Publications
Books, articles, and items of literary note in my back catalog.
Article: "Where Does Your CISO Report, " July 5, 2022
Article: "Securing New Technology is Going to Be OK, Just Not Today, " May 7, 2019
(ISC)2
Express Learning Course, “Securing the Remote Work Force,” June 2021
Blog Post: "Remote Work During the Pandemic: What We Got Wrong," February 1, 2021
Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World
Securing your mobile data requires the proper balance between security, user acceptance, technology capabilities, and resource commitment. Supplying real-life examples and authoritative guidance, this complete resource walks you through the process of creating an effective mobile security program and provides the understanding required to develop a customized approach to securing your information.
I did a segment on the topic for the AT&T Tech Channel web site.
Information Security Management Handbook
Contributed to the 2001, 2004, 2005, and 2006 editions.
Chapter topics include Phishing, Off-shore Development Risks, Email Retention. Biometric Security, and Penetration Testing.
Official (ISC)2 Guide to the CISSP CBK, Second Edition, 2009
Revised the “Access Control” chapter.
Certified Information Security Manager (CISM) Review Manual, 2009
Contributed to the CISM study guide.