Sharing Vital Cyberinformation: An Interview with the New Jersey CISO

The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) was established in 2015 to provide both the public and private sector in the state with a diverse set of cyberthreat analysis and security incident information.

As described on their government website: “The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) is the State’s one-stop shop for cybersecurity information sharing, threat analysis, and incident reporting.  A component organization within the New Jersey Office of Homeland Security and Preparedness (NJOHSP), the NJCCIC works to make the State of NJ more resilient to cyber attacks, to promote statewide awareness of local cyber threats and widespread adoption of best practices. Located at the Regional Operations Intelligence Center (ROIC), and acting in a cyber fusion center capacity, the NJCCIC is comprised of members from NJOHSP, the New Jersey Office of Information Technology (NJOIT), and the New Jersey State Police (NJSP). …”

With such a huge task that spans the public and private sectors and reaches around the globe to 35 countries, how can anyone possibly achieve such a challenging mission?

Fortunately for New Jersey, Michael T. Geraghty is up to the task. He wears several hats, serving as the chief information security officer (CISO) for the state of New Jersey and the director of NJCCIC within the New Jersey Office of Homeland Security and Preparedness.

Geraghty brings a wealth of public- and private- sector knowledge and experience into the role, having served as CISO of the Hudson’s Bay Company, chief information officer of the National Center for Missing and Exploited Children, and vice president of High Technology Investigations at Prudential Financial. Previously Geraghty served 12 years with the New Jersey State Police, where he led the formation and development of the High Technology Crimes Investigations Unit.

Geraghty has lectured extensively throughout (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: