Posts filed under: Burgess – Security Thought Leadership

Travel with a USG security clearance? 5 tips for a secure trip

[vc_row][vc_column width=”1/1″][text_output]Travel security for the cleared professional is incredibly important, both for personal safety as well as the protection of classified information. One of the first briefings an individual receives after being informed that they have been granted a security... Read More

The Four Vectors Targeting Intellectual Property

[vc_row][vc_column width=”1/1″][text_output]On 18 February, CEO Prevendra, Christopher Burgess had the pleasure to present at the Seattle Technical Forum conclave, one of five, presenting on a topic within cyber security. His topic, drawn from the offerings of Prevendra’s Two-Day Knowledge Share... Read More

National Security – Facility Security Officer & Cognizant Security Authority

Working within the Defense contractor environment, the roles and responsibilities of the facility security officer are of critical importance. Thinking of entering the defense contractor market place or wish to provide services to a classified government customer, Department of Defense,... Read More

Data Leak = Data Compromise

[vc_row][vc_column width=”1/1″][share facebook=”true” twitter=”true” google_plus=”true” linkedin=”true” pinterest=”true” email=”true”][text_output] Have you experienced a data compromise lately? The old adages “still water finds its own level” and “moving water finds a path of least resistance” both have applicability when we think of... Read More

When do you introduce Security Awareness training?

[vc_row][vc_column width=”1/1″][text_output]A new employee shows up on day one and walks through his ID card briefing, compensation and benefits brief, and security brief, meets his new team and manager, and tries to retain all the information rushing out at him... Read More

Top 10 reasons your employee’s security clearance was rejected

We’ve all been there. The Defense Industrial Security Clearance Office (DISCO) or the Office of Personnel Management (OPM) rejects your applicant’s application package. What went wrong? Your employee dutifully filled out all the necessary paperwork you thought the application package... Read More

Cyber Security Event Denial: If I don’t report it, did it really happen?

“If a tree falls in the forest and no one is there to hear it, does it make a sound?” The technological equivalent of this query within cyber security exists, unfortunately: “If a compromise occurs and no one reports it,... Read More

Customer Loyalty Sweepstakes: The Winner Engages the Customer

Depth of customer loyalty is driven by product quality coupled with how successfully the engagement with the customer is executed, according to the November 2013 Nielsen report, “How Loyal Are Your Customers?” which was derived from the Nielsen Global Survey of Loyalty... Read More

Information Technology at the Strategy Table

The chief information officers (CIOs) and IT management teams of the past were assigned a budget and then expected to execute necessary operations based on that budget alone. This was a situation that required the IT department to row, so... Read More

Security 2014 – Educate and Analyze

Writing for IBM Midsize Insider, Christopher Burgess offered up his thoughts on 2014 Moving into 2014, the chief information officers (CIOs) of small to medium-size businesses (SMBs) have security challenges ahead of them. In an eWeek piece, Michelle Maisto interviewed... Read More

Resume Security – Know what and where your are posting

Resume Security – The security risks associated with resumes, including candidate provision of content and employer’s processes and checks and balances. RESUME SECURITY There are two sides of the coin surrounding the security aspects of the job hunt. On one... Read More

IT Security Teams Enable Business – IBM Midsize Insider – December 2013

Writing for IBM Midsize Insider, Christopher Burgess discusses how IT security teams enable business.   Having an IT security team is an imperative for all companies, not just those in the enterprise space. This dedicated set of eyes is essential... Read More

Data Breach: The Downside of Data Loss for SMBs – IBM MidSize Insider – December 2013

Writing for IBM Midsize Insider, Christopher Burgess speaks to the downside of data loss to Small Medium Businesses.   Preferred business practices dictate cybe rsecurity, but data protection methodologies are a requirement for endpoint devices that contain customer data to... Read More

Secure the Data! Big Data Analytics Can Help, IDG Connect, November 2012

“Secure the data!” That’s the claxon call that every chief security officer (CSO) or chief information security officer (CISO) hears 24/7/365 coming from their CEO, their customers and their partners. In the 12th century AD, the methodology of choice to... Read More