Jackie Groark

/Jackie Groark
Jackie Groark

About Jackie Groark

Jackie Groark, Director, Security/CISO Jackie fuses a strategic view of security operations with decades of cyber threat experience as she helps customers chart a course for comprehensive business protection. Her vast cybersecurity experience enables the Veristor team to provide practical insights that help organizations defend against, and respond to cyberattacks. Jackie’s track record of driving thought leadership in IT security operations and strategies make her a worthy opponent for today’s most advanced attackers. Before being selected to fortify the Veristor practice, Jackie held cybersecurity positions at Southern Company, where she helped secure one of our nation’s most critical infrastructures - the electric grid. Her most recent role as IT Security Director of Threat Management & Intelligence involved implementing and operating critical solutions for both the infrastructure and application sides of the business. During her 25+ year career, Jackie has been praised for her ability to establish programs, build organizations and lead cross-functional teams for projects such as the complete build-out of a 24/7 security operations center, an insider threat fusion center, a 24/7 infrastructure operations center and a web infrastructure support department. Jackie earned a bachelor's degree in computer science and an MBA from The University of Southern Mississippi. When not on the battleground defeating cyber criminals, she can be found every Sunday whipping up milkshakes, frappuccinos or smoothies for middle school students in the Corner Café at Cross Pointe Church.
April 22nd, 2019|

Cybersecurity Talent Shortage Comes with a Steep Price

There are a startling 2.93 million open cybersecurity positions around the globe, according to (ISC)², and the problem is getting worse. Enterprise Strategy Group (ESG) estimates 53% of organizations report a problematic shortage of cybersecurity skills, up from 42% just three years ago. As the scale of breaches escalates and sensitive data is stolen or [...]

June 26th, 2018|

How to Start a Successful Insider Threat Program

(it takes more than just technology) Many organizations understand that insider threats pose a serious risk to security as we discussed in our previous blog. Yet out of approximately 250 professionals surveyed by Varonis1, as much as 24% have no breach detection capabilities and 40% are not able to detect when files containing sensitive data [...]

June 14th, 2018|

Preparation and Response for the Next Cybersecurity Threat

When we talk about cybersecurity breaches, we often refer to them as “the boom.” That’s probably because when an attack against an organization is successful, its destructive forces travel far, wide, and fast. But through advance preparation, including developing and maintaining an enterprise-level incident response plan, businesses can significantly reduce the impact of the next [...]

May 22nd, 2018|

An In-depth Look at Insider Threats

Cybersecurity: It’s Time to Eliminate the Weakness Within Back in the days of kings, knights, and castles, defending your fortress and securing the perimeter also involved looking in your own courtyard for threats that may already lurk within. The same is true with protecting your organization’s crown jewels today. It’s important to keep an eye [...]

February 8th, 2018|

Supporting Business Demands with a Holistic, Risk-Based Security Strategy

There’s a shift upon us in the way organizations approach their cybersecurity strategy. Where organizations once focused on meeting compliance demands, they are now prioritizing risk mitigation. Sure, compliance is still critical. Meeting mandates in the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS) must be [...]

January 9th, 2018|

Healthcare Data Breaches: What You Need to Know

Data breaches in the healthcare industry have been on the rise in recent years. Attackers are looking at new ways to infiltrate perimeters to seize and extort sensitive information on large scales. Inside leaks and human error are also contributing to this upward trend. Part of the problem is simply that it’s becoming easier for [...]

October 19th, 2017|

Endpoint Protection: The Final Layer of Ransomware Defense (let’s slam the door on this unwelcome visitor)

        Jackie Groark Director, Security / CISO — Ransomware attacks are now a fact of life that all businesses must deal with. While the recent global mega-attacks may make some think it’s a relatively new problem, it’s been around for nearly 30 years. But recently, ransomware has transformed into a very lucrative [...]

X