|Articles on Information Security
Insider Threat (Part 1)
Insider Threat (Part 2)
In this two-part article, I discuss the three types of insider threats, and what your organization can and cannot do to fight those
who have betrayed your organization's trust.
Recessions Calls for Better Change Management
During a recession, effective change management is even more important to stop "new criminals"
Leap of Faith
The insider threat is not decreasing. This paper discusses the need to ensure those people you put into positions of
trust can indeed be trusted.
Compliance Motivation Info: The Security Diet
Are personnel in your organization not complying with the information security program? This article contains
advice on how to motivate them to comply.
Risks, Threats & Vulnerabilities: Snowball Lessons
Inspired by teaching my boys, this article explains, without mathematics, the differences between risks, threats, and vulnerabilities.
In this article I discuss the importance of inspecting work areas after-hours, to identify security vulnerabilities. I include 18 of the most common vulnerabilities.
Handheld Device Security
This presentation shows why business leaders should be concerned about handheld device security issues. To help organizations
address such issues, I provide sample polices and discovery tasks.