Information Security Leader, Author, Instructor and Speaker

Default utility Image

Data Science in Cybersecurity: Five Questions to Ask Vendors TAGS: “There’s a mad rush in the cybersecurity solutions space to use the terms machine learning, analytics, and data science in …Continue reading →

Default utility Image

IDC PlanScape: Creating a Cybersecurity Professional Development Program TAGS: | | “The world of cybersecurity is becoming increasingly siloed,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Leaders …Continue reading →

Default utility Image

IDC PlanScape: Building a Security Operations Center TAGS: | | “The security operations center serves as the nerve center of an organization’s cybersecurity program,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

IDC PlanScape: Building Compliant Cloud Environments TAGS: | “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →

Default utility Image

IDC PlanScape: Deploying Multifactor Authentication TAGS: “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Achieving a Best-in-Class Wireless Infrastructure TAGS: | Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that …Continue reading →

Default utility Image

Email Security: Defending the Enterprise TAGS: | | Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →

Default utility Image

Data Loss Prevention and the Financial Firm TAGS: | The financial industry runs on sensitive information.  From confidential customer information and payment card account numbers to sensitive financial analyses, …Continue reading →

Default utility Image

Principles of PCI Compliance TAGS: Credit and debit card information are among the most sensitive pieces of information that organizations must handle.  When they fall …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple