Don’t be the #fail: Why ‘strategy’ should be your strategy for (ISC)2 elections

Once again, I bring you the unfiltered content of JJ’s mind through the blog-o-sphere. What I’m about to share are my opinions and do not represent those of anyone else on the board, near the board, under the board, at the organization or any any way affiliated with (ISC)2. My opinions are not always the […]

MORE > Click the title to read the full article.

Continue reading Don’t be the #fail: Why ‘strategy’ should be your strategy for (ISC)2 elections

The Official RSA Conference Guide by Industry’s Top Snarkers

Sure, sure — you can check out the voluminous agenda and event catalogs detailing what you’ll find at RSA this year. But to get the real scoop on “where the world talks security”, you need an insider’s view, and the most accurate, full-featured, and e… Continue reading The Official RSA Conference Guide by Industry’s Top Snarkers

InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi”. Since the event site doesn’t post the full abstract, I figured I’d share … Continue reading InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi

Your Favorite Speakers at Infosec World 2015

Okay, in full disclosure this probably isn’t going to be a list of YOUR favorite speakers, but it’s a list of some friend, colleagues, and mentors you don’t want to miss at this year’s Infosec World. A key to the session ID codes is below, and my favorite schedule format is their at-a-glance you can […]

MORE > Click the title to read the full article.

Continue reading Your Favorite Speakers at Infosec World 2015