<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=381391698926062&amp;ev=PageView&amp;noscript=1">
//mega nav ctas

OneNeck Blog

Author: Katie McCullough, OneNeck CISO

Katie McCullough, OneNeck CISO

Katie McCullough, OneNeck CISO
Katie provides direct leadership over Information Security, Governance, Risk and Compliance (GRC). She is responsible for overseeing and driving security and compliance efforts for the company and customers. Katie is accountable for ensuring OneNeck services are built and managed according to the foundational security principles of Confidentiality, Integrity and Availability (CIA). To achieve the CIA triad, she works closely with the OneNeck teams accountable for adhering and improving services, based on key industry best practice frameworks such as ISO, ITIL and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. In addition, she oversees these teams as they work to minimize, identify and address information security risks. These teams, under Katie’s guidance, also maintain a compliance and certification portfolio that is relevant to customers including: EU–U.S. Privacy Shield Framework, General Data Protection Regulation (GDPR), SSAE 18 examinations, PCI Data Security Standard validation, and HIPAA and HITECH examinations. Prior to joining OneNeck in September 2011, Katie spent 13 years, in various technical and management roles, within the Managed Services team of a prominent Midwest IT firm. Katie holds a Bachelor of Science in Computer Science from Southern Illinois University at Carbondale.

Recent Posts by Katie McCullough, OneNeck CISO

July 09, 2019 | Security

Anatomy of Ransomware

Ransomware is a type of malware that threat actors use to infect computers and encrypt computer files until a ransom is paid. After the initial infection, ransomware will attempt to spread to as many connected systems as possible, including  file systems and other accessible systems on a business’s network.

June 04, 2019 | Security

Creating a strong external security posture is critical

Creating a strong external security posture is critical. But what can businesses do to protect their data and environments?

October 09, 2018 | Security

The Big Chinese Hack – What do we know, and what should we do?

There has been a lot of chatter the past several days around a POTENTIAL hack via a China-based manufacture chip.  Yet, despite all the clamor, there are mixed reports about how real this is.