Looking back on the past year, I have a lot to be thankful for and I think it’s important to share appreciation with those who have made an impact along the way. There has been so much growth both personally and professionally this year I wonder where 2014 actual went! The highlights and Oscar-like accolades… Read More
Survival Guidance! FedRAMP and FISMA Resource for Assessing the Security Controls in Federal Information Systems and Organizations
Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the security controls in federal information systems and organizations free. This is a resource based on the NIST 800-53A framework you may freely use to conduct your organization’s FedRAMP, HIPAA or best practice based security audits. Your results are private and the output… Read More
Pop Quiz! Test your OWASP knowledge and earn credit.
There is a frequent question I get from each of my client organizations at least twice a year and that is, “Does your organization adhere to the OWASP Top 10 and is it part of your software development life cycle (SDLC)?” Well, currently, there are no certification exams and no formal training available so how… Read More
ETA – Estimated Time of Arrival in the Android Market
I have a new application in the Android Market today called ETA located here: ETA is the awesome new way to track your favorite people. ETA, otherwise known as Estimated Time of Arrival, is a clever application that answers the question other people ask you so frequently; where are you and how long will it… Read More
Information Security By the Numbers
The Security Trifecta is a comprehensive and innovative approach to holistic security, risk, governance and privacy coverage for the enterprise. Because the methodology is universally applicable and ultimately sustainable, it has become the perfect model for any size organization regardless of business concentration. In fact, the more critical, the more regulated, the more sensitive the… Read More
Multi-factor Mobility Method
A very compelling multi-factor authentication method for mobility by CheckSavvy has a ground-breaking opportunity. Secure Mobile Payments, Alerts & Discounts by CheckSavvy Payment alerts by cell phone with location-based discounts on entertainment, activities, dining, lodging, shopping & getting around in 60 major languages.
The Security Trifecta™ episodes
I’m working on some new episodes for The Security Trifecta™ information security series and the introduction is pretty cool I think. It would be great to get your feedback. Here is a sample: [flv:https://michaelpeters.org/wp-content/uploads/2012/05/The-Security-Trifecta.flv 320 240]
Persistent Blogging 5.0
MichaelPeters.org has been in production now for five years I’m happy to convey. I anticipate may more years of sharing information that I hope is informative, insightful, amusing, collaborative, and even provoking. Thanks to everyone for reading, commenting, and growing with me along the way.
Information Systems Security Association ISSA Fellow
I have been inducted into the Information Systems Security Association (ISSA) as a Fellow. ISSA participation has been a keystone component in my personal enrichment as a career security practitioner. As a global organization, membership has brought me closer to the world’s best and brightest in the business which has value difficult to quantify. I… Read More
Like butter
Zero to done in 30 seconds flat to open a 14 character Microsoft Office 2010 document? Passware is your friend.
Persistent Blogging 3.0
MichaelPeters.org has been in production now for three years I’m happy to convey. I anticipate may more years of sharing information that I hope is informative, insightful, amusing, collaborative, and even provoking. Thanks for reading, commenting, and playing along.
HORSE Project Wiki is now on Linkedin.com
The Holistic Operational Readiness Security Evaluation, also known as the HORSE Project, is now on Linkedin.com. The original wiki is now over four years in production and continues to be a great resource. Participants benefit from potentially earning CPE credits when they write original page plus contributions to the wiki. It also looks great on… Read More
Maintenance Window
I’ll be offline from Sunday, February 14th through Wednesday, February 17th for maintenance, service relocation and the doubling of my private connection. Thanks for playing along!
ISSA Senior Member Nomination
I was humbled and honored to be nominated by the Board of Directors of the Kentuckiana ISSA chapter in Louisville Kentucky for ISSA Senior Member. I’ve been out of the Kentuckiana territory for a number of years to be the Chief Information Security Officer for Colonial Bank (Now BB&T Bank). I’ve been a member of… Read More
A horse by any other name ….
If I were to be asked by anyone which volunteer activity I am most proud of, it would be my brain-child pet project known globally as the HORSE Project. The Holistic Operational Readiness Security Evaluation (HORSE) project has been a four year commitment to the education, enlightenment, collaboration, knowledge sharing, and awareness of the global… Read More
CIO Finance Summit Closure
It is always good to visit with the folks from CDM Media in Scottsdale Arizona. I was invited to participate in a CIO Panel Discussion titled: “Security, Encryption and Fraud: Future proofing the banking system and ensuring greater consumer protection.” Scott Crawford, Managing Research Director, Security & Risk Management with EMA moderated. Mike Kearn, ISO… Read More
CIO Finance Summit 2009
I’ll spent a few days in Scottsdale Arizona attending the CIO Finance Summit. I received an invitation to be a guest panelist for financial services information security. This will be the second time attending a CDM Media event. I’ll meet again with many of my counterparts from around the industry and made some new connections… Read More
Cloud Computing: Part 2
Internet information exchange and commerce has matured to the point that we cannot imagine how we would run our businesses without technology anymore. We have created elaborate systems and constructed solid disaster recovery and business continuity mechanisms to protect our digital assets. Until recently, these Internet facing systems have resided on dedicated computers that we… Read More
Juris Doctor 37 of 215
The network has been fixed, upgrades, migrated, and virtualized. Nothing brings about change better and faster than catastrophe. I have been virtualizing and consolidating my network from thirty servers on five network segments down to five servers on three segments. I pulled four racks out of my data room and now have one. On the… Read More
Juris Doctor 36 of 215
I’m playing catch up from mid-term examinations. To add insult to injury, the network is misbehaving which takes time that I would devote to other things and apply it to quenching my inner geek.
Sam Snyder
I recently became aware of Sam Snyder who has taken in interest in indexing what he deems as successful professionals. His blog is here: http://www.bigwinner.org/about/. He created a web site that is one of the world’s most extensive sources of advice and insights from top entrepreneurs, executives, and investors. It’s located at: http://www.bigwinner.org I appreciate… Read More
CIO Finance Summit 2008
A spent nearly a week in Scottsdale Arizona attending the CIO Finance Summit. I received an invitation to be a guest panelist for financial services information security. I met many of my peers around the industry and made some good connections with folks that I am sure will provide mutually beneficial situations down the road.… Read More
New adventures
We are leaving Louisville Kentucky destine for Montgomery Alabama this month. New schools, new jobs, paradigm shifts for everyone concerned.
SafetyNET
SafetyNET is my Intrusion Prevention System (IPS) project now in its fourth year of customer deployment. Human error has been engineered out and absolute security engineered in.