My Background

I am an independent information security consultant, expert witness, professional speaker, and writer with over 32 years of experience in IT – the last 26 of which I’ve dedicated to information security. Before starting Principle Logic in 2001, I served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations.

I have appeared on CNN television and CBS Radio as an information security expert and have been quoted in the Wall Street Journal, Entrepreneur Magazine, Fortune Small Business, Men’s Health, Women’s Health, Woman’s Day, and Inc. Magazine’s IncTechnology.com. My work has also been referenced by the PCI Security Standards Council in their Data Security Standard Wireless Guidelines. I am a well-regarded information security speaker and have keynoted, presented workshops, and served as a panelist at seminars and conferences hundreds of times for groups such as TechTarget, Gartner, RSA, ISACA, and ALAS. Additionally, I’ve performed hundreds of webcasts for TechTarget, Ziff-Davis, and other outlets.

I have written/co-written 12 information security books including one of the all-time best-selling information security books Hacking For Dummies (currently in its 6th edition) as well as Hacking Wireless Networks For Dummies, Point-of-Sale Security For Dummies, Next-Generation IPS For Dummies, HP Converged Infrastructure For Dummies, PCI Cardholder Data Protection For Dummies, Identity & Access Management For Dummies, Securing the Mobile Enterprise For Dummies, and Laptop Encryption For Dummies (all by Wiley), The Definitive Guide to Email Management and Security and Implementation Strategies for Fulfulling and Maintaining IT Compliance (Realtimepublishers.com), as well as the brand new The Practical Guide to HIPAA Privacy and Security Compliance (2nd edition) and Healthcare Information Systems, 2nd edition (Auerbach). In addition, I am technical editor of the books Network Security For Dummies and CISSP For Dummies (Wiley) as well as over a dozen books and whitepapers for Realtimepublishers.com.

I have written 37 whitepapers and over 1,300 articles on information security. I am a regular contributor of security content for TechTarget’s SearchSecurity.com and Ziff Davis’s Toolbox.com. I have also written for Information Security Magazine, Security Technology Executive, CSOOnline.com, and Computerworld.com.

I serve as a faculty member (consultant) for the Institute of Applied Network Security (IANS) where I specialize in incident response and recovery, application security, and vulnerability management. I also serve as an Industry Advisory Board member for Kennesaw State University’s Department of Computer Engineering. I am the founder and past president of the Technology Association of Georgia’s Information Security Society.

I earned my bachelor’s degree in Computer Engineering Technology from Southern College of Technology and my master’s degree in Management of Technology from Georgia Tech. I also hold the Certified Information Systems Security Professional (CISSP) certification which I obtained in 2001.

For fun, I enjoy racing my race-prepped Mazda Miata in the Spec Miata class with the Sports Car Club of America (SCCA), riding dirt bikes, and snow skiing with my family.

 

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)

 

I’ve written/co-written 12 books on information security including: