J Wolfgang Goerlich(@jwgoerlich) 's Twitter Profileg
J Wolfgang Goerlich

@jwgoerlich

Advisory CISO with Cisco. I’m an unflinchingly optimistic greybeard in this cyber dystopia. Views expressed are my own. Reach me with my website’s contact form.

ID:35797450

linkhttps://jwgoerlich.com calendar_today27-04-2009 17:14:44

39,7K Tweets

50,1K Followers

37,6K Following

Follow People
BlueHat IL(@BlueHatIL) 's Twitter Profile Photo

We are thrilled to reveal that the keynote speakers at the 2024 Blue Hat IL are none other than — drumroll, please — the wonderful Sherrod DeGrippo 🦓 & J Wolfgang Goerlich!
Register now to hear them speak > microsoftrnd.co.il/bluehatil/home

We are thrilled to reveal that the keynote speakers at the 2024 Blue Hat IL are none other than — drumroll, please — the wonderful @sherrod_im & @jwgoerlich! Register now to hear them speak > microsoftrnd.co.il/bluehatil/home
account_circle
Ron Parker(@scmunk) 's Twitter Profile Photo

I don't know what reminded me of this but here it is. I am pretty sure it wasn't the Zero Trust webinar I just watched. J Wolfgang Goerlich said app authz was hard. The only authz we had for this was the door.

I don't know what reminded me of this but here it is. I am pretty sure it wasn't the Zero Trust webinar I just watched. @jwgoerlich said app authz was hard. The only authz we had for this was the door.
account_circle
Claus Cramon Houmann(@ClausHoumann) 's Twitter Profile Photo

So the day finally came! The project we’ve been working on the last two years is now available for you as an open source project! TIDE, available in two repos StartTIDE (everything needed to get started) and CoreTIDE (automation) formerly

So the day finally came! The #detectionengineering project we’ve been working on the last two years is now available for you as an open source project! TIDE, available in two repos StartTIDE (everything needed to get started) and CoreTIDE (automation) #TIDeMEC formerly #MOLOCH
account_circle
Cisco(@Cisco) 's Twitter Profile Photo

“We know that the password has long been the weakest factor — the easiest to crack, forget and lose.” Learn how authentication supports from Duo Security advisory of J Wolfgang Goerlich ➡️ cs.co/6013nElYT

account_circle
David(@deFractal) 's Twitter Profile Photo

Just heard Dr. Stefani Goerlich, LMSW (she/her) ✡️ and Wolf on the Securing Sexuality podcast, discussing keyword-based controls to avoid use of to make non-consensual deepfakes. Filtering keywords is far too late: split training datasets and make separate models. 🧵
twitter.com/deFractal/stat…

account_circle
Ean Meyer - @eanmeyer.bsky.social(@EanMeyer) 's Twitter Profile Photo

I was thrilled to be on the Securing Sexuality Podcast with J Wolfgang Goerlich and Stefani Goerlich, LMSW (she/her) ✡️. We had a pile of fun talking about the types of challenges security practitioners and therapists share when it comes to protecting their clients. Check it out here!
securingsexuality.com/the-podcast/ep…

account_circle
Duo Security(@duosec) 's Twitter Profile Photo

Dive into the world of with J Wolfgang Goerlich, Cisco advisory CISO. 🔐

Check out this ZDNET article to learn 4 tactical steps to boost your defenses and keep the tricksters at bay: cs.co/6013rcf9z.

account_circle
Redhawk Security(@redhawknetwork) 's Twitter Profile Photo

Unlocking the Power of Zero Trust: Dive into the Security Outcomes Report by @JWGoerlich for a closer look at the evolving landscape. Discover the courage to forge ahead in cybersecurity.
oal.lu/668SL

account_circle
J Wolfgang Goerlich(@jwgoerlich) 's Twitter Profile Photo

Without data, we’re just another CISO with an opinion. So I’m excited to share insights on Zero Trust, grounded in extensive data by Cyentia Institute .

Wondering where to start with Zero Trust? We’ve got you. Wondering what’s new? Yep, we got you too.

blogs.cisco.com/security/findi…

account_circle
Frank McGovern(@FrankMcG) 's Twitter Profile Photo

Talk title developed on the spot with J Wolfgang Goerlich and Michael Wareman - “Finding Satisfaction in a World of Proving Negatives”.

Abstract: How to find satisfaction in cybersecurity (or any job) where you only see and hear the failures and take for granted the successes.

account_circle
Frank McGovern(@FrankMcG) 's Twitter Profile Photo

Don’t forget about chargeback so if an app isn’t supportive of the policies, like SSO, you can bill for that time to run that application and show the true costs.

IAM team often becomes the dumping ground. Stop enabling that.

Don’t forget about chargeback so if an app isn’t supportive of the policies, like SSO, you can bill for that time to run that application and show the true costs. IAM team often becomes the dumping ground. Stop enabling that.
account_circle
Frank McGovern(@FrankMcG) 's Twitter Profile Photo

Many programs, even beyond IAM, never take user experience into account.

You’d be amazed at what you can get done if you just listen as a security practitioner and find a balance of security vs productivity. If you sway too much security, it’s what creates most of your friction.

Many programs, even beyond IAM, never take user experience into account. You’d be amazed at what you can get done if you just listen as a security practitioner and find a balance of security vs productivity. If you sway too much security, it’s what creates most of your friction.
account_circle
Frank McGovern(@FrankMcG) 's Twitter Profile Photo

Evaluate Current State.

Take this understanding and build a charter. Your charter should not be very long. One to a few pages.

Evaluate Current State. Take this understanding and build a charter. Your charter should not be very long. One to a few pages.
account_circle