Information Security Leader, Author, Instructor and Speaker

Default utility Image

Encryption: Six Principles That CIOs Need to Know TAGS: “Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. …Continue reading →

Default utility Image

IDC PlanScape: Threat Hunting TAGS: | | “Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). …Continue reading →

Default utility Image

Data Science in Cybersecurity: Five Questions to Ask Vendors TAGS: “There’s a mad rush in the cybersecurity solutions space to use the terms machine learning, analytics, and data science in …Continue reading →

Default utility Image

IDC PlanScape: Creating a Cybersecurity Professional Development Program TAGS: | | “The world of cybersecurity is becoming increasingly siloed,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Leaders …Continue reading →

Default utility Image

IDC PlanScape: Building a Security Operations Center TAGS: | | “The security operations center serves as the nerve center of an organization’s cybersecurity program,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

IDC PlanScape: Building Compliant Cloud Environments TAGS: | “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →

Default utility Image

IDC PlanScape: Deploying Multifactor Authentication TAGS: “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Achieving a Best-in-Class Wireless Infrastructure TAGS: | Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that …Continue reading →

Default utility Image

Email Security: Defending the Enterprise TAGS: | | Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple