Author Archives: mclaukl

Unknown's avatar

About mclaukl

Professional Certifications - Certified CISO, CISM, CISSP, PMP, ITIL Master Certified, GIAC Security Leadership Certificate (GSLC), CRISC. Kevin also holds Certificates in the Advanced Principles of Information Security and in Advanced Information Security Research Methods from Jones International University. Kevin L. McLaughlin began his career as a Special Agent for the Department of Army. He was responsible for investigating Felony crimes around the globe. He has had many careers over the years, including being a Police Officer in Kissimmee Florida, an Investigator for Mastercard/Visa, a Middle School teacher, a Director at Kennedy Space Center (where he worked with Fred Hayes, James Lovell, Armstrong, Sheppard, etc.), the President of his own company, an IT Manager and Senior Information Security manager with the Procter & Gamble (P&G) company (fortune 35), a CISO at the University of Cincinnati and a Senior Information System Security Manager for the Whirlpool Corporation (fortune 125). Kevin has also been an adjunct since 1992. While at P&G Kevin created one of P&G’s augmentation outsourcing teams in India. Kevin designed and implemented this India team and it won a global Gold Service award from Atos-Origin and has acted as a model for countless corporate relationships since. Over the years Kevin has: created an Information Security program conducted Information Security Strategic planning designed Information Security solutions, investigated over 700 Cyber cases and operated a Global Security Operations Center. • Education - MS in Computer Science Education, BS in Management of Information Systems * PhD in Cyber Security, University of Fairfax

A day in the life of a senior Cyber Security Incident Responder

  The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

What’s It Going to Take to Have Cyber Security?

Written by- Kevin L. and Kody T. McLaughlin If you are a Cyber Security professional do you get as mad as I do when you read and hear over and over again that Cyber Security professionals don’t have enough talent, … Continue reading

Posted in Uncategorized | Leave a comment

The Cyber Security CIA explained via Calvin and Hobbes

Leave it to my son Kody, who is starting his Cyber Security career to come up with this novel way to explain the CIA triad for Cyber Security. In InfoSec terms, CIA refers to Confidentiality, Integrity, and Availability. To illustrate … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Compliance does not Equal Security

When I read items like this: Agarwal said NoMoreRack is now in the process of certifying itself this time as a Tier-1 merchant, even though the number of credit and debit cards it processed in 2013 placed it squarely in … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Excelsior National Cyber Security Institute

In December 2013 I was named a fellow for the Excelsior National Cyber Security Institute. http://www.nationalcybersecurityinstitute.org/fellows/  

Posted in Uncategorized | Tagged , , , , | Leave a comment

Short ISO Presentation

Posted in Uncategorized | Tagged , , , | Leave a comment

Fun Story about UC Cyber Warfare Game

Ok, so I wasn’t going to share this but I sort of think its pretty neat. My friend Quinn and I started an urban legend story at the University of Cincinnati from my classes first cyber warfare event years ago. … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence

  Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence By:  Kevin L. McLaughlin March 9, 2013   The amount of data available through electronic means is hard to wrap your mind around … Continue reading

Posted in Uncategorized | Tagged , , , , | 2 Comments

Why Is It?

Why is it that Internet Crime statistics continue to show that for the criminally inclined internet crime is a very viable and fast growing field? Why is it that millions of dollars are stolen from end users who simply fail to … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

The Talent Within

11/8/2012 In his book “Topgrading: How leading companies win by hiring, coaching and keeping the best people” (2005) Dr. Smart talks about how important it is for a company to not only hire A level talent but then keep and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment