Mr. Dan Chandler is Criterion’s Chief Information Security Officer (CISO) and cybersecurity solutions architect. As CISO, he directs and approves the design of security systems; reviews and approves cybersecurity policies, controls, and cyber incident response planning; identifies risks and actionable plans to protect the business; makes sure cybersecurity policies and procedures are communicated to all personnel and that compliance is enforced; and briefs the executive team on status and risks.
As a cybersecurity solutions architect, he supports service offering development and provides business development, capture, and proposal activities involving cybersecurity and privacy requirements. Mr. Chandler provides strategic leadership for the company’s information security programs to ensure that they are aligned with Criterion’s technology capabilities.
Mr. Chandler is a graduate of the University of North Carolina-Chapel Hill, a retired U.S. Army officer, and a graduate of the U.S. Army Command and General Staff College. He received his M.S. in Strategic Intelligence from the Defense Intelligence College; a professional certification as a Post-Graduate Intelligence Professional (PGIP); and is a Certified Information Systems Security Professional (CISSP), Certified Authorization Profession (CAP), and Project Management Professional (PMP). Since retiring from the military, Dan has been active in the cybersecurity and privacy fields for more than 21 years.
Under EO 14028, all Federal government agencies are specifically required to adopt Zero Trust Architecture (ZTA).
Remote work brings new challenges for cybersecurity.
Here are some of the tips we are using at Criterion to minimize teleworking cybersecurity risks.
Here are several recommended cybersecurity tips and additional precautions for shoppers that you should be tuned in to for the holiday shopping season.
This forecast sheet was developed specifically to provide information about what we currently know about the new DoD CMMC program.
Compliance-based measures, while better than nothing, do not give a true picture of an organization’s cybersecurity maturity.