Information Security Leader, Author, Instructor and Speaker

Segment Your Campus Network for Stronger Security

Campus networks carry almost every type of network traffic imaginable. Faculty and staff computers are similar to the devices in any workplace, but they’re just the tip of the iceberg in higher education. Students connect video game consoles, smart assistants, cameras and even smart microwaves to the same networks that connect temperature sensors and research equipment.

Published April 11, 2018 in EdTech Magazine

Read the full article: Segment Your Campus Network for Stronger Security

Posted in Articles | Tagged , | Leave a comment

Feds Can Optimize Disaster Recovery Solutions in the Cloud

Every IT leader shares this nightmare: critical systems down, users enraged, data lost. Without reliable and timely access to data, political leaders and agency staff cannot carry on their work, and constituents cannot rely on their government. Disaster-recovery programs ensure those groups that their data will be protected from loss and available for use, no matter the emergency.

Published March 2018 in FedTech Magazine.
Read the full article: Feds Can Optimize Disaster Recovery Solutions in the Cloud 

Posted in Articles | Tagged , | Leave a comment

Encryption: Six Principles That CIOs Need to Know

“Encryption is an intimidating technology for many IT leaders because it is highly technical and relies upon complex mathematical algorithms. While CIOs can and should leave the details of encryption to their cybersecurity teams, it is important that they have a working knowledge of the technology to provide responsible leadership and oversight,” said Mike Chapple, adjunct research analyst, IDC.

IDC Research Report published March 2018.
Read the full report: Encryption: Six Principles That CIOs Need to Know

Posted in White Papers | Tagged | Leave a comment

It’s Time to Question Longstanding Password Security Best Practices

Nobody likes password policies. IT leaders dislike reminding users to yet again change their passwords, then bracing for an onslaught of angry help desk calls. Users dread coming up with yet another obscure combination of uppercase and lowercase letters, symbols and digits that they can remember for the next 90 days. It’s an unpleasant experience all around.

But there’s good news for those frustrated by unwieldy password practices. Cybersecurity professionals are now turning toward new policies that embrace the end user to make security a natural habit. These ideas are bolstered by recent changes in federal security guidelines related to password management.

Published February 2018 in FedTech Magazine.
Read the full article: It’s Time to Question Longstanding Password Security Best Practices

Posted in Articles | Tagged , | Leave a comment

4 Ways Data Loss Prevention Tools Fit Right into Layered Security Strategies

Cybersecurity pros often follow a defense-in-depth strategy, acknowledging the fact that controls will fail. Layered defenses are especially important in the open-computing environment of academia. Data loss prevention solutions are an important component of a layered approach to security. DLP scans content leaving the institution for signs of sensitive information and often serves as the last line of defense, stopping data exfiltration after other controls fail to prevent a breach.

Published January 2018 in EdTech Magazine.
Read the full article: 4 Ways Data Loss Prevention Tools Fit Right into Layered Security Strategies

Posted in Articles | Tagged , | Leave a comment

Six Big Cybersecurity Certification Changes for 2018

On the heels of one of the most significant years in cybersecurity history, organizations around the world are making plans to develop the cybersecurity skills of their technical teams in 2018. IT leaders recognize that the threat landscape continues to shift and that they require skilled cybersecurity professionals to protect their information and systems against sophisticated attackers.

Whether you’re already a cybersecurity professional, or you’re seeking to switch into an exciting, growing career field, there’s plenty of opportunity to go around. The field needs plenty of newcomers to fill the cybersecurity skills gap and opportunities abound for existing security professionals to ramp up their skills and earn internal promotions and opportunities at new firms.

Just as the changing threat environment is creating new staffing needs, it’s also leading the technical certification industry to increase their focus on cybersecurity certification programs. The next 12 months will be full of changes in professional certification programs and IT pros should pay careful attention. Let’s break down some of the biggest developments in the field as we enter the new year.

Published January 2018 in Certification Magazine.
Read the full article: Six Big Cybersecurity Certification Changes for 2018

Posted in Articles | Tagged | Leave a comment

2017 in Review: The Top Cybersecurity News Stories

2017 was quite a year in the world of cybersecurity! From the politicization of cyberwarfare to several major data breaches, hardly a week went by that cybersecurity issues didn’t appear on the front pages of newspapers around the world. Let’s take a moment to recap what I consider to be the 10 biggest cybersecurity news stories of the past 12 months.

Published December 2017 in Certification Magazine.
Read the full article: 2017 in Review: The top cybersecurity news stories

Posted in Articles | Tagged , , , , , , | Leave a comment

IDC PlanScape: Threat Hunting

“Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Organizations that adopt threat hunting programs combine time-tested security knowledge with modern analytic techniques to identify and respond to suspicious activity.”

IDC Research Report published November 2017.

Read the full report: IDC PlanScape: Threat Hunting

Posted in White Papers | Tagged , , | Leave a comment

Data Science in Cybersecurity: Five Questions to Ask Vendors

“There’s a mad rush in the cybersecurity solutions space to use the terms machine learning, analytics, and data science in conjunction with security products. IT executives considering these solutions should ask probing questions that dig through the marketing hype to allow a careful assessment of the scope and depth of analytics techniques. By asking these questions, IT leaders will be better able to assess the potential value to the enterprise,” said Mike Chapple, adjunct research analyst with IDC’s IT Executive Programs (IEP).

IDC Research Report published November 2017.
Read the full report: Data Science in Cybersecurity: Five Questions to Ask Vendors

Posted in White Papers | Tagged | Leave a comment

Addressing the Cybersecurity Skills Gap

Cybersecurity professionals are used to managing crises, from the latest ransomware attack streaking across the Internet to a critical security vulnerability that requires patching hundreds or thousands of systems overnight. Cybersecurity experts step in to help organizations when things go wrong.

Today, the cybersecurity profession itself is facing a crisis that requires a different kind of management. There is a critical skills gap in the profession that will leave many crucial positions unfilled, jeopardizing the security of enterprises around the world.

Published November 2017 in Certification Magazine.
Read the full article: The right cert can provide a strong foundation for your cybersecurity career

Posted in Articles | Tagged | Leave a comment

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple