Ben Tomhave

Ben Tomhave

Herndon, Virginia, United States
4K followers 500+ connections

About

Ben Tomhave is a security industry veteran, progressive thinker, and culture warrior. He…

Articles by Ben

  • The Enshittification of the "Most Magical Place on Earth"

    Preface Corey Doctorow, in his seminal Wired article "The ‘Enshittification’ of TikTok," defines "enshittification"…

    7 Comments
  • Three Lessons From My Recent Job Search

    For those unaware, I left my previous role on Sept. 16th in order to shift my focus completely to finding a new job…

    5 Comments
  • A Shortage in Common Sense: The Myth of the Talent Gap

    I have a visceral reaction every time I encounter yet another article bemoaning the so-called "talent gap" or "labor…

    39 Comments
  • Business Must Change: InfoSec in 2019

    I don't know about you, but I am happy to see 2018 ended. Personally, it was a very difficult year, capping a very…

  • The Quest for Optimal Security

    There's no shortage of guidance available today about how to structure, build, and run a security program. Most…

    7 Comments
  • Forget C-I-A, Availability Is King

    In the traditional parlance of infosec, we've been taught repeatedly that the C-I-A triad (confidentiality, integrity…

    8 Comments
  • Measure Security Performance, Not Policy Compliance

    I started my security (post-sysadmin) career heavily focused on security policy frameworks. It took me down many roads,…

  • The Thankless Life of Analysts

    “There are no facts, only interpretations.” Friedrich Nietzsche There are shenanigans afoot, I tell ya; shenanigans! I…

    5 Comments
  • Design For Behavior, Not Awareness

    October was National Cybersecurity Awareness Month. Since today is the last day, I figured now is as good a time as any…

    12 Comments
  • Incremental “Gains” Are Just Slower Losses

    Anton Chuvakin and I were having a fun debate a couple weeks ago about whether incremental improvements are worthwhile…

    8 Comments

Activity

Experience

  • First Citizens Bank Graphic
  • -

    Herndon, VA

  • -

    Remote

  • -

  • -

    Remote

  • -

  • -

  • -

    Mclean, Virginia

  • -

    Remote

  • -

    Remote

  • -

    Fairfax, VA

  • -

    Herndon, VA

  • -

    Remote

  • -

    Remote

  • -

  • -

  • -

  • -

  • -

  • -

    Billings, Montana Area

  • -

    Great Falls, Montana Area

  • -

  • -

  • -

  • -

  • -

    Minneapolis, MN

  • -

    Chicago, IL and Minneapolis, MN

  • -

    Decorah, IA

  • -

    Minneapolis, MN

  • -

    Darien, IL

  • -

    Decorah, IA

Education

Licenses & Certifications

Publications

  • Understanding the Value of Enterprise Content-Aware DLP

    Gartner

    Content-aware data loss prevention is increasingly accepted as a standard part of security architecture, even as the market rebalances between enterprise, channel and DLP-lite solutions. This research provides a foundational analysis of the value and composition of E-DLP.

    Other authors
    See publication
  • How to Perform Application Security Testing for Web and Mobile Applic

    Gartner

    Application security testing remains a critical application security practice for developers, testers and security team members. This document explains how to implement three phases of AST throughout the software life cycle.

    Other authors
    • Ramon Krikken
    See publication
  • Approaches for Content and Data Security in Microsoft SharePoint Server

    Gartner

    Microsoft SharePoint Server continues to be prevalent in on-premises IT environments. The sensitive content it contains drives the need for solid security solutions. We analyze the strengths and weaknesses of built-in and third-party content protection approaches available now for SharePoint.

    See publication
  • Application Security: Think Big, Start With What Matters

    Gartner, Inc.

    Application security is a key part of security programs. This research presents a guidance framework for building an application security program based on key guiding principles that are essential to program success.

    Other authors
    • Ramon Krikken
    See publication
  • Security in a DevOps World

    Gartner

    Much has been written about DevOps, but very little has been done to address the role of security and risk management within that context. This research identifies opportunities for security teams and developers to reap benefits from a DevOps movement while evolving the state of security.

    Other authors
    • Sean Kenefick
    See publication
  • Comparing Methodologies for IT Risk Assessment and Analysis

    Gartner

    Technical professionals are often asked to research, recommend, implement and execute IT risk assessment and analysis processes. Here we compare and contrast common methodologies, highlighting attributes that readily integrate with risk management programs, as well as scale and evolve over time.

    Other authors
    See publication
  • Global Security Futures: Architectural Implications of Gartner's Security 2020 Scenario

    Gartner

    Macro changes in attack targets and threats to the enterprise, as well as the IT delivery model, are shaping the risk and security landscape over the next decade. Visibility into these anticipated changes help technical professionals plan for the architectural implications for future practices.

    Other authors
    See publication
  • Using NAC to Reduce Risk Related to BYOD and Unmanaged Devices

    Gartner

    Network access control is fundamentally about policy control, but the types of control vary widely, including basic network access, guest access, BYOD, and endpoint compliance. This assessment analyzes the myriad use cases in play today and describes the range of architectures available.

    Other authors
    See publication
  • Information Security and Privacy: A Practical Guide for Global Executives, Lawyers and Technologists

    ABA Press

    Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It…

    Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.

    Other authors
    • et al
    See publication
  • Data Breach and Encryption Handbook

    ABA Press

    The Data Breach and Encryption Handbook takes an in-depth look at the issue of escalating data breaches and their legal ramifications. This comprehensive resource focuses on the law and its implications, encryption technology, recognized methods of resolving a breach, and many related aspects of information security. Unlike a treatise on information security or encryption, this book will enable attorneys, business owners, technology professionals, and policy-makers to understand the root causes…

    The Data Breach and Encryption Handbook takes an in-depth look at the issue of escalating data breaches and their legal ramifications. This comprehensive resource focuses on the law and its implications, encryption technology, recognized methods of resolving a breach, and many related aspects of information security. Unlike a treatise on information security or encryption, this book will enable attorneys, business owners, technology professionals, and policy-makers to understand the root causes of the security failures that lead to many of today's massive data breaches. It will instruct practitioners on how to ask the right questions to address the issues raised by data breaches and provide solutions for how to prevent them. The book also examines a number of the major data breach incidents from a variety of legal and technology perspectives, and provides instructive graphics to illustrate the methodologies hackers use to cause these breaches.

    Other authors
    • Lucy L. Thomson
    • et al
    See publication
Join now to see all publications

Courses

  • AWS Cloud Practitioner Essentials

    -

  • AWS Security Fundamentals Online

    -

  • AWS Well-Architected Training

    -

  • BJ Fogg Behavior Design Boot Camp

    -

  • BSi ISO 17799 Implementation

    -

  • DOI DevOps Foundation

    -

  • NSA INFOSEC Assessment Methodology (IAM) Training

    -

  • NSA INFOSEC Evaluation Methodology (IEM) Training

    -

  • SANS Track 8: System Forensics, Investigations, and Response

    -

  • Splunk Fundamentals 1

    -

  • “Facilitative Leadership” by Interaction Associates

    -

  • “Intercultural Training: Working with Indian Nationals” by Prudential Financial

    -

  • “Managing Conflict” by Ridge Associates

    -

Organizations

  • Capital Theatre on Ice

    President of the Board

    -

    President of the Board of Directors for Capital Theatre on Ice.

  • American Bar Association, Information Security Committee

    Co-Chair and Co-Vice Chair

    -

    2 year term as Co-Vice Chair 2 year term as Co-Chair ABA InfoSec Committee within the Section of Science and Technology

  • Society of Information Risk Analysts

    Board Member

    -

    Member of the Board of Directors

  • OWASP, Northern Virginia Chapter

    Board Member

    -

    Member of the Board of Directors

  • ISSA

    Senior Member

Recommendations received

3 people have recommended Ben

Join now to view

View Ben’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ben directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses