Prevendra - endpoint security

Cybersecurity Presentation: Quantified Wealth Advisors

Christopher Burgess Burgess - Security Thought Leadership, Uncategorized 0 Comments

Thank you for the opportunity to speak to you today, 22 May 2017, on the topic of cybersecurity. If you find you have questions concerning how to protect your data or that of your clients, feel free to reach out to me via the form at the bottom of the page. Today’s presentation may be downloaded by a click of this …

BYOD: Users are a nightmare without policies

Christopher Burgess Blog, Burgess writes for IBM MidSize Insider, Information Security

Over the course of the past several years business leaders have evaluated and implemented the bring-your-own-device (BYOD) movement as a cost-effective methodology to preserve or reduce information technology (IT) operating expenses. In the quest to reduce these operational expenses, one might overlook the need to have a robust BYOD policy. A policy of this order addresses not only the technological …

Prevendra - Data backup

Where’s Your data and Can You Actually Get To It?

Christopher Burgess Blog, Burgess articles - Huffington Post & El Huffington Post, Information Security

You arrive at work or home. You unload your laptop or go to your desktop and power up the system by pressing the “ON/OFF” button. Lights flicker; nothing happens. If you’re like me your mind races; you sigh and think, “I don’t need this today.” You repeat. You inspect. You scratch your head. This was my situation a few weeks …

Prevendra - Gregory Allen Justice - arrest

Selling secrets to Russia? It’s a bad idea

Christopher Burgess Blog, Burgess writes for Clearance Jobs, Insider Threat, National Security Issues, Russia

The headline read:  Selling Secrets to the Russians? Jason Bourne Fan arrested in spy drama of his own.  Thus implying the motivation for Gregory Allen Justice was his sick wife, a job at which he felt unappreciated and a fascination with cinematic secret operatives such as Jason Bourne and James Bond. There’s more to the story. When he was arrested for what the …

Business woman found risks in information security |

Your IT Security Teams Enable Business

Christopher Burgess Burgess writes for IBM MidSize Insider

Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential for small- to medium-size businesses (SMBs). It is imperative that security team members have a clear understanding of their role as a support to the organization and that their success be measured by the business …

Travel with a USG security clearance? 5 tips for a secure trip

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

Travel security for the cleared professional is incredibly important, both for personal safety as well as the protection of classified information. One of the first briefings an individual receives after being informed that they have been granted a security clearance, is the counterintelligence brief. Included in the counterintelligence brief will be multiple references to foreign and hostile intelligence services and ...
Prevendra's CEO presenting: The Four Vectors Targeting Intellectual Property

The Four Vectors Targeting Intellectual Property

Christopher Burgess Blog, Burgess - Security Thought Leadership, Prevendra in the News

On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra's Two-Day Knowledge Share was, The Four Vectors Targeting Intellectual Property. Those who have read, Secrets Stolen, Fortunes Lost will recognize the vectors to be ...
Prevendra - Facility Security Officer - Cognizant Security Authority

National Security – Facility Security Officer & Cognizant Security Authority

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

Working within the Defense contractor environment, the roles and responsibilities of the facility security officer are of critical importance. Thinking of entering the defense contractor market place or wish to provide services to a classified government customer, Department of Defense, intelligence community or other government agency or department? You will want to familiarize yourself with the National Industrial Security Program …

Prevendra: RSA Conference

Data Leak = Data Compromise

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for RSA Conference

Share this PostHans Brinker Statute - By user:Pieter1 via Wikimedia Commons Have you experienced a data compromise lately? The old adages "still water finds its own level" and "moving water finds a path of least resistance" both have applicability when we think of the result of a data leak. How do employees' engage with data loss prevention (DLP) processes, policies, ...
Prevendra: RSA Conference

When do you introduce Security Awareness training?

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for RSA Conference

A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him via the orientation fire hose. All boxes checked, the employee is good to go, and the security team notes that 100 ...
Prevendra - rejected - NISPOM

Top 10 reasons your employee’s security clearance was rejected

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

We’ve all been there. The Defense Industrial Security Clearance Office (DISCO) or the Office of Personnel Management (OPM) rejects your applicant’s application package. What went wrong? Your employee dutifully filled out all the necessary paperwork you thought the application package was complete and tight. But here you are, reading, “We are sorry to advise that your application package for John …

Prevendra: RSA Conference

Cyber Security Event Denial: If I don’t report it, did it really happen?

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for RSA Conference

“If a tree falls in the forest and no one is there to hear it, does it make a sound?” The technological equivalent of this query within cyber security exists, unfortunately: “If a compromise occurs and no one reports it, did it really happen?” The answer in both instances is, “of course.” Yet the recent survey of 200 security professionals …

Prevendra - IBM Midsize Insider

Customer Loyalty Sweepstakes: The Winner Engages the Customer

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Depth of customer loyalty is driven by product quality coupled with how successfully the engagement with the customer is executed, according to the November 2013 Nielsen report, “How Loyal Are Your Customers?” which was derived from the Nielsen Global Survey of Loyalty Sentiment in which 29,000 Internet respondents from 58 countries participated. Nielsen’s global survey noted loyalty to be fickle, especially when …

Prevendra - IBM Midsize Insider

Information Technology at the Strategy Table

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

The chief information officers (CIOs) and IT management teams of the past were assigned a budget and then expected to execute necessary operations based on that budget alone. This was a situation that required the IT department to row, so to speak, after the corporate ship. Today, successful companies, including those in the midsize market space, have incorporated the CIO …

Security 2014 – Educate and Analyze

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess offered up his thoughts on 2014 Moving into 2014, the chief information officers (CIOs) of small to medium-size businesses (SMBs) have security challenges ahead of them. In an eWeek piece, Michelle Maisto interviewed Steve Durbin, the Internet Security Forum’s global vice president, who made several recommendations of areas of focus for the information …

Resume Security – Know what and where your are posting

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

Resume Security – The security risks associated with resumes, including candidate provision of content and employer’s processes and checks and balances. RESUME SECURITY There are two sides of the coin surrounding the security aspects of the job hunt. On one side of the coin we have the individual and the risks which the individual jobseeker is exposed during their job …

IT Security Teams Enable Business – IBM Midsize Insider – December 2013

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess discusses how IT security teams enable business.   Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential for small- to medium-size businesses (SMBs). It is imperative that security team members have a clear understanding of their role …

Prevendra - endpoint security

Data Breach: The Downside of Data Loss for SMBs – IBM MidSize Insider – December 2013

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess speaks to the downside of data loss to Small Medium Businesses.   Preferred business practices dictate cybe rsecurity, but data protection methodologies are a requirement for endpoint devices that contain customer data to protect against the possibility of a data breach/data loss. Customer data is among the most precious of all data within …

Secure the Data! Big Data Analytics Can Help, IDG Connect, November 2012

Christopher Burgess Burgess - Security Thought Leadership, Burgess articles - General

“Secure the data!” That’s the claxon call that every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to protect one’s data was to place it within the castle-keep behind high walls designed to withstand the attack from catapults …