Tag Archives: information security

A Note I Wrote to Someone Who Once Worked for Me

I recently had the honor to help provide a strong reference for a person who worked for me as a Cyber Analyst.  She got the Senior position she was going for but was just a little worried about what they should do … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Your Horse Was Analog

Your Horse Was Analog Kevin L. McLaughlin A  speech I made to 350+ people at the Michigan joint Military Ball.  Amway Grand Plaza Hotel. Like my tie? My wife didn’t – gave me a lot of grief before we left … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , | Leave a comment

Home Depot Breach 43M loss posting on LinkedIn

I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading

Aside | Posted on by | Tagged , , , , , , , , | Leave a comment

The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …

Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

A day in the life of a senior Cyber Security Incident Responder

  The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

The Cyber Security CIA explained via Calvin and Hobbes

Leave it to my son Kody, who is starting his Cyber Security career to come up with this novel way to explain the CIA triad for Cyber Security. In InfoSec terms, CIA refers to Confidentiality, Integrity, and Availability. To illustrate … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

Compliance does not Equal Security

When I read items like this: Agarwal said NoMoreRack is now in the process of certifying itself this time as a Tier-1 merchant, even though the number of credit and debit cards it processed in 2013 placed it squarely in … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Excelsior National Cyber Security Institute

In December 2013 I was named a fellow for the Excelsior National Cyber Security Institute. http://www.nationalcybersecurityinstitute.org/fellows/  

Posted in Uncategorized | Tagged , , , , | Leave a comment

Short ISO Presentation

Posted in Uncategorized | Tagged , , , | Leave a comment

Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence

  Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence By:  Kevin L. McLaughlin March 9, 2013   The amount of data available through electronic means is hard to wrap your mind around … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment