First of all I wanted to thank those who attended these sessions live at ICS-ISAC #SARACon. I enjoyed your input and thank you for the stimulating conversations and questions. I also apologize for a mix up on the first session as I forgot to turn on my lapel audio feed. The first session … [Read more...] about Video Training sessions from ICS-ISAC #SARACon
Welcome back. This month I have posted the first of the next phase of articles in the series. This phase will use the concepts defined in the last phase of articles which were released over the last year. The first of this new phase of articles Exploring the Critical Infrastructure Security … [Read more...] about What makes up the Critical Infrastructure Security Eco-system?
I have been asked this a few times, so I thought I would post my response.......... During my time working for a TPM manufacturer, we worked extensively on TPM adoption which seemed to be stagnant with the saturated growth phase of the PC industry. The thought at first was to achieve market … [Read more...] about How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?
Video Introduction to my latest article on Fierce Smart Grid. Listen to see how my research path led me to Security Management as a practice. The content for this article is on Fierce Smart Grid and lays the ground work for future topics on Secrets Management for Critical … [Read more...] about Managing Cryptographic Keys for Critical Infrastructure
For a limited time, attend our entry course Introductions to Security Management for Critical Infrastructure and use the following discount code when registering for 50% off the listed price!!! Discount Code: Expired It is an exciting time in the evolution of the digital age, we have an … [Read more...] about 50% Special offer!!! – Security Management for Critical Infrastructure
I though this article written by a good friend Victoria Wagner @victoriaross888 provided an interesting topic to discuss. Do governments have anything to gain by keeping the status quo in regards to the current digital age cyber environment? Really would the U.S. or China (using the example of … [Read more...] about Do governments really want to prevent hacking?
Check out our exciting new release Security Management for Critical Infrastructure , the first two courses in this series are now available online to take online at your own pace. Gain a deep understanding of topics which have been the featured in the highly circulate publications by cyber security … [Read more...] about New Course Release – Security Management for Critical Infrastructure
I got several comments on how much this portion of my latest training helped participants. Its worth the 3:30 min to view "I really, like how you use examples on "Which Cyber Security is Right" and "That section changed the way I think about Cyber Security" For more detailed 10 minute … [Read more...] about Which Cyber Security is Right?
Comment from first viewing of this video clip "This 10 minute clip changed the way I think about Cyber Security" … [Read more...] about Video clip “Business Models For Cyber Security”
Since I have received this question several times (in many different ways) thought I would make a post of my response. Question: I am interested to find out how you center yourself and clear your head before writing. I have had difficulty clearing my thoughts in getting my ideas out there. I do … [Read more...] about How to center yourself and clear your head before writing