Tag Archives: information system security

I just read an article on LinkedIn about the negative impact caused by the recent Home Depot breach. Here are my thoughts about how all the 2014 breaches should change some C level and Information Security paradigms. These could cause a major … Continue reading

Posted on by mclaukl | Leave a comment

The Insider Threat is Alive and Well – a summary taken directly from Raytheon’s How to Build an Insider Threat Program (2014) …

Aspects of human nature further complicate matters: Well-intended managers resist any notions of “their people” doing “bad things.” They screened them. They hired them. They work with them side-by-side and – if they’re good bosses – have developed a genuine interest … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , , | Leave a comment

A day in the life of a senior Cyber Security Incident Responder

  The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence

  Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence By:  Kevin L. McLaughlin March 9, 2013   The amount of data available through electronic means is hard to wrap your mind around … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Why Is It?

Why is it that Internet Crime statistics continue to show that for the criminally inclined internet crime is a very viable and fast growing field? Why is it that millions of dollars are stolen from end users who simply fail to … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

The Talent Within

11/8/2012 In his book “Topgrading: How leading companies win by hiring, coaching and keeping the best people” (2005) Dr. Smart talks about how important it is for a company to not only hire A level talent but then keep and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

In Cyber Crisis

We are a country in crisis in regards to adopting adequate Information Security practices.   I am not an alarmist but when I review the Cyber Security update that my team compiles and sends out a couple of times per week … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

A Myth of Information Security: All data needs to be protected!

When you think about the total amount of data that goes across an organization on a daily basis protecting all of it becomes a daunting, if not impossible, task. It is hard to wrap one’s mind around how much a … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Common Sense Requires No Policy

As a Senior Information Security professional I am often asked if we should have a policy that requires our Business Community members to do “X”.  In many of these cases the person is asking for a policy to be written … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Action, Not Inaction is What Being a Leader is All About

In Model-Netics methodology by Main Event Management you are taken through a management course that makes use of standard and what some would call common sense management rules to demonstrate and teach how to handle a lot of the items … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment