Tom Olzak

Tom Olzak

Cybersecurity Researcher, Author & Educator

Independent security researcher and an IT professional since 1983, with experience in programming, network engineering, and security. I have an MBA as well as CISSP certification. I am also an online instructor for the University of Phoenix. I've held positions as an IS director, director of infrastructure engineering, director of information security, and programming manager at a variety of manufacturing, healthcare, and distribution companies. Before joining the private sector, I served 10 years in the United States Army Military Police with four years as a military police investigator. I've written four books, Just Enough Security, Microsoft Virtualization, Enterprise Security: A Practitioner's Guide, and Incident Management and Response Guide. I am also the author of various papers and articles on security management.
Stories by Tom Olzak
Attackers scour the internet for flaws in Kubernetes and its exposed components that they may target, thus, making it simple...
Antimalware software plays a key role in securing endpoints, but it is incapable of protecting data and systems. Here’s how...
Throughout the life cycle of an IAM system, many issues emerge that must be addressed quickly and diligently. Below is...
In parts 1 and 2 in this three-part series, I described the first steps in setting up and managing system...
After learning to integrate cyber risk management with enterprise risk management and defining information resource categories in Part 1, here’s...
Let's look at ways to identify your organization's risk appetite and tolerance for each system, as well as how to...