Be the Jedi Master for Your Organization

Just like the plots in the Star Wars movie series, your security efforts are an ongoing journey….constantly confronted with changing technology and threats to your organization.

Star Wars aficionados have been lining up for months to get tickets for the release of The Last Jedi.  The Star Wars series takes us on a Good vs. Evil journey filled with symbols like Death Stars, light sabers, and droids.  Similarly, your security strategy is a constant battle against the evils of data loss or destruction.  Since all journeys have a past, present, and future…let’s begin.

Past – one year ago we recapped our Peters Goes Rogue event and relayed stories about the importance of data to members of the First Order as well as the Rebels.  Just like our own organizations, imagine the risk if the evil Empire was able to gain access to strategic assets like:

  • Human Resources data – information about the Stormtroopers
  • Operational plans – battle strategies and strategic locations
  • 3rd party data – information about members of the various alliances
  • Not to mention access to financials, system passwords, and research and development initiatives

NOTE: Recall that Alliance’s success came via secret knowledge of a flaw in the Death Star design with a thermal exhaust port and power core…

Present – as Star Wars: The Last Jedi hits the screen, viewers prepare to see old tactics like Imperial Walkers intermixed with exciting new threats like Snoke.  In this same way, our cyber security defenses need to protect us from traditional threats but also prepare us for the unknown (zero-day).  To accomplish this, Peters & Associates defends our Alliance members by adhering to the Peters security approach outlined below, as well as following concepts from our Defending your Data security eBook.

Future – being a Jedi Master for your organization will require focus and proper direction of a little mysterious energy (the “Force”).  We are happy to provide direction and guidance to as you find you are facing Evil confronting your organization.  Use The Force (or email) to contact us at info@peters.com to learn how we can help!

Oh, one more thing before you go…

By | 2017-12-11T12:09:53+00:00 December 6th, 2017|IT Security Solutions|Comments Off on Be the Jedi Master for Your Organization

About the Author:

Bruce is the Vice President of Business Strategy. In addition to client-facing roles, Bruce is responsible for operational excellence in areas such as marketing, product alignment, and vendor relations. Over the past 25 years, Bruce has always served in an advisory role for C-level executives, IT Directors and CISOs to ensure that business goals align with IT strategies and initiatives. Microsoft has recognized, trained and badged Bruce as an internal Microsoft resource to allow him full access to solution architecture, roadmaps and competitive guidance. Bruce has a focus on consultative education and helping organizations envision their future with justifiable rationale. He is sought after on speaking engagements including CIO roundtables, executive forums, and conferences. Bruce is a graduate from the University of Illinois (Secondary Ed.) and also holds an MBA from Keller Graduate School, with a credentialed security focus (CISM).