PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS ! Here’s some background information about this… Read More
Devil’s Due Diligence: Why your ignorance is not bliss!
Congratulations! Felicitaciones! Mazel Tov! Gratulerer! You have been offered a new job! What a relief it’s been since your prospective employer has been putting you through the meat grinder for months. You’ve had a string of interviews that have left you exhausted and nearly breathless given you’ve been nearly holding your breath and sitting ridged… Read More
Information Systems Security Association (ISSA) elections
The Information Systems Security Association (ISSA) elections for international leadership positions has now opened. I’m running for a Director position and I’m asking ISSA members to please vote for me. As a career security professional, ISSA Hall of Fame and Fellow recipient, I have received so much value from this not-for-profit, international organization of information security professionals… Read More
Dumb Luck: Why Security Breaches Are Like Playing Russian Roulette
“The future masters of technology must be light-hearted and intelligent. The machine easily masters the grim and the dumb.” Marshall McLuhan This quote has been a long standing personal favorite because it really illustrates on many levels the need to embrace the “Life Learner” concept; always pushing to enhance your own skill-set and capabilities. It… Read More
The New Social Security: When Social Media Meets Social Engineering
The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More
A Decade of SOX: Knowledge is your friend; Ignorance is your enemy
We are well past a decade now living with the Sarbanes Oxley Act. As one might expect, corporations, employees and auditors alike have become acclimated to the requirements so much so that the process is routine. The upside to this is that people supporting a SOX audit are pretty comfortable with the expectations and requirements.… Read More
Reasonable Duty of Care: Data Security and Privacy
You’ve see it in the news all too frequently now in our technologically interconnected world; companies are being breached seemingly at-will by hackers, malicious insiders, competing company entities, and nation states. The terrible truth is that companies and consumers are losing the battle. The cost of these breaches is rising as consumers are beginning to… Read More
The Future of the Security Executive?
I was presented with a question this week that I thought was worth sharing. The question was “What you think information security executives will need to be focused on in the next 2 to 3 years in order for their organizations to be successful?” I responded with these tasks-concepts that security executives must embrace: Collaboration… Read More
Thank You CSO Magazine Online!
You know it’s a great day when CSO’s Bill Brenner takes an interest in your book. He posted an excerpt and some commentary today in the Security Leadership section of CSO about my book, Governance Documentation and Information Technology Security Policies Demystified which may be found here: CSO Magazine Online and I couldn’t think of a better place for… Read More
Information Security By the Numbers
The Security Trifecta is a comprehensive and innovative approach to holistic security, risk, governance and privacy coverage for the enterprise. Because the methodology is universally applicable and ultimately sustainable, it has become the perfect model for any size organization regardless of business concentration. In fact, the more critical, the more regulated, the more sensitive the… Read More
ISSA Hall of Fame recipient
Yesterday I received wonderful and humbling news from Kevin Richards, International President of the Information Systems Security Association that I’m being inducted into the ISSA Hall of Fame. In the realm of information security, this could probably be compared to the Hollywood Oscars. It is tremendously exciting and as I’ve mentioned, very humbling for me to… Read More
Meet the Candidate for Your ISSA International Board of Directors – Michael Peters
Elections for the 2012 International Board of Directors are now going on! I am a candidate for the two-year term and I would appreciate your vote as an ISSA member in good standing. There are 13 candidates vying for 5 director positions. About Me I have been an independent information security consultant, executive, researcher, author, and… Read More
Are You Alert?
The world is full of information and it is becoming more transparent and more accessible to more people every day. This technological paradigm shift enables the individual and the organizational entities to discover more about another person or item of interest or even themselves. It becomes increasingly important to, where possible, control your digital spin.… Read More
Insecurity
If you think that absolute security exists you would be absolutely incorrect. Speaking as a security practitioner who has been in the business for as long as there has been a security business, I’ll tell you with a straight face that no technology system exists that is completely secure or one hundred percent impenetrable. The… Read More
How do you transition your IT teams from a technology to business mindset?
It is incumbent upon the technology leadership, who should already have an excellent business grasp, mentor, demonstrate and illustrate what lines of activities comprise the essence of the company’s mission. Only then will the supporting staff be able to accurately support those business activities with an accurate technological layer. If the technology leader does not… Read More
Now Reading: Irrefutable Laws of Leadership – 21
The Law of Legacy: A leader’s lasting value is measured by succession. My life sentence is, “I want to add value to leaders who will multiply value to others.” Most people simply accept their lives – they don’t lead them. Someday people will summarize your life in a single sentence. My advice: pick it now!… Read More
Now Reading: Irrefutable Laws of Leadership – 20
The Law of Explosive Growth: To add growth, lead followers – To multiply, lead leaders. Becoming a leader who develops leaders requires an entirely different focus and attitude from simply attracting and leading followers. It takes a different mind-set. Leadership development compounds. The more you invest in people and the longer you do it, the… Read More
Now Reading: Irrefutable Laws of Leadership – 19
The Law of Timing: When to lead is as important as what to do and where to go. If a leader repeatedly shows poor judgment, even in little things, people start to think that having him or her as the leader is the real mistake. When the right leader and the right timing come together,… Read More
Twitter Weekly Updates for 2011-02-27
Blog Updates Twitter Weekly Updates for 2011-02-20 – Blog Updates Twitter Weekly Updates for 2011-02-13 Blog Update… http://ow.ly/1bqmpJ # HORSE Project Update User:Shadowfire1989 – New user account http://ow.ly/1bqmpI # Blog Updates Now Reading: Irrefutable Laws of Leadership – 18 http://ow.ly/1briZw # HORSE Project Update Internet Law Treatise – ? Older revision Revision as of 15:54,… Read More
Now Reading: Irrefutable Laws of Leadership – 18
The Law of Sacrifice: A leader must give up to go up. The heart of good leadership is sacrifice. Sacrifice is an ongoing process, not a one-time payment. If leaders have to give up to go up, then they have to give up even more to stay up. This is certainly a subjective point of… Read More
Twitter Weekly Updates for 2011-02-20
Blog Updates Twitter Weekly Updates for 2011-02-13 – Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 h… http://ow.ly/1bjTZc # Blog Updates Juris Doctor 117 of 161 – I am definitely having fun with my Cyberspace Law class this term. The cou… http://ow.ly/1bjTZb # HORSE Project Update File:Poolball5.jpg – uploaded a new version of… Read More
Twitter Weekly Updates for 2011-02-13
Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 http://ow.ly/1bd7yL # Blog Updates Twitter Weekly Updates for 2011-02-06 – Blog Updates Domestic Terrorism According to a recent analysis… http://ow.ly/1bd7yM # Blog Updates CISO FYI 2011021001 – Security through Encryption Overview: As many companies begin the migration of th… http://ow.ly/1binPK # Powered by Twitter Tools
Now Reading: Irrefutable Laws of Leadership – 17
The Law of Priorities: Leaders understand that activity is not necessarily accomplishment. Leaders should get out of their comfort zone but stay in their strength zone. I suppose that some of my economic training will shine through right now but, not being one of my strong suits, please excuse my rudimentary comments. The division of… Read More
Now Reading: Irrefutable Laws of Leadership – 16
The Law of the Big MO: Momentum is a leader’s best friend. Why is momentum a leader’s best friend? Many times momentum is the only thing that makes the difference between losing and winning. Momentum is like a magnifying glass; it makes things look bigger than they really are. Even average people can perform far… Read More