David Burg

David Burg

United States
16K followers 500+ connections

About

For over 25 years, I have been at the forefront of cybersecurity and the management of…

Articles by David

Activity

16K followers

See all activities

Experience

  • interos.ai Graphic
  • -

  • -

  • -

    Washington, District of Columbia, United States

Publications

  • Surviving Contact with Reality - Crisis exercises as a key element of a cyber incident and crisis management response

    PwC

    Corporations occasionally face dramatic, even extinction-level crises that defy incident response plans housed in a single department, or present contingencies that have no prior planning. These events don’t happen often, but when they do, they can damage share price, reputation, and careers from the Board, the C-Suite, and many other positions further down the corporate ladder. How does this happen?

    Other authors
    See publication
  • US State of Cybercrime Survey 2015

    The US State of Cybercrime Survey is a collaborative effort with PwC, CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service. We found rising concern among the 500 US executives, security experts, and others from the public and private sectors who participated. In fact, 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. Organizations…

    The US State of Cybercrime Survey is a collaborative effort with PwC, CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service. We found rising concern among the 500 US executives, security experts, and others from the public and private sectors who participated. In fact, 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. Organizations must summon the vision, determination, skills, and resources to build a risk-based cybersecurity program that can quickly detect, respond to, and limit fast-moving threats.

    See publication
  • PwC's 2015 US CEO Survey: Secure Assets

    Concern over cyber threats has CEOs warming to government collaboration. With cyber attacks the new normal in business, CEOs from the biggest companies expressed the highest concern over cybersecurity. Compared to all other hindrances to growth, cyber threats caused the sharpest uptick in worry for US CEOs. And surprisingly, while CEOs see over-regulation as a growth impediment, a relatively large number say they welcome government-business collaboration on cybersecurity—signaling a shift for…

    Concern over cyber threats has CEOs warming to government collaboration. With cyber attacks the new normal in business, CEOs from the biggest companies expressed the highest concern over cybersecurity. Compared to all other hindrances to growth, cyber threats caused the sharpest uptick in worry for US CEOs. And surprisingly, while CEOs see over-regulation as a growth impediment, a relatively large number say they welcome government-business collaboration on cybersecurity—signaling a shift for the sake of securing business ecosystems.

    See publication
  • Global State of Information Security Survey 2015

    Security breaches are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. Cyber risks will never be completely eliminated. Today, organisations must remain vigilant and agile in the face of a continually evolving threat landscape. Find out why your organisation should consider implementing a risk-based approach to security that prioritises your most valuable assets and proactively addresses your most…

    Security breaches are on the rise, and it is no surprise to find that as the number of information security incidents continues to mount, so do financial losses. Cyber risks will never be completely eliminated. Today, organisations must remain vigilant and agile in the face of a continually evolving threat landscape. Find out why your organisation should consider implementing a risk-based approach to security that prioritises your most valuable assets and proactively addresses your most relevant threats.

    See publication
  • Using Technology to Detect Fraud

    Pennsylvania Institute of Public Accountants

    Technology is a double-edged sword. While recent technological advances have made our lives easier, they have also paved the way for people who commit fraud. Fortunately, companies can also use technology to analyze data in real time and search for patterns of behavior that point to fraud. By combining a 60+ year-old mathematical principle with modern technological capabilities, large-scale relational databases can be utilized to uncover fraudulent activities buried in voluminous repositories…

    Technology is a double-edged sword. While recent technological advances have made our lives easier, they have also paved the way for people who commit fraud. Fortunately, companies can also use technology to analyze data in real time and search for patterns of behavior that point to fraud. By combining a 60+ year-old mathematical principle with modern technological capabilities, large-scale relational databases can be utilized to uncover fraudulent activities buried in voluminous repositories of electronic information.

    See publication

View David’s full profile

  • See who you know in common
  • Get introduced
  • Contact David directly
Join to view full profile

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses