Donald Borsay, MSIA, CISA

Leland, North Carolina, United States Contact Info
3K followers 500+ connections

Join to view profile

About

IT Security leader with experience developing and delivering transformational IT security…

Services

Articles by Donald

Contributions

Activity

Join now to see all activity

Experience & Education

  • CYBER BUYER

View Donald’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • Panel: Enterprise Security Strategy & Workforce Education

    Informa

    Seesion explores how enterprises need to adapt their strategy to engage the workforce to optimize the value and manage the risks associated with digital innovation. What are the key alignment areas across the business and externally? How might detection capabilities and incident response need to change? What risk management techniques and risk metrics need to be embraced?

    Other authors
    See publication
  • Panel: Threat Intelligence

    SC Congress

    Interactive question and answer forum covering:
    1. What is Threat Intelligence?
    2. What are the key providers or sources for threat information?
    3. What is the role of information sharing?
    4. What is the anticipated impact of the Cyber Preparedness Act of 2016 - namely local and regional Fusion Centers?
    5. How have roles and responsibilities changed relative to today's threat intelligence processes?
    6. How have changes in threat intelligence practices impacted…

    Interactive question and answer forum covering:
    1. What is Threat Intelligence?
    2. What are the key providers or sources for threat information?
    3. What is the role of information sharing?
    4. What is the anticipated impact of the Cyber Preparedness Act of 2016 - namely local and regional Fusion Centers?
    5. How have roles and responsibilities changed relative to today's threat intelligence processes?
    6. How have changes in threat intelligence practices impacted technology?
    7. How has the mining and analysis of data changed to support today's threat landscape?
    8. Does knowledge of threat actors matter?

    Other authors
    See publication
  • Panel: Discussing Different Regulations and Standards and Finding a Suitable Standards Framework

    Informa

    IoT needs to be interconnected yet has a number of physical and technical constraints that prevent use of legacy protocols and standards. A new world order of network protocols and standards are evolving. Let panelists describe the current state and next steps for collaborating on tomorrow’s future.

    Other authors
    See publication
  • Panel: Bringing AI to Blockchain

    Informa

    Machine learning and other artificial intelligence techniques have become mainstream in enterprise IT. How might AI work within a decentralized framework such as IoT? What kind of organizations will need to evolve to develop and manage such a solution?

    Other authors
    See publication
  • Speaker: The Internet of Things

    Security of Things Meetup Boston

    Over a half-century ago and just a few steps down the street, J.C.R. Licklider of MIT envisioned a globally interconnected set of computers through which everyone could quickly access data and programs from any site. Who would have thought that we would evolve to over 6 billion Internet of Things-and most predict this is just the tip of the iceberg!

    Other authors
    See publication
  • Speaker: Maritime - Security at Port and Sea

    Infragard Rhode Island Alliance

    As the Ocean State, our livelihood has depended heavily on the seas. Our focus has been on the safety and legal transport of passengers and cargo, at port and overseas. While the focus remains, the threat landscape has radically changed. New adversaries have emerged possessing new
    capabilities to wreak havoc. This session will bring us all up to speed on these challenges and the resources available to protect and respond to tomorrow’s incidents.

    See publication
  • Panel: Current Threatscape

    Secureworld Expo

    Cybersecurity threats change and evolve daily. In today’s world, knowing the latest tactics can make the difference in keeping your company safe. Join industry leaders as they discuss the latest threats, trends, and ways to stay ahead of cyber-attacks.

    Other authors
    See publication
  • Speaker: Insider Threat - The Danger Within

    Infragard Rhode Island Members Alliance

    A company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing
    company property. However, the thief who is harder to detect and who could cause the most damage is the insider – the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” – someone who is stealing company information or products in order to…

    A company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing
    company property. However, the thief who is harder to detect and who could cause the most damage is the insider – the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” – someone who is stealing company information or products in order to benefit another organization or country.

    Other authors
  • Speaker: Cybercrime - The New Frontier

    Infragard Rhode Island Members Alliance

    Ten short years ago, terrorism was the greatest risk to our nation’s critical infrastructure. Technologies have emerged, and our lifestyles and business processes have fundamentally changed. Cybercrime is on the rise and cybersecurity is our new frontier.

    See publication
  • Panel: Phishing and Spear Phishing

    ISC2 Eastern MA Chapter

    Panel discussion on the threats and countermeasures to Phishing and Spear Phishing.

    Panelists:
    Peter Vittands, Information Security Manager, EnerNOC;
    Don Borsay, Principle Security Architect, FM Global
    Dan Gortze, Security Systems Manager II, Dell SecureWorks
    Dan MacDonnell, CISO, Boston Scientific
    Quinn Shamblin, Executive Director Information Security, Boston University

  • Speaker: Security in the Solution Development Lifecycle

    SecureWorld Boston

    This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority…

    This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority threats, and (3) adapting to agile development.

    Other authors
    See publication
  • Speaker: Certifying Information Security

    SecureWorld Boston

    Who certifies your security and what are they being asked about? Are they trained or at least aware of the implications of their statements? Are the statements measured and accredited by a separated role or outside agency? Every information security program needs some level of certification and accreditation. Join Donald Borsay, Principal Security Architect at FM Global, in his discussion of one vendor's method to certify enterprise and application security.

    See publication
  • Speaker: Governance, Risk, & Compliance - Vendor Insights

    ISSA New England

    Faciliated vendor panel discussion on Governance, Risk, and Compliance. Includes vision for IT GRC , vendor intigrations and applicability to IT GRC, use to address regulatory compliance and other industry mandates, tool differentiators, and dead ends.

    Presentation material available upon request from the author.

Courses

  • Computer Forensic Investigations

    GTI551

  • Computer Security Incident Response Team Management

    GTI554

  • GIAC Information Security Officer

    SEC301

  • GIAC Security Essentials

    SEC401

  • Historical Underpinnings and Foundations of Information Assurance

    GTI512

  • Human Factors and Managing Risk

    GTI532

  • Information Assurance Management and Analytics

    GTI542

  • Information Assurance Technology

    GTI522

  • SANS +S Training Program for the CISSP Certification Exam

    MGT414

  • Wireless Ethical Hacking, Penetration Testing, and Defenses

    SEC617

Organizations

  • ISACA International

    Chapter Membership and Marketing Director

    -

    On founding board for the Rhode Island Chapter of ISACA. Expanded initial membership by 80% and developed first newsletter. Responsible for expanding membership and developing brand.

  • Amature Athletic Union (AAU)

    President, Coach

    -

    Formed and directed the growth of the Rhode Island Cyclones Amature Athletic Union (AAU) youth basketball club. Responsible for coach and player recruitment, tryouts, equipment, finances, and banquet.

  • Digital Equipment Computer Users Society (DECUS)

    Special Interest Group Chairman, Local User Group Chairman

    -

    Founded and Chaired the Connecticut/Rhode Island/Massachusetts Local User Group (CRIMLUG) and Computer-Human Interaction Special Interest Group (CHISIG) of the Digital Equipment Computer Users Society (DECUS). Also Chaired the Technology, Hardware, and Engineering Special Interest Group (THESIG). Received Board medal and regional best local user group award. Responsible for volunteer recruitment, program development, finances, and session presentations.

Recommendations received

More activity by Donald

View Donald’s full profile

  • See who you know in common
  • Get introduced
  • Contact Donald directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses