Presentations
“Reimagining IT: A Study in IT Transformation,” EDUCAUSE Annual Conference, October 2019.
“IT Reimagined and Revitalized Through Talent and Technology,” EDUCAUSE Annual Conference, October 2019.
“Creating a Cybersecurity Strategy,” EDUCAUSE Annual Conference, October 2018.
“Strategy: If You Don’t Know Where You’re Going, You’ll Never Get There,” Security Professionals Conference, April 2018.
“What Is a Strategic CISO, and What Do You Need to Be One?”, Security Professionals Conference, May 2017.
“Successful CISO Leadership and Conflict Resolution,” Security Professionals Conference, April 2016.
“Working Together to Improve Cyberintelligence in the Big Ten,” EDUCAUSE Annual Conference, April 2016.
“The Personal Leadership Philosophy: A Valuable Leadership Tool,” EDUCAUSE Annual Conference, October 2013.
“Sourcing: Outsourcing, Open Source, and Traditional,” EDUCAUSE Annual Conference, October 2011.
“Professional Development for Managers,” EDUCAUSE Annual Conference, October 2011.
“Infrastructure Lightning Round,” EDUCAUSE Annual Conference, October 2010.
“Spotlight on Cloud Computing Series: Community Clouds,” EDUCAUSE Online, June 2010.
“StateNets Creating Opportunities During Challenging Economic Times,” Net@EDU Annual Meeting, February 2009.
“Virtual Worlds: Which Type Is Right for Your Institution?”, EDUCAUSE Midwest Regional Conference, March 2008.
“Shared Converged Services,” Net@EDU Annual Meeting, February 2008.
“Integrating Collaborative Tools,” Net@EDU Annual Meeting, February 2008.
Publications
When CISOs Are Independent of CIOs, Higher Ed Institutions Benefit, EdTech magazine, September 2019.
Cyberwarfare Podcast, Risk Group, August 2019.
“Cybersecurity Challenges Rant,” LinkedIn, https://www.linkedin.com/pulse/cybersecurity-challenges-rant-don-welch?trk=portfolio_article-card_title, May 2019.
“Cybersecurity Metrics to Help Drive Strategy,” Education Technology Insights, https://education-security.educationtechnologyinsights.com/cxoinsights/cybersecurity-metrics-to-help-drive-strategy-nid-604.html, May 2019.
“Creating a Cybersecurity Strategy for Higher Education,” EDUCAUSE Review, https://er.educause.edu/articles/2019/5/creating-a-cybersecurity-strategy-for-higher-education, May 2019.
“You’ve Been Drafted,” CIO Tech World, https://ciotechworld.com/donwelch, May 2019.
“IT Operations are the Key to Cybersecurity,” LinkedIn, https://www.linkedin.com/pulse/operations-key-cybersecurity-don-welch?trk=portfolio_article-card_title, April 2019.
“Coaching and Diversity,” LinkedIn, https://www.linkedin.com/pulse/coaching-diversity-don-welch?trk=portfolio_article-card_title, March 2019.
“Penn State’s Hack Response Event and Activities Like It Contribute to a Safer Future,” LinkedIn,
“Nation-State Threat to Higher Ed,” LinkedIn, https://www.linkedin.com/pulse/nation-state-threat-higher-ed-don-welch?trk=portfolio_article-card_title, February 2019.
“What If?”, LinkedIn, https://www.linkedin.com/pulse/what-don-welch?trk=portfolio_article-card_title, December 2018.
“Changing Leadership Styles As You Move Up,” LinkedIn, https://www.linkedin.com/pulse/changing-leadership-styles-you-move-up-don-welch?trk=portfolio_article-card_title, December 2018.
“Election Security,” LinkedIn, https://www.linkedin.com/pulse/election-security-don-welch?trk=portfolio_article-card_title, December 2018.
Security All-In Podcast, https://www.cybereason.com/security-all-in-the-ciso-podcast, October 2018.
“Accountability,” LinkedIn, https://www.linkedin.com/pulse/accountability-don-welch?trk=portfolio_article-card_title, August 2018.
“An Open Letter to Vendors,” LinkedIn, https://www.linkedin.com/pulse/open-letter-vendors-don-welch?trk=portfolio_article-card_title, August 2018.
“Security Podcasts,” LinkedIn, https://www.linkedin.com/pulse/security-podcasts-don-welch?trk=portfolio_article-card_title, August 2018.
“Table Top Exercises,” LinkedIn, https://www.linkedin.com/pulse/table-top-exercises-don-welch?trk=portfolio_article-card_title, July 2018.
“Cyber Militia,” LinkedIn, https://www.linkedin.com/pulse/cyber-militia-don-welch?trk=portfolio_article-card_title, June 2018.
“Cyber Moonshot: What Would It Take?”, LinkedIn, https://www.linkedin.com/pulse/cyber-moonshot-what-would-take-don-welch?trk=portfolio_article-card_title, June 2018.
“The Future of Cyber Security Talent,” LinkedIn, https://www.linkedin.com/pulse/future-cyber-security-talent-don-welch?trk=portfolio_article-card_title, June 2018.
“It’s Time to Set CISOs Free”, EDUCAUSE Review, https://er.educause.edu/articles/2018/6/its-time-to-set-cisos-free, June 2018.
“Enterprise Risk Management and the CISO,” LinkedIn, https://www.linkedin.com/pulse/enterprise-risk-management-ciso-don-welch?trk=portfolio_article-card_title, May 2018.
“The Optimism Bias Isn’t Always Bad,” LinkedIn, https://www.linkedin.com/pulse/optimism-bias-isnt-always-bad-don-welch?trk=portfolio_article-card_title, April 2018.
“CISOs Should Not Report to CIOs,” LinkedIn, https://www.linkedin.com/pulse/cisos-should-report-cios-don-welch?trk=portfolio_article-card_title, April 2018.
“Don Welch — Penn State University: On the Front Lines,” Toggle Magazine, https://www.togglemag.com/case-studies/don-welch-penn-state-university/, March 2018.
“Cyber Security Strategy Part 8: Communicating the Strategy,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-8-communicating-don-welch?trk=portfolio_article-card_title, January 2018.
“Cyber Security Strategy Part 7b: Cyber Security Strategy Design Framework,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-7b-design-framework-don-welch?trk=portfolio_article-card_title, January 2018.
“Cyber Security Strategy Part 7a: Cyber Security Strategy Threats and Constraints,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-7a-threats-constraints-don-welch?trk=portfolio_article-card_title, January 2018.
“Cyber Security Strategy Part 6: Strategic Environment Analysis,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-6-strategic-environment-analysis-welch?trk=portfolio_article-card_title, January 2018.
“Cyber Security Strategy Part 5: Business and IT Strategy,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-5-business-don-welch?trk=portfolio_article-card_title, December 2017.
“Cyber Security Strategy Part 4: Security Basics,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-4-basics-don-welch?trk=portfolio_article-card_title, December 2017.
“Cyber Security Strategy Part 3: Risk,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-3-risk-don-welch?trk=portfolio_article-card_title, December 2017.
“Cyber Security Strategy. Part 2: Introduction,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-2-introduction-don-welch?trk=portfolio_article-card_title, November 2017.
“Cyber Security Strategy. Part 1: Purpose,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-1-purpose-don-welch?trk=portfolio_article-card_title, November 2017.
“Virtual Worlds: Moving Beyond Today,” EDUCAUSE Review, https://er.educause.edu/articles/2008/9/virtual-worlds-moving-beyond-today September 2008.
“Information Security Through a Community of Practice: Tom Sawyer’s Approach,” EDUCAUSE Review, https://er.educause.edu/articles/2003/1/information-security-through-a-community-of-practice-tom-sawyers-approach, January 2003.