The convergence is upon us all; this influx of technology intermingled with information infused now in every possible facet of our business and personal lives. We live in the presence of infinite possibilities through technology. Business is being propelled into new trajectories never before possible. Out social spheres and human interpersonal interactions have all been… Read More
The Security Trifecta – Governance Made Easy: CISO Executive Summit Keynote
The CISO Executive Summit 2013 – Minneapolis I enjoyed delivering the closing keynote at the CISO Executive Summit this year and getting the opportunity to collaborate, strategize and even in some cases, commiserate with my information security comrades from across the industry. The good folks at Evanta organized the event with direction from the event’s… Read More
The Inmates are Running the Asylum: Why Cyber-criminals are Winning.
I could tell you about the most recent incidents of cyber threats in the news, but with the explosion of cyber threats there would be little value in citing just a couple of cases. The shocking reality is that there have been literally thousands of actual breaches that have NOT been reported to law enforcement in just… Read More
Reasonable Duty of Care: Data Security and Privacy
You’ve see it in the news all too frequently now in our technologically interconnected world; companies are being breached seemingly at-will by hackers, malicious insiders, competing company entities, and nation states. The terrible truth is that companies and consumers are losing the battle. The cost of these breaches is rising as consumers are beginning to… Read More
Download Premium Content: Governance Documentation and Information Technology Security Policies Demystified
For anyone who has purchased my book, Governance Documentation and Information Technology Security Policies Demystified, you now have full access to premium content that supports the book available for free download. To have access to this content, do the following:
Re-Post: C-Suite Slipping on Information Security, Study Finds
The analysis in this article is consistent with my research to date and I thought it worth sharing. I would suggest however that given the input from one of the largest audit firms creates a scenario that I refer to as the “Self-Licking Ice Cream Cone” and should be objectively consumed. It is quite ironic… Read More
PenTest Magazine: The Security Trifecta – IT Security Governance Demystified
PenTest Magazine just released their latest issue and my article, The Security Trifecta – IT Security Governance Demystified is included. You may find it here and also directly from the publisher here. Enjoy!
Thank You CSO Magazine Online!
You know it’s a great day when CSO’s Bill Brenner takes an interest in your book. He posted an excerpt and some commentary today in the Security Leadership section of CSO about my book, Governance Documentation and Information Technology Security Policies Demystified which may be found here: CSO Magazine Online and I couldn’t think of a better place for… Read More
Re-post: Your Employee Is an Online Celebrity. Now What Do You Do?
Mixing social media and on-the-job duties can be a win-win. Or not. I wanted to share an excellent article concerning an emerging issue in the workplace concerning employees with strong personal brands and potential conflicts with corporate needs and expectations. The original article is here: Personally, I considered it an excellent thought-provoking article! It points… Read More
Information Security By the Numbers
The Security Trifecta is a comprehensive and innovative approach to holistic security, risk, governance and privacy coverage for the enterprise. Because the methodology is universally applicable and ultimately sustainable, it has become the perfect model for any size organization regardless of business concentration. In fact, the more critical, the more regulated, the more sensitive the… Read More
Symbiotic Mutualism: A BYOD Love Story
The mass proliferation of consumer computing devices is in full force with only escalation on the horizon before us and any technologist who thinks that they can stop it or officially banish it from their little kingdoms should think again. Those troglodytes will only lead a frustrating existence in a world where resistance is truly… Read More
Risky Business: IT Security Risk Management Demystified
PenTest Magazine just released their latest issue and my article, Risky Business: IT Security Risk Management Demystified is included. You may find it here and also directly from the publisher here. Enjoy!
Is Facebook Losing its Luster?
I’ve been trying out an opted-in email based campaign this month targeting University Teachers, Higher Education Teachers and Book Stores in the US with a simple message that includes links to the most common sources of information and purchasing options for one of my books, Governance Documentation and Information Technology Security Policies Demystified which makes… Read More
Meet the Candidate for Your ISSA International Board of Directors – Michael Peters
Elections for the 2012 International Board of Directors are now going on! I am a candidate for the two-year term and I would appreciate your vote as an ISSA member in good standing. There are 13 candidates vying for 5 director positions. About Me I have been an independent information security consultant, executive, researcher, author, and… Read More
MENA ISC 2012 – The Security Trifecta™
It’s off to Amman Jordan today to spend the week at the Middle East North Africa Information Security Conference (MENA ISC 2012) where I’ll be presenting The Security Trifecta: Information Security by the Numbers. The concept is an accessible and highly sustainable pragmatic approach toward achieving enterprise security; both physical and digital. The Security Trifecta… Read More
1 MILLION PLUS VIEWS!
I’m excited to announce that the Holistic Operational Readiness Security Evaluation (HORSE) project wiki has surpassed the 1 million mark in page views by subscribers like you. If you don’t know what the HORSE Project is, browse on over to the site and see why it is one of the best, freely available authorities in… Read More
CrossView CISO Publishes New Security Series
In the March 2012 edition of the CrossView Wire, among the many progressive features is news coverage about my latest book Governance Documentation and Information Technology Security Policies Demystified. CrossView is a premier provider of cross-channel commerce solutions and services that enable a smarter, more personalized shopping experience. Their software unifies the Web, stores, call… Read More
Privacy Policy
General Terms Lazarus Alliance, LLC (“Lazarus Alliance, LLC” or “we”) understands that your privacy is important to you. Lazarus Alliance, LLC is committed to protecting the privacy of your personally-identifiable information as you use this Site. The scope of Lazarus Alliance, LLC’s commitment is described in this Privacy Policy. By submitting information, you agree to… Read More
Usage Terms
MichaelPeters.org – Your Personal CXO and its affiliates (“MichaelPeters.org – Your Personal CXO” or “we”) provides its content on MichaelPeters.org (the “Site”) subject to the following terms and conditions (the “Terms”). We may periodically change the Terms, so please check back from time to time. These Terms were last updated on March 31, 2012. By… Read More
The Security Trifecta™: an introduction.
I was reading a news article this morning about another security debacle at NASA involving the theft of a laptop containing the command and control codes for some high-tech toys like the International Space Station. The thing that amazed me the most was not that NASA would be a high value target, but that… Read More
Books by Michael D. Peters
Securing the C Level: Getting, Keeping or Reclaiming that Executive Title ISBN-13: 978-1467968829 ISBN-10: 146796882X ISBN-eBook: 978-1-62112-227-2 Want the E-PUB E-Book version instantly? Get it here: [wp_eStore:product_id:1:end] Now on Amazon and other book store locations! In the news! PR NewsChannel Homepage CBS Marketwatch CBS Chicago Daily Herald – Suburban Chicago Business Insider WLS Chicago TV… Read More
Easiest way to breach a bank? Just hold-em-mop!
On July 29, 2011, Massachusetts Attorney General Martha Coakley announced a $7,500 settlement with Belmont Savings Bank following a May 2011 data breach involving the names, Social Security numbers and account numbers of more than 13,000 Massachusetts residents. The bank has stated that it has no evidence of unauthorized access to or use of consumers’… Read More
The PCI Challenge
It is frequently in the news. Reports have been written. Punitive and compensatory damages have been awarded. Companies around the globe have been challenged to find the resources required to comply with the Payment Card Industry Data Security Standard (PCI DSS). The prime PCI DSS objective is to protect cardholder data. The prime objective of… Read More
Juris Doctor 117 of 161
I am definitely having fun with my Cyberspace Law class this term. The course concludes this December so I have the rest of the year to immerse myself into a synergistic subject area. It is widely held that in general, lawyer’s knowledge about computers, and predictions they make about new technology, are highly likely to… Read More