This Site Requires JavaScript Enabled.
Toolkits
  • IN Individuals Toolkit
  • SB Small Business Toolkit
  • ET Elections Toolkit
  • JO Journalists Toolkit
  • MBO Mission-Based Toolkit
Back to to Advisory Committee
Mark House

Mark House

The Associated Press
Deputy Director of Information Security

Mark House Deputy Director of Information Security, The Associated Press Mark House 25 years of combined information security and networking experience, helping organizations protect valuable assets from cyber threats, implementing global programs, and responding to cyber incidents. Over 13 of his 25 years have been spent in the media industry helping protect staff and organizational assets from a wide variety of cyber-attacks. In his role at The Associated Press, Mark leads the Information Security team with investigations into cyber-attacks against the AP and staff and is currently enhancing the organization’s risk management and compliance programs. Prior to joining the AP, Mark has worked for Dow Jones, Robert Wood Johnson University Hospital, and Circuit City Stores where he developed and implemented security programs, aided in organizational transitions, and investigated cyber-attacks and breaches.

Mark is an active member of numerous public/private initiatives between industry and law enforcement such as the CISA Election Infrastructure Security (EIS) Partnership, the U.S. Secret Service/FBI led NY/NJ Electronic Crimes Task Force, and other partnerships led by Federal and State law enforcement agencies. In his free time, Mark conducts educational sessions for school age children and adults on Internet safety and security as part of the ISC2’s Center for Cyber Security & Safety and DHS’ Internet Safety programs and is President and Executive Officer of an animal rescue non-profit whose mission is to provide freedom transports by ground or private planes to homeless, abandoned, abused, and neglected animals at risk of euthanasia in shelters across the country.

Legal Notice

GCA may provide information about third-party products or services, including security tools, videos, templates, guides, and other resources included in our cybersecurity toolkits (collectively, “Third-Party Content”). You are solely responsible for your use of Third-Party Content, and you must ensure that your use of Third-Party Content complies with all applicable laws, including applicable laws of your jurisdiction and applicable U.S. export compliance laws. We provide Third-Party Content as a service to those interested in such content. Your dealings or correspondence with third parties and your use of or interaction with any Third-Party Content are solely between you and the third party. GCA does not control or endorse, and makes no representations or warranties regarding, any Third-Party Content, and your access to and use of such Third-Party Content is at your own risk.

  • About
  • Community Forum
  • Submit a Tool
  • Privacy Policy
  • Terms of Service
  • Legal Notice
  • Artificial Intelligence Policy
    and Disclosure
  • Invest in Us

Copyright @ 2025 Global Cyber Alliance | Sitemap

Scroll to top

Tool Types

Video
Third Party Tool
Policy Document
Instructions
Third Party Scan

Time

“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.

Tool Levels

Level 1

Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.

Level 2

Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.

Level 3

Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.

Level 4

Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.

Support

Contact Us
[email protected]

Community Forum
https://community.globalcyberalliance.org/