Category: Information Assurance and Security

Am I looking for a job?

I’m a senior executive, a subject matter expert, and an influential strategic leader in cyber security. Why would I always be looking for a job, why would I always be keeping my ear to the ground, and why would I…

NDU Presentation to the faculty

I’ve been asked to talk about a variety of topics. This particular topic was a strategic look at three policy changes that might degrade, deter, or disrupt adversary capability in cyberspace. NDU IRMC 2016 Presentation (PPT)  

Some ICS Reading Resources

Quick hit on some things for reading up on control system security. One of my favorites is Kurtz, R., (2006) “Securing SCADA Systems” this particular book is older, but it has a great section on comparing ICS security protocols. Meant…

Curmudgeon Information Security Officer

After reading the first third of “Disrupted; My Misadventure in the startup bubble” by Dan Lyons I realized that I had been marketing myself all wrong. Hiring managers like the little-emperors of China want happy, go-lucky, youthful, soft individuals to…

A nightmare scenario: FedCyber

Bruce Schenier has his hollywood movie script for cyber terror, and Bob Gourley has a similar scenario at FedCyber. I wanted to answer the call before the presentations because I was going to put it into the perspective of my…