{"id":278,"date":"2015-06-16T00:00:00","date_gmt":"2015-06-16T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/"},"modified":"2024-06-10T23:03:14","modified_gmt":"2024-06-10T23:03:14","slug":"digital-memorial-tribute","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/","title":{"rendered":"Digital Memorial Tribute: Martin Zimmermann"},"content":{"rendered":"<p>By: Jane Ginn, MSIA, MRP<br \/>\nFebruary, 2015<\/p>\n<p>It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity.\u00a0 His untimely death by heart attack at a young age was a loss to all of us in the information technology field.\u00a0 I will try, in this short article, to convey some of the most important things I learned about the man as I worked with him on developing the Cyber Threat Intelligence Network.<\/p>\n<p><strong>Foundation<\/strong><\/p>\n<p>Martin grew up in Copenhagen, Denmark.\u00a0 His family also had a flat outside of Paris where he spent a lot of time as a youth.\u00a0 He was, so I\u2019m told, a sensitive young man, with a great facility for languages and computers.\u00a0 He excelled at Thai boxing and computer games and, as a young man, was proud of his stint as a disk jockey at some of the local clubs.\u00a0 In his early career he worked in the family business in the steel industry.\u00a0 During that time he realized he had a real affinity for the security aspects of computer science and taught himself everything he could about networks, computer technology and programming languages.\u00a0 People who knew him at that time realized he was compulsive about solving the most pressing problems, often having to do with a computer breach or hack, sometimes to the point of neglecting his own health and well-being.<\/p>\n<p><strong>Early Career<\/strong><\/p>\n<p>This very dedicated problem-solving attitude served Martin well has he moved into consulting services.\u00a0 As a bachelor he had total freedom to travel to client sites where he used his advanced penetration testing skills and analytical prowess to quickly and effectively solve client problems.\u00a0 He worked for several different firms, quickly advancing through the ranks because of his work ethic and dedication.\u00a0 He was somewhat short-tempered, however, and managed to antagonize people on occasion.<\/p>\n<p>Nonetheless, because of his technical prowess he was recognized by IBM as an information security \u201cthought-leader\u201d which reaffirmed his own belief in himself and his career path. He also sought and obtained multiple certifications within the cybersecurity industry.<\/p>\n<p>To manage his excess energy he trained hard at Thai Boxing and played hard in the clubs at night.\u00a0 But, by his late 30s something went terribly wrong.\u00a0 A slipped disk in his back, presumably from the long international flights and the binge working regime, caused him so much pain he sought medical relief.<\/p>\n<p><strong>The Titanium Back<\/strong><\/p>\n<p>After three successive operations to repair damage to his spine Martin found himself to be unable to maintain the constant demands of business consulting.\u00a0 In about 2008 he withdrew to a tiny, modest apartment and began living on a small pension from the Danish government.\u00a0 He spent days and nights in severe pain where the only relief he could find was to stay in a horizontal position. He became bed-ridden and his only escape was into the zeros-and-ones of his computing and electronic devices.<\/p>\n<p>Needless to say, he lost touch with most of the people he had worked with during his active years. \u00a0\u00a0During this time his only refuge was his passion for cybersecurity.\u00a0 He engaged with others frequently on social media platforms, sometimes challenging old patterns of thought and confronting others.\u00a0 By doing \u00a0this his sense of isolation was, somewhat, relieved.\u00a0 But that wasn\u2019t all.\u00a0 He knew he could not manage this state of affairs much longer, so he began to think about his legacy.<\/p>\n<p><strong>The Business<\/strong><\/p>\n<p>After about four years of on-again, off-again pain, he began to formulate an idea for a business that would, he believed, help address some of the inherent weaknesses he had begun to see in the Internet infrastructure.\u00a0 His dream was to develop an open platform that would become a trusted center of gravity for cybersecurity threat intelligence.\u00a0 He began to fulfil that dream in 2014 when he recruited me to his cause, and he and I and 12 other professionals in Europe and the US formed the Cyber Threat Intelligence Network (CTIN).<\/p>\n<p>He nurtured his social media contacts on LinkedIn and Twitter, and he maintained constant contact with virtual professional colleagues with whom he could communicate on the issues that mattered to him.\u00a0 By this time his ethical hacking prowess was recognized by Google.\u00a0 They inducted him into the Google \u201cSecurity Hall of Fame (Group Member x0xa)\u201d. Then, in 2014 he received an appointment to the prestigious ENISA Threat Landscape Stakeholders\u2019 Group.\u00a0 He began to develop a sense of hope that his dream of a CTIN might come through.\u00a0 He began to gather key people into his sphere of influence to persuade them to become part of the CTIN family.<\/p>\n<p>He believed that the STIX\/TAXII protocols for threat information sharing was the last best hope we had to facilitate human-to-machine and machine-to-machine threat intelligence sharing.\u00a0 He believed that this sharing among trust circles within the US, Europe and all the NATO countries, and between the public agencies and private sector companies would give the Internet resilience and help to counter the negative effects of cybercrime, cyber espionage, and cyber terrorism.<\/p>\n<p><strong>Last Chapter in Dante\u2019s \u2018Inferno\u2019<\/strong><\/p>\n<p>In about November of the cold Danish winter of 2014 he began to be pursued by an adversary on the Darknet; a Black Hat hacker that did not appreciate his strong advocacy for botnet take-downs and offensive countermeasures in cybersecurity.\u00a0 The worst thing to happen in the hackers\u2019 world is to be \u2018pwned\u2019\u2026.or, to have your computer taken over.\u00a0 He had apparently come up against someone that could equal his skills\u2026or rather, a group of people that could match him.\u00a0 During this time his mood slipped and at one point he said he felt like he was living in the \u201clast chapter of Dante\u2019s Inferno.\u201d<\/p>\n<p>Martin Dipo Zimmermann died of a heart attack alone in his apartment on December 10, 2014. He was 44 years old.<\/p>\n<p>The Cyber Threat Intelligence Network is his legacy.\u00a0 If you are on the side of the White Hats, I invite you to join us in honoring his legacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity.\u00a0 His untimely death by heart attack at a young age was a loss to all of us in the information technology [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[281],"tags":[148,34,282],"class_list":["post-278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberleaders","tag-cyber-security","tag-internet-freedom","tag-leader"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Digital Memorial Tribute: Martin Zimmermann - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2015-06-16T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:03:14+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Digital Memorial Tribute: Martin Zimmermann - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#blogposting\",\"name\":\"Digital Memorial Tribute: Martin Zimmermann - CTIN\",\"headline\":\"Digital Memorial Tribute: Martin Zimmermann\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Neutrality-e1548257891284.png\",\"width\":418,\"height\":191},\"datePublished\":\"2015-06-16T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:03:14+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#webpage\"},\"articleSection\":\"CyberLeaders, cyber security, internet freedom, leader\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/#listItem\",\"name\":\"Business\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/#listItem\",\"position\":3,\"name\":\"Business\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/cyberleaders\\\/#listItem\",\"name\":\"CyberLeaders\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/cyberleaders\\\/#listItem\",\"position\":4,\"name\":\"CyberLeaders\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/cyberleaders\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#listItem\",\"name\":\"Digital Memorial Tribute: Martin Zimmermann\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/#listItem\",\"name\":\"Business\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#listItem\",\"position\":5,\"name\":\"Digital Memorial Tribute: Martin Zimmermann\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/business\\\/cyberleaders\\\/#listItem\",\"name\":\"CyberLeaders\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/\",\"name\":\"Digital Memorial Tribute: Martin Zimmermann - CTIN\",\"description\":\"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/Neutrality-e1548257891284.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#mainImage\",\"width\":418,\"height\":191},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2015\\\/06\\\/16\\\/digital-memorial-tribute\\\/#mainImage\"},\"datePublished\":\"2015-06-16T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:03:14+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Digital Memorial Tribute: Martin Zimmermann - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Digital Memorial Tribute: Martin Zimmermann - CTIN","description":"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#blogposting","name":"Digital Memorial Tribute: Martin Zimmermann - CTIN","headline":"Digital Memorial Tribute: Martin Zimmermann","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2019\/01\/Neutrality-e1548257891284.png","width":418,"height":191},"datePublished":"2015-06-16T00:00:00+00:00","dateModified":"2024-06-10T23:03:14+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#webpage"},"articleSection":"CyberLeaders, cyber security, internet freedom, leader"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/#listItem","name":"Business"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/#listItem","position":3,"name":"Business","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/#listItem","name":"CyberLeaders"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/#listItem","position":4,"name":"CyberLeaders","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#listItem","name":"Digital Memorial Tribute: Martin Zimmermann"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/#listItem","name":"Business"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#listItem","position":5,"name":"Digital Memorial Tribute: Martin Zimmermann","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/#listItem","name":"CyberLeaders"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/","name":"Digital Memorial Tribute: Martin Zimmermann - CTIN","description":"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2019\/01\/Neutrality-e1548257891284.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#mainImage","width":418,"height":191},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/#mainImage"},"datePublished":"2015-06-16T00:00:00+00:00","dateModified":"2024-06-10T23:03:14+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Digital Memorial Tribute: Martin Zimmermann - CTIN","og:description":"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2015-06-16T00:00:00+00:00","article:modified_time":"2024-06-10T23:03:14+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Digital Memorial Tribute: Martin Zimmermann - CTIN","twitter:description":"By: Jane Ginn, MSIA, MRP February, 2015 It has been two months since the passing of the late Martin Dipo Zimmermann, my friend and colleague and a great contributor to the state-of-the-art in cybersecurity. His untimely death by heart attack at a young age was a loss to all of us in the information technology","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"278","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:45:02","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:54:16","updated":"2025-08-25 22:45:02"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/\" title=\"Business\">Business<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/\" title=\"CyberLeaders\">CyberLeaders<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tDigital Memorial Tribute: Martin Zimmermann\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"Business","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/"},{"label":"CyberLeaders","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/business\/cyberleaders\/"},{"label":"Digital Memorial Tribute: Martin Zimmermann","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2015\/06\/16\/digital-memorial-tribute\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=278"}],"version-history":[{"count":2,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/278\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/278\/revisions\/430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/327"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}