
Jeff Orr
Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.
More content by Jeff Orr
Cyber Security Is Integral To Business Continuity Planning
April 06 by Jeff OrrCommunications are critical for an organization when an incident occurs. Threat actors will also use a disruption to business operations as an opportunity to spread misinformation. Steps are available...
Incident Of The Week: Defense Electronics Manufacturer CPI Succumbs To Ransomware Demands
March 13 by Jeff OrrElectronics manufacturer Communications & Power Industries (CPI) was victimized by having its data encrypted and held ransom. Some of its customers include the US Department of Defense and the DoD’s D...
The Cost Of An Enterprise Ransomware Attack
March 12 by Jeff OrrRansomware attacks are occurring more frequently and the outcomes are having greater impact on organizations than ever before. Little empirical data is available, however, about the outcomes of these...
Phishing Attacks Work Because… Humans
March 11 by Jeff OrrPhishing remains one of the leading methods to target enterprise users and infiltrate the workplace. Phishing has become so disruptive that it is impacting worker productivity and raising questions ab...
Cyber Security Is A Team Sport
March 09 by Jeff OrrA Cyber Security Hub webinar with Code42 explored how cyber security can become an integral part of enterprise behavior and culture. The talk covered topics from the barriers to getting department coo...
RSAC2020: IoT Is Officially Part Of Enterprise Mobility
March 05 by Jeff OrrRisk that comes from mobile and IoT devices must be factored into the enterprise security program. Security leaders need to be looking at those risks holistically and strategically, rather than operat...
Is The Enterprise Security Operations Center Effective?
March 04 by Jeff OrrThe SOC is critical to today’s digitized economy and business requirements for operations both online and in the cloud. However, the current methods for security operations are not satisfying cyber pr...
Malware Analysis Strives To Outpace Enterprise Digitalization
March 03 by Jeff OrrMalware analysis is an essential element for developing the efficient removal tools that can ultimately eliminate malware from an infected system. The adoption of BYOD mobile devices and introduction...
Preparing Cyber Security Leaders For Regulation And Compliance
March 02 by Jeff OrrNot all industries have faced regulatory compliance and reporting requirements as a course of conducting business operations. Under-regulated sectors can take steps from a cyber security perspective t...
Enabling Cyber Security Defenders To Design Effective Solution Strategies
February 27 by Jeff OrrEnterprise cyber security defenders are required to be omniscient while attackers only need to know “one thing” very well. However, attacker strategies are changing. RSAC2020 was the backdrop for conv...
Is “Fall Guy” Part Of The Enterprise CISO Job Description?
February 26 by Jeff OrrThe enterprise cyber security mandate is clear: Protect the systems, data and personnel from cyber threats. The security leader is also assuming protection of the organization’s brand. When something...
Recognizing Access Management As A Cyber Security Framework And Process Control
February 24 by Jeff OrrIdentity and Access Management (IAM) and Privileged Access Management (PAM) are critically important disciplines. Cyber Security Hub examines some of the most impactful strategies that threat actors e...