Peter H. Gregory

Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and information technology.

Contents

Biography

Gregory is a member of the Board of Advisors and lecturer for the NSA-certified University of Washington Certificate in Information Security and Risk Management,[1] and on the Board of Advisors and the lead instructor for the University of Washington Certificate in Information Systems Security.[2] He is also a member of the board of directors of the Evergreen State chapter of InfraGard, and a founding member of the Pacific CISO Forum.[3]

As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell.

Publications

Gregory has written several articles for Computerworld and Software Magazine including:

Gregory has been interviewed by trade publications including Information Security Magazine,[3][12][13][14] CIO Magazine,[15] and Computerworld.[16]

See also

References

  1. ^ "Certificate in Information Security and Risk Management". University of Washington. September 2010. http://www.pce.uw.edu/prog.aspx?id=4065. Retrieved 2010-09-17. 
  2. ^ "Certificate in Information Systems Security". University of Washington. September 2010. http://www.pce.uw.edu/prog.aspx?id=4067. Retrieved 2010-09-17. 
  3. ^ a b Sherman, Erik. "Peer to Peer". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256996,00.html. Retrieved 2008-04-20. 
  4. ^ Gregory, Peter. "Protect Apps and Data with a Disaster Recovery Plan". Software Magazine. http://www.softwaremag.com/L.cfm?Doc=1157-8/2008. Retrieved 2008-08-24. 
  5. ^ Gregory, Peter. "Identify Vulnerabilities with Application Scanning Tools". Software Magazine. http://softwaremag.com/L.cfm?Doc=1058-5/2007. Retrieved 2008-04-20. 
  6. ^ Gregory, Peter. "Integrity begins within: Security pros lead by example". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,,91832,00.html?SKC=security-91832. Retrieved 2008-04-20. 
  7. ^ Gregory, Peter. "Vulnerability Management Ushers an Era of Technical Risk Management". Software Magazine. http://www.softwaremag.com/L.cfm?Doc=2003-11/2003-11security. Retrieved 2008-04-20. 
  8. ^ Gregory, Peter. "Security in the software development life cycle". SearchSecurity. http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci915821,00.html. Retrieved 2008-04-20. 
  9. ^ Gregory, Peter. "Tipping sacred cows: Make bold decisions to protect your information". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,10801,81788,00.html. Retrieved 2008-04-20. 
  10. ^ Gregory, Peter. "Lessons learned from the blaster worm". Computerworld. http://www.computerworld.com/securitytopics/security/story/0,10801,85247,00.html. Retrieved 2008-04-20. 
  11. ^ Gregory, Peter. "For an infosecurity career, get the technical basics first". Computerworld. http://www.computerworld.com/newsletter/0,4902,96090,00.html?nlid=SEC2. Retrieved 2008-04-20. 
  12. ^ Damore, Kelley. "Moving On Up". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257071_idx1,00.html. Retrieved 2008-04-20. 
  13. ^ Damore, Kelley. "Token Support Isn’t Enough". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257115_idx2,00.html. Retrieved 2008-04-20. 
  14. ^ Mimoso, Michael. "Best Advice". Information Security Magazine. http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257032,00.html. Retrieved 2008-04-20. 
  15. ^ Brandel, Mary. "Data Breach History Includes Plenty of Big Names". CIO Magazine. http://www.cio.com/article/12541. Retrieved 2008-04-20. 
  16. ^ Brandel, Mary. "Legal Niceties". Computerworld Magazine. http://www.computerworld.com/securitytopics/security/story/0,10801,105064,00.html. Retrieved 2008-04-20. 

External links