About
Currently working with high growth cyber businesses to help them address the ever…
Articles by Ryan
-
Partner to Protect: Cyber Defense requires collaboration with the best and the brightest
Partner to Protect: Cyber Defense requires collaboration with the best and the brightest
By Ryan LaSalle
Activity
-
I am honored to have been named to the Legal 500 2024 M&A Private Practice Powerlist, along with my partner Russ Richards. This is a credit to our…
I am honored to have been named to the Legal 500 2024 M&A Private Practice Powerlist, along with my partner Russ Richards. This is a credit to our…
Liked by Ryan LaSalle
-
Did Putin pledge Russian support for Iran in case of a US retaliation against Israel? Get the full scoop from Joedy McCreary at USA TODAY featuring…
Did Putin pledge Russian support for Iran in case of a US retaliation against Israel? Get the full scoop from Joedy McCreary at USA TODAY featuring…
Liked by Ryan LaSalle
Experience
Education
Licenses & Certifications
Publications
-
2021 State of Cyber Resilience
Accenture
In our annual survey among 4,744 global respondents around the current state of cybersecurity resilience, we found 85% of CISOs agree or strongly agree that the cybersecurity strategy is developed with business objectives, such as growth or market share, in mind. Yet, 81%, also said that “staying ahead of attackers is a constant battle and the cost is unsustainable” compared with 69% in 2020.
Other authorsSee publication -
2018 State of Cyber Resilience
Accenture
Organizations are gaining ground on the damaging impact of targeted cyber attacks, proving that recent security investments are paying off. Despite the number of targeted cyber attacks doubling in the last year, companies are improving cyber resilience and demonstrating they can perform better under pressure. But there is more work to be done. Now is the time to build on this momentum by drawing on investment capacity to fully realize the benefits of cyber resilience. Accenture reveals five…
Organizations are gaining ground on the damaging impact of targeted cyber attacks, proving that recent security investments are paying off. Despite the number of targeted cyber attacks doubling in the last year, companies are improving cyber resilience and demonstrating they can perform better under pressure. But there is more work to be done. Now is the time to build on this momentum by drawing on investment capacity to fully realize the benefits of cyber resilience. Accenture reveals five steps to close the gap on cyber attackers and continue to embed security into the fabric of their organizations within the next two to three years.
-
The Cyber-Committed CEO & Board
Dark Reading
Here is what CISOs need to communicate to upper management about the business risks of mismanaging cybersecurity.
-
The Cyber-Committed CEO
Accenture
Organizations with cyber-committed CEOs and boards can better manage cyber-risk, better protect against cyberattacks, and better leverage cybersecurity for strategic opportunities.
Other authorsSee publication -
The Accenture Security Index
Accenture
To define high performance security objectively, Accenture developed The Accenture Security Index, which assesses performance across 33 cybersecurity capabilities, at both the industry and country level, helping business leaders understand the effectiveness of their security measures. Organizations that have a clear picture of where they stand across these capabilities can then take proper measures to substantially reduce cybersecurity threats.
Other authorsSee publication -
Guarding and Growing Personal Data Value
Accenture
Organizations that demonstrate responsibility in the way they handle personal data today will lead the digital economy of tomorrow.
Other authorsSee publication -
If Data is Money, Why Don't Businesses Keep it Secure?
Harvard Business Review
4 key recommendations businesses can use to protect their most valuable asset - customer trust
Personal data is the new currency of the digital economy. Like money, it can flow easily across borders and it commands an intrinsic value — the insight generated from personal data helps deliver benefits to individuals, businesses, and governments alike. Yet, unlike money, the market for personal data is relatively embryonic. Important questions, such as who “owns” personal data and what…4 key recommendations businesses can use to protect their most valuable asset - customer trust
Personal data is the new currency of the digital economy. Like money, it can flow easily across borders and it commands an intrinsic value — the insight generated from personal data helps deliver benefits to individuals, businesses, and governments alike. Yet, unlike money, the market for personal data is relatively embryonic. Important questions, such as who “owns” personal data and what responsibilities companies have as custodians of it, are hot topics of debate. If businesses are to continue using personal data to create value for themselves and for their customers, they will need to manage it as carefully as they would money, in four key ways.Other authorsSee publication -
Security Implications: Accenture Technology Vision 2014
Accenture
Embracing digital disruption is not the forte of most security organizations. Accenture's Security Implications paper connects the trends of tomorrow with the security practices and approaches needed to help organizations go digital.
Other authorsSee publication -
Intelligent Security: Defending the Digital Enterprise
Accenture
Despite all the resources invested in traditional information security approaches, many organizations still fall prey to cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries.
A new active security stance, aligned with business priorities, can help enterprises address the changing demands of a global and mobile work force, provide proactive data protection and understand potential threats and attack vectors.Other authorsSee publication -
A Privacy-Centered Economy
Techworld.com
As organizations look to elevate their appeal to customers, Accenture looks at privacy and how organizations enable customer control of their data as a possible dimention for comptetition.
Other authors -
Surge to Meet Demand
Techworld.com
We explore how a security organization's need for skills, resources and horsepower is elastic and can benefit from learning lessons from the "cloud".
-
Towards High Performance in Security
accenture.com
As threats grow in magnitude and sophistication, corporate security functions and chief information security officers will have to recalibrate their goals to address cyber security threats and start building the next generation of defenses. Accenture’s vision of a transformed approach to security operations is based on the use of data analytics, strategic use of existing resources and access to virtual resources. We identify the three imperatives for creating a next-generation security function…
As threats grow in magnitude and sophistication, corporate security functions and chief information security officers will have to recalibrate their goals to address cyber security threats and start building the next generation of defenses. Accenture’s vision of a transformed approach to security operations is based on the use of data analytics, strategic use of existing resources and access to virtual resources. We identify the three imperatives for creating a next-generation security function that provides strategic value and ultimately enables high performance.
Other authorsSee publication
Patents
-
Data Trend Analysis
Issued US 9355172
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts within the data. In response to determining that co-occurrences of term and concept pairs reach a predefined threshold, the method may include adding the term and concept pairs to an ontology. The method may include logging occurrences of terms in the ontology within the data with respect to associated…
According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts within the data. In response to determining that co-occurrences of term and concept pairs reach a predefined threshold, the method may include adding the term and concept pairs to an ontology. The method may include logging occurrences of terms in the ontology within the data with respect to associated data times, identifying a plurality of time periods, and for one of the plurality of time periods and for the logged terms, determining a first score indicative of a weighted term frequency metric for a logged term within the data during the one time period, and determining a second score indicative of a commonality of a presence of the logged term within the data among the plurality of time periods.
-
Knowledge discovery system with user interactive analysis view for analyzing and generating relationships
Issued US 7765176
A knowledge model discovery system is configured to provide an interactive view having simultaneously displayed sub-views that include a relational data element view and a geophysical view. Using the interactive view, a user may perform search and analysis of information organized with a knowledge management tool in conjunction with geographic information. The relational data element view may provide a relational visualization that displays data elements provided with the knowledge management…
A knowledge model discovery system is configured to provide an interactive view having simultaneously displayed sub-views that include a relational data element view and a geophysical view. Using the interactive view, a user may perform search and analysis of information organized with a knowledge management tool in conjunction with geographic information. The relational data element view may provide a relational visualization that displays data elements provided with the knowledge management tool as narrowed by the context of a user analysis. The geophysical view may provide a geographically based depiction of the same data elements using a similar context. The relational data element view and the geophysical view may be operated in coordination to maintain cohesiveness and similar context of the information displayed in the views.
-
Providing human performance management data and insight
Issued US 7,337,120
A method that includes obtaining human performance related data from at least one remotely located application service provider, organizing the data into at least one metric, preparing an interpretation of the data and providing interactive, on-line access to the data and the interpretation.
Other inventorsSee patent -
Transitive Trust Network
Issued US 7,143,052
Methods, data structures, and systems by which entities can efficiently discover, extend, validate and establish business relationships over a digital network are disclosed. A transitive trust system can be utilized by any number of interconnected entities in which at least two of the entities are capable of sharing information. One or more entity trust lists contain, for at least two of the entities, at least one characteristic. Each characteristic can, for example, describe or pertain to the…
Methods, data structures, and systems by which entities can efficiently discover, extend, validate and establish business relationships over a digital network are disclosed. A transitive trust system can be utilized by any number of interconnected entities in which at least two of the entities are capable of sharing information. One or more entity trust lists contain, for at least two of the entities, at least one characteristic. Each characteristic can, for example, describe or pertain to the actual or perceived dependability, reliability and/or credibility of an entity. The system also includes at least one transactional trust list that contains at least one parameter relative to an exchange between at least two of the entities through at least one degree of separation between the entities. The transactional trust list can, for example, be a listing of any type of parameters that define or describe business exchanges within a particular industry segment. The transactional trust list can also list information about the types of transactional activities that can take place and proxy actions available to cooperating entities. The system retrieves information from the entity trust list and the transactional trust list in order to provide a framework for at least two of the entities to establish relationships with one another.
Honors & Awards
-
2018 Washingtonian Magazine Tech Titan
Washingtonian Magazine
https://www.washingtonian.com/2018/09/20/tech-titans-2018-washingtons-top-tech-leaders/
Recommendations received
2 people have recommended Ryan
Join now to viewMore activity by Ryan
-
I felt compelled to share the success of the Columbia Universiry Capstone class that I taught this semister. The students where briliant and…
I felt compelled to share the success of the Columbia Universiry Capstone class that I taught this semister. The students where briliant and…
Liked by Ryan LaSalle
-
This piece by Eric Geller in The Record from Recorded Future News does a nice job explaining the importance of the new Cyberspace, Digital…
This piece by Eric Geller in The Record from Recorded Future News does a nice job explaining the importance of the new Cyberspace, Digital…
Liked by Ryan LaSalle
-
I’m excited to have Shaun Khalfan join PayPal as our new Senior Vice President, Chief Information Security Officer! Shaun will be a key member of my…
I’m excited to have Shaun Khalfan join PayPal as our new Senior Vice President, Chief Information Security Officer! Shaun will be a key member of my…
Liked by Ryan LaSalle
-
Einstein's most advanced breakthroughs came from his ability to make conceptual linkages among different mental models. 🤯 To put it another way…
Einstein's most advanced breakthroughs came from his ability to make conceptual linkages among different mental models. 🤯 To put it another way…
Liked by Ryan LaSalle
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Ryan LaSalle in United States
-
Ryan LaSalle
Plant manager at Coastal Millwork and Supply
-
Ryan LaSalle-Castro
Senior Innovation Manager at Breakthrough Research
-
Ryan LaSalle
System Engineer at Lockheed Martin
-
Ryan LaSalle
Plant Manager at Coastal Millwork and Supply, LLC
7 others named Ryan LaSalle in United States are on LinkedIn
See others named Ryan LaSalle