Security Management Viewpoint – February 2005 – Final
Securing Information Infrastructure
Key-Elements of an Information Risk Profile – ISACA Member Journal – July 2013
Key Elements of an Information Security Program – ISACA Member Journal – January 2005
Key Elements of an Information Risk Management Program – ISACA Member Journal – March 2008
Key Elements of a Threat and Vulnerability Management Program – ISACA Member Journal – May 2006
Key Considerations for Business Resiliency – ISACA Member Journal – May 2009
Information Security Considerations for Server Virtualized Environments – WSTA – January 2008
Developing an Information Risk and Security Management Strategy – ISACA Member Journal – April 2010
Designing Web Environment Security Solutions
Denial of Service Attacks, What They are and How to Combat Them
5 Tips to Outsmart Adversary Exec Brief
5 Mistakes to Avoid Exec Brief
@ISACA Volume 14 _ 13 July 2016 – Metrics
@ISACA Volume 7 _ 6 April 2016
@ISACA Volume 7 _ 6 April 2016 – Ransomware
@ISACA Vol. 22 2012 Mobile Device Management
@ISACA Vol. 16 2012 Strategy (2)
@ISACA Vol. 1 2012 Mobile Device Security
@ISACA Vol 23 2010 Vendor Questionnaire
@ISACA Vol 17 2010 Social Networking
@ISACA Vol 15 2011 Engaging Cloud Providers
@ISACA Vol 11 2010 – Vendor Compliance
Changing the Mindset – Creating a Risk Conscious and Security Aware Culture
@ISACA Vol 9 2011 Evaulating Programs
@ISACA Vol 3 2011 – Data Leakage