• 21 Jun 2018

    Testimonials

    Testimonials The following are testimonials from my Fortune 500, mid-market enterprise, Internet startup, software development, state and local government, and non-profit clients. Click here for testimonials on my speaking engagements. “This is the third company where I’ve worked with Kevin Beaver. He does a quick and thorough job. Once we get the reports back, he works with us to understand any issues and can provide advice on remediation. When you ...

    Continue Reading...
  • 21 Jun 2018

    Security Speaker

    Speaking Engagement Testimonials The following are testimonials on keynote presentations, seminars, webcasts and other talks I've given: “We had the pleasure of having Kevin Beaver as our speaker for the 4th annual AYSA Spring Symposium.  AYSA (At Your service Anesthesia) is a mobile anesthesia group that provides anesthesia care to several Ambulatory Surgery Centers throughout the Atlanta metropolitan area.  Kevin spoke on two subjects: HIPAA and phishing that could have ...

    Continue Reading...
  • 21 Jun 2018

    Management

    Information security management You may need to do a quick third-party registration to access certain ones. Articles How CIOs can build cybersecurity teamwork across leadership The CIO’s role in strengthening cybersecurity Top 4 information security strategy essentials CIOs need Security policies matter, but only so much Seven keys to success when working with information security professionals Security lessons to be learned from the COVID-19 response Who should be responsible for ...

    Continue Reading...
  • 21 Jun 2018

    Compliance

    Information security compliance You may need to do a quick third-party registration to access certain ones. Articles Understanding the Cybersecurity Maturity Model Certification (CMMC) PCI DSS compliance across retail and financial services Considerations for addressing the new PCI SSL/TLS requirements (formerly published at it.toolbox.com) Going beyond addressable with HIPAA and doing what’s right with data encryption (formerly published at thalessecurity.com) How security intelligence can support HIPAA compliance (formerly published at ...

    Continue Reading...
  • 21 Jun 2018

    Careers

    Information security and IT careers You may need to do a quick third-party registration to access certain ones. Articles Security policies matter, but only so much Finding Success in an Information Security Career (formerly published at it.toolbox.com) Security lessons to be learned from the COVID-19 response Security careers – what to expect in 2020 (private IANS customer portal) Security strategies or tactics - Where should you focus? Security professionals know ...

    Continue Reading...
  • 20 Jun 2018

    Home

    Who is Principle Logic My name is Kevin Beaver and I am the founder and principal consultant of Principle Logic, LLC. I am an independent information security (a.k.a. cybersecurity) expert and I solve problems. I help my clients protect their network systems, applications, and information assets from malicious or careless employees, criminal hackers, and unforeseen events. I've always believed that you can't secure what you don't acknowledgeSM. I focus on ...

    Continue Reading...
  • 07 Aug 2017

    How to gain control & become an IoT security expert

    You've no doubt heard the vendor spiels and seen their solutions for gaining control of your Internet of Things environment. But do you truly have IoT under control? Like other things in IT, it can be pretty overwhelming, especially when you're struggling to keep your arms around your traditional network environment with cloud and mobile and all the complexities they bring. Well, IoT security doesn't have to be that difficult. It's ...

    Continue Reading...
  • 12 Dec 2016

    Trump’s an expert on hacking too, huh?

    Yesterday, soon-to-be President Donald Trump showed just how ignorant politicians can be when it comes to computer security, breaches, and hacking. Referring to the Russians interfering with our recent election, the Donald said:"Once they hack if you don't catch them in the act you're not going to catch them...They have no idea if it's Russia or China or somebody. It could be somebody sitting in a bed some place."It's interesting. ...

    Continue Reading...
  • 19 Sep 2016

    What, exactly, is reasonable security? The state of California knows!

    With all that's happening in the world of information security, it seems that there's never enough regulation. From to HIPAA to the state breach notification laws to PCI DSS and beyond, there are rules - and guidance - around every corner. Oddly enough the breaches keep occurring. As if what we've been told up to this point is not reasonable enough. Some people, mostly federal government bureaucrats and lawyers who ...

    Continue Reading...
  • 21 Jan 2015

    Øbama knows more about information security than we do

    I know it's painful to listen to our Ruler wax poetic about how great things are in America and how he's going to continue transforming society for the better...so just in case you missed last night's State of the Union and proposed initiatives, his regime wishes to "better secure" the Internet and our networks by making changes to the Computer Fraud and Abuse Act (CFAA). Here are some good reads ...

    Continue Reading...