
Looking for the HORSE Project? Look no further! Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki. We would like to invite the information security community to participate in this open community project. The intention is ultimately to raise the proficiency level of information security auditors, security practitioners, lawyers and legal practitioners, financial… Read More
The Security Trifecta An Introductory Review Information Security By the Numbers The Security Trifecta Methodology Briefings The Security Trifecta: Information Security By the Numbers The Security Trifecta: We are all in the Same Boat The Security Trifecta: Collaboration Vs. Isolation The Security Trifecta: Governance, Technology and Vigilance The Security Trifecta: Source Code, Application and Systems… Read More
PenTest Magazine just released their latest issue and my article, Risky Business: IT Security Risk Management Demystified is included. You may find it here and also directly from the publisher here. Enjoy!
A very compelling multi-factor authentication method for mobility by CheckSavvy has a ground-breaking opportunity. Secure Mobile Payments, Alerts & Discounts by CheckSavvy Payment alerts by cell phone with location-based discounts on entertainment, activities, dining, lodging, shopping & getting around in 60 major languages.
Midwest Book Review’s Editor-in-Chief Jim Cox writes: “Along with the general economy, the job market crash that began in 2008 and which is starting to recover some four years later is still highly competitive and highly volatile. This is as true for executive level corporate officer as it is for the industrial line worker. Drawing… Read More
I’ve been trying out an opted-in email based campaign this month targeting University Teachers, Higher Education Teachers and Book Stores in the US with a simple message that includes links to the most common sources of information and purchasing options for one of my books, Governance Documentation and Information Technology Security Policies Demystified which makes… Read More
“One thing I learned along the way is that you must deliver something before you deliver everything in order to be successful.” – Michael D. Peters
I recently wrote an article about IT risk management and created several illustrations. One in particular stands by itself in terms of depicting a holistic view of the whole risk management life cycle in a critical path method model which I thought would be worth sharing. It would be useful to your ISO 27005 or… Read More
To appease the trademark gods, I had a whole series of images rendered to represent The Security Trifecta methodology and offerings. Here is an example: Thoughts?
I have 80 Facebook “Likes” for my author’s page located here: https://www.facebook.com/pages/Michael-D-Peters-Author/319103068141032 and I want to increase that number. As a promotional effort, I’ll be giving away a free copy of Securing the C Level for every tenth Facebook “Like” on my author’s page until this promotion ends.
mdpeters posted User:ABBIEHALDEN861.
My alma mater, Western Governors University, included a very nice alumni profile of yours truly in their spring 2012 newsletter. I have been a huge fan of WGU because of their progressive programming, competency approach to education, accessibility to non-traditional students, and significantly lower cost of education especially when compared to the outrageously ever-increasing costs to… Read More
Yesterday I received wonderful and humbling news from Kevin Richards, International President of the Information Systems Security Association that I’m being inducted into the ISSA Hall of Fame. In the realm of information security, this could probably be compared to the Hollywood Oscars. It is tremendously exciting and as I’ve mentioned, very humbling for me to… Read More
Have you ever wondered what happens to all those queries given to SIRI or IRIS on your smartphones? Millions of people should be concerned and so should public and private sector organizations. For those of you who are not up to speed on what SIRI or IRIS is, I’ll explain. Basically, they are two applications… Read More
I’m working on some new episodes for The Security Trifecta™ information security series and the introduction is pretty cool I think. It would be great to get your feedback. Here is a sample: [flv:https://michaelpeters.org/wp-content/uploads/2012/05/The-Security-Trifecta.flv 320 240]
“You never know when you are auditioning!” You have heard me say it before. I’ve written about it in my book “Securing the C Level” and here in my blog. I’ve discussed it at conferences and in presentations. But this represents the extreme end of that recommendation I had never included for consideration. Cops: Pastor… Read More
Logan, Midwest Book Review writes: “Along with the general economy, the job market crash that began in 2008 and which is starting to recover some four years later is still highly competitive and highly volatile. This is as true for executive level corporate officer as it is for the industrial line worker. Drawing upon his… Read More
John Taylor, Midwest Book Review writes: “Corporate Culture is a strange thing that often proves ludicrously difficult to understand. “Securing the C Level: Getting, Keeping, or Reclaiming that Executive Title” is a guide from Michael D. Peters as he presents an exploration of Corporate culture, as he explains its nuances to those who want to… Read More
MichaelPeters.org is now syndicated on the Security Bloggers Network! It is the best place to find the largest collection of security focused blogs all in one place on the planet. Check them out here: http://www.securitybloggersnetwork.com/
Elections for the 2012 International Board of Directors are now going on! I am a candidate for the two-year term and I would appreciate your vote as an ISSA member in good standing. There are 13 candidates vying for 5 director positions. About Me I have been an independent information security consultant, executive, researcher, author, and… Read More
Existing in the commerce galaxy, the vast majority of merchants are doing “traveling” or business without proper safety controls or rather, information security controls in place. While I know of no single solution or silver bullet that can be purchased or leveraged to ensure absolute information security, there are many ways your store and customer… Read More
The second day of MENA ISC 2012 was action packed with many great presentations. I had many engaging conversations with quite a few delegates. Discussing The Security Trifecta was of course a favorite topic of mine. What really matters was the overarching theme that was delivered by many speakers was in getting control of information… Read More
Several exceptional facets of MENA ISC 2012 became quite apparent to me during my attendance and participation in the Middle East North Africa Information Security Conference. First, what a truly impressive assembly of international security experts and delegates. People attending were engaged, inquisitive, and very collaborative which is a vital component in mastering the global… Read More