Security Management Viewpoint – February 2005 – Final

Securing Information Infrastructure

Key-Elements of an Information Risk Profile – ISACA Member Journal – July 2013

Key Elements of an Information Security Program – ISACA Member Journal – January 2005

Key Elements of an Information Risk Management Program – ISACA Member Journal – March 2008

Key Elements of a Threat and Vulnerability Management Program – ISACA Member Journal – May 2006

Key Considerations When Evaluating ISRM Capabilities and Programs – ISACA Member Journal – April 2011

Key Considerations for Business Resiliency – ISACA Member Journal – May 2009

Information Security Governance Motivations, Benefits, and Outcomes – ISACA Member Journal – July 2006

Information Security Considerations for Server Virtualized Environments – WSTA – January 2008

Developing Metrics and Measures for Information Security Governance – ISACA Member Journal – March 2007

Developing an Information Risk and Security Management Strategy – ISACA Member Journal – April 2010

Designing Web Environment Security Solutions

Denial of Service Attacks, What They are and How to Combat Them

Changing the Mindset – Creating a Risk Conscious and Security Aware Culture – ISACA Member Journal – March 2012

A Technical Overview of IPsec

5 Tips to Outsmart Adversary Exec Brief

5 Mistakes to Avoid Exec Brief

@ISACA Volume 14 _ 13 July 2016 – Metrics

@ISACA Volume 7 _ 6 April 2016

@ISACA Volume 7 _ 6 April 2016 – Ransomware

@ISACA Vol. 22 2012 Mobile Device Management

@ISACA Vol. 16 2012 Strategy (2)

@ISACA Vol. 10 2012 Culture

@ISACA Vol. 6 2012 Metrics

@ISACA Vol. 1 2012 Mobile Device Security

@ISACA Vol 23 2010 Vendor Questionnaire

@ISACA Vol 21 2011 BYOD

@ISACA Vol 17 2010 Social Networking

@ISACA Vol 15 2011 Engaging Cloud Providers

@ISACA Vol 11 2010 – Vendor Compliance

Changing the Mindset – Creating a Risk Conscious and Security Aware Culture

@ISACA Vol 9 2011 Evaulating Programs

@ISACA Vol 5 2010 Strategy

@ISACA Vol 3 2011 – Data Leakage