Mike Saurbaugh

Faculty Member

IANs Research


Security Awareness of the Developer Kind

Posted on: 21 May 2015

Knock, knock on the door… “Do you have a minute to talk about a report request?” asked the developer. Security awareness typically focuses on employees – the people working in support, the call center, or with business partners. What about developers? The people who receive requests from the company to execute something – be it…

Behavioral Change Through Influence

Posted on: 10 Apr 2015

Influence, it’s one of those things which some have mastered. In the business world influence can be used as an advantage in order to achieve the desired outcome. Many people in security get locked into the technical realm which is only natural. However, what about learning something new which has to do with people in…

InfoSec World 2015 – Recap

Posted on: 26 Mar 2015

InfoSec World 2015 just wrapped up from Disney’s Contemporary Resort in Orlando, Florida. With around 1200 attendees, over 75 speakers, and over 50 exhibitors, the event provided something for everyone. In addition, MIS Training ensured attendees had opportunity to attend workshops and hands-on training to provide a top-notch educational experience. Many attendees commented on how…

Offense vs. Defense – Unite!

Posted on: 09 Jan 2015

You can feel the enthusiasm this time of year as football playoffs and bowl games capture massive attention. Us vs. them. You vs. me. Offense vs. defense. In the sporting world, this is how it works. There is no collaboration or uniting of opposable forces. Someone wins, and someone loses. Historically, we’ve had similar tactics…

Black Friday – Paper or Plastic?

Posted on: 27 Nov 2014

Happy anniversary? One year ago the infamous Target breach occurred; November 27 to be exact. Unless you’ve not ventured out to a retailer in 2014, there’s a good chance you’ve been impacted by a card breach. Impacted? What does that mean? Like many, probably an inconvenience. Granted there is risk of fraud but that’s waived,…

Cloud Data Security – Control, Privacy, Trust

Posted on: 04 Sep 2014

The latest iCloud photo leak news makes for interesting conversation – both with friends and family as well as business leaders. Yet not surprisingly, many are entrusting their digital lives and their business with something they know very little about. Is this the epitome of trust? Just do what others did; it’ll be fine? This…

Security Culture – It’s a Business Decision

Posted on: 10 Jul 2014

Everyday businesses make decisions. The saying, “it’s a business decision,” is loathed by some in the security industry and largely because security was not involved in the decision. Many of these decisions should involve the security team. However, this assumes security’s embedded into the business and not on the outside looking in. Anyone who’s been…

Managing Third-Party Relationships

Posted on: 19 Jun 2014

Third-parties are an expansion of the corporate network. They’re a necessity providing a range of services which are better off outsourced than to try and do in-house. Often-times third-parties are less expensive and more efficient which has become attractive to business leaders to maintain or gain a competitive advantage. The expansion of the corporate footprint not…

Salary Sources for Security Professionals and Hiring Managers

Posted on: 21 May 2014

How much is a security professional worth annually? A number of factors go into this equation, but suffice it to say, the security industry and the salaries have not felt the recession the same as other professions. And with suggested security professional unemployment at zero, it’s no wonder young security professionals are opting for (formal)…

Security Awareness of the Heartbleed Kind

Posted on: 02 May 2014

“Should I change my password?” “OK, I changed my password, now I’m secure, right?” Media reports over the past month certainly heightened security awareness and drove the public to sit up, pay attention, and do “something.” What that something is, depends on the guidance people heard, the importance of the service they are using and what…