Juris Doctor 54 of 215

Torts Multiple Choice Technique: in light of the challenge I seem to have with torts, its time to dive into the analysis of torts multiple question (guess). This is some of Professor Bracci’s lecture advice. Step one: Identify the tort position we start with. What is the best theory? Intentional Tort (Easy to prove by… Read More

CIO Finance Summit Closure

It is always good to visit with the folks from CDM Media in Scottsdale Arizona. I was invited to participate in a CIO Panel Discussion titled: “Security, Encryption and Fraud: Future proofing the banking system and ensuring greater consumer protection.” Scott Crawford, Managing Research Director, Security & Risk Management with EMA moderated. Mike Kearn, ISO… Read More

Daily Digest for September 2nd

mdpeters @CDMmedia looking for Cloud Computing standards? Check out opencloudconsortium.org. Don’t relegate security to the dust bin, get educated! [#]. mdpeters Cloud Computing: Would you go to your wedding without knowing who is under the vail? Know your potential SaaS provider intimately first. [#]. mdpeters New blog post: Enclaves of Technical Excellence https://michaelpeters.org/?p=786 [#]. mdpeters… Read More

Daily Digest for August 31st

mdpeters When business and information security are aligned, the true value of security will be apparent. [#]. mdpeters In the debate concerning insider versus outsider information security threats, consider any connection to data as an outsider threat. [#]. mdpeters @CDMmedia BI education seems to be the biggest utilization hurdle. This is true holistically, not just… Read More

KISS – Keep It Simple Security – 2009090101

I was reading the latest report published by Deloitte titled “The 6th Annual Global Security Survey.” I did enjoy the survey results and I do intend on using a portion to help shape my general information security strategy in my practice. Certain fundamentals are always sound and always obvious. One quote that I’ll comment on… Read More