Raleigh, North Carolina, United States
Contact Info
4K followers
500+ connections
About
Articles by Jim
Contributions
-
Cybersecurity professionals are struggling to get promoted. Are you making these common mistakes?
While the other items are important, for me this has been one of the more significant items I consider when evaluating someone for promotion. There is willingness (or the lack thereof) to change in how you work and/or change in your interpretation of security. I hear a lot of, "...but that's not how we do it," or "that's not a security issue," and general resistance to operational change and security practices doesn't demonstrate the desire to continually develop or collaborate. In short, it's an indicator.
-
What do you do if your Cybersecurity goals are not aligned with your overall business objectives?
For some cyber groups they may not be aware they're out if sync withe the business. So, the lesson here is always be looking for gaps. Confirm and reconfirm your role in the business and alignment with business objectives. Your value is enhanced when it is part of meeting business goals as well as ensuring security is not a drag on the business. Making sure things are security is only part of the challenge and responsibilities.
Activity
-
Greeted this morning by LinkedIn with... "Privately.." and "not visible to others" Cute. I did my best ever Dr. Evil impression while typing in a…
Greeted this morning by LinkedIn with... "Privately.." and "not visible to others" Cute. I did my best ever Dr. Evil impression while typing in a…
Shared by Jim Tiller
-
If you’re going to blackhat and looking for an incredible speaker and awesome human- look no more ⬇️
If you’re going to blackhat and looking for an incredible speaker and awesome human- look no more ⬇️
Liked by Jim Tiller
Experience & Education
Licenses & Certifications
-
-
-
Certified Information Systems Security Professional (CISSP)
(ISC)²
Issued ExpiresCredential ID 4997 -
-
-
-
-
-
Publications
-
Information Security Management Handbook, Sixth Edition, Volume 7 - Editor
Auerbach Publications
-
Official (ISC)2 Guide to the CISSP CBK Second Edition - Contributing Author
Auerbach Publications
-
Information Security Management Handbook, Fifth Edition - Contributing Author
Auerbach Publications
-
A Technical Guide to IPSec Virtual Private Networks - Author
CRC Press, Auerbach
This book has been cited and referenced in more than 25 other books and I've seem more than 150 references in other web-based material.
Patents
-
Tool, Method and Apparatus for Assessing Network Security
Issued US 9077746
-
System and Method for Implementing Security Management using a Database-Modeled Security Policy
Issued US 7299504b1
This is a patent came after the first, which defined the technical implementation of the security methodology for managing security posture, such as policy, controls, risk, and compliance. Interestingly, when we first developed this the only words that captured the concept was project management... of course... today we call this GRC.
Other inventorsSee patent -
System and Method for Security Project Management
Issued US 7167983b1
This is a patent that defined the methods for managing security posture, which incorporated policy, controls, risk, and compliance. Interestingly, when we first developed this the only words that captured the concept was project management... of course... today we call this GRC.
Other inventorsSee patent
Recommendations received
37 people have recommended Jim
Join now to viewMore activity by Jim
-
When I first met Jacob, I started noticing we had a lot of the same interests. We both like golf, we both thoroughly enjoy a cozy fire and a good…
When I first met Jacob, I started noticing we had a lot of the same interests. We both like golf, we both thoroughly enjoy a cozy fire and a good…
Liked by Jim Tiller
-
Sidebar ... I've been thinking about this quite a bit, and I'm hoping some of you are too. Materiality - that's a big word being thrown around in…
Sidebar ... I've been thinking about this quite a bit, and I'm hoping some of you are too. Materiality - that's a big word being thrown around in…
Liked by Jim Tiller
-
This week Jonathan Rau gives us a tour through the landscape of security data engineering, the #SIEM and other related topics. If you like your snark…
This week Jonathan Rau gives us a tour through the landscape of security data engineering, the #SIEM and other related topics. If you like your snark…
Liked by Jim Tiller
-
#CybersecurityAwarenessForever Day # 114: 💥 Today's Awareness Lesson: The Red Teams Get All the Cool Cyber Names 💥 ⭐ But the Blue Team Gets a Few…
#CybersecurityAwarenessForever Day # 114: 💥 Today's Awareness Lesson: The Red Teams Get All the Cool Cyber Names 💥 ⭐ But the Blue Team Gets a Few…
Liked by Jim Tiller
-
OpenAI was hacked, but didn't bother to tell anyone. Cool, nothing to see here. Nothing at all... https://lnkd.in/eRQyhxVg
OpenAI was hacked, but didn't bother to tell anyone. Cool, nothing to see here. Nothing at all... https://lnkd.in/eRQyhxVg
Liked by Jim Tiller
-
Real people posts to adds ratio on LI is at an all-time low.
Real people posts to adds ratio on LI is at an all-time low.
Posted by Jim Tiller
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jim Tiller in United States
-
Jim Tiller
Tiller BioPharma Consulting LLC
-
Jim Tiller
-
Jim Tiller
Senior Reliability Maintenance Project Manager at Amentum
-
Jim Tiller
retired
56 others named Jim Tiller in United States are on LinkedIn
See others named Jim Tiller