Mission Statement:

“Reach the widest possible worldwide audience with information on data security, business security, and information assurance. Achieve this mission through published books, magazine articles, online forums, public speaking, expert court testimony, instruction, mentoring, and leadership.”

This mission is fulfilled through over fifty published books in five languages, several interviews, over forty articles in Forbes, BusinessWeek, Computerworld, Software Magazine, BankInfoSecurity, Information Security Magazine, and other periodicals, and numerous public speaking appearances including RSA, InfraGard, (ISC)2, ISACA, Interop, and WTIA, advisory board service, and public service projects aimed at improving the state of information security regionally, nationally, and world-wide.

Peter is one of the most admirable and fascinating gentlemen I’ve worked with. A notable author, Peter has the panoramic understanding and expertise on IT/Infrastructure security and Disaster Recovery. He is an expert, a visionary and an able leader – all in one.” — an unsolicited recommendation from a colleague

IMG_9177 crop

Keynote at Victoria Privacy and Security Conference, Victoria Canada (photo credit Albert Beattie)

IMG_8335 crop

Keynote at SecureWorld Expo (photo credit Jennifer Jacoby)

DSC_0048Keynote at the University of Nevada – Reno (photo credit Denise Mandichak)

Each one should use whatever gift he has received to serve others, faithfully administering God’s grace in its various forms. 1 Peter 4:10 (NIV) (more)

* * *

cover_3E final  CoverFinal  Cover mockup  AmazonCover  Cover Amazon  Early Cover  Critical Infrastructure Risk Assessment cover  CBFD front cover  CIPM Cover  CISM Bundle Cover  Screen Shot 2021-10-21 at 17.40.07  CISSP FD 6ed cover  CISM Exams 1ed cover  CDPSE Cover Amazon  CISA Exams Cover  Cover CISSP 5  CISSP 2 Cover  9781119002819.pdf  networking cover  cism  CISA Study Guide 2nd ed  CISSP For Dummies  CISSP Guide to Security Essentials IT Disaster Recovery Planning for DummiesBiometrics for DummiesCISSP3eCover1CISA All-In-One Study GuideSecuring the Vista EnvironmentWindows Vista AdministrationBlocking Spam and Spyware for DummiesCISSP for Dummiesviruses.jpgSecurity+ Certification for DummiesEnterprise Information SecurityEnterprise Information Security, RomanianSun Certified System AdministratorSolaris SecuritySolaris Security, ChineseSolaris Security, Japanese APT FD cover  Threat Hunting FD cover  VEAMM Cover  Stopping 0-Day cover  IT Sec FD Physical Access Control For DummiesIntrusion Prevention Systems For DummiesFirewalls For DummiesSIP Communications For DummiesUCFDunifiedcommfd-spanishConverged Network Security for DummiesMidsized Business Communicationsmidsizedcomm-spanishIMS for DummiesVoIP Security for DummiesSIP Communications for Dummies

Press Kit

Peter and Becky Gregory
Peter Gregory and his wife, c. 2005

Professional Background
Speaking Engagements
Advisory Boards and Memberships
Volunteer Work
Are you an aspiring writer?
Me in 1972


Humor – without it life is just too dull

Contact my publicist using the form below. Include an e-mail address if you would like a reply (but no reply is guaranteed). All communications are held in strictest confidence.

8 thoughts on “Peter H. Gregory, CISM, CISA, CIPM, CRISC, CDPSE, CISSP, DRCE, CCSK

  1. Art Hunt

    Hi Peter,
    Just logged on to your site. I am definitely impressed. You’ve got a great mission and you’re providing a highly needed service.
    Plus, you’ve inspired me to write, “Pastoring for Dummies”!
    Pastor Art

  2. Doug Woodall

    I found your site thru a Google Alert for “Spyware”.
    I think Ive been here before and maybe even left a comment.
    I wanted to compliment you on your site.
    Education about online safety should be a required course.

    Best wishes for you and yours,

  3. theblogline

    Great blog with interesting articles. Do you navigate to the dark parts of the internet to websites but mostly forums which preach and teach how to exploit / hack different sites, systems, etc. ? I find it extremely interesting and insightful as to not only how they do it, but sometimes, why they do it.

  4. Laura Hess

    I found your site through a google search for a Winsock Repair Utility Vista (Vista’s a terrible thing)!

    This site has to be the most comprehensive and thoughtful site I have ever visited!

    Besides your own content, the links are so focused..exactly what I have been praying for!

    Thank you for all that you have done and continue to do.

    God Bless!

  5. Lou Holland

    Was looking at Becky’s and decided to read your blog. Like to see your home page. It seems very interesting, I also have a few of your books. Thanks Auntie Lou

  6. R Steele


    It was just over three years ago that we discussed the possibility of CISA and CISSP certification programs showing up at the university level. With your help, certification course work is now available at the University of WA. where you are an Advisory Board Member for the Certificate Program in Information Systems Security.

    Congratulations on the upcoming release of your new Course Technology book, CISSP Guide to Security Essentials. I always knew you were the right man for the job!

    ~ R Steele

  7. Robert Borders

    I am studying for my CISSP cert and bought your book “CISSP GUIDE TO SECURITY ESSENTIALS”. Great book! Easy to read and understand. It is also clear and concise. Many books take a whole page to state the same thing you state in 2 sentences.

    I plan on taking the CISSP exam next month . I am self-studying by mainly using your book; however, I can’t find the answers to the question, cases, and projects in the book or web site. Please advise.

    Thank You,

    Robert Borders CCNP, MCSE
    Network Engineer


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.