Rob Scholl CISO @RISK

Rob Scholl CISO @RISK
Contact me and we can share more.

Recent Posts

IP and Data Anonymization 

[fa icon='calendar'] Mar 7, 2018 9:39:02 AM / by Rob Scholl CISO @RISK posted in Insider, Cyber attack surface, polymorphic, Cyber Event

[fa icon="comment"] 0 Comments

Protecting your privacy: Anomymization the good & bad.

IP Anonymization is good, and bad - let's learn why.

Read More [fa icon="long-arrow-right"]

Consensus Theory Machine Learning reduces "Cyber Ghostbuster" Missions

[fa icon='calendar'] Aug 20, 2017 2:06:23 PM / by Rob Scholl CISO @RISK posted in Cyber attack surface, Privacy by design, MainStreet USA, MME, Cybersecurity requirements

[fa icon="comment"] 1 Comment

As a CISO, my challenge has been to reduce the number of alerts by filtering out the noise generated by a myriad of data sources.  I have to balance the latest "good idea" checklists and frameworks with the budget and staff that I have already.  As an Information Security expert, I have discovered that it is costly both financially and organizationally in staff morale to constantly having to conduct "Ghostbuster" missions that end like bad comedy through chasing ghosts in a machine that alerts us constantly and points us to a dead end.

Read More [fa icon="long-arrow-right"]

Cyber is Polymorphic "so what?"

[fa icon='calendar'] Mar 22, 2017 4:29:58 PM / by Rob Scholl CISO @RISK posted in Cyber attack surface, polymorphism, polymorphic

[fa icon="comment"] 2 Comments


Every time you turn on the TV, or view social media, you can’t help but be overwhelmed with discussions around cyber security and hacking. Leaders of agencies, military units, or industries, consistently yield an interesting and recurring theme:

Cyber Security is "polymorphic."  Polymorphism, polymorphic or polymorph, from the Greek words poly ("many") and morphe ("form, shape, structure"), may refer to computing and science,  

  • Cyber Polymorphism represent the ability in computer programming to present the same programming interface for differing underlying forms (data types, classes) and then the substrate of Cyber extends all the way to how it is encoded.
    • Polymorphic code, self-modifying program code designed to defeat anti-virus programs or reverse engineering
Read More [fa icon="long-arrow-right"]