- Greater Boston Area
- Information Technology and Services
|Recommendations||4 people have recommended Mike|
Join LinkedIn & access Mike's full profile
Join LinkedIn & access Mike's full profile. It's free!
As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.
- See who you know in common
- Get introduced
- Contact Mike directly
On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing personal data in the cloud for client organizations. The opinion describes associated risks and provides recommendations for best practices. This brief white paper explains why Acquia Cloud is aligned with the guidance provided by the EU data protection regulators ensuring that the transfer of EU personal data to cloud service providers such as Acquia may take place lawfully under EU law.
Hakin9 MagazineNovember 2012
Risk managers and information security professionals are tasked with reviewing the security posture of cloud service providers and their platforms. This article provides an overview of the cloud shared responsibility model, identifies the unique risks of cloud computing, and discusses best practice and audit frameworks which may be leveraged when conducting a risk analysis of cloud service providers, and discusses how to protect your customers and your organization
The Payment Card Industry Data Security Standard (PCI DSS) is a multifaceted security standard that is intended to help organizations proactively protect customer account data.
PCI Compliance applies to any organization that stores, transmits, or transacts credit card data. Failure to become PCI compliant may expose your businesses to legal and financial liabilities. This white paper summarizes roles and responsibilities regarding PCI compliance for Acquia Cloud hosted websites.
Hakin9 MagazineMay 2014
In the early days of the Internet, DOS attacks were simpler. Protocol manipulation attacks such as Ping flood, TCP Syn flood and the so called Smurf Attack were designed to overwhelm victim hosts TCP stacks and bandwidth in order to prevent them from serving legitimate requests. Network vendors fought back and began to provide basic DOS protection against these most common protocol manipulation attacks. Border routers (routers which sit between your infrastructure and the Internet) provide access control lists (ACLs) which can be configured to drop unneeded protocols. Packet inspection firewall vendors added protocol anomaly protection capabilities. Configuring your router and firewall’s basic DOS protection against these types of protocol anomalies can be considered baseline protection.
Hackin9 MagazineJune 2014
Today, business is dependent on continuous availability of technology infrastructure, platforms and technology services. For this reason disaster recovery planning continues to gain prominence as a critical part of risk management. This article aims to summarize how to implement a successful disaster recovery program.
Certified Information Systems Security Professional (CISSP)
(ISC)2, License 93397– Present
Certificate of Cloud Security Knowledge (CCSK) V3.0
Cloud Security Alliance, License 484062913215– Present
- Internet Security
- Cloud Computing
- Data Center
- IT Audit
- Information Security...
- Compliance Management
- Disaster Recovery
- Vulnerability Management
- Information Security
- Business Continuity
- Computer Security
- Risk Management
- ISO 27001
- IT Management
- PCI DSS
- Vulnerability Assessment
- Program Management
- Security Audits
- Network Security
- Web Application Security
- Application Security
- Penetration Testing
- Business Process
- Security Architecture...
- Sarbanes-Oxley Act
- Data Security
- Identity Management
- See 19+ See less
Search by name
Over 300 million professionals are already on LinkedIn. Find who you know.
People Also Viewed
Director, Business and IT Advisory Services at Alexander Aronson Finning CPAs
Director of Security Engineering at Pearson PLC
Principal Security Engineer at Pearson plc
Chief Security Officer, SVP at Pearson plc
Director of Information Security, CISSP, CISM, CISA, ITIL
VP, Global Information Security at Pearson
VP, Security Operations at Pearson plc
CISO / Information Risk Management
Data Security Officer at Pearson Technology Group
Find a different Mike Lemire
Senior Marketing Consultant and Team Lead, Enterprise Division at HubSpot
Greater Boston Area
Cleveland/Akron, Ohio Area
Director, Corporate Materials at Benchmark Electronics
Greater New York City Area
Principal at Miles & Stockbridge P.C.
Washington D.C. Metro Area
Client Delivery Manager at Xerox Canada
New Brunswick, Canada