TJ Trent

Opinions expressed by ICN authors are their own.

TJ Trent is an expert in organizational compliance and governance for organizations in the cyber universe. His focus is on people, processes, and systems, which provides the foundation for understanding the true place of technology in the cyber world.

TJ works fiercely and passionately to prevent, detect, and eradicate cyber threats. ​During his 13 year career he has witnessed the information technology field burgeon into a powerhouse industry intertwined ​with the fabric of our lives. ​As the lines have blurred between technology and our lives, cyber security and cyber awareness are at the forefront of media attention. The last two years we have been inundated with breach after breach. From healthcare and banking violations to our most sensitive and private photographs. It seems like nothing is safe anymore.​

A super high achiever dedicated to learning and continually improving. TJ has been able to rise to the elite levels of success in his career. With over nine years of leadership experience, TJ has helped many organizations and individuals reach milestones within their careers. As a result, he is also uniquely suited to help you turbo charge your career within the information technology field.

TJ's credentials include a Bachelors of Science-Information Systems Security, Certified Information Systems Security Professional, GIAC Security Essentials (SANS 401), GIAC Certified Enterprise Defender (SANS 501), GIAC Certified Incident Handler (SANS 504), GIAC Certified Intrusion Analyst (SANS 503), GIAC Certified Forensic Examiner (SANS 408), GIAC Certified Critical Controls (SANS 566), and GIAC Certified Network Systems Auditor (AUD 507). TJ will complete his Masters of Business Administration-Technology Management in February 2016.

The opinions expressed in this blog are those of TJ Trent and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Baby steps: building a cybersecurity strategy

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Why we continue to fail: lessons learned from the Atlanta Airport fiasco

Five basic failures happened that make the Atlanta airport a softer target for future attack.

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

Cybersecurity has a huge skills gap! Will you be part of the problem or the solution?

There is currently a projected shortfall of 1.6 million qualified persons to fill cyber security roles. Since it is very clear we are vulnerable to cyber attacks and need to mitigate them we need people now. Complaining about...

Why you can’t afford not to train veterans in cyber security

Why you can’t afford not to train veterans in cyber security

By 2019 ISACA estimates over 2 million cyber security roles will remain unfilled. A natural solution to this problems is retraining veterans to fill these positions.

10 facts every small business leader must act upon

10 facts every small business leader must act upon

Small businesses aren't immune from attack. In fact, a recent Ponemon study revealed 55 percent of small businesses surveyed have been compromised. Small business leaders need to understand 10 key fundamentals and take immediate...

Why every leader needs to understand Apple vs. FBI

Why every leader needs to understand Apple vs. FBI

We must avoid any solution that provides a master key to any encryption technology. Violating the privacy of our citizens must remain the exception and not the rule.

Why your security strategy should not be created in a vacuum

Why your security strategy should not be created in a vacuum

Sound strategy supports the core business processes of the organization. It should be (as we often said in the military) a combat multiplier. Meaning it should bolster, strengthen, and galvanize each of the efforts of each business...

Why written policies are vital to your cyber strategy

Why written policies are vital to your cyber strategy

Policies predefine how our organizations will protect against cyber incidents. They outline the processes that will be used on a daily basis as well as the steps to take when an incident occurs. Essentially, they do all the heavy...

Creating a strategy to offset the cyber talent shortage

Creating a strategy to offset the cyber talent shortage

A record 79 percent of U.S. businesses reported a cybersecurity incident in the last year, and the 238,158 job postings for cybersecurity-related jobs in 2014 is an increase of 91 percent from 2010. In the U.S. alone, companies posted...

Why desensitization is ruining your security strategy (part 1)

Why desensitization is ruining your security strategy (part 1)

Our information security teams are understaffed, overworked, and a result are becoming desensitized to the tell tale indicators of compromise showing up wishing our enterprise infrastructures.

5 myths that will thwart any security strategy

5 myths that will thwart any security strategy

We have to stop relying on outdated and unsupported information. Crafting successful (business driven) security strategy relies upon being accurately informed.

How to create effective cyber strategy

How to create effective cyber strategy

In 60% of reported cases attackers compromise an organization within minutes. Only 25% of those organizations discover the compromise within days or less. 70% of attacks use the initial victim to target a secondary victim. No one is...

Load More