Information Security Leader, Author, Instructor and Speaker

Default utility Image

Building an Information and IT Compliance Program TAGS: In higher education, we’ve seen an unprecedented increase in laws and regulations that govern everything from the way we handle …Continue reading →

Default utility Image

Real-Life Use Cases for Vulnerability Management and Best Practices TAGS: In a presentation with my colleague Thomas Siu of Case Western Reserve University, I shared our experience with vulnerability management …Continue reading →

Default utility Image

Stuxnet and the Advanced Persistent Threat TAGS: | | The Michiana chapter of the Institute of Internal Auditors invited me to give a talk today for their CPE program …Continue reading →

Default utility Image

Webcast: Content Monitoring in the Enterprise TAGS: | | | From data loss prevention to database activity monitoring and digital rights management, there are a bewildering variety of technologies available …Continue reading →

Default utility Image

Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise TAGS: Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that …Continue reading →

Default utility Image

Presentation: Windows and Mirrors: Two Perspectives on IT Metrics TAGS: I recently had the opportunity to present our work on IT Metrics at a meeting of the Common Solutions Group. …Continue reading →

Default utility Image

Vulnerability Scanning at Notre Dame TAGS: I had the privilege of presenting Vulnerability Scanning at Notre Dame with colleagues from Qualys at EDUCAUSE 2011. Review my …Continue reading →

Default utility Image

Podcast: Endpoint encryption strategies TAGS: | When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a …Continue reading →

Default utility Image

Podcast: Making NAC work with your existing security tools TAGS: | This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your …Continue reading →

Default utility Image

Hacking the Vote: Information Security and the 2008 Presidential Election TAGS: | I had the opportunity to share my thoughts on the role that information security might play in the upcoming election …Continue reading →