Ready to make some changes to your information security program for 2016? You need to read these pieces I’ve recently written:
Setting and achieving realistic information security program goals for 2016
Information security’s chicken and egg problem (formerly published at toolbox.com)
Security’s gaping hole – policy enforcement (formerly published at toolbox.com)
Four reasons people aren’t buying what you’re selling in IT (formerly published at toolbox.com)
When security policies are bad for business (formerly published at toolbox.com)
Reacting vs. responding to security incidents (formerly published at toolbox.com)
Security’s greatest challenge – inaction (formerly published at toolbox.com)
Using what you’ve got to build a strong security program (formerly published at toolbox.com)
You can also check out the other information security content I’ve developed over the years on my website at www.principlelogic.com/resources.
“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.
His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”