• 21 Jun 2018

    Testimonials

    Testimonials The following are testimonials from my Fortune 500, mid-market enterprise, Internet startup, software development, state and local government, and non-profit clients. Click here for testimonials on my speaking engagements. “This is the third company where I’ve worked with Kevin Beaver. He does a quick and thorough job. Once we get the reports back, he works with us to understand any issues and can provide advice on remediation. When you ...

    Continue Reading...
  • 21 Jun 2018

    Security Speaker

    Speaking Engagement Testimonials The following are testimonials on keynote presentations, seminars, webcasts and other talks I've given: “We had the pleasure of having Kevin Beaver as our speaker for the 4th annual AYSA Spring Symposium.  AYSA (At Your service Anesthesia) is a mobile anesthesia group that provides anesthesia care to several Ambulatory Surgery Centers throughout the Atlanta metropolitan area.  Kevin spoke on two subjects: HIPAA and phishing that could have ...

    Continue Reading...
  • 21 Jun 2018

    Physical Security

    Physical security You may need to do a quick third-party registration to access certain ones. Articles Keeping Resilient - Integrating Information Security with Physical Security Locking Down Today's Data Centers Progression of Convergence: Trends and Tactics The critical Web-based systems that are going untested and unsecured The importance of testing “less critical” web systems Podcasts Webcasts Locking Down the Data Center of Tomorrow The relationship between physical and information security ...

    Continue Reading...
  • 21 Jun 2018

    Management

    Information security management You may need to do a quick third-party registration to access certain ones. Articles How CIOs can build cybersecurity teamwork across leadership The CIO’s role in strengthening cybersecurity Top 4 information security strategy essentials CIOs need Security policies matter, but only so much Seven keys to success when working with information security professionals Security lessons to be learned from the COVID-19 response Who should be responsible for ...

    Continue Reading...
  • 21 Jun 2018

    Compliance

    Information security compliance You may need to do a quick third-party registration to access certain ones. Articles Understanding the Cybersecurity Maturity Model Certification (CMMC) PCI DSS compliance across retail and financial services Considerations for addressing the new PCI SSL/TLS requirements Going beyond addressable with HIPAA and doing what’s right with data encryption How security intelligence can support HIPAA compliance Why PHI access controls matter What Changed in the New PCI ...

    Continue Reading...
  • 21 Jun 2018

    Careers

    Information security and IT careers You may need to do a quick third-party registration to access certain ones. Articles Security policies matter, but only so much Finding Success in an Information Security Career Security lessons to be learned from the COVID-19 response Security careers – what to expect in 2020 Security strategies or tactics - Where should you focus? Security professionals know everything necessary, yet incidents and breaches continue Take ...

    Continue Reading...
  • 20 Jun 2018

    Home

    Who is Principle Logic My name is Kevin Beaver and I am the founder and principal consultant of Principle Logic, LLC. I am an independent information security (a.k.a. cybersecurity) expert and I solve problems. I help my clients protect their network systems, applications, and information assets from malicious or careless employees, criminal hackers, and unforeseen events. I've always believed that you can't secure what you don't acknowledgeSM. I focus on ...

    Continue Reading...
  • 02 May 2018

    About

    My Background I am an independent information security (a.k.a. cybersecurity) consultant, expert witness, professional speaker, and writer with over 35 years of experience in IT - the last 29 of which I've dedicated to information security. Before starting Principle Logic in 2001, I served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations. I have appeared on CNN television and CBS ...

    Continue Reading...
  • 07 Aug 2017

    How to gain control & become an IoT security expert

    You've no doubt heard the vendor spiels and seen their solutions for gaining control of your Internet of Things environment. But do you truly have IoT under control? Like other things in IT, it can be pretty overwhelming, especially when you're struggling to keep your arms around your traditional network environment with cloud and mobile and all the complexities they bring. Well, IoT security doesn't have to be that difficult. It's ...

    Continue Reading...
  • 12 Dec 2016

    Trump’s an expert on hacking too, huh?

    Yesterday, soon-to-be President Donald Trump showed just how ignorant politicians can be when it comes to computer security, breaches, and hacking. Referring to the Russians interfering with our recent election, the Donald said:"Once they hack if you don't catch them in the act you're not going to catch them...They have no idea if it's Russia or China or somebody. It could be somebody sitting in a bed some place."It's interesting. ...

    Continue Reading...