Ryan LaSalle

Ryan LaSalle

Alexandria, Virginia, United States
6K followers 500+ connections

About

Currently working with high growth cyber businesses to help them address the ever…

Articles by Ryan

Activity

Join now to see all activity

Experience

  • Nisos Graphic

    Nisos

    Arlington, Virginia, United States

Education

Licenses & Certifications

Publications

  • 2021 State of Cyber Resilience

    Accenture

    In our annual survey among 4,744 global respondents around the current state of cybersecurity resilience, we found 85% of CISOs agree or strongly agree that the cybersecurity strategy is developed with business objectives, such as growth or market share, in mind. Yet, 81%, also said that “staying ahead of attackers is a constant battle and the cost is unsustainable” compared with 69% in 2020.

    Other authors
    See publication
  • 2018 State of Cyber Resilience

    Accenture

    Organizations are gaining ground on the damaging impact of targeted cyber attacks, proving that recent security investments are paying off. Despite the number of targeted cyber attacks doubling in the last year, companies are improving cyber resilience and demonstrating they can perform better under pressure. But there is more work to be done. Now is the time to build on this momentum by drawing on investment capacity to fully realize the benefits of cyber resilience. Accenture reveals five…

    Organizations are gaining ground on the damaging impact of targeted cyber attacks, proving that recent security investments are paying off. Despite the number of targeted cyber attacks doubling in the last year, companies are improving cyber resilience and demonstrating they can perform better under pressure. But there is more work to be done. Now is the time to build on this momentum by drawing on investment capacity to fully realize the benefits of cyber resilience. Accenture reveals five steps to close the gap on cyber attackers and continue to embed security into the fabric of their organizations within the next two to three years.

    See publication
  • The Cyber-Committed CEO & Board

    Dark Reading

    Here is what CISOs need to communicate to upper management about the business risks of mismanaging cybersecurity.

    See publication
  • The Cyber-Committed CEO

    Accenture

    Organizations with cyber-committed CEOs and boards can better manage cyber-risk, better protect against cyberattacks, and better leverage cybersecurity for strategic opportunities.

    Other authors
    See publication
  • The Accenture Security Index

    Accenture

    To define high performance security objectively, Accenture developed The Accenture Security Index, which assesses performance across 33 cybersecurity capabilities, at both the industry and country level, helping business leaders understand the effectiveness of their security measures. Organizations that have a clear picture of where they stand across these capabilities can then take proper measures to substantially reduce cybersecurity threats.

    Other authors
    See publication
  • Guarding and Growing Personal Data Value

    Accenture

    Organizations that demonstrate responsibility in the way they handle personal data today will lead the digital economy of tomorrow.

    Other authors
    See publication
  • If Data is Money, Why Don't Businesses Keep it Secure?

    Harvard Business Review

    4 key recommendations businesses can use to protect their most valuable asset - customer trust

    Personal data is the new currency of the digital economy. Like money, it can flow easily across borders and it commands an intrinsic value — the insight generated from personal data helps deliver benefits to individuals, businesses, and governments alike. Yet, unlike money, the market for personal data is relatively embryonic. Important questions, such as who “owns” personal data and what…

    4 key recommendations businesses can use to protect their most valuable asset - customer trust

    Personal data is the new currency of the digital economy. Like money, it can flow easily across borders and it commands an intrinsic value — the insight generated from personal data helps deliver benefits to individuals, businesses, and governments alike. Yet, unlike money, the market for personal data is relatively embryonic. Important questions, such as who “owns” personal data and what responsibilities companies have as custodians of it, are hot topics of debate. If businesses are to continue using personal data to create value for themselves and for their customers, they will need to manage it as carefully as they would money, in four key ways.

    Other authors
    See publication
  • Security Implications: Accenture Technology Vision 2014

    Accenture

    Embracing digital disruption is not the forte of most security organizations. Accenture's Security Implications paper connects the trends of tomorrow with the security practices and approaches needed to help organizations go digital.

    Other authors
    See publication
  • Intelligent Security: Defending the Digital Enterprise

    Accenture

    Despite all the resources invested in traditional information security approaches, many organizations still fall prey to cyber threats, or find they are unprepared to deal with rapidly blurring enterprise boundaries.

    A new active security stance, aligned with business priorities, can help enterprises address the changing demands of a global and mobile work force, provide proactive data protection and understand potential threats and attack vectors.

    Other authors
    See publication
  • A Privacy-Centered Economy

    Techworld.com

    As organizations look to elevate their appeal to customers, Accenture looks at privacy and how organizations enable customer control of their data as a possible dimention for comptetition.

    Other authors
    • Rafae Bhatti
    See publication
  • Surge to Meet Demand

    Techworld.com

    We explore how a security organization's need for skills, resources and horsepower is elastic and can benefit from learning lessons from the "cloud".

    See publication
  • Towards High Performance in Security

    accenture.com

    As threats grow in magnitude and sophistication, corporate security functions and chief information security officers will have to recalibrate their goals to address cyber security threats and start building the next generation of defenses. Accenture’s vision of a transformed approach to security operations is based on the use of data analytics, strategic use of existing resources and access to virtual resources. We identify the three imperatives for creating a next-generation security function…

    As threats grow in magnitude and sophistication, corporate security functions and chief information security officers will have to recalibrate their goals to address cyber security threats and start building the next generation of defenses. Accenture’s vision of a transformed approach to security operations is based on the use of data analytics, strategic use of existing resources and access to virtual resources. We identify the three imperatives for creating a next-generation security function that provides strategic value and ultimately enables high performance.

    Other authors
    See publication

Patents

  • Data Trend Analysis

    Issued US 9355172

    According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts within the data. In response to determining that co-occurrences of term and concept pairs reach a predefined threshold, the method may include adding the term and concept pairs to an ontology. The method may include logging occurrences of terms in the ontology within the data with respect to associated…

    According to an example, a method for data trend analysis may include retrieving data from data sources, associating the data with a time, and identifying co-occurrences of terms and concepts within the data. In response to determining that co-occurrences of term and concept pairs reach a predefined threshold, the method may include adding the term and concept pairs to an ontology. The method may include logging occurrences of terms in the ontology within the data with respect to associated data times, identifying a plurality of time periods, and for one of the plurality of time periods and for the logged terms, determining a first score indicative of a weighted term frequency metric for a logged term within the data during the one time period, and determining a second score indicative of a commonality of a presence of the logged term within the data among the plurality of time periods.

    See patent
  • Knowledge discovery system with user interactive analysis view for analyzing and generating relationships

    Issued US 7765176

    A knowledge model discovery system is configured to provide an interactive view having simultaneously displayed sub-views that include a relational data element view and a geophysical view. Using the interactive view, a user may perform search and analysis of information organized with a knowledge management tool in conjunction with geographic information. The relational data element view may provide a relational visualization that displays data elements provided with the knowledge management…

    A knowledge model discovery system is configured to provide an interactive view having simultaneously displayed sub-views that include a relational data element view and a geophysical view. Using the interactive view, a user may perform search and analysis of information organized with a knowledge management tool in conjunction with geographic information. The relational data element view may provide a relational visualization that displays data elements provided with the knowledge management tool as narrowed by the context of a user analysis. The geophysical view may provide a geographically based depiction of the same data elements using a similar context. The relational data element view and the geophysical view may be operated in coordination to maintain cohesiveness and similar context of the information displayed in the views.

    See patent
  • Providing human performance management data and insight

    Issued US 7,337,120

    A method that includes obtaining human performance related data from at least one remotely located application service provider, organizing the data into at least one metric, preparing an interpretation of the data and providing interactive, on-line access to the data and the interpretation.

    Other inventors
    See patent
  • Transitive Trust Network

    Issued US 7,143,052

    Methods, data structures, and systems by which entities can efficiently discover, extend, validate and establish business relationships over a digital network are disclosed. A transitive trust system can be utilized by any number of interconnected entities in which at least two of the entities are capable of sharing information. One or more entity trust lists contain, for at least two of the entities, at least one characteristic. Each characteristic can, for example, describe or pertain to the…

    Methods, data structures, and systems by which entities can efficiently discover, extend, validate and establish business relationships over a digital network are disclosed. A transitive trust system can be utilized by any number of interconnected entities in which at least two of the entities are capable of sharing information. One or more entity trust lists contain, for at least two of the entities, at least one characteristic. Each characteristic can, for example, describe or pertain to the actual or perceived dependability, reliability and/or credibility of an entity. The system also includes at least one transactional trust list that contains at least one parameter relative to an exchange between at least two of the entities through at least one degree of separation between the entities. The transactional trust list can, for example, be a listing of any type of parameters that define or describe business exchanges within a particular industry segment. The transactional trust list can also list information about the types of transactional activities that can take place and proxy actions available to cooperating entities. The system retrieves information from the entity trust list and the transactional trust list in order to provide a framework for at least two of the entities to establish relationships with one another.

    See patent

Honors & Awards

  • 2018 Washingtonian Magazine Tech Titan

    Washingtonian Magazine

    https://www.washingtonian.com/2018/09/20/tech-titans-2018-washingtons-top-tech-leaders/

Recommendations received

2 people have recommended Ryan

Join now to view

More activity by Ryan

View Ryan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Ryan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Ryan LaSalle in United States

Add new skills with these courses