Interviews

The CISO/Security Vendor Relationship: The “15 Minutes of Your Time” Request | Interview by Forbes Magazine
The CISO/Security Vendor Relationship: Do CISOs Fall for Obvious Sales Ploys? | Interview by Forbes Magazine
A Day in the Life of Optiv Cyber Security Superheroes | Interview by Optiv
Interview | Interview by David Spark, “Twenty Ways Online Meetings Are Changing The Face Of Business”
Interview | Interview by Art of the Hack (powered by CSO), “20 of the Most Misguided Beliefs About Infosec”
Interview | Interview by SC Magazine in its ebook, Internet of Things (IoT) SC Magazine
Interview | Video interview on the topic of organizations continuing to build unsecure products and systems by SecureWorld Expo swe
Instructor Profile | interview by University of Washington department of Professional and Continuing Education
Information Security Tips by a Guru | interview in My Information Security Job e-magazine
The Same Five Questions | interview in IBM Forward View Magazine (registration may be required to view content) Podcast on iTunes IBM
Me and my job | interview in SC Magazine SC Magazine
Twitter security: There’s still a lot of work to do | quoted in C|Net News article CNet
Intrusion defense in the era of Windows Vista| screencast at Search Midmarket Security
Boost Your Career and Your Paycheck | quotes in (ISC)² eBook promoting the data security profession ISC2
Money for nothing and security for free | SearchSecurity SearchSecurity
Are you certified yet? Why not? | Gocertify Gocertify
More or less: Browser security reloaded (podcast) | Bitpipe Bitpipe
Microsoft plans changes to Patch Tuesday | SearchSecurity SearchSecurity
Quote from a Computerworld Article in an ad from the University of Fairfax U of Fairfax logo_large
Best of the Web: Analysis of TJX 10-K SEC report Dark Reading Daily Dark Reading Daily
Token Support Isn’t Enough | Information Security Magazine Information Security Magazine
The XX Factor | Information Security Magazine  Information Security Magazine
Moving On Up | Information Security Magazine  Information Security Magazine
Data Scandal: Do you know how to respond to the inevitable security breach? You’d better. | Computerworld Magazine. CIO Magazine CIO Magazine
Legal Niceties | Computerworld Magazine Computerworld Magazine
Best Advice | Information Security Magazine. Print edition includes photograph. Information Security Magazine
Spending on software patches is a tough sell | SearchWindowsSecurity.com, SearchSMB.com SearchSMB.com
Peer-to-Peer | Information Security Magazine Peer to Peer
LexisNexis break-in spurs more calls for reform | C|Net News , Tech Republic Tech Republic
Security drives information analyst, day and night | The Seattle Times. Seattle Times
CERT creates incident-response certification | SearchSecurity SearchSecurity
Schools stay mum on file traders’ names | C|Net News CNet
(More Than) Five Questions With . . . Cybersecurity expert Peter Gregory | The Direct Marketing Association. (no longer carried on DMA web site; PDF available here) DMA_logo
CIO, CPO Relationship Becoming Key in IT Shops | SearchCIO SearchCIO
The ABCs of the CPO position | SearchSecurity SearchSecurity
Insecurities over Indian outsourcing | Tech Republic Tech Republic
Companies creating more chief privacy officer jobs | SearchSecurity SearchSecurity
Cert Spotlight: CISA focuses on information assurance | SearchSecurity SearchSecurity
Does your CSO need to be a techie? | SearchSecurity SearchSecurity
Cert Spotlight: CISSPs ‘know’ security | SearchSecurity SearchSecurity
Author interview: Sun Systems Administration certifications | GoCertify Gocertify
Author interview: Sun Certified System Administrator for Solaris 8 Study Guide | CertificationBooks.com
Article on published authors (no longer carried on web site) | Independent Publisher Magazine Independent Publisher
Advertisements

One thought on “Interviews

  1. Pingback: Author, Instructor, Security Advisor |

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s