Privacy Piracy Host, Mari Frank, Esq. Interviews Michael Peters

PRIVACY PIRACY HOST, MARI FRANK, ESQ. INTERVIEWS MICHAEL PETERS MONDAY AUGUST 25TH, 2014, AT 8AM PACIFIC TIME ON KUCI 88.9 FM IN IRVINE AND STREAMING ON WWW.KUCI.ORG   MICHAEL PETERS will discuss the following topics and more! Lazarus Alliance Information Security Biggest Threat to our Global Community Don’t miss this fascinating interview with MICHAEL PETERS !   Here’s some background information about this… Read More

Devil’s Due Diligence: Why your ignorance is not bliss!

  Congratulations! Felicitaciones! Mazel Tov! Gratulerer! You have been offered a new job! What a relief it’s been since your prospective employer has been putting you through the meat grinder for months. You’ve had a string of interviews that have left you exhausted and nearly breathless given you’ve been nearly holding your breath and sitting ridged… Read More

Information Systems Security Association (ISSA) elections

The Information Systems Security Association (ISSA) elections for international leadership positions has now opened. I’m running for a Director position and I’m asking ISSA members to please vote for me. As a career security professional, ISSA Hall of Fame and Fellow recipient, I have received so much value from this not-for-profit, international organization of information security professionals… Read More

Dumb Luck: Why Security Breaches Are Like Playing Russian Roulette

“The future masters of technology must be light-hearted and intelligent. The machine easily masters the grim and the dumb.” Marshall McLuhan This quote has been a long standing personal favorite because it really illustrates on many levels the need to embrace the “Life Learner” concept; always pushing to enhance your own skill-set and capabilities. It… Read More

The New Social Security: When Social Media Meets Social Engineering

The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More

A Decade of SOX: Knowledge is your friend; Ignorance is your enemy

We are well past a decade now living with the Sarbanes Oxley Act. As one might expect, corporations, employees and auditors alike have become acclimated to the requirements so much so that the process is routine. The upside to this is that people supporting a SOX audit are pretty comfortable with the expectations and requirements.… Read More

Reasonable Duty of Care: Data Security and Privacy

You’ve see it in the news all too frequently now in our technologically interconnected world; companies are being breached seemingly at-will by hackers, malicious insiders, competing company entities, and nation states. The terrible truth is that companies and consumers are losing the battle. The cost of these breaches is rising as consumers are beginning to… Read More

The Future of the Security Executive?

I was presented with a question this week that I thought was worth sharing. The question was “What you think information security executives will need to be focused on in the next 2 to 3 years in order for their organizations to be successful?” I responded with these tasks-concepts that security executives must embrace: Collaboration… Read More

Thank You CSO Magazine Online!

You know it’s a great day when CSO’s Bill Brenner takes an interest in your book. He posted an excerpt and some commentary today in the Security Leadership section of CSO about my book, Governance Documentation and Information Technology Security Policies Demystified which may be found here: CSO Magazine Online and I couldn’t think of a better place for… Read More

Information Security By the Numbers

The Security Trifecta is a comprehensive and innovative approach to holistic security, risk, governance and privacy coverage for the enterprise. Because the methodology is universally applicable and ultimately sustainable, it has become the perfect model for any size organization regardless of business concentration. In fact, the more critical, the more regulated, the more sensitive the… Read More

ISSA Hall of Fame recipient

Yesterday I received wonderful and humbling news from Kevin Richards, International President of the Information Systems Security Association that I’m being inducted into the ISSA Hall of Fame. In the realm of information security, this could probably be compared to the Hollywood Oscars. It is tremendously exciting and as I’ve mentioned, very humbling for me to… Read More

Meet the Candidate for Your ISSA International Board of Directors – Michael Peters

Elections for the 2012 International Board of Directors are now going on! I am a candidate for the two-year term and I would appreciate your vote as an ISSA member in good standing. There are 13 candidates vying for 5 director positions. About Me I have been an independent information security consultant, executive, researcher, author, and… Read More

Are You Alert?

The world is full of information and it is becoming more transparent and more accessible to more people every day. This technological paradigm shift enables the individual and the organizational entities to discover more about another person or item of interest or even themselves. It becomes increasingly important to, where possible, control your digital spin.… Read More

How do you transition your IT teams from a technology to business mindset?

It is incumbent upon the technology leadership, who should already have an excellent business grasp, mentor, demonstrate and illustrate what lines of activities comprise the essence of the company’s mission. Only then will the supporting staff be able to accurately support those business activities with an accurate technological layer. If the technology leader does not… Read More

Twitter Weekly Updates for 2011-02-27

Blog Updates Twitter Weekly Updates for 2011-02-20 – Blog Updates Twitter Weekly Updates for 2011-02-13 Blog Update… http://ow.ly/1bqmpJ # HORSE Project Update User:Shadowfire1989 – New user account http://ow.ly/1bqmpI # Blog Updates Now Reading: Irrefutable Laws of Leadership – 18 http://ow.ly/1briZw # HORSE Project Update Internet Law Treatise – ? Older revision Revision as of 15:54,… Read More

Twitter Weekly Updates for 2011-02-20

Blog Updates Twitter Weekly Updates for 2011-02-13 – Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 h… http://ow.ly/1bjTZc # Blog Updates Juris Doctor 117 of 161 – I am definitely having fun with my Cyberspace Law class this term. The cou… http://ow.ly/1bjTZb # HORSE Project Update File:Poolball5.jpg – uploaded a new version of… Read More

Twitter Weekly Updates for 2011-02-13

Blog Updates Now Reading: Irrefutable Laws of Leadership – 17 http://ow.ly/1bd7yL # Blog Updates Twitter Weekly Updates for 2011-02-06 – Blog Updates Domestic Terrorism According to a recent analysis… http://ow.ly/1bd7yM # Blog Updates CISO FYI 2011021001 – Security through Encryption Overview: As many companies begin the migration of th… http://ow.ly/1binPK # Powered by Twitter Tools