the moments of crises. I can’t...

All Roads Lead to Rome: Critical Infrastructure Security at the Crossroad

All Roads Lead to Rome: Critical Infrastructure Security at the Crossroad

There’s an idiom that sums up the idea that there are many different ways to reach a goal: “All roads lead to Rome.” However, there is another, lesser-known understanding of that empire’s famous road system: it served as an...

The Yin-Yang of Cybersecurity Legislation – The Internet of Things Cybersecurity Act

The Yin-Yang of Cybersecurity Legislation – The Internet of Things Cybersecurity Act

The dynamic of opposites permeates human culture: light and dark, push and pull, happy and sad, supply and demand, yin and yang. While we tend to prefer one over the other, the reality is that the tension between opposites is what...

Load More