Dan Lohrmann

Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist and author. During his distinguished career, Dan has served global organizations in the public and private sectors in a variety of executive leadership capacities, including enterprise-wide Chief Security Officer (CSO), Chief Technology Officer (CTO) and Chief Information Security Officer (CISO) roles in Michigan State Government. Dan was named: "CSO of the Year," "Public Official of the Year," and a Computerworld "Premier 100 IT Leader." Dan is the co-author of the Wiley book, “Cyber Mayday and the Day After: A Leader’s Guide to Preparing, Managing and Recovering From Inevitable Business Disruptions.” Dan Lohrmann joined Presidio in November 2021 as an advisory CISO supporting mainly public sector clients. He formerly served as the Chief Strategist and Chief Security Officer for Security Mentor, Inc. Dan started his career at the National Security Agency (NSA). He worked for three years in England as a senior network engineer for Lockheed Martin (formerly Loral Aerospace) and for four years as a technical director for ManTech International in a US / UK military facility. Lohrmann is on the advisory board for four university information assurance (IA) programs, including Norwich University, University of Detroit Mercy (UDM), Valparaiso University and Walsh College. Earlier in his career he authored two books - Virtual Integrity: Faithfully Navigating the Brave New Web and BYOD For You: The Guide to Bring Your Own Device to Work. Mr. Lohrmann holds a Master's Degree in Computer Science (CS) from Johns Hopkins University in Baltimore, Maryland, and a Bachelor's Degree in CS from Valparaiso University in Indiana.

Focus cyber risk on critical infrastructure:  Remote substations are vulnerable

Focus cyber risk on critical infrastructure: Remote substations are vulnerable

Doug DePeppe has some especially strong feelings about protecting remote substations from cyber attacks. Here is his guest CSO blog to explain why.

Watch out Silicon Valley: Israel's cybersecurity start-ups are coming

Watch out Silicon Valley: Israel's cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

No More XP: CSOs Need to Engage Now

No More XP: CSOs Need to Engage Now

Migrating off of Windows XP has become an issue that has jumped to the top of the CIO priority lists all over the world. Is your enterprise ready? Are you engaged with the plan?

Watch the Michigan Cyber Summit Online

The 2013 Michigan Cyber Summit will be held on Friday, October 25, 2013. The agenda is packed with experts from all over the world, and the opening keynote will be delivered by Michigan Governor Rick Snyder. Governor Snyder is the...

Could Syria launch a major cyberattack against the USA?

Could Syria launch a major cyberattack against the USA?

Should our leaders consider whether pro-Syrian forces might launch a cyberattack against US critical infrastructure in retaliation for military action? My view: American businesses should hope for the best, while preparing for the...

Two New Insider Threats to Consider

Two New Insider Threats to Consider

Recent headlines have highlighted what I believe are two new threats that have traditionally received minimal attention. These new insider threats include a new employee profile to consider and a series of disruptive technologies....

Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone

Introducing BYOD for You: The Guide for Employees Who Bring Their Own Smartphone

I am introducing my new eBook called BYOD for You: The Guide to Bring Your Own Device to Work.

BYOD is the new WiFi. Here's why

About a decade ago, the implementation of wireless networks was a very hot, even cutting edge, issue in computer security circles. The widespread mantra for CISOs at that time was: “WiFi is a bad idea.” In my view, BYOD is the new...

Google Chrome issues warnings while blocking ESPN.com and major websites

Google Chrome issues warnings while blocking ESPN.com and major websites

On Saturday, February 9, 2013, I was watching Valparaiso play Cleveland State in college basketball while checking on some sports scores. All of a sudden, a red box popped up from my Google Chrome browser which cut off the website and...

The Michigan Cyber Range: Who, what, when, where and how

What is a cyber range? Who needs a cyber range? Where can you go to learn more or to get your technology and security teams some of this advanced training?

CISO 2020: Will you be ready?

What are the key traits that CSOs and CISOs need to manifest in order to survive in our ever-changing, even hostile, cyber world? Last Friday evening, I had the honor and privilege of offering the opening keynote speech for CISOs, as...

Marketing security: True stories strengthen numbers for making point

How do security pros typically make the case for more, better or stronger security? Answer: Numbers - big numbers! I recommend adding a few stories.

The Time is Right for The International Cybersecurity Dialogue

Ever since I became Michigan’s first Chief Information Security Officer (CISO) in 2002, I have noticed a disturbing gap between front line users, security technologists and many senior policy makers. What can I suggest in the way of a...

Titanic Mistakes: Five Pragmatic Lessons from Spectacular Technology Failures

Everyone is talking about the sinking of the Titanic – and they should be. Here are five lessons for technology and security professionals from the sinking of the Titanic ...

Stuck in CAPTCHA Hell: When Security Disables

A CAPTCHA popped up questioning my credentials. “Darn, I hate when this happens,” I thought. “No worries, I’ve been through this security checkpoint before.” I typed in the two different words with the fuzzy characters. “Is there a...

Real Government Cloud Computing Efforts

What’s really going on with cloud computing in government? That’s been the key question for both public and private sector technology and security leaders over the past few years. Other perplexing issues include: Are the savings real?...

Privacy, Piracy and Parental Controls: Where In the World Are We Going in 2012 And Beyond?

It’s that time of year when we look back to reminisce on the past and look forward and attempt to predict what’s coming next. What’s the prize? If you can figure out this maze correctly, you can pretty much predict the future of the...

Blind spots: How cyber defense is like stopping Tim Tebow

Blind spots: How cyber defense is like stopping Tim Tebow

Michigan's CSO on the extremes of marketing hype and defeatist mentality in security

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 3 - Wrap-up)

We are discussing technology’s role in reducing the insider threats using a SIEM solution. In the previous installments of this blog series we have established the need for a SIEM solution and determined roles needed to implement this...

Stopping The Insider Threat: The Case for SIEM in Government IT (Part 2)

This article is about roles and they are as important in government IT as they are in the NBA. The roles and responsibilities required for successful SIEM implementation and the importance of establishing clearly defined roles cannot...

Load More