PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS ! Here’s some background information about this… Read More
Honored to make the CISO short list with esteemed colleagues! Thank you CEO World Magazine
The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More
While pondering the recent Target and Neiman Marcus breaches and many of those that have come before, I cannot help myself but to look for common denominators. If you compare these companies to your house, there are doors and windows that allow movement into and out of those houses. If you open a window and it… Read More
I’ve been in the corporate chief information security officer’s (CISO) executive chair long enough to realize that the traditional hierarchical model of information security reporting up through the technology department has a fatal flaw. This hazard is directly associated with the inherent conflict of duties that exists by the very nature of the position. For… Read More
The CISO Executive Summit 2013 – Minneapolis I enjoyed delivering the closing keynote at the CISO Executive Summit this year and getting the opportunity to collaborate, strategize and even in some cases, commiserate with my information security comrades from across the industry. The good folks at Evanta organized the event with direction from the event’s… Read More
You’ve see it in the news all too frequently now in our technologically interconnected world; companies are being breached seemingly at-will by hackers, malicious insiders, competing company entities, and nation states. The terrible truth is that companies and consumers are losing the battle. The cost of these breaches is rising as consumers are beginning to… Read More
I’m honored to be joining the EC Council Certified CISO (C|CISO) ranks.
As we approach retail’s favorite season, I have the unique perspective of being concerned about information security as both the Chief Information Security Officer (CISO) for a commerce software company and as a customer to a plethora of retailers — some who are clients and others who are not. In effect, I’m wearing two… Read More
Elections for the 2012 International Board of Directors are now going on! I am a candidate for the two-year term and I would appreciate your vote as an ISSA member in good standing. There are 13 candidates vying for 5 director positions. About Me I have been an independent information security consultant, executive, researcher, author, and… Read More
Several exceptional facets of MENA ISC 2012 became quite apparent to me during my attendance and participation in the Middle East North Africa Information Security Conference. First, what a truly impressive assembly of international security experts and delegates. People attending were engaged, inquisitive, and very collaborative which is a vital component in mastering the global… Read More
In the March 2012 edition of the CrossView Wire, among the many progressive features is news coverage about my latest book Governance Documentation and Information Technology Security Policies Demystified. CrossView is a premier provider of cross-channel commerce solutions and services that enable a smarter, more personalized shopping experience. Their software unifies the Web, stores, call… Read More
Interview with Tim Heard and InfoSec Institute. I had the honor and pleasure of being interviewed by Tim Heard for a new feature that InfoSec Institute is running called CISO Interview Series. The article may be found at InfoSec Institutes site. About the Author Tim Heard is the founder and president of eSearch Associates,… Read More
I was reading a news article this morning about another security debacle at NASA involving the theft of a laptop containing the command and control codes for some high-tech toys like the International Space Station. The thing that amazed me the most was not that NASA would be a high value target, but that… Read More
On July 29, 2011, Massachusetts Attorney General Martha Coakley announced a $7,500 settlement with Belmont Savings Bank following a May 2011 data breach involving the names, Social Security numbers and account numbers of more than 13,000 Massachusetts residents. The bank has stated that it has no evidence of unauthorized access to or use of consumers’… Read More
mdpeters posted 5 items. User:Clemabun Main Page User:Vickorfo User:Wahbcai User:Nabioff mdpeters posted 6 items. User:Mdpeters HORSE – Holistic Operational Readiness Security Evaluation.:About Main Page File:Personal-CISO.jpg File:Michael-2010010102.jpg Main Page mdpeters posted 6 items. User:CrossView File:Linkedin.jpg Main Page Main Page Main Page Main Page mdpeters posted 2 items. Documents User:Mdpeters
Blog Updates Twitter Weekly Updates for 2011-02-13 – Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 h… http://ow.ly/1bjTZc # Blog Updates Juris Doctor 117 of 161 – I am definitely having fun with my Cyberspace Law class this term. The cou… http://ow.ly/1bjTZb # HORSE Project Update File:Poolball5.jpg – uploaded a new version of… Read More
Your Personal CISO is now an open group on Linkedin.com. You can find it here: http://www.linkedin.com/groups/Your-Personal-CISO-3790361?trk=myg_ugrp_ovr
Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 http://ow.ly/1bd7yL # Blog Updates Twitter Weekly Updates for 2011-02-06 – Blog Updates Domestic Terrorism According to a recent analysis… http://ow.ly/1bd7yM # Blog Updates CISO FYI 2011021001 – Security through Encryption Overview: As many companies begin the migration of th… http://ow.ly/1binPK # Powered by Twitter Tools
Security through Encryption Overview: As many companies begin the migration of their internally hosted email to cloud providers such as Google, several items that need to be discussed come to my mind to ensure your corporate privacy and security is maintained. There are plenty of crossover implications for personal privacy and security as well. Encryption… Read More
My expertise is in enabling business through information technology excellence. I’m focused on being your new CISO, CIO, or CTO.
Ladies and Gentleman, Elvis has left the building! I’m available and looking for my next position as your new CIO, CISO, or CTO.
I spent the week reviewing Torts. This month is going to be rough. I have the First Year Law Students’ Examination to contend with and starting my new CISO job located in a new state. No pressure right?
mdpeters New blog post: Outlandish State Laws – California https://michaelpeters.org/?p=876 [#]. mdpeters New blog post: Outlandish State Laws – Florida https://michaelpeters.org/?p=878 [#]. mdpeters New blog post: Outlandish State Laws – Georgia https://michaelpeters.org/?p=880 [#]. mdpeters New blog post: Outlandish State Laws – Massachusetts https://michaelpeters.org/?p=882 [#]. mdpeters New blog post: CISO at Fifth Third Processing Solutions https://michaelpeters.org/?p=885… Read More