About
Ben Tomhave is a security industry veteran, progressive thinker, and culture warrior. He…
Articles by Ben
Activity
-
Security people need to get way more comfortable w SQL. I’m working on it myself :)
Security people need to get way more comfortable w SQL. I’m working on it myself :)
Liked by Ben Tomhave
-
Useful resource to have in your personal arsenal to protect your privacy.
Useful resource to have in your personal arsenal to protect your privacy.
Liked by Ben Tomhave
-
The Death of the Honest Tech Review Over the last 25 years, truly critical reviews of enterprise technology have largely disappeared. Yes…
The Death of the Honest Tech Review Over the last 25 years, truly critical reviews of enterprise technology have largely disappeared. Yes…
Liked by Ben Tomhave
Experience
Education
Licenses & Certifications
Publications
-
Understanding the Value of Enterprise Content-Aware DLP
Gartner
Content-aware data loss prevention is increasingly accepted as a standard part of security architecture, even as the market rebalances between enterprise, channel and DLP-lite solutions. This research provides a foundational analysis of the value and composition of E-DLP.
Other authorsSee publication -
How to Perform Application Security Testing for Web and Mobile Applic
Gartner
Application security testing remains a critical application security practice for developers, testers and security team members. This document explains how to implement three phases of AST throughout the software life cycle.
Other authors -
-
Approaches for Content and Data Security in Microsoft SharePoint Server
Gartner
See publicationMicrosoft SharePoint Server continues to be prevalent in on-premises IT environments. The sensitive content it contains drives the need for solid security solutions. We analyze the strengths and weaknesses of built-in and third-party content protection approaches available now for SharePoint.
-
Application Security: Think Big, Start With What Matters
Gartner, Inc.
Application security is a key part of security programs. This research presents a guidance framework for building an application security program based on key guiding principles that are essential to program success.
Other authors -
-
Security in a DevOps World
Gartner
Much has been written about DevOps, but very little has been done to address the role of security and risk management within that context. This research identifies opportunities for security teams and developers to reap benefits from a DevOps movement while evolving the state of security.
Other authors -
-
Comparing Methodologies for IT Risk Assessment and Analysis
Gartner
Technical professionals are often asked to research, recommend, implement and execute IT risk assessment and analysis processes. Here we compare and contrast common methodologies, highlighting attributes that readily integrate with risk management programs, as well as scale and evolve over time.
Other authorsSee publication -
Global Security Futures: Architectural Implications of Gartner's Security 2020 Scenario
Gartner
Macro changes in attack targets and threats to the enterprise, as well as the IT delivery model, are shaping the risk and security landscape over the next decade. Visibility into these anticipated changes help technical professionals plan for the architectural implications for future practices.
Other authorsSee publication -
Using NAC to Reduce Risk Related to BYOD and Unmanaged Devices
Gartner
Network access control is fundamentally about policy control, but the types of control vary widely, including basic network access, guest access, BYOD, and endpoint compliance. This assessment analyzes the myriad use cases in play today and describes the range of architectures available.
Other authorsSee publication -
Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and Technologists
ABA Press
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It…
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.
Other authors -
-
Data Breach and Encryption Handbook
ABA Press
The Data Breach and Encryption Handbook takes an in-depth look at the issue of escalating data breaches and their legal ramifications. This comprehensive resource focuses on the law and its implications, encryption technology, recognized methods of resolving a breach, and many related aspects of information security. Unlike a treatise on information security or encryption, this book will enable attorneys, business owners, technology professionals, and policy-makers to understand the root causes…
The Data Breach and Encryption Handbook takes an in-depth look at the issue of escalating data breaches and their legal ramifications. This comprehensive resource focuses on the law and its implications, encryption technology, recognized methods of resolving a breach, and many related aspects of information security. Unlike a treatise on information security or encryption, this book will enable attorneys, business owners, technology professionals, and policy-makers to understand the root causes of the security failures that lead to many of today's massive data breaches. It will instruct practitioners on how to ask the right questions to address the issues raised by data breaches and provide solutions for how to prevent them. The book also examines a number of the major data breach incidents from a variety of legal and technology perspectives, and provides instructive graphics to illustrate the methodologies hackers use to cause these breaches.
Other authors -
Courses
-
AWS Cloud Practitioner Essentials
-
-
AWS Security Fundamentals Online
-
-
AWS Well-Architected Training
-
-
BJ Fogg Behavior Design Boot Camp
-
-
BSi ISO 17799 Implementation
-
-
DOI DevOps Foundation
-
-
NSA INFOSEC Assessment Methodology (IAM) Training
-
-
NSA INFOSEC Evaluation Methodology (IEM) Training
-
-
SANS Track 8: System Forensics, Investigations, and Response
-
-
Splunk Fundamentals 1
-
-
“Facilitative Leadership” by Interaction Associates
-
-
“Intercultural Training: Working with Indian Nationals” by Prudential Financial
-
-
“Managing Conflict” by Ridge Associates
-
Organizations
-
Capital Theatre on Ice
President of the Board
-President of the Board of Directors for Capital Theatre on Ice.
-
American Bar Association, Information Security Committee
Co-Chair and Co-Vice Chair
-2 year term as Co-Vice Chair 2 year term as Co-Chair ABA InfoSec Committee within the Section of Science and Technology
-
Society of Information Risk Analysts
Board Member
-Member of the Board of Directors
-
OWASP, Northern Virginia Chapter
Board Member
-Member of the Board of Directors
-
ISSA
Senior Member
Recommendations received
-
LinkedIn User
3 people have recommended Ben
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content