Hat tip: Don
![]()
Yan Ross
From:yanross7@gmail.com" data-test-id="message-to" style="outline: none !important; padding-inline-end: 4px;">yanross7@gmail.com
To:staylor326@aol.com" data-test-id="message-to" style="outline: none !important;">staylor326@aol.com
Cc:donstanger@aol.com" data-test-id="message-to" style="outline: none !important;">Don STANGER,jacklrubin@yahoo.com" data-test-id="message-to" style="outline: none !important;">Jack Rubin,f16jack@hotmail.com" data-test-id="message-to" style="outline: none !important;">Jack Kelley
Fri, Aug 9 at 6:19 PM
Thanks for your prompt and positive response, Steve!
I'd like to take the Tuesday, September 3rd slot. We can ease back down from the holiday weekend.
One clarification: Arizona doesn't participate in Daylight Savings Time, so until the clocks go back in the autumn, we're an hour behind Utah in MST. You wrote 7:00 a.m. MST, and that's fine (assuming you mean 8:00 a.m. in UT).
My presentation for this group is really a string of topics based on my professional journey. I'll start with some background on my education, military service, working as Counsel to the House of Representatives Banking Committee, on the Board of the Inter-American Development Bank, and then private law practice, all leading to my current semi-retired status editing Cyber Defense Magazine and providing strategic consulting services for SMEs.
Each of these experiences contributed to my current activities in cybersecurity, critical infrastructure assurance, risk management (including the developing area of cyber risk insurance), and social commentary.
I'll cover the interconnectedness of the various applications affecting our daily lives, some of the challenges and responses, and developing threats.
I will provide a variety of examples of how vulnerabilities in Information Technology (IT) and Operating Technology (OT) are being addressed -- some more effectively than others.
My presentation is not dependent on slides and graphs, and it's not linear -- that is, I can handle questions using the "CHAT" facility on Zoom, then return to the points I want to make.
I can say that in general I will avoid getting into political implications, unless there are questions opening those doors.
I will, however, offer some observations (with cybersecurity implications) on such current developments as the recent Supreme Court ruling overturning the "Chevron Deference" precedent and its effect on regulatory powers -- and how they will likely impact cybersecurity practices. If there's time and interest, I may address some conflicting government priorities and how they create winners and losers in the economy (and especially in the 16 sectors of critical infrastructure).
As you may have surmised, I expect to be talking with an audience of both current and retired professionals, who have both experience and the ability to learn from new and differing perspectives on what's going on out there in what passes for the real world.
Lest this seem too dry, I will (in moderation) inject some humor with stories that illustrate the stations along my own journey, from government service to private practice, to M&A and antitrust principles, to educational endeavors, to identity theft risk management, to privacy concerns, to critical infrastructure, to cybersecurity, to artificial intelligence, and beyond (including a few fuzzy predictions).
Of course, I'm open to any suggestions you or other LSDM members may have in advance.
Best wishes to all,
Yan




