DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Quotes

“It doesn’t take much for hackers to piece…”

Jim Van Dyke

Reading Time: 2 mins read
in Cyber Citizens, Quotes

“It doesn’t take much for hackers to piece together your identity from online fragments.” Jim Van Dyke – Senior Vice President of Innovation at Sontiq

Source: Built in

About Jim Van Dyke:

Jim Van Dyke is Senior Vice President of Innovation at Sontiq and a former board member of the Consumer Financial Protection Bureau.

Mr. Van Dyke has led in the roles of research, product management and education at organizations ranging from Fortune 500 to startup. A frequent presenter, previous speaking venues range from US House of Representatives to keynote speaker roles at numerous industry events. Jim is known for numerous new discoveries that have resulted from his research on customer-related security, fraud, payments, and electronic financial services. Mr. Van Dyke’s published comments reach a global audience of over 40 million people per year though outlets ranging from CNN to the Financial Times.

Jim has also served as Research Director of financial services and payments efforts for Jupiter Media Metrix; product director for an Internet encryption system used by Global 1000 commercial banking firms; provided Internet products strategy at Hewlett Packard, launched an Internet banking and payments system; and worked in the creation and implementation of interactive capabilities within the supply chain industry including online point of sale, electronic transactions, and accounting applications.

Mr. Van Dyke presents before audiences ranging from the US House of Representatives, Federal Reserve Banks and numerous and numerous other professional venues. His published comments reach a global audience of over 40 million people per year though such outlets as NPR, The Wall Street Journal, Business Week, The Economist, Forbes, USA Today, The New York Times, The San Francisco Chronicle, Financial Times and American Banker. Mr. Van Dyke earned an MBA and BS in Management (both with honors), resides in the San Francisco Bay Area, serves in numerous volunteer roles, and is an avid bicyclist.

Tags: Digital FootprintDigital Footprint QuotesInfosecJim Van DykequotesSontiq
ADVERTISEMENT

Related Posts

“As long as passwords are…”

“As long as passwords are…”

March 28, 2023
“To be effective, passwords must be…”

“To be effective, passwords must be…”

March 28, 2023
“Single-word credentials are no longer safe”

“Single-word credentials are no longer safe”

March 28, 2023
“Many are under the assumption that…”

“Many are under the assumption that…”

March 28, 2023

More Articles

Advanced Security Issues of Iot Based 5g Plus Wireless Communication for Industry 4.0

April 1, 2021

Machine Learning Methods for Malware Detection

October 24, 2020
Incidents

Hive Ransomware Group Leaks Data From European Retailer

December 8, 2022
Tutorials

How can a donor vet a charity online from a cybersecurity perspective?

January 17, 2023

Cyber Security Risk Management: Impact of Legislation and Regulation

June 6, 2022
Incidents

Hong Kong Police Disrupt International Phishing Syndicate

February 8, 2023
Alerts

CISA, NSA, and ODNI Release Guidance on Securing the Software Supply Chain

November 17, 2022
Alerts

SonicWall security advisory (AV22-413)

July 25, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.