Prevendra - endpoint security

Cybersecurity Presentation: Quantified Wealth Advisors

Christopher Burgess Burgess - Security Thought Leadership, Uncategorized

Thank you for the opportunity to speak to you today, 22 May 2017, on the topic of cybersecurity. If you find you have questions concerning how to protect your data or that of your clients, feel free to reach out to me via the form at the bottom of the page. Today’s presentation may be downloaded by a click of this …

BYOD: Users are a nightmare without policies

Christopher Burgess Blog, Burgess writes for IBM MidSize Insider, Information Security

Over the course of the past several years business leaders have evaluated and implemented the bring-your-own-device (BYOD) movement as a cost-effective methodology to preserve or reduce information technology (IT) operating expenses. In the quest to reduce these operational expenses, one might overlook the need to have a robust BYOD policy. A policy of this order addresses not only the technological …

Prevendra - Data backup

Where’s Your data and Can You Actually Get To It?

Christopher Burgess Blog, Burgess articles - Huffington Post & El Huffington Post, Information Security

You arrive at work or home. You unload your laptop or go to your desktop and power up the system by pressing the “ON/OFF” button. Lights flicker; nothing happens. If you’re like me your mind races; you sigh and think, “I don’t need this today.” You repeat. You inspect. You scratch your head. This was my situation a few weeks …

Prevendra - Gregory Allen Justice - arrest

Selling secrets to Russia? It’s a bad idea

Christopher Burgess Blog, Burgess writes for Clearance Jobs, Insider Threat, National Security Issues, Russia

The headline read:  Selling Secrets to the Russians? Jason Bourne Fan arrested in spy drama of his own.  Thus implying the motivation for Gregory Allen Justice was his sick wife, a job at which he felt unappreciated and a fascination with cinematic secret operatives such as Jason Bourne and James Bond. There’s more to the story. When he was arrested for what the …

Business woman found risks in information security |

Your IT Security Teams Enable Business

Christopher Burgess Burgess writes for IBM MidSize Insider

Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential for small- to medium-size businesses (SMBs). It is imperative that security team members have a clear understanding of their role as a support to the organization and that their success be measured by the business …

Prevendra - Facility Security Officer - Cognizant Security Authority

National Security – Facility Security Officer & Cognizant Security Authority

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

Working within the Defense contractor environment, the roles and responsibilities of the facility security officer are of critical importance. Thinking of entering the defense contractor market place or wish to provide services to a classified government customer, Department of Defense, intelligence community or other government agency or department? You will want to familiarize yourself with the National Industrial Security Program …

Prevendra - rejected - NISPOM

Top 10 reasons your employee’s security clearance was rejected

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

We’ve all been there. The Defense Industrial Security Clearance Office (DISCO) or the Office of Personnel Management (OPM) rejects your applicant’s application package. What went wrong? Your employee dutifully filled out all the necessary paperwork you thought the application package was complete and tight. But here you are, reading, “We are sorry to advise that your application package for John …

Prevendra: RSA Conference

Cyber Security Event Denial: If I don’t report it, did it really happen?

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for RSA Conference

“If a tree falls in the forest and no one is there to hear it, does it make a sound?” The technological equivalent of this query within cyber security exists, unfortunately: “If a compromise occurs and no one reports it, did it really happen?” The answer in both instances is, “of course.” Yet the recent survey of 200 security professionals …

Prevendra - IBM Midsize Insider

Customer Loyalty Sweepstakes: The Winner Engages the Customer

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Depth of customer loyalty is driven by product quality coupled with how successfully the engagement with the customer is executed, according to the November 2013 Nielsen report, “How Loyal Are Your Customers?” which was derived from the Nielsen Global Survey of Loyalty Sentiment in which 29,000 Internet respondents from 58 countries participated. Nielsen’s global survey noted loyalty to be fickle, especially when …

Prevendra - IBM Midsize Insider

Information Technology at the Strategy Table

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

The chief information officers (CIOs) and IT management teams of the past were assigned a budget and then expected to execute necessary operations based on that budget alone. This was a situation that required the IT department to row, so to speak, after the corporate ship. Today, successful companies, including those in the midsize market space, have incorporated the CIO …

Security 2014 – Educate and Analyze

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess offered up his thoughts on 2014 Moving into 2014, the chief information officers (CIOs) of small to medium-size businesses (SMBs) have security challenges ahead of them. In an eWeek piece, Michelle Maisto interviewed Steve Durbin, the Internet Security Forum’s global vice president, who made several recommendations of areas of focus for the information …

Resume Security – Know what and where your are posting

Christopher Burgess Blog, Burgess - Security Thought Leadership, Burgess writes for Clearance Jobs, NISPOM/DCID

Resume Security – The security risks associated with resumes, including candidate provision of content and employer’s processes and checks and balances. RESUME SECURITY There are two sides of the coin surrounding the security aspects of the job hunt. On one side of the coin we have the individual and the risks which the individual jobseeker is exposed during their job …

IT Security Teams Enable Business – IBM Midsize Insider – December 2013

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess discusses how IT security teams enable business.   Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential for small- to medium-size businesses (SMBs). It is imperative that security team members have a clear understanding of their role …

Prevendra - endpoint security

Data Breach: The Downside of Data Loss for SMBs – IBM MidSize Insider – December 2013

Christopher Burgess Burgess - Security Thought Leadership, Burgess writes for IBM MidSize Insider

Writing for IBM Midsize Insider, Christopher Burgess speaks to the downside of data loss to Small Medium Businesses.   Preferred business practices dictate cybe rsecurity, but data protection methodologies are a requirement for endpoint devices that contain customer data to protect against the possibility of a data breach/data loss. Customer data is among the most precious of all data within …

Secure the Data! Big Data Analytics Can Help, IDG Connect, November 2012

Christopher Burgess Burgess - Security Thought Leadership, Burgess articles - General

“Secure the data!” That’s the claxon call that every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to protect one’s data was to place it within the castle-keep behind high walls designed to withstand the attack from catapults …