Last week Contribution and Indemnity gave me a bit of trouble. This week I am looking forward to Conspiracy and Solicitation which seems like it will be full of twists and turns. I’m gaining intellectual traction faster with Criminal Law and Contract Law than I am with Torts. Overall though, there is no doubt in… Read More
Syndication Updates for 2009-04-03
9:44am mdpeters posted an item. HORSE – Holistic Operational Readiness Security Evaluation.:Community Portal
Syndication Updates for 2009-03-18
12:54am mdpeters posted 2 items. (Hide Details) HORSE – Holistic Operational Readiness Security Evaluation.:Privacy policy HORSE – Holistic Operational Readiness Security Evaluation.:About
Syndication Updates for 2009-03-17
7:54pm mdpeters posted 2 items. (Hide Details) HORSE – Holistic Operational Readiness Security Evaluation.:Privacy policy HORSE – Holistic Operational Readiness Security Evaluation.:About
Cloud Computing, AKA SaaS
Synopsis: The effective weak link of cloud computing: An oversight by a single vendor creates a single point of failure that can have devastating effects on an untold number of its customers. Commentary: Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and… Read More
Syndication Updates for 2009-03-09
12:09am mdpeters posted 9 items. (Hide Details) Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Documents Adaptive Best Practices Policy Samples: Sample Information Systems and Technology Security Policy: Sample Information Security Program Charter: Adaptive Best Practices Policy Samples: Sample Information Security Program Charter: Sample Information Systems and Technology Security Policy: 1:20pm mdpeters posted… Read More
Syndication Updates for 2009-02-27
2:10pm mdpeters posted 3 items. (Hide Details) Security Management: Security Management: Security Management:
Syndication Updates for 2009-02-22
9:56pm mdpeters posted 170 items. (Hide Details) Impossibility Motion for change of venue—Based on publicity FN10 Witnesses testifying as to documents Preemption Motion challenging method of choosing jury Use of computer security consultants, EDP auditors, and computer professionals FN9 Motion to reduce charge Subjects of discovery; checklist Arraignment; Pleas; Continuance of Case in general Other… Read More
Policies, standards, and Guidlines, Oh My!
My pet project for the past three years has been the Holistic Operational Readiness Security Evaluation wiki, otherwise known as the HORSE Project. In addition to some great audit guidance, security advice, tools, ect, there is a full compliment of policies to use as boilerplates for any organization. Find it all here: http://lazarusalliance.com/horsewiki/ It… Read More
Juris Doctor 21 of 215
I’ve gone into week 21 now. I still have a three day lead on classes across the board much to my satisfaction. I actually am beginning to feel like this stuff is beginning to make sense. Hooray for the home team. The only complaint from my family members has been the extra effort I needed… Read More
Juris Doctor 20 of 215
This week has cooked along just fine. Work has tapered off just enough now that the procrastinators have gone into hibernation. I’ll brace myself for Q4 when the time comes again. I continue to get affirmation that Law School will be a real boon to my career and accumulated wisdom. International and federal cyber law… Read More
ISSA September 2008
I was honored to be interviewed by Jeff Combs of Alta Associates for an article in the September 2008 ISSA Journal. We discussed the blurring lines between information security, law, and compliance at it relates to technology.
CIO Finance Summit 2008
A spent nearly a week in Scottsdale Arizona attending the CIO Finance Summit. I received an invitation to be a guest panelist for financial services information security. I met many of my peers around the industry and made some good connections with folks that I am sure will provide mutually beneficial situations down the road.… Read More
Juris Doctor 2 of 215
The objective analysis versus the subjective analysis? The objective, reasonable interpretation by someone in the position of the parties involved and present as witness would assume. I seem to gravitate towards the subjective rather than the objective nature of the analysis. This has been my first real challenge during law school. It has occured to… Read More
SafetyNET
SafetyNET is my Intrusion Prevention System (IPS) project now in its fourth year of customer deployment. Human error has been engineered out and absolute security engineered in.
HORSE Project Wiki
My favorite pet project is the Holistic Operational Readiness Security Evaluation otherwise known as the HORSE Project. The intention is ultimately to raise the proficiency level of information security auditors, security practitioners, financial auditors, and anyone who verifies that controls exist over business systems.