Author Archives: mclaukl

About mclaukl

Professional Certifications - Certified CISO, CISM, CISSP, PMP, ITIL Master Certified, GIAC Security Leadership Certificate (GSLC), CRISC. Kevin also holds Certificates in the Advanced Principles of Information Security and in Advanced Information Security Research Methods from Jones International University. Kevin L. McLaughlin began his career as a Special Agent for the Department of Army. He was responsible for investigating Felony crimes around the globe. He has had many careers over the years, including being a Police Officer in Kissimmee Florida, an Investigator for Mastercard/Visa, a Middle School teacher, a Director at Kennedy Space Center (where he worked with Fred Hayes, James Lovell, Armstrong, Sheppard, etc.), the President of his own company, an IT Manager and Senior Information Security manager with the Procter & Gamble (P&G) company (fortune 35), a CISO at the University of Cincinnati and a Senior Information System Security Manager for the Whirlpool Corporation (fortune 125). Kevin has also been an adjunct since 1992. While at P&G Kevin created one of P&G’s augmentation outsourcing teams in India. Kevin designed and implemented this India team and it won a global Gold Service award from Atos-Origin and has acted as a model for countless corporate relationships since. Over the years Kevin has: created an Information Security program conducted Information Security Strategic planning designed Information Security solutions, investigated over 700 Cyber cases and operated a Global Security Operations Center. • Education - MS in Computer Science Education, BS in Management of Information Systems * PhD in Cyber Security, University of Fairfax

“Harmonizing the Digital Symphony: The Essential Role of Cybersecurity Detection Engineers in Safeguarding Cyber Landscapes” 

“Cybersecurity Detection Engineers play a crucial role as frontline experts, identifying threats and facilitating rapid responses. These professionals are a vital part of the blue team, and their expertise in detection capabilities significantly enhances defenses and reduces the noise floor. … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Cybersecurity Deception Engineers: The Unseen Guardians of Cybersecurity Programs and the Unsung Heroes in the Battle Against Cyber Threats

“Cybersecurity Deception Engineers, the unseen guardians of cybersecurity, craft a deceptive digital landscape. They turn potential vulnerabilities into traps, thwarting threats and illuminating the intentions of cyber adversaries.” – Kevin Lynn McLaughlin, PhD  In the unending expanse of the digital … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Offense for Defense: The Art and Science of Cybersecurity Red Teaming 

“Embracing the principles of Cybersecurity Red Teaming not only fortifies an organization’s digital defenses but fosters a proactive mindset that is essential for thriving in the ever-evolving cyber threat landscape. It is through this strategic fusion of innovation, collaboration, and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

DEFENSE IS THE BEST OFFENSE: THE EVOLVING ROLE OF CYBERSECURITY BLUE TEAMS AND THE IMPACT OF SOAR TECHNOLOGIES

ABSTRACT. The article delves into the intricacies, tools, approaches, and tactics utilized by Cybersecurity Blue Teams, as well as the essential planning practices that lay the foundation for successful operations. The effectiveness of Blue Team operations relies on the proficiency … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

SECURING CORPORATE IoT DEVICES: CHALLENGES, STRATEGIES, AND THE ROLE OF AI AND ML IN CYBERSECURITY

The rapid proliferation of IoT devices within corporate infrastructures has left organizations more vulnerable than ever to cyberattacks. It is essential to adopt a comprehensive approach that incorporates various techniques, tools, and emerging technologies, such as AI and ML, to … Continue reading

Posted in Critical Manufacturing Cyber Security | Tagged , , , , , , , , , , , | 1 Comment

“Unlocking Leadership Excellence: One Cybersecurity Executive’s Guide to Essential Reads for Aspiring Team Leaders”

“In the pursuit of leadership excellence, the wisdom gleaned from the works of esteemed authors can serve as a guiding beacon, empowering aspiring team leaders to navigate the complexities of the cybersecurity landscape with confidence, agility, and foresight.” – Kevin … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD  & Erik S. A. Elliott

EDPACS _ 2023 _ Kevin Lynn McLaughlin, PhD  & Erik S. A. Elliott Unleashing the Power of Mobile Threat Hunting Toolkits: Why They Are Crucial in Today’s Cybersecurity Landscape “Mobile threat hunting toolkits are a crucial component of modern cybersecurity … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

CYBERSECURITY AND FUSION CENTERS

To cite this article: Kevin Lynn McLaughlin (2023): CYBERSECURITY AND FUSION CENTERS, EDPACS, DOI: 10.1080/07366981.2023.2205689 To link to this article: https://doi.org/10.1080/07366981.2023.2205689 In the ever-evolving world of cybersecurity, it is vital to streamline complexity and create accessible solutions. The establishment of … Continue reading

Posted in Uncategorized | Leave a comment

Sometimes you need a who, A what, no – a who, oh ok 

It always surprises me when I meet a novice or someone who is new to a field or new to a role and they are embarrassed to ask for help. Even worse is when they are afraid that receiving feedback … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Pollyanna Leadership?

“Positive leadership isn’t just about being optimistic, it’s about acknowledging challenges while emphasizing resilience and a can-do attitude. It empowers individuals and inspires teams to take risks, embrace change, learn from mistakes and work together to overcome obstacles. Unlike authoritarian … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment