Ready to make some changes to your information security program for 2016? You need to read these pieces I’ve recently written:
Setting and achieving realistic information security program goals for 2016
Information security’s chicken and egg problem
Security’s gaping hole – policy enforcement
Four reasons people aren’t buying what you’re selling in IT
When security policies are bad for business
Reacting vs. responding to security incidents
Security’s greatest challenge – inaction
Using what you’ve got to build a strong security program
You can also check out the other information security content I’ve developed over the years on my website at www.principlelogic.com/resources.
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”