Mr. VanSteenburg is a Cyber Security Analyst at Quanterion Solutions Incorporated in Utica, NY. He has earned his Masters degree in cybersecurity from Utica College with a concentration in computer forensics. His areas of expertise are computer and network security, information assurance, and computer forensics. His research focuses on network design security, intrusion detection systems, and implementation of current cybersecurity best practices. He also has experience in transitioning web systems from traditional infrastructure to the Azure Government cloud as well as deploying privately hosted cloud infrastructure.
CSIAC Reports
Reducing Your Digital Footprint
Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital footprint. The information left behind can have real-world consequences. As such it is essential that users understand how their digital footprint is created, the magnitude of that digital trail, and the steps they can take to reduce their digital footprint to manage and protect their privacy on the Internet.
View Report
This report explains what a digital footprint is, why it could be harmful if a person’s footprint is too large, and steps that can be taken to reduce their digital footprint.Cloud Infrastructure Deployment
Background An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. According to RightScale, 72 percent of enterprises have adopted a private cloud model (2017). It is crucial that companies…
View ReportMobile Security
In the past five years alone, the amount of mobile data has grown eighteen fold (Cisco Mobile VNI, 2017). Security concerns are at the forefront due to the reliance on mobile devices for both business and personal use, along with…
View Report
Podcasts / Webinars
The CSIAC Podcast » Cloud Infrastructure Deployment
An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. It is crucial that companies have an understanding of the various cloud deployment models, considerations that must be taken into…
The CSIAC Podcast » CS Digest Roundtable #1: Emotet Trojan, Cryptojacking, and User Data Exposure
This is the first CS Digest show of the CSIAC Podcast. The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across…
The CSIAC Podcast » Mobile Security – Part 1 of 2
In the past five years alone, the amount of mobile data has grown eighteen fold (Cisco Mobile VNI, 2017). Security concerns are at the forefront due to the reliance on mobile devices for both business and personal use, along with…
The CSIAC Podcast » Mobile Security – Part 2 of 2
In the past five years alone, the amount of mobile data has grown eighteen fold (Cisco Mobile VNI, 2017). Security concerns are at the forefront due to the reliance on mobile devices for both business and personal use, along with…
The CSIAC Podcast » CS Digest Roundtable #3: Tricking Neural Networks, CIA Impersonation, International Data Privacy, and Encrypted Malware Detection
In today’s episode the CSIAC takes the most important articles in a past CS Digest and discusses the articles’ importance in the world of technology and cyber security.
The CSIAC Podcast » CS Digest Roundtable #5: GitHub DDoS, Marine Breach, iPhone Unlocking, and Battlefield of Things
In this episode of the CSIAC Podcast, SMEs discuss a DDos attack on GitHub, a data breach suffered by the U.S. Marine Forces Reserve, an iPhone hack, and an Army Research Lab contract for “Internet of Battlefield Things”.
The CSIAC Podcast » Reducing Your Digital Footprint
Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital footprint. The information left behind can have real-world consequences. As such it is essential that users understand how their digital…
The CSIAC Podcast » Cybersecurity Maturity Model Certification (CMMC): The Road to Compliance
The Cybersecurity Maturity Model Certification (CMMC) introduces a verification mechanism that will ensure the necessary security mechanisms are in place to better protect Controlled Unclassified Information (CUI) and other sensitive data made available to contractor organizations.
CMMC will soon be incorporated into Defense Federal Acquisition Regulation Supplement (DFARS), making it a requirement for DIB contractors that wish to be eligible for contract awards. This podcast provides an overview of CMMC for DoD contractors and subcontractors that are new to this requirement.
Leave a Comment
You must be logged in to post a comment.