Presentations

RajGoel_Social_Media_and_Kids

What Do You, Your Kids, Employees and Interns need to know about Social Media?

RajGoel-ISC2-Secure_San_Antonio_Dallas_Cloud_Privacy_Concerns_FINAL

Cloud Privacy Concerns – Oversharing & Overcollecting

The_Panopticon

Big Brother, Little Sisters – How the government, and private corporations undermine your privacy, security and liberty

How_to_lose_your_job_caeer_freedom_fortune_using_social_media

How to lose your job, career, fortune and Freedom (mis)using social media

ISC2-ASIS_Lessons_Learned_From_The_FTC

Lessons Learned from the FTC (Federal Trade Commission, USA)

ISC2-Compliance_Challenges_In_The_Cloud_1b

Compliance Challenges In The Cloud

ECPA declared that e-mail was a private means of communication, and that we might hope for the same level of privacy in it as we have in phone calls and letters. Among other things, it means that police need a wiretap warrant to read your e-mails, and that your e-mail company’s employees can’t disclose your […]

ISC2-PCI_Compliance_Pay_Now_or_Pay_Later

PCI Compliance: Pay Now, or Pay Later

“For many small businesses, the CIO is somebody’s child down the road who’s really good at Nintendo.? -Howard Schmidt, US CyberSecurity CZAR

ISC2-Protecting_Consumer_Privacy

Protecting Consumer Privacy: DO’s, DON’Ts & Lessons Learned

The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars

download

Cloud Computing

ISC2-PCI_COMPLIANCE-Case_Studies_In_Failure

Case Studies In Failure

The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.