Information security management

You may need to do a quick third-party registration to access certain ones.

  • Managing network security threats with an ERM strategy
  • Implementing Security with Systems Management – Best Practices for companies with fewer than 500 users – As security becomes more critical to the computing environment, businesses must look to streamline systems management. This webcast outlines the critical security issues that need to be addressed in today’s computing environment. Learn more about securing systems management in your business, including best practices for integrating security into the IT infrastructure, common systems management oversights, common security risks and the business problems they cause, and practical tips for gaining control of the IT network.
  • Hacking Your Operations for Improved Security – Many organizations test their information systems for security vulnerabilities on an ongoing basis. The problem is that’s only half the issue. There’s also security documentation, users, and various IT-related business processes that affect overall information risks just as much. In this paid webcast hosted by ComplianceOnline, learn about real-world examples and how you can use the malicious mindset to look beyond the technical weaknesses and view your information security from a broader perspective that takes the entire business in account.

Client Testimonials

“A business associate referred our company to Principle Logic when we were seeking a resource to perform vulnerability /penetration testing for our external and internal networks. We found Kevin Beaver to be professional, well informed, and easy to work with. His testing did not disrupt our networks, and his progress updates were timely.

His final report was very thorough and included security recommendations for our network environment. The executive leadership was so impressed with Kevin’s security expertise, they have extended their agreement to continue to perform periodic testing. We highly recommend Kevin Beaver and Principle Logic as a resource for network security testing.”

(IT managed services firm)


I’ve written/co-written 12 books on information security including: