Kevin
-
Recent Posts
Archives
-
Author Archives: mclaukl
Information Security Defense in Depth Part 2 – A Bit More Technical View
Still for foundation level folks but a bit more technical view of Defense in Depth than last week’s post.
Critical Manufacturing Cyber Security Defense Program – A Starting Look
Cyber security professionals are often tasked with trying to defend more than they have the resources to defend. This is especially true in the area of Critical Manufacturing as there tends to be a strong desire to protect everything. In … Continue reading
Cyber Security – A basic look at Defense in Depth
A basic somewhat quirky and fun look at Defense in Depth.
The Highest Risk Ever….. Not!
I just received one of my daily news reports about Cyber Security and it said something to the effect of such and such a Research group has found out that Application Security holes are at highest numbers ever and … Continue reading
A Note I Wrote to Someone Who Once Worked for Me
I recently had the honor to help provide a strong reference for a person who worked for me as a Cyber Analyst. She got the Senior position she was going for but was just a little worried about what they should do … Continue reading
CIsO or ciSo?
In some big companies it does make sense to have a polished CISO who is responsible for working both the Boardroom and the IT Executive management group. In those cases a strong security focused Deputy CISO should be considered for … Continue reading
Posted in Uncategorized
Leave a comment
Your Horse Was Analog
Your Horse Was Analog Kevin L. McLaughlin A speech I made to 350+ people at the Michigan joint Military Ball. Amway Grand Plaza Hotel. Like my tie? My wife didn’t – gave me a lot of grief before we left … Continue reading
I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading
The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …
Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading
Posted in Uncategorized
Tagged compliance, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, Policy, risk, risk assessment, risk management, Security
Leave a comment
Just a Random Thought After an Information Technology (IT) Meeting
It is not the job of IT operational support staff to eliminate 100% of failures across the corporate infrastructure. (cost would be too high) It is ITs job to manage failures so that they stay within the levels of operation … Continue reading