Leland, North Carolina, United States
Contact Info
3K followers
500+ connections
About
Services
Articles by Donald
Contributions
-
What are the essential steps to ensure data privacy?
The principles for security and privacy are different. When you forfeit your personal information, are you Notified in advance of its intended use? Are you given a Choice to opt-out? Do you know what Third Parties will have access and why? Do you have access to your personal information and have a means to verify it. Do you know how your data will be protected and who is responsible? In many ways, privacy is organized around the use cases. No use, no access.
-
How can architecture documentation standards improve your IT projects?
When I assumed the role of a Principal Security Architect,. I quickly discovered the importance of documentation to gain consensus and guide the transformation. A service silo may have their own perspectives for the documents. A large enterprise may have another perspective. Use the framework that works best but remember that this is an overhead cost. One or two frameworks works better than hundreds. Last, if you are in an organization that has death by meetings with little tangible benefit, consider using an architect and their documents! You can lead a horse to water and eventually ALL will drink :-)
Activity
-
As we in America celebrate Thanksgiving and approach the holiday season, I want to take a moment to reflect on how truly blessed I am and how deeply…
As we in America celebrate Thanksgiving and approach the holiday season, I want to take a moment to reflect on how truly blessed I am and how deeply…
Liked by Donald Borsay, MSIA, CISA
-
🚀 𝗧𝗿𝗮𝗻𝘀𝗳𝗼𝗿𝗺𝗶𝗻𝗴 𝘁𝗵𝗲 𝗖𝗜𝗦𝗢 𝗥𝗼𝗹𝗲: 𝗙𝗿𝗼𝗺 '𝗡𝗼-𝗦𝗮𝘆𝗲𝗿' 𝘁𝗼 𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗰 𝗘𝗻𝗮𝗯𝗹𝗲𝗿 🚀 Have you ever poured…
🚀 𝗧𝗿𝗮𝗻𝘀𝗳𝗼𝗿𝗺𝗶𝗻𝗴 𝘁𝗵𝗲 𝗖𝗜𝗦𝗢 𝗥𝗼𝗹𝗲: 𝗙𝗿𝗼𝗺 '𝗡𝗼-𝗦𝗮𝘆𝗲𝗿' 𝘁𝗼 𝗦𝘁𝗿𝗮𝘁𝗲𝗴𝗶𝗰 𝗘𝗻𝗮𝗯𝗹𝗲𝗿 🚀 Have you ever poured…
Liked by Donald Borsay, MSIA, CISA
-
Thank you. I am lucky and I am so very grateful. Happy Thanksgiving!
Thank you. I am lucky and I am so very grateful. Happy Thanksgiving!
Liked by Donald Borsay, MSIA, CISA
Experience & Education
Licenses & Certifications
Publications
-
Panel: Enterprise Security Strategy & Workforce Education
Informa
Seesion explores how enterprises need to adapt their strategy to engage the workforce to optimize the value and manage the risks associated with digital innovation. What are the key alignment areas across the business and externally? How might detection capabilities and incident response need to change? What risk management techniques and risk metrics need to be embraced?
Other authorsSee publication -
Panel: Threat Intelligence
SC Congress
Interactive question and answer forum covering:
1. What is Threat Intelligence?
2. What are the key providers or sources for threat information?
3. What is the role of information sharing?
4. What is the anticipated impact of the Cyber Preparedness Act of 2016 - namely local and regional Fusion Centers?
5. How have roles and responsibilities changed relative to today's threat intelligence processes?
6. How have changes in threat intelligence practices impacted…Interactive question and answer forum covering:
1. What is Threat Intelligence?
2. What are the key providers or sources for threat information?
3. What is the role of information sharing?
4. What is the anticipated impact of the Cyber Preparedness Act of 2016 - namely local and regional Fusion Centers?
5. How have roles and responsibilities changed relative to today's threat intelligence processes?
6. How have changes in threat intelligence practices impacted technology?
7. How has the mining and analysis of data changed to support today's threat landscape?
8. Does knowledge of threat actors matter?Other authorsSee publication -
Panel: Discussing Different Regulations and Standards and Finding a Suitable Standards Framework
Informa
IoT needs to be interconnected yet has a number of physical and technical constraints that prevent use of legacy protocols and standards. A new world order of network protocols and standards are evolving. Let panelists describe the current state and next steps for collaborating on tomorrow’s future.
Other authorsSee publication -
Panel: Bringing AI to Blockchain
Informa
Machine learning and other artificial intelligence techniques have become mainstream in enterprise IT. How might AI work within a decentralized framework such as IoT? What kind of organizations will need to evolve to develop and manage such a solution?
Other authorsSee publication -
Speaker: The Internet of Things
Security of Things Meetup Boston
Over a half-century ago and just a few steps down the street, J.C.R. Licklider of MIT envisioned a globally interconnected set of computers through which everyone could quickly access data and programs from any site. Who would have thought that we would evolve to over 6 billion Internet of Things-and most predict this is just the tip of the iceberg!
Other authorsSee publication -
Speaker: Maritime - Security at Port and Sea
Infragard Rhode Island Alliance
As the Ocean State, our livelihood has depended heavily on the seas. Our focus has been on the safety and legal transport of passengers and cargo, at port and overseas. While the focus remains, the threat landscape has radically changed. New adversaries have emerged possessing new
capabilities to wreak havoc. This session will bring us all up to speed on these challenges and the resources available to protect and respond to tomorrow’s incidents. -
Panel: Current Threatscape
Secureworld Expo
Cybersecurity threats change and evolve daily. In today’s world, knowing the latest tactics can make the difference in keeping your company safe. Join industry leaders as they discuss the latest threats, trends, and ways to stay ahead of cyber-attacks.
Other authorsSee publication -
Speaker: Insider Threat - The Danger Within
Infragard Rhode Island Members Alliance
A company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing
company property. However, the thief who is harder to detect and who could cause the most damage is the insider – the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” – someone who is stealing company information or products in order to…A company can often detect or control when an outsider (non-employee) tries to access company data either physically or electronically, and can mitigate the threat of an outsider stealing
company property. However, the thief who is harder to detect and who could cause the most damage is the insider – the employee with legitimate access. That insider may steal solely for personal gain, or that insider may be a “spy” – someone who is stealing company information or products in order to benefit another organization or country.Other authors -
Speaker: Cybercrime - The New Frontier
Infragard Rhode Island Members Alliance
Ten short years ago, terrorism was the greatest risk to our nation’s critical infrastructure. Technologies have emerged, and our lifestyles and business processes have fundamentally changed. Cybercrime is on the rise and cybersecurity is our new frontier.
-
Panel: Phishing and Spear Phishing
ISC2 Eastern MA Chapter
Panel discussion on the threats and countermeasures to Phishing and Spear Phishing.
Panelists:
Peter Vittands, Information Security Manager, EnerNOC;
Don Borsay, Principle Security Architect, FM Global
Dan Gortze, Security Systems Manager II, Dell SecureWorks
Dan MacDonnell, CISO, Boston Scientific
Quinn Shamblin, Executive Director Information Security, Boston University -
Speaker: Security in the Solution Development Lifecycle
SecureWorld Boston
This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority…
This session focuses on security engineering and assurance techniques in the software development life cycle. Current practices and trends are discussed for each stage of the lifecycle, including concept development, design and construction, stabilization, and implementation. Listen and learn from a panel of application security thought leaders as they respond to today’s challenges, such as: (1) aligning assurances to software risk and compliance factors, (2) designing to counter priority threats, and (3) adapting to agile development.
Other authorsSee publication -
Speaker: Certifying Information Security
SecureWorld Boston
Who certifies your security and what are they being asked about? Are they trained or at least aware of the implications of their statements? Are the statements measured and accredited by a separated role or outside agency? Every information security program needs some level of certification and accreditation. Join Donald Borsay, Principal Security Architect at FM Global, in his discussion of one vendor's method to certify enterprise and application security.
-
Speaker: Governance, Risk, & Compliance - Vendor Insights
ISSA New England
Faciliated vendor panel discussion on Governance, Risk, and Compliance. Includes vision for IT GRC , vendor intigrations and applicability to IT GRC, use to address regulatory compliance and other industry mandates, tool differentiators, and dead ends.
Presentation material available upon request from the author.
Courses
-
Computer Forensic Investigations
GTI551
-
Computer Security Incident Response Team Management
GTI554
-
GIAC Information Security Officer
SEC301
-
GIAC Security Essentials
SEC401
-
Historical Underpinnings and Foundations of Information Assurance
GTI512
-
Human Factors and Managing Risk
GTI532
-
Information Assurance Management and Analytics
GTI542
-
Information Assurance Technology
GTI522
-
SANS +S Training Program for the CISSP Certification Exam
MGT414
-
Wireless Ethical Hacking, Penetration Testing, and Defenses
SEC617
Organizations
-
ISACA International
Chapter Membership and Marketing Director
-On founding board for the Rhode Island Chapter of ISACA. Expanded initial membership by 80% and developed first newsletter. Responsible for expanding membership and developing brand.
-
Amature Athletic Union (AAU)
President, Coach
-Formed and directed the growth of the Rhode Island Cyclones Amature Athletic Union (AAU) youth basketball club. Responsible for coach and player recruitment, tryouts, equipment, finances, and banquet.
-
Digital Equipment Computer Users Society (DECUS)
Special Interest Group Chairman, Local User Group Chairman
-Founded and Chaired the Connecticut/Rhode Island/Massachusetts Local User Group (CRIMLUG) and Computer-Human Interaction Special Interest Group (CHISIG) of the Digital Equipment Computer Users Society (DECUS). Also Chaired the Technology, Hardware, and Engineering Special Interest Group (THESIG). Received Board medal and regional best local user group award. Responsible for volunteer recruitment, program development, finances, and session presentations.
Recommendations received
8 people have recommended Donald
Join now to viewMore activity by Donald
-
Wishing all of my LN colleagues and friends a safe and Happy Thanksgiving! Blessed with the visit of family as my first Thanksgiving in a new house…
Wishing all of my LN colleagues and friends a safe and Happy Thanksgiving! Blessed with the visit of family as my first Thanksgiving in a new house…
Posted by Donald Borsay, MSIA, CISA
-
Thank you for the Top Global CISO Award recognition Cyber Defense Magazine. This could not be possible without the support of the National…
Thank you for the Top Global CISO Award recognition Cyber Defense Magazine. This could not be possible without the support of the National…
Liked by Donald Borsay, MSIA, CISA
-
As we wrap up #NJLM2024, want to thank all the organizers for a great conference! Special thanks and congratulations to Michael C. Taran Samhammer…
As we wrap up #NJLM2024, want to thank all the organizers for a great conference! Special thanks and congratulations to Michael C. Taran Samhammer…
Liked by Donald Borsay, MSIA, CISA
-
At Microsoft Ignite in Chicago on Wednesday Illumio was very honored to be featured on stage. This was alongside fellow Initial Graph Ecosystem…
At Microsoft Ignite in Chicago on Wednesday Illumio was very honored to be featured on stage. This was alongside fellow Initial Graph Ecosystem…
Liked by Donald Borsay, MSIA, CISA
-
🎉 Exciting News! 🎉 We’re proud to announce that NCN Technology has been named one of the Top Web Designers in Virginia by SocialAppsHQ! 🏆 This…
🎉 Exciting News! 🎉 We’re proud to announce that NCN Technology has been named one of the Top Web Designers in Virginia by SocialAppsHQ! 🏆 This…
Liked by Donald Borsay, MSIA, CISA
-
CYBER BUYER's partner BlueVoyant is going places fast! Ping me if you want to learn more!
CYBER BUYER's partner BlueVoyant is going places fast! Ping me if you want to learn more!
Shared by Donald Borsay, MSIA, CISA
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More