Cyber Security in the Rearview Mirror

Here are some interesting facts we have discovered after analyzing the 2014 security breach statistics. The number of U.S. data breaches tracked in 2014 hit a record high of 783 in 2014. This represents a substantial hike of 27.5 percent over the number of breaches reported in 2013 and a significant increase of 18.3 percent over the… Read More

Vicariously Leeching: beware of third-party crashers

A disturbing trend is emerging within the service provider space of cloud services in the form of deceptive spin doctoring and outright deceptions in plain site. If you are a consumer of any of the plethora of services available and seeking to potentially enlist the services of the myriad of contending vendors, it behooves you to… Read More

Demise of the Mighty Merchant: rampant credit card fraud and what to do about it.

In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks and card processing merchants brace for impact as litigation costs increase and stock values decrease. We have even seen top executives lose their jobs over cyber breaches. Card issuers… Read More

The Locksmith: Combating Crime Within Corporate Anywhere

Around about the time I was wrapping up my tenure as CISO for Colonial Bank back in 2009, I was reflecting on the lessons learned from being part of a company whose corporate soul was ripe with criminal intent. From a historical perspective, Colonial Bank became the largest bank failure of 2009 because of a $2,900,000,000.00 (Yes,… Read More

OSI Model Layer 8: The Carbon Layer

Just one of the many reasons my vocation and avocation is centered on information security is that things tomorrow will not be quite the same as they were today. There is always someone innovating out there for better or worse. I cannot imagine this challenge subsiding which is quite thrilling and for some, quite distressing. Any… Read More

The Death of Privacy: A Tale of Collusion and Corruption

In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we voluntarily add our behavioral attributes to the associated handlers of our digital DNA almost entirely without consideration for personal privacy. We will review… Read More

Hello Payment Card Industry (PCI) Qualified Security Assessor (QSA)

I’m honored to be joining the Payment Card Industry (PCI) Qualified Security Assessor (QSA) ranks. Credit card fraud and identity theft will always be a problem and it seems we continue to be painfully more and more aware of just how often it is breached by cyber-criminals. If you would like to know more about what… Read More

Privacy Piracy Host, Mari Frank, Esq. Interviews Michael Peters

PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG   MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS !   Here’s some background information about this… Read More

2014 Phoenix Security & Audit Conference

I’m looking forward to presenting The Death of Privacy: A Tale of Collusion and Corruption at the 2014 Phoenix Security & Audit Conference. In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we… Read More

Devil’s Due Diligence: Why your ignorance is not bliss!

  Congratulations! Felicitaciones! Mazel Tov! Gratulerer! You have been offered a new job! What a relief it’s been since your prospective employer has been putting you through the meat grinder for months. You’ve had a string of interviews that have left you exhausted and nearly breathless given you’ve been nearly holding your breath and sitting ridged… Read More

Information Systems Security Association (ISSA) elections

The Information Systems Security Association (ISSA) elections for international leadership positions has now opened. I’m running for a Director position and I’m asking ISSA members to please vote for me. As a career security professional, ISSA Hall of Fame and Fellow recipient, I have received so much value from this not-for-profit, international organization of information security professionals… Read More

Dumb Luck: Why Security Breaches Are Like Playing Russian Roulette

“The future masters of technology must be light-hearted and intelligent. The machine easily masters the grim and the dumb.” Marshall McLuhan This quote has been a long standing personal favorite because it really illustrates on many levels the need to embrace the “Life Learner” concept; always pushing to enhance your own skill-set and capabilities. It… Read More

The New Social Security: When Social Media Meets Social Engineering

The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More

Hello PCA SHOP CERTIFIED® Auditor

I’m honored to be joining the Privacy Compliance Association’s SHOP CERTIFIED® Auditor ranks. Consumer privacy, identity theft and fraud will always be a problem and it seems we continue to be painfully more aware of just how often it is breached by cyber-criminals, employees, corporate executives, rogue nations and even our own government. If you would… Read More

Human Nature – The Proverbial Thorn in the CISO’s Keaster!

While pondering the recent Target and Neiman Marcus breaches and many of those that have come before, I cannot help myself but to look for common denominators. If you compare these companies to your house, there are doors and windows that allow movement into and out of those houses. If you open a window and it… Read More

Too Many Targets! Why Target isn’t the only retailer poised for a breach.

Unless you have been living without a source for current news this week, you undoubtedly have heard the bad news about Target Corporation and how hackers breached the technological defenses and stole credit-card data for roughly 40 million customers. The media frenzy focused on Target Corporation has already spawned a dozen class-action lawsuits against the… Read More

Survival Guidance! Resource for SSAE 16 SOC 2 Readiness Audits

Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the procedural and technical controls free. This is a resource based on the SSAE 16 SOC 2 framework you may freely use to conduct your organization’s readiness audits. Your results are private and the output is sent to you without charge. It’s just… Read More

Survival Guidance! Resource for SSAE 16 SOC 1 Readiness Audits

Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the procedural and technical controls free. This is a resource based on the SSAE 16 SOC 1 framework you may freely use to conduct your organization’s readiness audits. Your results are private and the output is sent to you without charge. It’s just… Read More

Survival Guidance! FedRAMP and FISMA Resource for Assessing the Security Controls in Federal Information Systems and Organizations

Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the security controls in federal information systems and organizations free. This is a resource based on the NIST 800-53A framework you may freely use to conduct your organization’s FedRAMP, HIPAA or best practice based security audits. Your results are private and the output… Read More