TakeDownCon 2015 Keynote Address

I’m honored to be invited to EC-Council’s TakeDownCon keynote speaker for the 2015 event. TakeDownCon brings together information security researchers and technical experts from corporate to underground industries, to a unique “Ethical Hacking” conference. In two days, they will present and debate the latest security threats, disclose current vulnerabilities, and share information crucial to the… Read More

Proactive vs Reactive Cyber Security on Money Radio

Recently Michael Peters, CEO of Lazarus Alliance, spent time with David Cogan of Money Radio and eLiances discussing the differences between proactive cyber security and reactive cyber security. You can replay the broadcast as heard on money radio. An overview of the discussion was when you think cyber security, what comes to your mind first? I’ve… Read More

Resistance is NOT Futile for Cyber Insurance Casualty Insurers.

If you think that the business general liability or even purpose built cyber insurance policies will cover you in the event of a cyber-security breach, it’s highly likely you are mistaken. In fact, it is in your carriers best business interest to deny your claim. Chances are the exemptions in your policy exclude coverage for… Read More

CIO Review: Lazarus Alliance has been shortlisted for 20 Most Promising Capital Market Technology Solution Providers

It’s always rewarding when your work and accomplishments are recognized especially when it comes without warning. Like I tell people, “You never know when you are auditioning!” The message from CIO Review included: CIO Review : Lazarus Alliance has been shortlisted for 20 Most Promising Capital Market Technology Solution Providers In the last few months… Read More

Low-Hanging Fruit Anyone? Why cyber-criminals are looking for you.

Cyber-crime is largely a crime of opportunity. Just like a burglar cases the neighborhood looking for easy pickings. Cyber-criminals case the Internet looking for victims who make it easier to steal from them, the companies they lead or belong to. By adhering to the Security Trifecta® and implementing a proactive cyber security strategy based in… Read More

Did you know that there are only four types of cyber security incidents?

My career has been devoted to both the art and the science behind information security. When I speak of the science, I am referring to the technology and the process we immerse ourselves into as we set about securing our organizations we are charged with protecting. When I speak about the art, I am referring… Read More

Do Cyber Security Breaches Determine Your Fate?

Over the past year we have seen corporate cyber security breaches decimating business value, killing companies and ending careers. Even at the highest levels within the largest corporations, no one is exempt from the damage a cyber security breach causes. Outside of traditional global war, never before have we experiences technological war quite like the… Read More

The Fallacy of Despair: Why your security breach is not inevitable!

There is a growing sentiment within the business community that a security breach affecting their company is inevitable. This is perpetuated by security professionals and providers or services and products who reinforce this mythos with statements resembling: “It’s not if your company is going to be breached but when your company is going to be… Read More

Cyber Security in the Rearview Mirror

Here are some interesting facts we have discovered after analyzing the 2014 security breach statistics. The number of U.S. data breaches tracked in 2014 hit a record high of 783 in 2014. This represents a substantial hike of 27.5 percent over the number of breaches reported in 2013 and a significant increase of 18.3 percent over the… Read More

Vicariously Leeching: beware of third-party crashers

A disturbing trend is emerging within the service provider space of cloud services in the form of deceptive spin doctoring and outright deceptions in plain site. If you are a consumer of any of the plethora of services available and seeking to potentially enlist the services of the myriad of contending vendors, it behooves you to… Read More

Demise of the Mighty Merchant: rampant credit card fraud and what to do about it.

In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks and card processing merchants brace for impact as litigation costs increase and stock values decrease. We have even seen top executives lose their jobs over cyber breaches. Card issuers… Read More

The Locksmith: Combating Crime Within Corporate Anywhere

Around about the time I was wrapping up my tenure as CISO for Colonial Bank back in 2009, I was reflecting on the lessons learned from being part of a company whose corporate soul was ripe with criminal intent. From a historical perspective, Colonial Bank became the largest bank failure of 2009 because of a $2,900,000,000.00 (Yes,… Read More

OSI Model Layer 8: The Carbon Layer

Just one of the many reasons my vocation and avocation is centered on information security is that things tomorrow will not be quite the same as they were today. There is always someone innovating out there for better or worse. I cannot imagine this challenge subsiding which is quite thrilling and for some, quite distressing. Any… Read More

The Death of Privacy: A Tale of Collusion and Corruption

In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we voluntarily add our behavioral attributes to the associated handlers of our digital DNA almost entirely without consideration for personal privacy. We will review… Read More

Hello Payment Card Industry (PCI) Qualified Security Assessor (QSA)

I’m honored to be joining the Payment Card Industry (PCI) Qualified Security Assessor (QSA) ranks. Credit card fraud and identity theft will always be a problem and it seems we continue to be painfully more and more aware of just how often it is breached by cyber-criminals. If you would like to know more about what… Read More

Privacy Piracy Host, Mari Frank, Esq. Interviews Michael Peters

PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG   MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS !   Here’s some background information about this… Read More

2014 Phoenix Security & Audit Conference

I’m looking forward to presenting The Death of Privacy: A Tale of Collusion and Corruption at the 2014 Phoenix Security & Audit Conference. In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we… Read More