I've had to turn down 3 speaking engagements the weeks of October 10th & 17th because I'm, well, speaking at other shows those weeks. Maybe it's something about the weather that time of year? Perhaps discounted meeting facility rental rates? I suspect the real reason is that all the top-notch security speakers are busy then so the conference organizers are reaching out to second stringers like me. BTW, my apologies ...
Continue Reading...Join me today in TechTarget's SearchCompliance.com virtual tradeshow: Enterprise Risk Management: Mitigation Strategies for Today's Global Enterprise My presentation "Managing Network Security Threats with an ERM Strategy" starts around 3pm ET and I'll be doing a live Q&A just after....
Continue Reading...I just spent 6.5 minutes cracking a family member's laptop password in order to demonstrate the dangers of not having whole disk encryption. I then went on to spend 20 minutes+ of my life trying to sync some new music to an iPod Touch with the unbelievably difficult iTunes interface.... After investing a lot of time (that I'll never get back, mind you) I still didn't get the music synced. ...
Continue Reading...Here's a 67 second video that defines the essence of where we are in life, our careers and even in information security today:I really like what John Wooden said:"There's a choice you have to make in everything you do. So keep in mind that in the end the choice you make makes you."I also love what John Maxwell says:"It's your personal choices. If they're good, it's going to help make ...
Continue Reading...Be it texting while driving, browsing Facebook while in a meeting or checking emails while having lunch with a friend, it seems that there's always something better for us to be doing. It's so much easier being somewhere else rather than in the moment. That's the essence of this well-written piece on Gizmodo:The Epidemic of Digital DistractionYou see there's a human epidemic that not many people really care to acknowledge ...
Continue Reading...Here's a humorous and thought-provoking post by my friend Pete Lindstrom that you should check out:Dr. Laura as Information Security OfficerIt's so easy for people to say "No" to information security rather than "How"...similar to how many people - children and adults alike - say "I can't!" rather than "How can I?".People are always going to take the path of least resistance...if you let them....
Continue Reading...Here's a piece where I, Richard Stiennon, Andrew Baker and others weigh on executive management's involvement in information security:Focus Experts’ Briefing: How CEOs Can Prepare for and Respond to CyberattacksUnless and until executives get on board with security - across the board - I'll continue reciting one of my favorite quotes:“Many executives are insulated from reality and consequently don’t know what the hell is going on.” -James Champy...
Continue Reading...This month marks 10 years since I started my information security consulting business Principle Logic. I cannot express to you how grateful I am to be so blessed.Like many businesses, things weren't all rosy from the get-go. My wife, Amy, and I worked very hard to build up the business through networking, fostering relationships and little bit of marketing sprinkled in here and there. We did that over and over ...
Continue Reading...I just got back in town from doing a video shoot on cloud security with my friends and colleagues at TechTarget in Boston (man, I love that city). Anyway, I feel compelled to share with you a few of TechTarget's websites that I write for and I know they have lots of others with all sorts of information security, compliance and IT content. Here you go:SearchCompliance.comSearchEnterpriseDesktop.comSearchEnterpriseLinux.comSearchWinIT.comSearchSQLServer.comSearchMobileComputing.comSearchSoftwareQuality.comSearchNetworking.comSearchSecurityChannel.com...all of their sites are ...
Continue Reading...Here's a great infosec quote from statesman Thomas Paine:"Our greatest enemies, the ones we must fight most often, are within."This applies to both malicious insiders and ourselves as each of us certainly tend to get in our own way when it comes to making things happen with security....
Continue Reading...