• Stacks Image 16
  • Stacks Image 31
  • Stacks Image 29
  • Stacks Image 23

Welcome…

I am a certified information systems security professional, manager, auditor, ethical hacker, forensic investigator, and penetration tester. I am also certified by Microsoft, Apple, and Linux. I have almost 20 years of experience as Vice President of Information Security, Senior Information Security Consultant, Information Security Officer, and Director of Technology in organizations including the federal government, Fortune 500 (banking and marketing) and educational universities.

So…what is information security anyway?

An official description is “the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.” I find it’s easier to describe it simply as the process of protecting your important information from reaching someone that shouldn’t have it. Depending on who you are and what is important to you, that could be your credit card information, medical history, social security number, company trade secrets, or all of the above.

…and why should I care about information security?

People will often lock the doors to their home and install an alarm in order to protect their possessions. This concept is also true for information security, and it can be done in many ways. For example, in order to protect personal information, various locks and alarms should to be put in place, often referred to information security as “layered security.” Some examples of this include encryption, intrusion prevention and detection, and data backups. Whether you’re a home user with a laptop securing a home network or a corporation dealing with regulatory compliance, everyone should be concerned with computer security. Explaining the complexity of information security and how to correctly implement it for your needs are just two areas where I can help.

Stacks Image 83