My name is Kevin Beaver and I am the founder and principal consultant of Principle Logic, LLC. I am an independent information security (a.k.a. cybersecurity) expert and I solve problems. I help my clients protect their network systems, applications, and information assets from malicious or careless employees, criminal hackers, and unforeseen events.
I’ve always believed that you can’t secure what you don’t acknowledgeSM. I focus on performing realistic information security assessments that help you find the weaknesses that count – the vital few rather than the trivial many. This approach will help you take the pain out of your compliance requirements, and most importantly, minimize your business risks. See what my clients have to say about my work.
I have over 34 years of experience in IT – 28 of which have been in information security. For the past two decades I’ve worked for myself full-time as an information security consultant, writer, professional speaker, and expert witness. See my bio page for more about my background and my resources page for links to the books, articles, whitepapers, webcasts, and videos I’ve written and recorded. You can also view my information security blog here.
I can help you with the following:
If you want the services of an information security expert who can assess your business’s information security from an unbiased outsider’s perspective, an expert witness to help you with your case, a writer to help you develop information security content, or a well-known speaker for a keynote address, seminar, panel, or webcast I can assist you. See my services page for more details.
The people who hire me need specific expertise and assistance navigating the information security and compliance puzzles with the longer-term goal of minimizing business risks. My clients include internal auditors, IT managers, compliance officers, business owners and CTOs/CIOs/CISOs at Fortune 1000 corporations, banks, non-profits, software development firms, IT and security vendors, credit unions, 911 operations centers, small businesses, universities and municipal government agencies. I also perform subcontract work for IT and security systems integrators and consulting firms, including whitelabeled vulnerability and penetration testing and virtual CISO work. I’ve gained a ton of insight and experience working for clients across every major industry – and bring that wisdom to the work I’ll do for you.
I don’t chase trends or fads in security. I’ll help you with the proven information security principles – many of which have been around for decades – you can build out your information security program without having to recreate the wheel.
I don’t have “CEO” or “President” on my business card. I’m not a hands-off “analyst” calling the shots from the sidelines either. I’m a hands-on practitioner. I focus on being street smart and practical in my work. I’m a technical engineer at heart that equally understands the business side of IT and information security. I don’t sell or install security products. I focus solely on performing assessments, making recommendations for remediation and then stepping away. This eliminates any conflicts of interest. I don’t claim to be everything to everyone but I am confident in my information security skills.
I’m not an auditor. I come in peace. I won’t beat you up but rather show you what you’re not seeing. I deliver reports to make you look good – and help you get better. I go beyond the checklists and basic vulnerability scans. I provide a custom analysis of the weaknesses that matter in your environment – the ones that the regulators, your business partners, your auditors, and your customers want to know about.
My security assessments are different from commoditized (crowdsourced) vulnerability scans or niche pen tests that are of minimal value. I’m of the belief that quality work and deliverables make all the difference – just like what my clients are saying. Proper security testing can’t be outsourced to a third-party cloud service or overseas techies who don’t understand your business and goals.
I sell advice. I’ll show you where you are now and where you need to be. You’ll see immediate payback and dramatic improvements in your information security program over the long haul like my other clients have. The good news is that you won’t have to worry about completely retooling your systems and operations based on what I find. Contrary to common recommendations, most information security weaknesses have simple solutions that don’t have to be complicated or expensive. I’ll educate you on what’s relevant now and, more importantly, what you actually need in order to minimize your security risks.
My formal education in engineering and business management combined with over two decades of hands-on technical experience allows me to provide practical recommendations that make good long-term business sense. I won’t deliver a thick, fluffed-up report that looks pretty on the outside with no substance on the inside. I’ll tell you just what you need to know – in a way that’s easy for you and your team to understand.
I’m a Certified Information Systems Security Professional – CISSP – the industry standard and highest-level certification in my field. When it comes to my expert witness work and speaking engagements I’m also a great communicator who can filter reality and facts from the hype and noise and present it in a way that everyone understands. Don’t take my word for any of this. See what my clients have to say.
Perhaps most importantly, I’ve been doing my own thing working for myself since 2001. I’m going to keep it that way so you’ll know I’ll be around for the long haul.
I’m committed to being an information security expert who provides a human touch, is easy to reach, and is enjoyable to do business with before, during and after the sale. When you bring me on board you’re going to get:
You’ll start and end up with someone that knows your business, your network, and your needs and offers practical advice on dealing with the information security risks at hand. If we determine that your project requires greater resources than one person can handle, I’ll pull in other industry leaders I’ve worked with and have grown to trust to ensure your work is completed in a prompt and professional manner. Either way, you’ll deal with one email address, one phone number, and one person period.
The bottom line is that I have performed the hands-on work , written the books, given the speeches, and taught the classes to form a solid reputation for my information security expertise, leadership in the industry, and ongoing customer loyalty. You’ll be truly pleased.