• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Logic Central Academy

Technological Era Education and Training

  • Contact me
  • Home
  • About
  • Education and Training
    • Cyber Security Courses
      • Cyber Security Career Guidance Series
      • Security Management for Critical infrastructure Series
      • Secure Coding Series
      • Secure Testing Series
    • License Training Material
    • Mentoring
  • Consulting
  • Speaking
  • Categories
    • Business Management
    • Security Management
      • Data Lifecycle Management
      • Trust Management
      • Secrets Management
      • Supply Chain Management
    • Cyber Security
    • Critical Infrastructure
    • Self Help
    • Publications
    • Partners
    • Uncategorized

Security Eco-system, Creative Holistic Solutions

November 13, 2014 by admin 1 Comment

As we have laid the groundwork over the last year and a half of publications focused on Security Management for Critical Infrastructure, we can now start to link some solid solution details. This article is the first part of a multi-part release which will outline the component and access features … [Read more...] about Security Eco-system, Creative Holistic Solutions

Filed Under: Critical Infrastructure, Secrets Management, Security Management, Supply Chain Management

Video Training sessions from ICS-ISAC #SARACon

September 25, 2014 by admin Leave a Comment

First of all I wanted to thank those who attended these sessions live at ICS-ISAC #SARACon.  I enjoyed your input and thank you for the stimulating conversations and questions.  I also apologize for a mix up on the first session as I forgot to turn on my lapel audio feed. The first session … [Read more...] about Video Training sessions from ICS-ISAC #SARACon

Filed Under: Business Management, Critical Infrastructure, Secrets Management, Security Management, Supply Chain Management

What makes up the Critical Infrastructure Security Eco-system?

September 18, 2014 by admin 1 Comment

Welcome back. This month I have posted the first of the next phase of articles in the series. This phase will use the concepts defined in the last phase of articles which were released  over the last year. The first of this new phase of articles Exploring the Critical Infrastructure Security … [Read more...] about What makes up the Critical Infrastructure Security Eco-system?

Filed Under: Critical Infrastructure, Security Management, Supply Chain Management

How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?

August 7, 2014 by admin 6 Comments

I have been asked this a few times, so I thought I would post my response.......... During my time working for a TPM manufacturer, we worked extensively on TPM adoption which seemed to be stagnant with the saturated growth phase of the PC industry. The thought at first was to achieve market … [Read more...] about How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?

Filed Under: Cyber Security, Security Management, Trust Management

Managing Cryptographic Keys for Critical Infrastructure

July 17, 2014 by admin 3 Comments

Video Introduction to my latest article on Fierce Smart Grid. Listen to see how my research path led me to Security Management as a practice. The content for this article is on Fierce Smart Grid and lays the ground work for future topics on Secrets Management for Critical … [Read more...] about Managing Cryptographic Keys for Critical Infrastructure

Filed Under: Critical Infrastructure, Secrets Management, Security Management

50% Special offer!!! – Security Management for Critical Infrastructure

June 27, 2014 by admin 1 Comment

For a limited time, attend our entry course Introductions to Security Management for Critical Infrastructure and use the following discount code when registering for 50% off the listed price!!! Discount Code: Expired It is an exciting time in the evolution of the digital age, we have an … [Read more...] about 50% Special offer!!! – Security Management for Critical Infrastructure

Filed Under: Critical Infrastructure, Cyber Security, Security Management

Do governments really want to prevent hacking?

June 11, 2014 by admin 1 Comment

I though this article written by a good friend  Victoria Wagner @victoriaross888 provided an interesting topic to discuss. Do governments have anything to gain by keeping the status quo in regards to the current digital age cyber environment? Really would the U.S. or China (using the example of … [Read more...] about Do governments really want to prevent hacking?

Filed Under: Cyber Security

New Course Release – Security Management for Critical Infrastructure

June 5, 2014 by admin Leave a Comment

Check out our exciting new release Security Management for Critical Infrastructure , the first two courses in this series are now available online to take online at your own pace. Gain a deep understanding of topics which have been the featured in the highly circulate publications by cyber security … [Read more...] about New Course Release – Security Management for Critical Infrastructure

Filed Under: Business Management, Critical Infrastructure, Cyber Security, Data Lifecycle Management, Secrets Management, Security Management, Supply Chain Management, Trust Management

Which Cyber Security is Right?

May 26, 2014 by admin Leave a Comment

I got several comments on how much this portion of my latest training helped participants. Its worth the 3:30 min to view "I really, like how you use examples on "Which Cyber Security is Right" and "That section changed the way I think about Cyber Security" For more detailed 10 minute … [Read more...] about Which Cyber Security is Right?

Filed Under: Business Management, Cyber Security, Security Management

Video clip “Business Models For Cyber Security”

May 26, 2014 by admin Leave a Comment

Comment  from first viewing of this video clip "This 10 minute clip changed the way I think about Cyber Security" … [Read more...] about Video clip “Business Models For Cyber Security”

Filed Under: Business Management, Cyber Security, Security Management

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Go to Next Page »

Primary Sidebar

Christopher Gorog Coffee With Chris Podcast, Listen or join candid talks with the Logic Central Academy Founder. Visit our Media Site.

Connect With Me Online

  • Email
  • Facebook
  • LinkedIn
  • YouTube

RECENT POSTS

  • (no title)
  • Cyber Security needs a Socio-Technological era solution
  • Exciting New High School Concept
  • A Call for Participation in IoT Cyber Research
  • CWC Cyber – Conversation with DHS’s Chuck Brooks

Copyright © 2023 · Genesis Framework · WordPress · Log in