Testimonials
We have become so dependent with technology that it is important the we begin to understand what it is that is helping us, and what needs to be worked on in order to better protect us. Our real issues are aligned with what will it take for us to continue to be up? Businesses cannot afford to be down, and neither can consumers.
- What are you trying to protect?
- What are the relevant THREATS?
- How comfortable are you with your ability to detect and respond before damage is done?
Protecting your Data (both business and personal) is the issue that is top of mind. Protecting you and keeping the attacker out, is essential to everyone. That’s what we will discuss to help you protect yourself from getting #HACKED!
Since, “cyber domain” has become a source of potential conflict, earning the interest of the world’s military powers. During my studies at the Naval War College, I penned a monograph positing how cyber capabilities could be used as an instrument of national power in lieu of kinetic strikes. This thesis has since been reinforced by the development of the “Integrated Tasking Order” and “Cyber Tasking Order” – tools to synchronize kinetic and non-kinetic operations across all domains.
To be sure, cyber operations can have significant effects on not only the functioning of government but the confidence of societies and markets as well. The technical ability to conduct a cyber-attack has decreased significantly. Malicious cyber tools and exploits are easily found on the Internet and can be used by anyone. Not only are attacks more sophisticated, but attribution is difficult.
From my humble perspective, this book is a must-read for anyone looking to learn more about the critically important threat of cyber warfare. As a practical guide, it helps prepare cyber security practitioners as well as policymakers interested in the historical, technical, and strategic context in the cyber domain. LCDR Douglas Ramsdell, USN (Ret.)
I have known Albert Whale for a number of years and with his involvement as one of EC-Council University CIS Board Advisor. He is one of my resources when it comes to cyber security careers and cyber workforce success. Dr. Charline F. Nixon
Now, I call Albert whenever I consider doing anything with my data. Most of the time, I have a general idea of what could go wrong. But a lot of times, I don’t. And that’s a scary thought!
Anyone contemplating doing anything in business today needs to read Albert’s two books. I have, and I am still scared to make a move without talking to Albert first.
It is not all doom and gloom, however. But with the things that I don’t know, I’m glad that I do know Albert because when I get finished consulting him, I then go back to whatever company it is that I am talking to and pose cyber security questions to them that make them understand that I am serious about making sure that my business ventures are going to be as secure as possible.
Gone are the days when we don’t have to be appreciative of the subject of cybersecurity, even I you are in my situation – growing food. That’s right; even farmers need a cybersecurity expert to help them to manage their business!
So, I hope you will appreciate this book and consider both the tone and specifics Albert brings to the table. We can no longer live without making cybersecurity is in the right hands and that no one else will have access to it. - Juan Lacey (Founder & CEO of Farms close by)