Advancing cybersecurity

Through our books, interviews, speeches, testimony and practice, we have anticipated and advanced some of the most important developments in the history of cybersecurity.

Leadership

Jack J. Domet

Jack J. Domet is a management expert with more than twenty-five years’ experience in helping multinational corporations adapt to shifts in technology, globalization, and consumerism through organizational change.

Thomas J. Parenty

Thomas J. Parenty is an international cybersecurity and privacy expert who, over the course of four decades, has worked at the National Security Agency and advised other government agencies and corporations across the globe.

Contributions to the public interest

Across four decades, Archefact Group’s founders have advanced cybersecurity practices, policy and education through consequential actions.

Timeline

1984   The Decision at NSA
1995   NIST’s Cybersecurity Beginnings
1997   Presidential Commission
1999   Encryption Export Controls
2001   NIST Oversight
2003   Trust Framework
2008   Cyber Regulations Deciphered
2012   Medical Information Protection
2019   Digital Stewardship

Practical Advice for Leaders

In collaboration with Harvard Business Review Press, Archefact Group’s founders have written two books to give boards, executive teams and managers practical advice and concrete direction to fulfill their cybersecurity responsibilities and protect their companies from cyberattack.

A Leader’s Guide to Cybersecurity

Read more

Digital Defense

Read more

Press

Dale Peterson
March 31, 2020
Unsolicited Response Podcast

The Board of Directors Role in ICS Security

Archefact Group's Thomas Parenty speaks with ICS security consultant Dale Peterson about the Board of Directors’ responsibility in business risk management.

See more
Jack Domet Tatarklubben Cyber Risk Cyber Threat Narratives
February 18, 2021
Tatarklubben

On Managing Your Company's Cyber Risks

Jack Domet talks about how you can manage your company’s cyber risks more effectively through the application of cyber threat narratives.

See more
Chief Executive
December 18, 2019
Chief Executive

The CEO’s Role In Preventing a Cyber Crisis

For Chief Executive, the Archefact founders write: "You can delegate cybersecurity, but if something goes wrong, all eyes will be on you, not your CTO."

See more
December 03, 2019
Harvard Business Review IdeaCast

Why Cybersecurity Isn’t Only a Tech Problem

In a recent HBR IdeaCast, Thomas Parenty and Jack Domet say that most organizations are approaching cybersecurity all wrong.

See more
December 13, 2019
European Business

Cybersecurity Is a Leadership Responsibility

A discussion on why cybersecurity is a leadership topic and how corporate leaders can manage cyber risks, defend their company and lead in a cyber crisis.

See more
Harvard Business Review
October 22, 2019
Harvard Business Review

HBR Magazine: Sizing Up Your Cyberrisks

Featured in the Nov/Dec issue of HBR Magazine, the Archefact founders advise: "Focus first on the threats to your key activities—not on the technology itself."

See more
The New York Times logo
May 15, 2017
The New York Times

China, Addicted to Bootleg Software, Reels From Ransomware Attack

"Using copied software and other media has become embedded in China’s computing culture...the only way I see this changing things is if the central government decides there is a risk to critical infrastructure from this threat and force people to buy legitimate software. But I don’t see that happening right now.”

See more
The Economist logo
June 23, 2005
The Economist

The Leaky Corporation

“But the problem is often a lack of understanding by senior managers not just of technology but of business processes… no one in the organisation bothers to look at the value of what data they hold, the consequences if something bad happens to it, and the appropriate mechanisms to prevent that from happening.”

See more
CNN logo
December 10, 2003
CNN

Cybersecurity Enters Boardroom

How to support an "always on" business environment, yet defend assets from cyber attack via the Internet, is now a major concern. "If you have all your protection up-to-date it still doesn't allow you to answer questions such as are my customer financial records safe or are the designs for a new product protected from competitors."

See more