Tag Archives: information system security

A day in the life of a senior Cyber Security Incident Responder

  The day was proving to be an exciting one for team Havoc, the Company’s cyber Red Team, as the L2 report he had just read showed that 4 of the core company servers were vulnerable to a very common … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , | Leave a comment

Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence

  Department of Homeland Security, Fusion Centers & the Cyber Security Liaison Program: A sharing of intelligence By:  Kevin L. McLaughlin March 9, 2013   The amount of data available through electronic means is hard to wrap your mind around … Continue reading

Posted in Uncategorized | Tagged , , , , | 1 Comment

Why Is It?

Why is it that Internet Crime statistics continue to show that for the criminally inclined internet crime is a very viable and fast growing field? Why is it that millions of dollars are stolen from end users who simply fail to … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

The Talent Within

11/8/2012 In his book “Topgrading: How leading companies win by hiring, coaching and keeping the best people” (2005) Dr. Smart talks about how important it is for a company to not only hire A level talent but then keep and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , | Leave a comment

In Cyber Crisis

We are a country in crisis in regards to adopting adequate Information Security practices.   I am not an alarmist but when I review the Cyber Security update that my team compiles and sends out a couple of times per week … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

A Myth of Information Security: All data needs to be protected!

When you think about the total amount of data that goes across an organization on a daily basis protecting all of it becomes a daunting, if not impossible, task. It is hard to wrap one’s mind around how much a … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Common Sense Requires No Policy

As a Senior Information Security professional I am often asked if we should have a policy that requires our Business Community members to do “X”.  In many of these cases the person is asking for a policy to be written … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Action, Not Inaction is What Being a Leader is All About

In Model-Netics methodology by Main Event Management you are taken through a management course that makes use of standard and what some would call common sense management rules to demonstrate and teach how to handle a lot of the items … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Building the Information Assurance Program

In 1948 in his book “The Seven Story Mountain”, Thomas Merton wrote “Success – the logic of worldly success rests on a fallacy:  the strange error that our perfection depends on the thought and opinions and applause of other men.” … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Non-Expiring Passwords for C Level Employees. Really?

So, the other day while teaching my Online Course in Computer Security for the University of Advancing technologies I had a student ask me what they should do if their CFO asked to have an unexpiring password in a publicly … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment