LinkedInMike Lemire

Mike Lemire

Greater Boston Area
Information Technology and Services
Recommendations4 people have recommended Mike

Join LinkedIn & access Mike's full profile

Join LinkedIn & access Mike's full profile. It's free!

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you know in common
  • Get introduced
  • Contact Mike directly
View full profile



Comments on EU Recommendations for Data Processing in the Cloud(Link)

January 2013

On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing personal data in the cloud for client organizations. The opinion describes associated risks and provides recommendations for best practices. This brief white paper explains why Acquia Cloud is aligned with the guidance provided by the EU data protection regulators ensuring that the transfer of EU personal data to cloud service providers such as Acquia may take place lawfully under EU law.

Conducting Risk Assessments of Cloud Service Providers(Link)

Hakin9 Magazine
November 2012

Risk managers and information security professionals are tasked with reviewing the security posture of cloud service providers and their platforms. This article provides an overview of the cloud shared responsibility model, identifies the unique risks of cloud computing, and discusses best practice and audit frameworks which may be leveraged when conducting a risk analysis of cloud service providers, and discusses how to protect your customers and your organization

Achieving PCI Compliance in Acquia Cloud(Link)

June 2013

The Payment Card Industry Data Security Standard (PCI DSS) is a multifaceted security standard that is intended to help organizations proactively protect customer account data.

PCI Compliance applies to any organization that stores, transmits, or transacts credit card data. Failure to become PCI compliant may expose your businesses to legal and financial liabilities. This white paper summarizes roles and responsibilities regarding PCI compliance for Acquia Cloud hosted websites.

Choosing a DDOS Protection Service(Link)

Hakin9 Magazine
May 2014

In the early days of the Internet, DOS attacks were simpler. Protocol manipulation attacks such as Ping flood, TCP Syn flood and the so called Smurf Attack were designed to overwhelm victim hosts TCP stacks and bandwidth in order to prevent them from serving legitimate requests. Network vendors fought back and began to provide basic DOS protection against these most common protocol manipulation attacks. Border routers (routers which sit between your infrastructure and the Internet) provide access control lists (ACLs) which can be configured to drop unneeded protocols. Packet inspection firewall vendors added protocol anomaly protection capabilities. Configuring your router and firewall’s basic DOS protection against these types of protocol anomalies can be considered baseline protection.

Building a Successful Disaster Recovery Program(Link)

Hackin9 Magazine
June 2014

Today, business is dependent on continuous availability of technology infrastructure, platforms and technology services. For this reason disaster recovery planning continues to gain prominence as a critical part of risk management. This article aims to summarize how to implement a successful disaster recovery program.


Certified Information Systems Security Professional (CISSP)

(ISC)2, License 93397
– Present

Certificate of Cloud Security Knowledge (CCSK) V3.0

Cloud Security Alliance, License 484062913215
– Present


  • Internet Security
  • Cloud Computing
  • Data Center
  • IT Audit
  • Security
  • Information Security...
  • Compliance Management
  • Disaster Recovery
  • Vulnerability Management
  • Information Security
  • SaaS
  • Business Continuity
  • Computer Security
  • Risk Management
  • ISO 27001
  • IT Management
  • SAS70
  • Vulnerability Assessment
  • Firewalls
  • Program Management
  • Security Audits
  • Network Security
  • Web Application Security
  • Application Security
  • Penetration Testing
  • Business Process
  • Security Architecture...
  • Sarbanes-Oxley Act
  • Networking
  • Data Security
  • Identity Management
  • See 19+  See less

View Mike's full profile to...

  • See who you know in common
  • Get introduced
  • Contact Mike directly

Not the Mike Lemire you're looking for? View more


People Also Viewed

LinkedIn member directory:

  1. a
  2. b
  3. c
  4. d
  5. e
  6. f
  7. g
  8. h
  9. i
  10. j
  11. k
  12. l
  13. m
  14. n
  15. o
  16. p
  17. q
  18. r
  19. s
  20. t
  21. u
  22. v
  23. w
  24. x
  25. y
  26. z
  27. more