Information Security Leader, Author, Instructor and Speaker

Default utility Image

What Security Vulnerabilities Should Be Fixed First? TAGS: | | Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →

Default utility Image

Data Loss Prevention and the Financial Firm TAGS: | The financial industry runs on sensitive information.  From confidential customer information and payment card account numbers to sensitive financial analyses, …Continue reading →

Default utility Image

Data Loss Prevention TAGS: | IT executives around the world know the sinking feeling that occurs when a security manager shows up in the doorway …Continue reading →

Default utility Image

Webcast: Content Monitoring in the Enterprise TAGS: | | | From data loss prevention to database activity monitoring and digital rights management, there are a bewildering variety of technologies available …Continue reading →

Default utility Image

Podcast: Countdown: Top Five Ways to Detect Unwanted Data in the Enterprise TAGS: Our file servers, workstations, flash drives and cloud services all contain massive amounts of data, driven by the fact that …Continue reading →

Default utility Image

Metadata security and preventing leakage of sensitive information TAGS: | Most security professionals know metadata often contains sensitive information about documents hidden from obvious view, but easily extracted with the …Continue reading →

Default utility Image

How to Develop a Sound Data Loss Prevention Strategy TAGS: No matter what your line of business, you no doubt have some data in your possession that’s critical to you, …Continue reading →

Default utility Image

What Your Business Can Learn from WikiLeaks TAGS: | Earlier this year, the actions of a 22-year-old brought WikiLeaks, a previously obscure website, into the public spotlight. Pfc. Bradley …Continue reading →

Default utility Image

Finding sensitive information on the endpoint TAGS: | There’s little question that any security manager who’s suffered through a lost laptop incident knows what aspect of the ordeal …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple