Kevin
-
Recent Posts
Archives
-
Author Archives: mclaukl
I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading
The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …
Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading
Posted in Uncategorized
Tagged compliance, cyber security, Cyber Security Incident Response, Incident Response, information assurance, information security, Information Security Policy, information system security, Information Technology, Policy, risk, risk assessment, risk management, Security
Leave a comment
Just a Random Thought After an Information Technology (IT) Meeting
It is not the job of IT operational support staff to eliminate 100% of failures across the corporate infrastructure. (cost would be too high) It is ITs job to manage failures so that they stay within the levels of operation … Continue reading
A day in the life of a senior Cyber Security Incident Responder
The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading
What’s It Going to Take to Have Cyber Security?
Written by- Kevin L. and Kody T. McLaughlin If you are a Cyber Security professional do you get as mad as I do when you read and hear over and over again that Cyber Security professionals don’t have enough talent, … Continue reading
Posted in Uncategorized
Leave a comment
The Cyber Security CIA explained via Calvin and Hobbes
Leave it to my son Kody, who is starting his Cyber Security career to come up with this novel way to explain the CIA triad for Cyber Security. In InfoSec terms, CIA refers to Confidentiality, Integrity, and Availability. To illustrate … Continue reading
Compliance does not Equal Security
When I read items like this: Agarwal said NoMoreRack is now in the process of certifying itself this time as a Tier-1 merchant, even though the number of credit and debit cards it processed in 2013 placed it squarely in … Continue reading
Excelsior National Cyber Security Institute
In December 2013 I was named a fellow for the Excelsior National Cyber Security Institute. http://www.nationalcybersecurityinstitute.org/fellows/
Posted in Uncategorized
Tagged cyber security, Cyber Wargames, information assurance, information security, Security
Leave a comment
Short ISO Presentation
Posted in Uncategorized
Tagged cyber security, information assurance, information security, ISO
Leave a comment
Fun Story about UC Cyber Warfare Game
Ok, so I wasn’t going to share this but I sort of think its pretty neat. My friend Quinn and I started an urban legend story at the University of Cincinnati from my classes first cyber warfare event years ago. … Continue reading