Social Computing Guidelines

I have added a new governance document to the HORSE wiki that provides an example of a social computing and networking employee guideline. It is located here: http://lazarusalliance.com/horsewiki/index.php/Social_Computing_Guidelines Like so many of my corporate information security counterparts, the explosion of public applications available and the massive participation presents a new challenge in the presentation of… Read More

Laws of Power – 27

Play on people’s need to believe to create a cult-like following: people have an overwhelming desire to believe in something. Become the focal point of such desire by offering them a cause, a new faith to follow. Keep your words vague but full of promise; emphasize enthusiasm over rationality and clear thinking. Give your new… Read More

Corporate Records: Voice-mail

As electronic discovery matures to meet the ever-changing technology landscape, it is incumbent upon the information security practitioner, forensic investigator, General Counsel, or others responsible for the discovery, acquisition, processing, preservation, and presentation of electronic records to keep swimming or risk drowning. There should be no illusion that voicemail would be considered an electronic record… Read More

The lines are blurring

The legal profession, in one form or another, as existed for thousands of years. As with any activity, experience and practice helps us become more proficient, more accurate, more profound. Information security and regulatory activities are relative newcomers in the holistic picture. These pursuits also require vigilance and practice. An interesting phenomenon I believe is… Read More

Incorporation

The former Lazarus Alliance Incorporated is being reorganized as Lazarus Alliance LLC. The corporate focus will continue to be Information Security and Compliance consulting services, but, we will gradually be adding Legal services. In time, I intend on offering premiere comprehensive international services focused upon information security. Basically, Lawyers who are actually technically savvy. The… Read More

Syndication Updates for 2009-03-09

12:09am mdpeters posted 9 items. (Hide Details) Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Documents Adaptive Best Practices Policy Samples: Sample Information Systems and Technology Security Policy: Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Sample Information Security Program Charter: Sample Information Systems and Technology Security Policy: 1:20pm mdpeters posted… Read More

Policies, standards, and Guidlines, Oh My!

  My pet project for the past three years has been the Holistic Operational Readiness Security Evaluation wiki, otherwise known as the HORSE Project. In addition to some great audit guidance, security advice, tools, ect, there is a full compliment of policies to use as boilerplates for any organization. Find it all here: http://lazarusalliance.com/horsewiki/ It… Read More