Information Technology at the Strategy Table

The chief information officers (CIOs) and IT management teams of the past were assigned a budget and then expected to execute necessary operations based on that budget alone. This was a situation that required the IT department to row, so to speak, after the corporate ship. Today, successful companies, including those in the midsize market space, have incorporated the CIO …

Passwords – Creation & Usage – Online Safety & Security

Do you use a password? The evolution of online crime is as much about your password strength as it is about your password usage. If you use your strong password for shopping site A and then reuse the password for shopping sites B, C, D, E, F then you are basically saying to yourself – “I trust each of these sites to have the same robust level of security”

Social Media and Cyber Security (Talk2Cisco)

In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security.  Here is the write-up and recap of the event: Talk2Cisco .  I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses.  I also think the individual will garner value from …

Crimeware – a book review by Christopher

Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).

Security Monitoring – a book review by Christopher

The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.

2008 – Presentations by Christopher Burgess

In 2008, the publication of Secrets Stolen, Fortunes Lost, proved to be the entree to a great many speaking engagements.  Once again, I was invited to NATO’s information assurance conference, and to the AFIO annual intelligence symposium.  All in all 2008, saw a diverse and exiciting schedule of events, all of which served to continue to increase the awareness of …

2007 – Presentations by Christopher Burgess

In 2007 I learned much about the concept of “Thought Leadership” and was pleased to have been invited by both public and private entities to speak to their organizations and personnel.  Visting Purdue University, Massachusetts for the E-Government Summit, and NATO for their Information Assurance conference, and supporting the HTCIA, ASIS, WRG  and AGMA and getting to meet their constituents.    I thoroughly enjoyed visiting the many …