Lessons on Lessons Learned
As an incognito project manager, I found it very refreshing to watch and participate in discovering and applying lessons learned […]
Lessons on Lessons Learned Read More »
As an incognito project manager, I found it very refreshing to watch and participate in discovering and applying lessons learned […]
Lessons on Lessons Learned Read More »
Once again as an Incognito Project Manager, here are some observations on the Power of being Proactive… Prior to
Lessons in Being Proactive Read More »
I recently changed hats from project team-builder to project team member. As the e-learning course developer on the team, it
Lessons from an Incognito Project Manager Read More »
I believe that most people in the computer-using community (which now is just about everybody in the developed nations) want to do the right thing, and can do the right thing. They just need to know what the right things are, and how to do them.
Administrative controls are perhaps most important, because they most directly impact your people. On the one hand, they are the simplest, since all it takes is education. On the other hand, education about the hazards of smoking or the possibility that having sex causes pregnancy hasn’t done much to change behaviors in those realms. Well, rather than throw up our hands and give up, let’s tackle administrative controls anyhow…
Administrative Security Controls Read More »
There is a lot to talk about with regard to technical security controls, aka the “sexy stuff” like firewalls and IDS. So rather than bore you with technobabble (in Scrappy Information Security, I start with packets, headers, ports & MACs as a way of introducing how the Internet works), I will instead focus on an explanation of encryption.
Technical Security Controls Read More »
I think most of us “get” physical security. Still, a few basic (and a few not-so-basic) physical security controls worth discussing include…
Physical Security Controls Read More »
When teaching “InfoSec 101,” I reflect back on my early career as a reporter, and focus on answering the standard questions: who, what, why, where, when, and how. Since this is a Scrappy Book, let’s throw caution to the wind and take them out of order…
We’re adults, and we like to know “why.” I would like to share some of the whys of information security, so that you can understand why the infosec guys can be so darned stubborn.
Scrappy Information Security Read More »
There’s one significant characteristic of a leader that I have not mentioned: Be a model for those behaviors and traits
Change Leadership takes one step after the other Read More »