drj logo

"*" indicates required fields

Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2026 Call for Papers
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Top Security Leaders on 2022 Cybersecurity Awareness Month

by Jon Seals | October 6, 2022 | | 0 comments

New data breaches, cyber-attacks, or identity theft are being announced daily, with 76% of organizations being attacked by ransomware in the past two years! 

Top executives from FieldEffect, Open Systems, Zerify, VAST Data, ioXt, InsightCyber, Tetrate and Vaultree give commentary highlighting this year’s theme, “See Yourself in Cyber” for 2022 Cybersecurity Awareness Month.

Matt Holland, Co-founder and CEO of Field Effect:

“Despite all of the cyber security tools, categories and offerings on the market, businesses of all sizes continue to be underprotected. They feel overwhelmed and forced into solutions well outside of their areas of expertise. At Field Effect, we work with our customers and partners to provide a solution that is holistic in nature; designed to identify vulnerabilities and stop threats across the breadth of the network, cloud services and endpoints; and delivered in a way that removes the noise and complexity and relieves our clients’ burdens.”

Francis Cianfrocca, CEO at InsightCyber: 

“2023 will be the year that hostile cyberattacks against infrastructure and industrial operations become mainstream. Why? As attacks on the hardware and software that monitor and control equipment—otherwise known as operational technology (OT) environments—become more common, the motivation of cyber attackers has evolved from merely disrupting business to compromising the integrity of industrial environments with the malicious intention to cause harm. To be able to truly manage and mitigate risk from cyber and physical security threats, enterprises must be able to identify the smallest of anomalies to detect suspicious activity to prevent it before they become the next headline.”

Grace Burkard, Director of Operations, ioXt Alliance: 

“The theme of this year’s Cybersecurity Awareness Month, ‘See yourself in cyber,’ resonates with ioXt particularly well because our alliance serves to promote the importance of increasing the security for IoT products in order to build a safer connected world. As IoT devices have taken on critical roles in many industries, it is paramount for IoT manufacturers to incorporate security from the start and take responsibility to implement. ioXt empowers these manufacturers to do just that by certifying their devices to a rigorous set of standards put forth by global security leaders. They’re also provided the opportunity to ‘see themselves in cyber’ by participating in the work groups to have a voice in creating the standards for new profiles. It is never too late to start thinking about security and get involved!”

Adrianus Warmenhoven, Defensive Strategist at NordVPN: 

While protecting your data may seem like a lofty task, there are steps to be taken to maintain control over your information, especially this Cyber Security Month. With the understanding that humans rely on the internet and it is what keeps our day-to-day moving, we must look not at how to avoid information-sharing, but rather at how to maintain safety in doing so. Adrianus Warmenhoven, defensive strategist at NordVPN shares, “I do acknowledge that anything that preserves privacy can be abused for crime, but since our lives have become so intertwined with the network, we must try to help people to live the lives they want or in some cases even need.” As such, the importance of VPNs and secure browsers are emphasized this month. 

“In order to stay cyber-safe this and every month, a VPN provides some simple steps you can take everyday to preserve your privacy. When surfing the web, be conscientious of fake websites and when downloading apps, never download from third-parties and always double check the source. Consistently check and reset privacy settings on your phone to ensure you have your desired level of sharing. Double-down on your data’s security by browsing with a VPN to encrypt your online activity and eliminate location tracking With the current state of technology, VPNs are a vital component in today’s (digital) life. While we can argue over security issues (‘all websites use TLS anyway!’) or lawful interception (‘I have nothing to hide!‘) there can be no argument over the need for personal privacy. And remember, no device is hacker-proof. Be cognizant of who and what you interact with online everyday.”

May Mitchell, CMO of Open Systems: 

“Cybersecurity Awareness Month signifies an occasion to improve cybersecurity literacy and promote education around critical cybersecurity topics protecting people and society. The opportunity to improve cybersecurity through education and public engagement resonates with me deeply given my intense personal passion for the security field. Protecting any organization requires a 24/7, mission-driven approach to defend assets and data from bad actors.  

People are the first defense for an enterprise’s cybersecurity posture, and education is the key to empowering them to harden their defenses. In the cyber threat environment we face today, it is imperative to have a security operations center (SOC) offering round-the-clock support to customers. Many organizations struggle to dedicate the necessary resources and are even more stretched due to changes in remote and hybrid work complicating enterprises’ attack surfaces. This month, we are committed to using this awareness opportunity to continue our mission of educating the marketplace. Every organization should understand and prioritize the necessity of using a tailored security approach that protects critical assets and maximizes security investments, without falling prey to common IT complexity that creates risks due to a patchwork of solutions – rather than a holistic approach.” 

Varun Talwar, Co-Founder and Co-Creator at Tetrate:

“Companies need to rethink where their perimeters are. They don’t just include the front and back doors anymore. They also include all the windows, side doors, and other unknown vulnerabilities. In today’s day and age, there is an increasing importance to stay ahead of the cyber criminals and online vulnerabilities, and ensure your data and information, especially when it is connected across multiple apps, is secure.”

George Axberg, VP of Data Protection at VAST Data:

“Ransomware is top of mind not just for IT professionals but also in the boardroom. Budgets are being allocated to implement Vanguards to keep bad actors out, and Zero Trust is being implemented for those within. That said, the numbers still show that the threats are increasing at an alarming rate,” says George Axberg, VAST Data’s VP of Data Protection. 

“How we as stewards of our most critical assets, our data, react to an event such as a Cyber Strike is tantamount to how we react to a Natural Disaster. Processes need to be put in place to react swiftly in the event of an attack. Part of that plan of resilience needs to be a repository worthy of storing those digital assets and RESTORING said assets to a workable form. For example, at VAST Data we provide a secure, resilient, high performance at exabyte scale platform – one that is powered by unique and innovative all-flash technology leveraging modern economics. When a negative event happens, our clients know their data is there, secured, and they can retrieve it all in a flash, up to 50x faster than traditional backup solutions.”

Tilo Weigandt, Co-Founder & COO, Vaultree 

Education and communication are key in the cybersecurity industry. Cybersecurity doesn’t have to be complex and boring; it can be educational and fun if approached from the right angle, which can take away the fear of entering this space or diving deeper into a specific topic.

What’s important is to start with the basics and learn the mechanics and dynamics of security measures and their counterparts. But you don’t even have to be an expert in, say, cryptography to make a sound decision; there is no shame in taking advice. However, the abundance of vendors in the space makes it difficult to cut through the noise and it can sometimes seem overwhelming. So, sit down with experts and exchange thoughts and doubts, be part of communities and talk about your pain points, and talk to selected vendors to understand different approaches. 

Always keep in mind: No matter what we do, data breaches and leaks will always happen, so the essential second line of defense – encryption – is crucial to any security plan. There are already vendors out there offering solutions with which you can process, search and compute always-encrypted data at scale, so that you can concentrate on your daily business and fight other fires.

George Waller, Co-Founder and EVP of Zerify: 

“At Zerify, cybersecurity is something we are constantly vigilant about and have been highly dedicated to ensuring – and continually improving –  for over two decades. While it’s more than a month-long focus in our eyes, we are glad cybersecurity is getting the world’s attention in a time when hybrid and remote work environments support critical communications, and video conferencing takes place from multiple locations and even multiple unknown devices. We hope that as the usage of collaborative communications increases – and the world continues to rely on video conferencing platforms- Cybersecurity Awareness Month will be a time to hone in on greater capabilities to secure organizations, ensuring Zero Trust across platforms, greatly reducing breaches and hacks and thwarting the efforts of bad actors across the globe.”

Tilo Weigandt, Co-Founder and COO of Vaultree:

“Education and communication are key in the cybersecurity industry. Cybersecurity doesn’t have to be complex and boring; it can be educational and fun if approached from the right angle, which can take away the fear of entering this space or diving deeper into a specific topic. 

What’s important is to start with the basics and learn the mechanics and dynamics of security measures and their counterparts. But you don’t even have to be an expert in, say, cryptography to make a sound decision; there is no shame in taking advice. However, the abundance of vendors in the space makes it difficult to cut through the noise and it can sometimes seem overwhelming. So, sit down with experts and exchange thoughts and doubts, be part of communities and talk about your pain points, and talk to selected vendors to understand different approaches. 

Always keep in mind: No matter what we do, data breaches and leaks will always happen, so the essential second line of defense – encryption – is crucial to any security plan. There are already vendors out there offering solutions with which you can process, search and compute always-encrypted data at scale, so that you can concentrate on your daily business and fight other fires.”

Related Content

  1. Integration of Cybersecurity into Physical Security Realm
  2. Future-Proof Business Security: Strategies for Long-Term Resilience
    The Future of Business Protection
  3. Disaster Recovery Journal
    October is Cybersecurity Awareness Month

Recent Posts

Oakland Police Department Selects Mark43 to Modernize Public Safety Technology

July 11, 2025

Accel Atoms AI and Atoms X Scaling Programs to Offer Indian-Origin Founders up to $1M

July 11, 2025

Keeper Security Debuts Secure Model Context Protocol AI Agent Integration for Secrets Management

July 11, 2025

DuploCloud Enters Strategic Collaboration Agreemen with AWS to Bring in Agentic AI to DevOps and IT

July 10, 2025

NVMe Storage Solutions for High-Speed Data Ingestion for AI, Autonomous, and Professional Media Applications

July 10, 2025

Abstract Security Delivers 4X Operational Efficiency at Juul Labs

July 9, 2025

Archives

  • July 2025 (20)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy