Information Security Leader, Author, Instructor and Speaker

Default utility Image

Addressing the Cybersecurity Skills Gap TAGS: Cybersecurity professionals are used to managing crises, from the latest ransomware attack streaking across the Internet to a critical security vulnerability …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

DHS’s CDM Program Moves to the Next Phase: Protection TAGS: From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal …Continue reading →

Default utility Image

Find Your Footing in Cloud Security with CCSK The cloud is here to stay. Organizations of all sizes and industries are turning to cloud services as a flexible, …Continue reading →

Default utility Image

Solving the cybersecurity staffing shortage Cybersecurity is at a critical juncture. Organizations around the world increasingly recognize the importance of cybersecurity to their reputation and …Continue reading →

Default utility Image

Keep Your Campus Both Smart and Secure as IoT Expands The Internet of Things is taking college campuses by storm. From a Google Home in a professor’s office to a …Continue reading →

Default utility Image

4 Ways to Use Context-Aware Security for Maximum Advantage Professionals at higher education institutions make context-aware security decisions every day. A security guard decides which visitors to allow on …Continue reading →

Default utility Image

Half-a-billion reasons not to use free e-mail On September 26, 2016, Yahoo! announced to the world that they were the victim of the largest systematic account compromise in …Continue reading →

Default utility Image

3 Tips for Feds Looking to Ditch Old Datasets The digital universe is expanding at a staggering rate as government agencies, businesses and citizens generate troves of data each …Continue reading →

Default utility Image

Still got it: CISSP certification a must for aspiring security professionals Rumors of the Certified Information Systems Security Professional (CISSP) certification’s demise are greatly exaggerated. In January 2015, I published an …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple