Writing Services
While your executives might lack the time to produce many contributed articles, blogs, or whitepapers, I can help your team develop a regular stream of content that meets your communications objectives and enables your executives' unique voices and storylines to shine.
These pieces can take a number and combination of shapes, defining threats or risks you seek to address, demystifying the issues and technologies required to address them, and differentiating your unique vision and strategies for successfully implementing these solutions.
This process involves surveying your executive and organizational topic content, interviewing executives, developing messaging and topic documents, and developing a pipeline of content to promote executive perspectives and organizational expertise.
Defining Risks, Threats, and Threat Actors
Demystifying Issues and Technologies for Decision-Makers
Differentiating Approaches to Policy Action and Technology Adoption
These pieces can take a number and combination of shapes, defining threats or risks you seek to address, demystifying the issues and technologies required to address them, and differentiating your unique vision and strategies for successfully implementing these solutions.
This process involves surveying your executive and organizational topic content, interviewing executives, developing messaging and topic documents, and developing a pipeline of content to promote executive perspectives and organizational expertise.
Defining Risks, Threats, and Threat Actors
- When Nation-States Hack the Private Sector for Intellectual Property (The Hill)
- Quantum Computing Must Be a National Security Priority (Scientific American)
- Quantum Computing's Cyber-Threat to National Security (National Defense University)
- Why Cyber Espionage isn’t Just the Military’s Problem (McAfee Blog)
- Iranian Hacker Indictment Reminds Us That Risks To Critical Infrastructure Are Real (Dark Reading)
- U.S. County Election Websites Fail to Fulfill Basic Security Measures (McAfee CTO Blog)
- COVID-19 & Voting: When Paper is the Safest Election Technology (McAfee CTO Blog)
- Out of Aspen: State of Critical Infrastructure Cybersecurity (Dark Reading)
Demystifying Issues and Technologies for Decision-Makers
- The Machines Are Coming! The Machines Are Coming! (Dark Reading)
- Why SolarWinds-SUNBURST is a Wakeup Call (McAfee CTO Blog)
- Why Human-Machine Teaming Will Lead to Better Security Outcomes (McAfee CTO Blog)
- WannaCry: The Old Worms and the New (McAfee CTO Blog)
- My lousy Super Bowl-betting AI shows how humans are indispensable in cybersecurity (The Next Web)
Differentiating Approaches to Policy Action and Technology Adoption
- Security, Time, and the Decline of Efficacy (McAfee CTO Blog)
- McAfee CTO @ RSA: Catching Lightning in a Bottle or Burning Bridges to the Future? (McAfee CTO Blog)
- Cloud Security and Artificial Intelligence in the Financial Sector (McAfee CTO Blog)
- Cyber Readiness of U.S. Oil and Gas Sector (Trellix Blog)
- Cyber Readiness of U.S. Healthcare Services (Government Technology)
- Cyber Readiness in Asia Pacific Region: Australia, India, Japan (Trellix Blog)
- Cyber Readiness in Europe: France, Germany, United Kingdom (Trellix Blog)
- A Robust Federal Cybersecurity Workforce Is Key To Our National Security (McAfee CTO Blog)