Thursday Dec 18

InfoSec Life Lessons from Dr. Seuss- keynote debut and BruCon

Wednesday, 3 December 2014 08:56

InfoSec Life Lessons from Dr. Seuss- keynote debut and BruCon

Recently I had the pleasure of unveiling my new keynote, “InfoSec Life Lessons from Dr. Seuss” at the BruCon conference hosted each year in Gent, Belgium. The event is absolutely amazing, extremely well-managed, features some of the best speakers, and offers actionable content. The energy and collaboration was off the charts and I would highly recommend any colleagues to attend this conference if given the opportunity.

title slide Dr Seuss

The opportunity to share a new message was a key point of my excitement at this conference. For the first time, I stepped completely outside of my comfort zone of technical content and in to a realm of virgin leadership territory. It was terrifying, exhilarating and I’m so happy to share it with you here. The full video presentation is available on YouTube in its entirety. Some anecdotal scenes are detailed below by timestamp.

Read more: InfoSec Life Lessons from Dr. Seuss- keynote debut and BruCon

JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Friday, 28 November 2014 10:06

JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Each year we go through the same cycle of love and hate during the annual (ISC)2 Board of Directors elections. Across the social media worlds, the apathy and frustration come head-to-head with excitement and hope. Disenfranchised members ask “why vote?” and “who cares?”, or make comments about how “nothing will change”. The more engaged crowd, led by hope and motivated by incremental change pushes for engagement and participation.

Read more: JJ’s Top 10 Reasons to Vote in (ISC)2 Elections

Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

Friday, 28 November 2014 09:00

Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

As a Board Member of not just (ISC)2, but also of the (ISC)2 Foundation, I’m very excited to share that (ISC)2 is offering a live, in-person Safe and Secure Online Volunteer Training right here in North Carolina on Tuesday, December 2nd. The training runs from 11am-2pm with a break for lunch. It’s definitely worth the drive from Greensboro, Winston-Salem, Raleigh, Sanford, Durham and even Charlotte and Greenville. These live trainings are typically only offered at large industry events such as the RSA Conference and Security Congress. As the event description notes, it really is a unique opportunity and I hope my colleagues in the area will join me in taking full advantage!

Read more: Give Back: Volunteer Training for Safe and Secure Online in NC December 2nd

Calling Bull$#** on Women in Infosec

Tuesday, 25 February 2014 10:11

Calling Bull$#** on Women in Infosec

Okay folks, I’m tired of hearing about “women in infosec” in its current topical form. I’ve stayed miles away from this topic for years, but now I’m going to speak up. And, to start the conversation, I call BULLSHIT. Not on the notion that we need more women in infosec, but on the methods, the justification and the explanation of why (or, lack thereof).  Hang tight for that one – the why – that’s coming in my next post.

Read more: Calling Bull$#** on Women in Infosec

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Friday, 21 February 2014 11:20

JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Hey everyone, I know I’m a little behind getting my RSA Conference updates out, but, well, s#!7 happens! I hope you’ll accept my better-late-than-never post letting you know where I’ll be during this year’s RSA festivities. This year, be sure to check out the Neuro-hacking 101 session I’m presenting with Mike Rothman. I think it’s safe to say it’s one of the first (if not the only) of it’s kind for an infosec conference. Also, be sure to catch this year’s NAC P2P session. It always fill up quickly and this year we have a new twist.

Read more: JJ’s Sessions at RSA 2014- NAC, Mindfulness, Snowden and more

Wireless

The Best Damn 802.11ac Channel Allocation Graphics, Ever
The Best Damn 802.11ac Channel Allocation Graphics, Ever
Share
As I was writing a series of wireless articles recently, I searched for graphics. I wanted a graphic that could show the 802.11 5GHz channels, clearly denote DFS frequencies while correctly noting the Dopplar-avoidance rules, visually show channel width options and also included the newly-added 802.11ac channel. My requirements for this graphic were apparently too demanding.
More
Four Options for Secure Wireless Authentication with 802.1X
Four Options for Secure Wireless Authentication with 802.1X
Share
The use of 802.1X in wireless is currently the most widely accepted method for secure authentication and key exchange in enterprise environments.
More
The 4 Wireless Controller Architectures You Need to Know
The 4 Wireless Controller Architectures You Need to Know
Share

Here are the 4 wireless controller/management architectures you NEED to know, and an overview of what vendor solutions fall where.

More
5 Classes of Wireless by Mission [Mgmt’s Guide to Wireless]
5 Classes of Wireless by Mission [Mgmt’s Guide to Wireless]
Share
Wireless can be broken down into five primary classifications, based on its mission. These are classifications I’ve defined for use in discussing wireless goals with customers.
More

Other Stuff

Successful 802.1X Every Time
Share
It’s not rocket science, but any time we mingle and intertwine four or five different pieces of technology, there’s always the potential for a mess… or at least a misconfiguration or two along the way. Don’t know what 802.1X is? Check out the recent 802.1X technology primer. If you’re planning to, or are implementing wired 802.1X, wireless security and/or NAC, the contents of this blog may save you hours of time and trouble. More
Final days to vote- SBN Blog & Podcast Awards
Share
It’s Tuesday, January 24th, which means there are just 4 days left to vote for your top blogs and podcasts finalists for the Security Bloggers Network Awards, to be presented at RSA Conference USA 2012. If you’re a member blogger of the SBN, then you’re eligible to vote. Finalists were selected from a panel of outstanding judges (kept secret until after the nominations and finalists were announced). More

Search

Get Social

RSSFacebookLinkedinYoutube

NetworkedBlogs

Subscribe

Enter your email address:

Delivered by FeedBurner