Peter H. Gregory

From Wikipedia, the free encyclopedia

Peter H. Gregory, CISA, CISSP is an American information security manager, computer security specialist, and writer. He is the author of several books on computer security and technology.

Contents

[edit] Biography

Gregory is a member of the Board of Advisors and lecturer for the NSA-certified University of Washington Certificate Program in Information Assurance & Cybersecurity[1]. He is also a member of the board of directors for the Evergreen State chapter of InfraGard, and a founding member of the Pacific CISO Forum.

As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell.

Gregory is the founder and organizer of several online communities; the largest are the CISA Forum with over 2,800 members and the CISM Forum with over 800 members. These and other online communities exist to help others better understand data security and regulation issues and improve their professional knowledge and stature through industry certifications.

[edit] Career

Gregory studied Electrical Engineering and Computer Science at the University of Nevada in the 1970s. His career includes positions in computer operations and programming in municipal government and banking, and a software engineering and application architect position at Bally Technologies. In 2000 he joined World Vision as a Unix systems architect, and in 2003 he moved to Seattle and worked for over twelve years in the wireless telecommunications industry at McCaw Cellular (now part of AT&T Mobility) and Western Wireless in IT and security management positions. Today he works as a security and risk manager at a financial software solutions company in the Seattle area.


[edit] Publications

  • Gregory, Peter. Solaris Security, Prentice-Hall, 1999. ISBN 0-130-96053-5
  • Gregory, Peter. Sun Certified System Administrator for Solaris 8 Study Guide, Prentice-Hall, 2001. ISBN 0-130-40933-2
  • Gregory, Peter. Enterprise Information Security, Financial Times Management, 2003. ISBN 0-273-66157-4
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, John Wiley & Sons, 2003. ISBN 0-764-51670-1
  • Gregory, Peter; Miller, Lawrence. Security+ Certification for Dummies, John Wiley & Sons, 2003. ISBN 0-764-52576-X
  • Gregory, Peter. Computer Viruses for Dummies, John Wiley & Sons, 2004. ISBN 0-764-57418-3
  • Gregory, Peter; Simon, Mike. Blocking Spam and Spyware for Dummies, John Wiley & Sons, 2005. ISBN 0-764-57591-0
  • Gregory, Peter. VoIP Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. ISBN 0-764-03744-X
  • Gregory, Peter. SIP Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. ISBN 0-470-04149-80
  • Gregory, Peter. Converged Network Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-12098-9
  • Gregory, Peter. IP Multimedia Subsystems for Dummies, Radisys Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-13587-7
  • Gregory, Peter. Midsized Communications Solutions for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-16552-2
  • Gregory, Peter. Unified Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. ISBN 0-470-17495-1
  • Gregory, Peter. Securing the Vista Environment, O'Reilly Media, 2007. ISBN 0-596-51430-1
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Second Edition, John Wiley & Sons, 2007. ISBN 0-470-12426-1
  • Gregory, Peter. IT Disaster Recovery Planning for Dummies, John Wiley & Sons, 2007. ISBN 0-470-03973-6
  • Gregory, Peter; Simon, Mike. Biometrics for Dummies, John Wiley & Sons, 2008. ISBN 0-470-29288-7

Gregory has written several articles for Computerworld and Software Magazine including:

  • Identify Vulnerabilities with Application Scanning Tools[2]
  • Integrity begins within: Security pros lead by example[3]
  • Vulnerability Management Ushers an Era of Technical Risk Management[4]
  • Security in the software development life cycle[5]
  • Tipping sacred cows: Make bold decisions to protect your information[6]
  • Lessons learned from the blaster worm[7]
  • For an infosecurity career, get the technical basics first[8]

Gregory has been interviewed by trade publications including Information Security Magazine[9] [10] [11] [12], CIO Magazine[13], and Computerworld[14].

[edit] See also


[edit] References

  1. ^ Advisory Board. University of Washington (January 2007). Retrieved on 2008-04-20.
  2. ^ Gregory, Peter. Identify Vulnerabilities with Application Scanning Tools. Software Magazine. Retrieved on 2008-04-20.
  3. ^ Gregory, Peter. Integrity begins within: Security pros lead by example. Computerworld. Retrieved on 2008-04-20.
  4. ^ Gregory, Peter. Vulnerability Management Ushers an Era of Technical Risk Management. Software Magazine. Retrieved on 2008-04-20.
  5. ^ Gregory, Peter. Security in the software development life cycle. SearchSecurity. Retrieved on 2008-04-20.
  6. ^ Gregory, Peter. Tipping sacred cows: Make bold decisions to protect your information. Computerworld. Retrieved on 2008-04-20.
  7. ^ Gregory, Peter. Lessons learned from the blaster worm. Computerworld. Retrieved on 2008-04-20.
  8. ^ Gregory, Peter. For an infosecurity career, get the technical basics first. Computerworld. Retrieved on 2008-04-20.
  9. ^ Damore, Kelley. Moving On Up. Information Security Magazine. Retrieved on 2008-04-20.
  10. ^ Damore, Kelley. Token Support Isn’t Enough. Information Security Magazine. Retrieved on 2008-04-20.
  11. ^ Sherman, Erik. Peer to Peer. Information Security Magazine. Retrieved on 2008-04-20.
  12. ^ Mimoso, Michael. Best Advice. Information Security Magazine. Retrieved on 2008-04-20.
  13. ^ Brandel, Mary. Data Breach History Includes Plenty of Big Names. CIO Magazine. Retrieved on 2008-04-20.
  14. ^ Brandel, Mary. Legal Niceties. Computerworld Magazine. Retrieved on 2008-04-20.

[edit] External links


Persondata
NAME Gregory, Peter
ALTERNATIVE NAMES
SHORT DESCRIPTION American computer scientist
DATE OF BIRTH
PLACE OF BIRTH
DATE OF DEATH
PLACE OF DEATH