Personal Information
Organization / Workplace
Cleveland/Akron, Ohio Area, Ohio United States
Occupation
Cybersecurity Leader | Consultant | Author | Cyber Investigator
Industry
Technology / Software / Internet
Website
securitythinkingcap.com
About
Eric Vanderburg is a Christian cybersecurity leader, consultant, author, and thought leader. Vanderburg leads the cybersecurity consulting division at TCDI. TCDI's cybersecurity division provides companies with peace of mind in our digital world by protecting the confidentiality, integrity, and availability of data and critical systems. TCDI security practitioners, analysts, engineers and forensic investigators apply their unique skills to create confidence in your information systems and policies.
In addition to being the Vice President of Cybersecurity at TCDI , Eric is also the Vice Chairman of the board of directors for the Technology Ministry Network, a nonprofit that equips those i...
Tags
eric vanderburg
computers
information security
computer networking
cybersecurity
comptia
networking concepts
computer hardware
information systems
forensics
jurinnov
ethical hacking
penetration testing
remington college
human relations
hacking
white hat
cisco
routing
ccna
switching
network security
technology
risk
malware
security
incident response
japan
computer software
virtual private network
threats
virus
ip address
security awareness
ip
protocol
tcp
network design
wan
windows server 2003
computer forensics
data breach
ransomware
cloud
infosec
hack
virtualization
culture
password
health
udp
bridge
virtual lan
router
access control list
attacks
mobile
memory
linux
hard drive
hdd
networking essentials
chief security officer
cso
hackers
encryption
routing protocols
microsoft
active directory
storage
ntfs
printers
windows
zombie
botnet
isaca
codemash
2014
mit
privacy
gdpr
devops
containers
equifax
cybercrime
criminal
risk management
it
itsm
iot
emerging technology
technology management
management
railway
innovation
competitiveness
niche markets
technology incubation
maglev
aviation
superconductivity
space
robotics
laws of robotics
asimov
scenario
planning
compliance
hacktivism
activism
website
web development
website security
cyber attacks
coding
detection
trojan
fraud
social engineering
cyber
untangled
identity theft
alarms
fence
wall
guards
alarm
guard
lighting
structure
physical security
shoulder surfing
dumpster diving
transmission control protocol
tcp/ip
nessus
encode
dvd rip
dvd
japanese garden
pond
koi
teahouse
japanese
tea
computer
cleveland state university
kent state university
return on investment
roi
adoption
customer relationship management
customer service
customer
crm
safety
substance dependence
substance abuse
communication
nonverbal communication
change
ethics
social responsibility
creativity
stressor
motivation
expectancy theory
conflict resolution
total quality management
direct memory access
file system
hard disk drive
raid
standard raid levels
event viewer
macintosh
unix
ethernet
coaxial cable
osi model
data link layer
protocols
architecture
distributed networks
wide area network
networking
simple network management protocol
cisco ios
enhanced interior gateway routing protocol
ppp
frame relay
point to point protocol
data encryption standard
operational security
policy
file transfer protocol
fibre channel
standards
osi
cluster
replication (computing)
electricity
main board
motherboard
ram
random access memory
floppy
display
lcd
monitor
cathode ray tube
mass storage
multimedia
output
i/o
input
modem
portables
laptop
printer
scsi
logical drive
internet
macos
macosx
operating system
windows registry
bios
master boot record
ssd
accelerated graphics port
hertz
online safety
internet safety
careers
weaknesses
cuyahoga community college
cover letter
resume
professional development
interview
hdi
goals
strengths
network attached storage
storage area network
nas
san
accounting
ftp
csa
cisco security agent
attackers
baselining
web security
remote access
cryptography
keys
policies
governance
topology
ios
acl
access lists
group policy
gpo
device manager
devices
user accounts
computer account
user account
group account
files
drives
disks
data
cifs
file systems
printing
server
restore
backup
recovery
internet information services
web
iis
performance
first responder
intrusion detection
business leaders
cyber forensics
china
computer fraud
law firm
incident
computer security
See more
Presentations
(150)Likes
(7)Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Muhammad Khan
•
5 years ago
Solving distributed data management problems in a microservice architecture (sfmicroservices)
Chris Richardson
•
6 years ago
Japanese Architecture
theringgirl
•
14 years ago
Culture
Reed Hastings
•
14 years ago
Native eDiscovery for Lotus Notes
Daegis
•
12 years ago
Personal Information
Organization / Workplace
Cleveland/Akron, Ohio Area, Ohio United States
Occupation
Cybersecurity Leader | Consultant | Author | Cyber Investigator
Industry
Technology / Software / Internet
Website
securitythinkingcap.com
About
Eric Vanderburg is a Christian cybersecurity leader, consultant, author, and thought leader. Vanderburg leads the cybersecurity consulting division at TCDI. TCDI's cybersecurity division provides companies with peace of mind in our digital world by protecting the confidentiality, integrity, and availability of data and critical systems. TCDI security practitioners, analysts, engineers and forensic investigators apply their unique skills to create confidence in your information systems and policies.
In addition to being the Vice President of Cybersecurity at TCDI , Eric is also the Vice Chairman of the board of directors for the Technology Ministry Network, a nonprofit that equips those i...
Tags
eric vanderburg
computers
information security
computer networking
cybersecurity
comptia
networking concepts
computer hardware
information systems
forensics
jurinnov
ethical hacking
penetration testing
remington college
human relations
hacking
white hat
cisco
routing
ccna
switching
network security
technology
risk
malware
security
incident response
japan
computer software
virtual private network
threats
virus
ip address
security awareness
ip
protocol
tcp
network design
wan
windows server 2003
computer forensics
data breach
ransomware
cloud
infosec
hack
virtualization
culture
password
health
udp
bridge
virtual lan
router
access control list
attacks
mobile
memory
linux
hard drive
hdd
networking essentials
chief security officer
cso
hackers
encryption
routing protocols
microsoft
active directory
storage
ntfs
printers
windows
zombie
botnet
isaca
codemash
2014
mit
privacy
gdpr
devops
containers
equifax
cybercrime
criminal
risk management
it
itsm
iot
emerging technology
technology management
management
railway
innovation
competitiveness
niche markets
technology incubation
maglev
aviation
superconductivity
space
robotics
laws of robotics
asimov
scenario
planning
compliance
hacktivism
activism
website
web development
website security
cyber attacks
coding
detection
trojan
fraud
social engineering
cyber
untangled
identity theft
alarms
fence
wall
guards
alarm
guard
lighting
structure
physical security
shoulder surfing
dumpster diving
transmission control protocol
tcp/ip
nessus
encode
dvd rip
dvd
japanese garden
pond
koi
teahouse
japanese
tea
computer
cleveland state university
kent state university
return on investment
roi
adoption
customer relationship management
customer service
customer
crm
safety
substance dependence
substance abuse
communication
nonverbal communication
change
ethics
social responsibility
creativity
stressor
motivation
expectancy theory
conflict resolution
total quality management
direct memory access
file system
hard disk drive
raid
standard raid levels
event viewer
macintosh
unix
ethernet
coaxial cable
osi model
data link layer
protocols
architecture
distributed networks
wide area network
networking
simple network management protocol
cisco ios
enhanced interior gateway routing protocol
ppp
frame relay
point to point protocol
data encryption standard
operational security
policy
file transfer protocol
fibre channel
standards
osi
cluster
replication (computing)
electricity
main board
motherboard
ram
random access memory
floppy
display
lcd
monitor
cathode ray tube
mass storage
multimedia
output
i/o
input
modem
portables
laptop
printer
scsi
logical drive
internet
macos
macosx
operating system
windows registry
bios
master boot record
ssd
accelerated graphics port
hertz
online safety
internet safety
careers
weaknesses
cuyahoga community college
cover letter
resume
professional development
interview
hdi
goals
strengths
network attached storage
storage area network
nas
san
accounting
ftp
csa
cisco security agent
attackers
baselining
web security
remote access
cryptography
keys
policies
governance
topology
ios
acl
access lists
group policy
gpo
device manager
devices
user accounts
computer account
user account
group account
files
drives
disks
data
cifs
file systems
printing
server
restore
backup
recovery
internet information services
web
iis
performance
first responder
intrusion detection
business leaders
cyber forensics
china
computer fraud
law firm
incident
computer security
See more