Donald J. Welch, Ph.D.

Don WelchDon serves as Interim Vice President for Information Technology and Chief Information Officer at the Pennsylvania State University. He is also an Affiliate Professor in the College of Information Sciences and Technology as well as the Department of Electrical Engineering and Computer Science. Prior to being named interim VPIT/CIO, he was Chief Information Security Officer (CISO) for Penn State since 2016.

Don brings an extensive leadership background to his role, starting with his 25-year career in the U.S. Army, followed by several roles in the civilian realm.

His last position before leaving the Army was CIO and professor of computer science at the U.S. Military Academy at West Point. Some of his other assignments include tours of duty with the Army’s counterterrorist unit Delta Force, and service as the senior human resources manager for the Army’s uniformed information technology workforce.

In civilian life, he served as Chief Executive Officer of Merit Network in Michigan, which provides networking, security and community services to member organizations; Chief Technology Officer at H-E-B, a retail/distribution/manufacturing company that operates in Texas and Mexico; and Chief Information Security Officer for the University of Michigan.

Among his awards are Legion of Merit from the U.S. Army, Champion of Change by the White House, Top CEO for Michigan, and Leader and Innovator of the Year for Michigan from Grant Thornton.

Don has a bachelor of science from West Point, master of science in computer science from California Polytechnic State University (Cal Poly), and a Ph.D. in computer science from the University of Maryland.

Presentations

“Reimagining IT: A Study in IT Transformation,” EDUCAUSE Annual Conference, October 2019.

“IT Reimagined and Revitalized Through Talent and Technology,” EDUCAUSE Annual Conference, October 2019.

“Creating a Cybersecurity Strategy,” EDUCAUSE Annual Conference, October 2018.

“Strategy: If You Don’t Know Where You’re Going, You’ll Never Get There,” Security Professionals Conference, April 2018.

“What Is a Strategic CISO, and What Do You Need to Be One?”, Security Professionals Conference, May 2017.

“Successful CISO Leadership and Conflict Resolution,” Security Professionals Conference, April 2016.

“Working Together to Improve Cyberintelligence in the Big Ten,” EDUCAUSE Annual Conference, April 2016.

“The Personal Leadership Philosophy: A Valuable Leadership Tool,” EDUCAUSE Annual Conference, October 2013.

“Sourcing: Outsourcing, Open Source, and Traditional,” EDUCAUSE Annual Conference, October 2011.

“Professional Development for Managers,” EDUCAUSE Annual Conference, October 2011.

“Infrastructure Lightning Round,” EDUCAUSE Annual Conference, October 2010.

“Spotlight on Cloud Computing Series: Community Clouds,” EDUCAUSE Online, June 2010.

“StateNets Creating Opportunities During Challenging Economic Times,” Net@EDU Annual Meeting, February 2009.

“Virtual Worlds: Which Type Is Right for Your Institution?”, EDUCAUSE Midwest Regional Conference, March 2008.

“Shared Converged Services,” Net@EDU Annual Meeting, February 2008.

“Integrating Collaborative Tools,” Net@EDU Annual Meeting, February 2008.

Publications

Cyberwarfare Podcast, Risk Group, August 2019.

“Cybersecurity Challenges Rant,” LinkedIn, https://www.linkedin.com/pulse/cybersecurity-challenges-rant-don-welch?trk=portfolio_article-card_title, May 2019.

“Cybersecurity Metrics to Help Drive Strategy,” Education Technology Insights, https://education-security.educationtechnologyinsights.com/cxoinsights/cybersecurity-metrics-to-help-drive-strategy-nid-604.html, May 2019.

“Creating a Cybersecurity Strategy for Higher Education,” EDUCAUSE Review, https://er.educause.edu/articles/2019/5/creating-a-cybersecurity-strategy-for-higher-education, May 2019.

“You’ve Been Drafted,” CIO Tech World, https://ciotechworld.com/donwelch, May 2019.

“IT Operations are the Key to Cybersecurity,” LinkedIn, https://www.linkedin.com/pulse/operations-key-cybersecurity-don-welch?trk=portfolio_article-card_title, April 2019.

“Coaching and Diversity,” LinkedIn, https://www.linkedin.com/pulse/coaching-diversity-don-welch?trk=portfolio_article-card_title, March 2019.

“Penn State’s Hack Response Event and Activities Like It Contribute to a Safer Future,” LinkedIn,

https://www.linkedin.com/pulse/penn-states-hack-response-event-activities-like-contribute-don-welch?trk=portfolio_article-card_title, March 2019.

“Nation-State Threat to Higher Ed,” LinkedIn, https://www.linkedin.com/pulse/nation-state-threat-higher-ed-don-welch?trk=portfolio_article-card_title, February 2019.

“What If?”, LinkedIn, https://www.linkedin.com/pulse/what-don-welch?trk=portfolio_article-card_title, December 2018.

“Changing Leadership Styles As You Move Up,” LinkedIn, https://www.linkedin.com/pulse/changing-leadership-styles-you-move-up-don-welch?trk=portfolio_article-card_title, December 2018.

“Election Security,” LinkedIn, https://www.linkedin.com/pulse/election-security-don-welch?trk=portfolio_article-card_title, December 2018.

Security All-In Podcast, https://www.cybereason.com/security-all-in-the-ciso-podcast, October 2018.

“Accountability,” LinkedIn, https://www.linkedin.com/pulse/accountability-don-welch?trk=portfolio_article-card_title, August 2018.

“An Open Letter to Vendors,” LinkedIn, https://www.linkedin.com/pulse/open-letter-vendors-don-welch?trk=portfolio_article-card_title, August 2018.

“Security Podcasts,” LinkedIn, https://www.linkedin.com/pulse/security-podcasts-don-welch?trk=portfolio_article-card_title, August 2018.

“Table Top Exercises,” LinkedIn, https://www.linkedin.com/pulse/table-top-exercises-don-welch?trk=portfolio_article-card_title, July 2018.

“Cyber Militia,” LinkedIn, https://www.linkedin.com/pulse/cyber-militia-don-welch?trk=portfolio_article-card_title, June 2018.

“Cyber Moonshot: What Would It Take?”, LinkedIn, https://www.linkedin.com/pulse/cyber-moonshot-what-would-take-don-welch?trk=portfolio_article-card_title, June 2018.

“The Future of Cyber Security Talent,” LinkedIn, https://www.linkedin.com/pulse/future-cyber-security-talent-don-welch?trk=portfolio_article-card_title, June 2018.

“It’s Time to Set CISOs Free”, EDUCAUSE Review, https://er.educause.edu/articles/2018/6/its-time-to-set-cisos-free, June 2018.

“Enterprise Risk Management and the CISO,” LinkedIn, https://www.linkedin.com/pulse/enterprise-risk-management-ciso-don-welch?trk=portfolio_article-card_title, May 2018.

“The Optimism Bias Isn’t Always Bad,” LinkedIn, https://www.linkedin.com/pulse/optimism-bias-isnt-always-bad-don-welch?trk=portfolio_article-card_title, April 2018.

“CISOs Should Not Report to CIOs,” LinkedIn, https://www.linkedin.com/pulse/cisos-should-report-cios-don-welch?trk=portfolio_article-card_title, April 2018.

“Don Welch — Penn State University: On the Front Lines,” Toggle Magazine, https://www.togglemag.com/case-studies/don-welch-penn-state-university/, March 2018.

“Cyber Security Strategy Part 8: Communicating the Strategy,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-8-communicating-don-welch?trk=portfolio_article-card_title, January 2018.

“Cyber Security Strategy Part 7b: Cyber Security Strategy Design Framework,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-7b-design-framework-don-welch?trk=portfolio_article-card_title, January 2018.

“Cyber Security Strategy Part 7a: Cyber Security Strategy Threats and Constraints,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-7a-threats-constraints-don-welch?trk=portfolio_article-card_title, January 2018.

“Cyber Security Strategy Part 6: Strategic Environment Analysis,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-6-strategic-environment-analysis-welch?trk=portfolio_article-card_title, January 2018.

“Cyber Security Strategy Part 5: Business and IT Strategy,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-5-business-don-welch?trk=portfolio_article-card_title, December 2017.

“Cyber Security Strategy Part 4: Security Basics,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-4-basics-don-welch?trk=portfolio_article-card_title, December 2017.

“Cyber Security Strategy Part 3: Risk,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-3-risk-don-welch?trk=portfolio_article-card_title, December 2017.

“Cyber Security Strategy. Part 2: Introduction,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-2-introduction-don-welch?trk=portfolio_article-card_title, November 2017.

“Cyber Security Strategy. Part 1: Purpose,” LinkedIn, https://www.linkedin.com/pulse/cyber-security-strategy-part-1-purpose-don-welch?trk=portfolio_article-card_title, November 2017.

“Virtual Worlds: Moving Beyond Today,” EDUCAUSE Review, https://er.educause.edu/articles/2008/9/virtual-worlds-moving-beyond-today September 2008.

“Information Security Through a Community of Practice: Tom Sawyer’s Approach,” EDUCAUSE Review, https://er.educause.edu/articles/2003/1/information-security-through-a-community-of-practice-tom-sawyers-approach, January 2003.