<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

Author: Katie McCullough, OneNeck CISO

Katie McCullough, OneNeck CISO

Katie McCullough, OneNeck CISO

Katie provides direct leadership over Information Security, Governance, Risk and Compliance (GRC). She is responsible for overseeing and driving security and compliance efforts for the company and customers. Katie is accountable for ensuring OneNeck services are built and managed according to the foundational security principles of Confidentiality, Integrity and Availability (CIA). To achieve the CIA triad, she works closely with the OneNeck teams accountable for adhering and improving services, based on key industry best practice frameworks such as ISO, ITIL and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. In addition, she oversees these teams as they work to minimize, identify and address information security risks. These teams, under Katie’s guidance, also maintain a compliance and certification portfolio that is relevant to customers including: EU–U.S. Privacy Shield Framework, General Data Protection Regulation (GDPR), SSAE 18 examinations, PCI Data Security Standard validation, and HIPAA and HITECH examinations. Prior to joining OneNeck in September 2011, Katie spent 13 years, in various technical and management roles, within the Managed Services team of a prominent Midwest IT firm. Katie holds a Bachelor of Science in Computer Science from Southern Illinois University at Carbondale.

View Full Bio

Recent Posts by Katie McCullough, OneNeck CISO

October 23, 2019 | Security

When it comes to avoiding risk, what is OneNeck doing?

Security is intrinsic to our services (for all customers) and organization (all the way to the president and CEO of our parent company TDS Inc.). It’s part of every service we develop—from start to finish. Additionally, we leverage the Critical Security Controls (CSC), outlined by the Center for Internet Security (CIS), to complete our annual...

August 27, 2019 | Security

Components of a Successful Security Practice

In its simplest form, compliance is about setting rules and following them, every time. No wavering, no audible—everyone simply follows the rules—every time. Seems easy, but it’s not always.

July 09, 2019 | Security

Anatomy of Ransomware

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file...

June 04, 2019 | Security

Creating a strong external security posture is critical

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

October 09, 2018 | Security

The Big Chinese Hack – What do we know, and what should we do?

There has been a lot of chatter the past several days around a POTENTIAL hack via a China-based manufacture chip.  Yet, despite all the clamor, there are mixed reports about how real this is.