TJ Trent is an expert in organizational compliance and governance for organizations in the cyber universe. His focus is on people, processes, and systems, which provides the foundation for understanding the true place of technology in the cyber world.
TJ works fiercely and passionately to prevent, detect, and eradicate cyber threats. During his 13 year career he has witnessed the information technology field burgeon into a powerhouse industry intertwined with the fabric of our lives. As the lines have blurred between technology and our lives, cyber security and cyber awareness are at the forefront of media attention. The last two years we have been inundated with breach after breach. From healthcare and banking violations to our most sensitive and private photographs. It seems like nothing is safe anymore.
A super high achiever dedicated to learning and continually improving. TJ has been able to rise to the elite levels of success in his career. With over nine years of leadership experience, TJ has helped many organizations and individuals reach milestones within their careers. As a result, he is also uniquely suited to help you turbo charge your career within the information technology field.
TJ’s credentials include a Bachelors of Science-Information Systems Security, Certified Information Systems Security Professional, GIAC Security Essentials (SANS 401), GIAC Certified Enterprise Defender (SANS 501), GIAC Certified Incident Handler (SANS 504), GIAC Certified Intrusion Analyst (SANS 503), GIAC Certified Forensic Examiner (SANS 408), GIAC Certified Critical Controls (SANS 566), and GIAC Certified Network Systems Auditor (AUD 507). TJ will complete his Masters of Business Administration-Technology Management in February 2016.
The opinions expressed in this blog are those of TJ Trent and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.
Building a cyber strategy can be overwhelming unless you start with large goals broken down into smaller milestones.
According to the Wall Street Journal, only 66.7 percent of jobseekers responded to cyber security job postings on Indeed.com between July and September of last year.
"No business is too small to evade a cyber attack," according to Ponemon.
"Under questioning from members of the House Judiciary Committee on Tuesday, FBI Director James Comey admitted that his agency would "of course" seek to use the precedent gained from a win in the San Bernardino to unlock other phones.&
“His army was small, undertrained, undersupplied, and fragile. He waged a war mostly of defense, deliberately avoiding large formations of British troops. For all the rhetoric, most of his maneuvers were pinpricks against a stronger, bigger ene
“Don’t think about winning the SEC Championship. Don’t think about the national championship. Think about what you needed to do in this drill, on this play, in this moment. That’s the process: Let’s think about what we c
The talent gap has serious implications for domestic and international economics and security and must be addressed
Overwhelmed, overloaded, and understaffed information security teams are ruining your cyber security strategy.