• 07 Mar 2020

    Speaking engagement for ALAS in Phoenix was a big success!

    I had the opportunity to be invited to speak at the Attorney's Liability Assurance Society (ALAS) 2020 Cybersecurity Conference in Phoenix, AZ last week, and it was awesome. With a great group of 220 law firm IT leaders and general counsel professionals, I presented Beyond the Policies: Top 5 Security Findings (that I see in literally every security assessment I perform). I also served as a panelist for a lively ...

    Continue Reading...
  • 30 Apr 2019

    Healthcare’s latest (ridiculous) proposal to improve security in that industry

    For years, I've ranted about the rebranding of information security to "cybersecurity". This strategy is nothing more than a means to redirect attention - even create confusion - over what we do so that something shiny, new, and sexy can be sold to those who are buying. It's bad for what we're trying to accomplish in this field. We need less confusion rather than more. Well, here's a new set ...

    Continue Reading...
  • 21 Jun 2018

    Testimonials

    Testimonials The following are testimonials from my Fortune 500, mid-market enterprise, Internet startup, software development, state and local government, and non-profit clients. Click here for testimonials on my speaking engagements. Contact me for a proposal. I'll share with you who wrote these testimonials and show you why I'm the guy you need to hire for your vulnerability and penetration testing or security consulting needs. “Principle Logic, LLC and Kevin Beaver ...

    Continue Reading...
  • 21 Jun 2018

    Security Speaker

    Speaking Engagement Testimonials The following are testimonials on keynote presentations, seminars, webcasts and other talks I've given: "Kevin did a wonderful job of engaging the room with his keynote presentation. His communication style as it related to the topic of cybersecurity was on point to keep the attention of our audience. I saw several of our attendees with their phones up taking pictures of slides in effort to capture some ...

    Continue Reading...
  • 21 Jun 2018

    Physical Security

    Physical security You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted. Articles Keeping Resilient - Integrating Information Security with Physical Security Locking Down Today's Data Centers Progression of Convergence: Trends and Tactics The critical Web-based systems that are going untested and unsecured The importance of testing “less critical” web systems Podcasts Webcasts Locking Down the Data Center of ...

    Continue Reading...
  • 21 Jun 2018

    Management

    Information security management You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted. Articles 8 ERP security best practices to implement now How CIOs can build cybersecurity teamwork across leadership The CIO’s role in strengthening cybersecurity Top 4 information security strategy essentials CIOs need Security policies matter, but only so much Seven keys to success when working with information ...

    Continue Reading...
  • 21 Jun 2018

    Compliance

    Information security compliance You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted. Articles Understanding the Cybersecurity Maturity Model Certification (CMMC) PCI DSS compliance across retail and financial services Considerations for addressing the new PCI SSL/TLS requirements Going beyond addressable with HIPAA and doing what’s right with data encryption How security intelligence can support HIPAA compliance Why PHI access ...

    Continue Reading...
  • 21 Jun 2018

    Careers

    Information security and IT careers You may need to do a quick third-party registration to access certain ones. Resources without a hyperlink are no longer published/posted. Articles Security policies matter, but only so much Finding Success in an Information Security Career Security lessons to be learned from the COVID-19 response Security careers – what to expect in 2020 Security strategies or tactics - Where should you focus? Security professionals know ...

    Continue Reading...
  • 20 Jun 2018

    Home

    Who is Principle Logic My name is Kevin Beaver and I am the founder and principal consultant of Principle Logic, LLC. I am an independent information security (a.k.a. cybersecurity) expert and I solve problems. I help my clients protect their network systems, applications, and information assets from malicious or careless employees, criminal hackers, and unforeseen events. I've always believed that you can't secure what you don't acknowledgeSM. I focus on ...

    Continue Reading...
  • 02 May 2018

    About

    My Background I am an independent computer and information security (a.k.a. cybersecurity) consultant, professional speaker, and writer with over 36 years of experience in IT - the last 30 of which I've dedicated to security. Before starting Principle Logic in 2001, I served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations. I have appeared on CNN television and CBS Radio ...

    Continue Reading...