There is a huge difference in the very traditional methodology used by almost all audit firms and the proactive constant auditing methodology used by Lazarus Alliance. This infographic explains those differences along with shining a little light on some dirty techniques used by the big expensive bully firms.
Cyber Security Comes In Only Two Flavors
When you think cyber security, what comes to your mind first? I’ve posed that question to many an audience over the years and most frequently the response is what folks see on the nightly news or through some new source. Recently people will respond with examples such as Home Depot, Target, Sony, JP Morgan and the… Read More
Looking back on 2014
Looking back on the past year, I have a lot to be thankful for and I think it’s important to share appreciation with those who have made an impact along the way. There has been so much growth both personally and professionally this year I wonder where 2014 actual went! The highlights and Oscar-like accolades… Read More
The Locksmith: Combating Crime Within Corporate Anywhere
Around about the time I was wrapping up my tenure as CISO for Colonial Bank back in 2009, I was reflecting on the lessons learned from being part of a company whose corporate soul was ripe with criminal intent. From a historical perspective, Colonial Bank became the largest bank failure of 2009 because of a $2,900,000,000.00 (Yes,… Read More
OSI Model Layer 8: The Carbon Layer
Just one of the many reasons my vocation and avocation is centered on information security is that things tomorrow will not be quite the same as they were today. There is always someone innovating out there for better or worse. I cannot imagine this challenge subsiding which is quite thrilling and for some, quite distressing. Any… Read More
The Death of Privacy: A Tale of Collusion and Corruption
In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we voluntarily add our behavioral attributes to the associated handlers of our digital DNA almost entirely without consideration for personal privacy. We will review… Read More
Hello Payment Card Industry (PCI) Qualified Security Assessor (QSA)
I’m honored to be joining the Payment Card Industry (PCI) Qualified Security Assessor (QSA) ranks. Credit card fraud and identity theft will always be a problem and it seems we continue to be painfully more and more aware of just how often it is breached by cyber-criminals. If you would like to know more about what… Read More
Privacy Piracy Host, Mari Frank, Esq. Interviews Michael Peters
PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS ! Here’s some background information about this… Read More
2014 Phoenix Security & Audit Conference
I’m looking forward to presenting The Death of Privacy: A Tale of Collusion and Corruption at the 2014 Phoenix Security & Audit Conference. In our technically advancing world, our personal privacy expectations must be reconsidered, re-conceived and redefined. We all expose ourselves through swipes, transactions, likes and tweets. Through handsets, television sets and mindsets, we… Read More
If You Ignore Security Vulnerabilities, They Go Away!
I was recently contacted by the CEO of an upstart company in the business health insurance space who wanted my company to enroll. While there were many compelling reasons to join forces with them, as any responsible executive would do, I wanted to know more about how my private data would be protected while in… Read More
Devil’s Due Diligence: Why your ignorance is not bliss!
Congratulations! Felicitaciones! Mazel Tov! Gratulerer! You have been offered a new job! What a relief it’s been since your prospective employer has been putting you through the meat grinder for months. You’ve had a string of interviews that have left you exhausted and nearly breathless given you’ve been nearly holding your breath and sitting ridged… Read More
Information Systems Security Association (ISSA) elections
The Information Systems Security Association (ISSA) elections for international leadership positions has now opened. I’m running for a Director position and I’m asking ISSA members to please vote for me. As a career security professional, ISSA Hall of Fame and Fellow recipient, I have received so much value from this not-for-profit, international organization of information security professionals… Read More
Dumb Luck: Why Security Breaches Are Like Playing Russian Roulette
“The future masters of technology must be light-hearted and intelligent. The machine easily masters the grim and the dumb.” Marshall McLuhan This quote has been a long standing personal favorite because it really illustrates on many levels the need to embrace the “Life Learner” concept; always pushing to enhance your own skill-set and capabilities. It… Read More
CISO Short List
Honored to make the CISO short list with esteemed colleagues! Thank you CEO World Magazine
The New Social Security: When Social Media Meets Social Engineering
The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More
Hello PCA SHOP CERTIFIED® Auditor
I’m honored to be joining the Privacy Compliance Association’s SHOP CERTIFIED® Auditor ranks. Consumer privacy, identity theft and fraud will always be a problem and it seems we continue to be painfully more aware of just how often it is breached by cyber-criminals, employees, corporate executives, rogue nations and even our own government. If you would… Read More
Human Nature – The Proverbial Thorn in the CISO’s Keaster!
While pondering the recent Target and Neiman Marcus breaches and many of those that have come before, I cannot help myself but to look for common denominators. If you compare these companies to your house, there are doors and windows that allow movement into and out of those houses. If you open a window and it… Read More
Too Many Targets! Why Target isn’t the only retailer poised for a breach.
Unless you have been living without a source for current news this week, you undoubtedly have heard the bad news about Target Corporation and how hackers breached the technological defenses and stole credit-card data for roughly 40 million customers. The media frenzy focused on Target Corporation has already spawned a dozen class-action lawsuits against the… Read More
Survival Guidance! Resource for SSAE 16 SOC 2 Readiness Audits
Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the procedural and technical controls free. This is a resource based on the SSAE 16 SOC 2 framework you may freely use to conduct your organization’s readiness audits. Your results are private and the output is sent to you without charge. It’s just… Read More
Survival Guidance! Resource for SSAE 16 SOC 1 Readiness Audits
Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the procedural and technical controls free. This is a resource based on the SSAE 16 SOC 1 framework you may freely use to conduct your organization’s readiness audits. Your results are private and the output is sent to you without charge. It’s just… Read More
Survival Guidance! FedRAMP and FISMA Resource for Assessing the Security Controls in Federal Information Systems and Organizations
Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for assessing the security controls in federal information systems and organizations free. This is a resource based on the NIST 800-53A framework you may freely use to conduct your organization’s FedRAMP, HIPAA or best practice based security audits. Your results are private and the output… Read More
Survival Guidance! Resource for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule.
HIPAA Survival Guidance! MichaelPeters.org and LazarusAlliance.com is making our auditor’s resource for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule free. This is a resource you may freely use to conduct your organization’s HIPAA security audits. Your results are private and the output is sent to you without charge. It’s just on… Read More
A Decade of SOX: Knowledge is your friend; Ignorance is your enemy
We are well past a decade now living with the Sarbanes Oxley Act. As one might expect, corporations, employees and auditors alike have become acclimated to the requirements so much so that the process is routine. The upside to this is that people supporting a SOX audit are pretty comfortable with the expectations and requirements.… Read More
The Truth about ID Theft: No fear mongering, no snake oil, just simple advice.
After years of advising corporations, investment firms and being directly involved with helping people understand what identity theft is and making recommendations on how they might thwart criminals from turning them into victims. I decided to revisit the topic and share a simple checklist approach to prevent identity theft. With just a few simple steps… Read More