I recently published the below post on the SANS Internet Storm Center site. I will never forget the name of my first server – Rachel. I was very proud to be the person whose job it was to defend Rachel from all types of disruption. To this day I still remember each IP address, user account, […]
Blog
Community SANS in Pittsburgh
Consider joining me for the next Community SANS event in Pittsburgh, PAon June 16 – June 21, 2014. I will be teaching the SANS Security Essentials Bootcamp Style course. This popular course is appropriate both forpeople new to security as well as those who have been in security foryears. This was the first SANS course I attended […]
Community SANS Returns to Charleston
Consider joining me for the next Community SANS event in Charleston, SC on February 24 – March 1, 2014. I will be teaching the SANS Security Essentials Bootcamp Style course. This popular course is appropriate both for people new to security as well as those who have been in security for years. This was the first SANS course […]
Cloud Computing Atlanta
I am looking forward to speaking at the Cloud Computing Atlanta event on Tuesday November 12. This meeting will be held at the Advanced Technology Development Center (ATDC) at Georgia Tech and is open to the public. I will be speaking about the 20 Critical Security Controls and how it can be applied in a cloud hosting […]
Security BSides DC
I am thrilled to be a speaker at the upcoming Security BSides DC. The lineup for this 2 day event is outstanding. I look forward to speaking on the 20 Security Controls and specifically how they can be used to improve the security of your network.
How to get sufficient funding for your security program (without having a major incident) – Repost
I recently had another guest diary published on the SANS Internet Storm Center Diary. I have enjoyed the material on the ISC site for many years and consider it an honor to contribute. I hope this is helpful information that you can use to secure sufficient funding for your security program in advance of your next security incident. […]