In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses. I also think the individual will garner value from …
Out of Control User = Frenetic IT
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing how another user has caused a “blip” that will stretch your capabilities to protect both the user during their online …
Online Safety: Today Begins National Cyber Security Awareness Month
Today marks the beginning of National Cyber Security Awareness Month in the United States. I urge you to take a moment each day to educate yourself, your family, your colleagues on the need to be vigilant, proactive and engaged with respect to protecting your online persona and also your business. Your personal data and privacy are your responsibility to maintain …
Our Family Is Our Responsibility
I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective. One question which I fielded surrounded whether or not there is risk to children via the various social media networks (i.e., Facebook) or should one accept that if someone really wants to hurt my family they don’t need …
Crimeware – a book review by Christopher
Five stars to Jakobsson & Ramzan for a most useful guide to understanding the underbelly of the internet. The strength exhibited by this book lies within the all-star lineup of contributors and the thorough dissection of the numerous forms of crimeware. Their book is a must read for anyone who has responsibility or an interest in protecting Personal Identifying Information (PII), Private Consumer Information (PCI) or Intellectual Property (IP).
Security Monitoring – a book review by Christopher
The guide is a professional guide, with exemplars which can be used in a sandbox, or to assist you in noodling through specific infrastructure monitoring issues – such as “tuning” so the incident logs tell you the story, and don’t drown you in event data. This book should be in every incident responset team’s professional library.
2008 – Presentations by Christopher Burgess
In 2008, the publication of Secrets Stolen, Fortunes Lost, proved to be the entree to a great many speaking engagements. Once again, I was invited to NATO’s information assurance conference, and to the AFIO annual intelligence symposium. All in all 2008, saw a diverse and exiciting schedule of events, all of which served to continue to increase the awareness of …
2007 – Presentations by Christopher Burgess
In 2007 I learned much about the concept of “Thought Leadership” and was pleased to have been invited by both public and private entities to speak to their organizations and personnel. Visting Purdue University, Massachusetts for the E-Government Summit, and NATO for their Information Assurance conference, and supporting the HTCIA, ASIS, WRG and AGMA and getting to meet their constituents. I thoroughly enjoyed visiting the many …
- Page 2 of 2
- 1
- 2