Information Security Leader, Author, Instructor and Speaker

Default utility Image

Six Big Cybersecurity Certification Changes for 2018 TAGS: On the heels of one of the most significant years in cybersecurity history, organizations around the world are making plans to …Continue reading →

Default utility Image

2017 in Review: The Top Cybersecurity News Stories TAGS: | | | | | | 2017 was quite a year in the world of cybersecurity! From the politicization of cyberwarfare to several major data breaches, hardly …Continue reading →

Default utility Image

Addressing the Cybersecurity Skills Gap TAGS: Cybersecurity professionals are used to managing crises, from the latest ransomware attack streaking across the Internet to a critical security vulnerability …Continue reading →

Default utility Image

Russia meddling mess will cost tech giants big bucks to fix TAGS: | During a series of hearings before House and Senate committees this week, members of Congress trotted out poster boards showing …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

DHS’s CDM Program Moves to the Next Phase: Protection TAGS: From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal …Continue reading →

Default utility Image

Find Your Footing in Cloud Security with CCSK The cloud is here to stay. Organizations of all sizes and industries are turning to cloud services as a flexible, …Continue reading →

Default utility Image

Solving the cybersecurity staffing shortage Cybersecurity is at a critical juncture. Organizations around the world increasingly recognize the importance of cybersecurity to their reputation and …Continue reading →

Default utility Image

Keep Your Campus Both Smart and Secure as IoT Expands The Internet of Things is taking college campuses by storm. From a Google Home in a professor’s office to a …Continue reading →

Default utility Image

4 Ways to Use Context-Aware Security for Maximum Advantage Professionals at higher education institutions make context-aware security decisions every day. A security guard decides which visitors to allow on …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple