{"id":1650,"date":"2020-08-10T13:13:24","date_gmt":"2020-08-10T18:13:24","guid":{"rendered":"http:\/\/blogs.iit.edu\/itm_loopback\/?p=1650"},"modified":"2020-08-11T12:22:26","modified_gmt":"2020-08-11T17:22:26","slug":"professor-thomas-johnson-profiled-as-idg-connect-secret-cso","status":"publish","type":"post","link":"https:\/\/blogs.iit.edu\/itm_loopback\/2020\/08\/10\/professor-thomas-johnson-profiled-as-idg-connect-secret-cso\/","title":{"rendered":"ITM Professor Thomas Johnson Profiled as IDG Connect Secret CSO"},"content":{"rendered":"<p><a href=\"https:\/\/www.idgconnect.com\/interviews\/1505762\/secret-cso-thomas-johnson-servercentral-turing-group\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.iit.edu\/itm_loopback\/files\/2020\/08\/HEADER-06-08-20-Thomas-Johnson-ServerCentral-Turing-Group-roi-1-620x354-1.png\" alt=\"\" width=\"620\" height=\"354\" \/><\/a><br \/>\n<strong>ITM Adjunct Industry Professor Thomas \u201cT.J.\u201d Johnson<\/strong> was recently profiled by the I.T. website <a href=\"https:\/\/www.idgconnect.com\/interviews\/1505762\/secret-cso-thomas-johnson-servercentral-turing-group\">IDG Connect as \u201cThe Secret CSO.\u201d<\/a> The CISO at Server Central Turing Group, as an ITM faculty member Professor Johnson is a winner of the Jeffrey Kimont Memorial Teaching Award and is a member of the ITM Curriculum Committee and the Center for Cyber Security and Forensics Education Advisory Board. He received his Master of Information Technology and Management in May 2012. Congratulations to T.J. for this recognition of his professional expertise!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ITM Adjunct Industry Professor Thomas \u201cT.J.\u201d Johnson was recently profiled by the I.T. website IDG Connect as \u201cThe Secret CSO.\u201d The CISO at Server Central Turing Group, as an ITM faculty member Professor Johnson is a winner of the Jeffrey Kimont Memorial Teaching Award and is a member of the ITM Curriculum Committee and the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1757,3869],"tags":[],"class_list":["post-1650","post","type-post","status-publish","format-standard","hentry","category-faculty","category-security"],"_links":{"self":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1650","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/comments?post=1650"}],"version-history":[{"count":6,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1650\/revisions"}],"predecessor-version":[{"id":1688,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/posts\/1650\/revisions\/1688"}],"wp:attachment":[{"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/media?parent=1650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/categories?post=1650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.iit.edu\/itm_loopback\/wp-json\/wp\/v2\/tags?post=1650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}