All posts by: Christopher Burgess

National Security – Facility Security Officer & Cognizant Security Authority

Working within the Defense contractor environment, the roles and responsibilities of the facility security officer are of critical importance. Thinking of entering the defense contractor market place or wish to provide services to a classified government customer, Department of Defense,... Read More

Media – News – Commentary

[vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/2″][callout type=”center” button_icon=”tablet” circle=”true” target=”blank” title=”Media?” message=”Expert commentary? Expert analysis? Local, National or International focus?” button_text=”Click the drop-down to the right” href=”” id=”” class=”” style=””][/vc_column][vc_column fade_animation_offset=”45px” width=”1/2″][feature_headline type=”center” level=”h3″ looks_like=”h3″ icon=”video-camera” id=”” class=”” style=””]FAQ for Media[/feature_headline][line][accordion... Read More

Data Leak = Data Compromise

[vc_row][vc_column width=”1/1″][share facebook=”true” twitter=”true” google_plus=”true” linkedin=”true” pinterest=”true” email=”true”][text_output] Have you experienced a data compromise lately? The old adages “still water finds its own level” and “moving water finds a path of least resistance” both have applicability when we think of... Read More

When do you introduce Security Awareness training?

[vc_row][vc_column width=”1/1″][text_output]A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him... Read More

Top 10 reasons your employee’s security clearance was rejected

We’ve all been there. The Defense Industrial Security Clearance Office (DISCO) or the Office of Personnel Management (OPM) rejects your applicant’s application package. What went wrong? Your employee dutifully filled out all the necessary paperwork you thought the application package... Read More

Cyber Security Event Denial: If I don’t report it, did it really happen?

“If a tree falls in the forest and no one is there to hear it, does it make a sound?” The technological equivalent of this query within cyber security exists, unfortunately: “If a compromise occurs and no one reports it,... Read More

Customer Loyalty Sweepstakes: The Winner Engages the Customer

Depth of customer loyalty is driven by product quality coupled with how successfully the engagement with the customer is executed, according to the November 2013 Nielsen report, “How Loyal Are Your Customers?” which was derived from the Nielsen Global Survey of Loyalty... Read More

Information Technology at the Strategy Table

The chief information officers (CIOs) and IT management teams of the past were assigned a budget and then expected to execute necessary operations based on that budget alone. This was a situation that required the IT department to row, so... Read More

VOA – “Careto” – ‘Mask’ malware – a cyber espionage operation

‘Mask” Malware Called ‘Most Advanced’ Cyber-espionage Operation – (February 13, 2014): Prevendra’s CEO, Christopher Burgess is interviewed by VOA about  the Advanced Persistent Threat Malware – “Careto.” WASHINGTON — Researchers at the Internet security firm Kaspersky Lab say they have uncovered... Read More

Etiquette this Safer Internet Day 2014

    It is often times hard to absorb all of the avenues by which we interconnect online and how those connections create opportunity. Opportunity for good, and the not so good behaviors. Take for example, the many networks that have evolved... Read More

VOA: Sochi Games Present Hacking Minefield

Sochi Games Present Hacking Minefield – (February 05, 2014): The U.S. State Department is warning Americans traveling to the Olympic Games in Sochi, Russia, not to expect much in the way of privacy. Specifically, the State Department says travelers should... Read More

Human Trafficking – Slavery at Sea

[vc_row][vc_column][vc_column_text] On 25 January 2014, Scottish Express carried a story, “Boat Slave Shame of Fishing Industry” which details slavery at sea, the continued practice of bringing in foreign workers to man the fishing fleets and then isolating and effectively enslaving these... Read More

VOA – More Questions than Answers About China Internet Outage

More Questions than Answers About China Internet Outage – (January 22, 2014): Chinese Internet users are now able to access numerous websites including Baidu and Sina Weibo after the country once again experienced massive outages Tuesday. According to the China... Read More

Prevendra’s CEO on the BBC discussing the NSA reforms

BBC’s “World have your say” program discusses President Obama’s speech and his recommendations for National Security Agency (NSA) reforms. On 17 January 2014, Prevendra’s CEO, Christopher Burgess participated in the BBC’s World Service “World have your say” radio program. The... Read More

Homeland Security Today: No Vacancy – The daunting challenge of hotel security

In the December 2013/January 2014 issue of Homeland Security Today magazine, “No Vacancy – The daunting challenge of hotel security” discusses hotel security from the hotel’s perspective as well as that of those who might be lodging with the hotels.  The author,... Read More

Security 2014 – Educate and Analyze

Writing for IBM Midsize Insider, Christopher Burgess offered up his thoughts on 2014 Moving into 2014, the chief information officers (CIOs) of small to medium-size businesses (SMBs) have security challenges ahead of them. In an eWeek piece, Michelle Maisto interviewed... Read More

Resume Security – Know what and where your are posting

Resume Security – The security risks associated with resumes, including candidate provision of content and employer’s processes and checks and balances. RESUME SECURITY There are two sides of the coin surrounding the security aspects of the job hunt. On one... Read More

IT Security Teams Enable Business – IBM Midsize Insider – December 2013

Writing for IBM Midsize Insider, Christopher Burgess discusses how IT security teams enable business.   Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential... Read More

Espionage in the Heartland: Rice to China

On 12 December 2013, a criminal complaint was filed by the United States Attorney in the Kansas District, petitioning for the arrest of two individuals, with ties to China, for the theft of  trade secrets from Ventria Bioscience and other... Read More

Data Breach: The Downside of Data Loss for SMBs – IBM MidSize Insider – December 2013

Writing for IBM Midsize Insider, Christopher Burgess speaks to the downside of data loss to Small Medium Businesses.   Preferred business practices dictate cybe rsecurity, but data protection methodologies are a requirement for endpoint devices that contain customer data to... Read More