mdpeters @CDMmedia looking for Cloud Computing standards? Check out opencloudconsortium.org. Don’t relegate security to the dust bin, get educated! [#]. mdpeters Cloud Computing: Would you go to your wedding without knowing who is under the vail? Know your potential SaaS provider intimately first. [#]. mdpeters New blog post: Enclaves of Technical Excellence https://michaelpeters.org/?p=786 [#]. mdpeters… Read More
Thriving and surviving in an e…
Thriving and surviving in an economic downturn: it is a good time to be in information security.
@b2bmedia the presentation rea…
@b2bmedia the presentation really managed clearly a very complex situation. I’m looking forward to digesting the material. Kudos!
@b2bmedia the discussion could…
@b2bmedia the discussion could have gone for hours and the questions were very provoking. The evolution of the CISO is exciting.
Enclaves of Technical Excellence
I have long held that the prime objective of a security practitioner to protect the Crown Jewels that reside within a data source. It is necessary to assess our controls put in place to thwart threats to our data sources. It is vital that we construct the new perimeter directly around those databases. Gone are… Read More
Cloud Computing: Would you go …
Cloud Computing: Would you go to your wedding without knowing who is under the vail? Know your potential SaaS provider intimately first.
@CDMmedia looking for Cloud Co…
@CDMmedia looking for Cloud Computing standards? Check out opencloudconsortium.org. Don’t relegate security to the dust bin, get educated!
People ask me, “As a CISO, how…
People ask me, “As a CISO, how well do you sleepat night?” Like a baby I tell them. I get up every two hours.
Cloud Computing? Just say no t…
Cloud Computing? Just say no to immature technology.
Daily Digest for August 31st
mdpeters When business and information security are aligned, the true value of security will be apparent. [#]. mdpeters In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat. [#]. mdpeters @CDMmedia BI education seems to be the biggest utilization hurdle. This is true holistically, not just… Read More
KISS – Keep It Simple Security – 2009090101
I was reading the latest report published by Deloitte titled “The 6th Annual Global Security Survey.” I did enjoy the survey results and I do intend on using a portion to help shape my general information security strategy in my practice. Certain fundamentals are always sound and always obvious. One quote that I’ll comment on… Read More
@CDMmedia BI education seems t…
@CDMmedia BI education seems to be the biggest utilization hurdle. This is true holistically, not just when approaching BI.
In the debate concerning insid…
In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat.
When business and information …
When business and information security are aligned, the true value of security will be apparent.
Daily Digest for August 31st
mdpeters On the way to the CIO Finance Summit at the Scottsdale Arizona Four Seasons to represent the security community. [#]. mdpeters New blog post: Juris Doctor 52 of 215 https://michaelpeters.org/?p=767 [#].
Juris Doctor 52 of 215
I’ve been a bit of a slacker this past week towards my studies although that is hardly the case for the past fifty-two weeks. I added up the number of note pages I have typed and cumulatively there are in excess of six hundred pages. Law school definitely keeps the paper mills in business and… Read More
On the way to the CIO Finance …
On the way to the CIO Finance Summit at the Scottsdale Arizona Four Seasons to represent the security community.
Daily Digest for August 29th
mdpeters posted Social Computing Guidelines mdpeters posted Social Computing Guidelines mdpeters posted Social Computing Guidelines mdpeters New blog post: Social Computing Guidelines https://michaelpeters.org/?p=758 [#]. mdpeters New blog post: CIO Finance Summit 2009 https://michaelpeters.org/?p=763 [#].
CIO Finance Summit 2009
I’ll spent a few days in Scottsdale Arizona attending the CIO Finance Summit. I received an invitation to be a guest panelist for financial services information security. This will be the second time attending a CDM Media event. I’ll meet again with many of my counterparts from around the industry and made some new connections… Read More
Social Computing Guidelines
I have added a new governance document to the HORSE wiki that provides an example of a social computing and networking employee guideline. It is located here: http://lazarusalliance.com/horsewiki/index.php/Social_Computing_Guidelines Like so many of my corporate information security counterparts, the explosion of public applications available and the massive participation presents a new challenge in the presentation of… Read More
Daily Digest for August 28th
mdpeters posted Social Computing Guidelines
Daily Digest for August 26th
mdpeters posted Sample Internet Acceptable Use Policy: mdpeters posted Social Computing Guidelines
Daily Digest for August 26th
mdpeters New blog post: Laws of Power – 30 https://michaelpeters.org/?p=751 [#].
The Scene
The weakest link in my caper is most certainly the other person. – Michael D. Peters