About
Articles by Perry
-
Shooting Ourselves in the Foot: The Biases We all Have
Shooting Ourselves in the Foot: The Biases We all Have
By Perry Carpenter
-
5 Things You May Not Know About Security Awareness Training
5 Things You May Not Know About Security Awareness Training
By Perry Carpenter
Activity
-
Ransomware is a massive risk to enterprises in the west and it is not going away. Ransomware actors will continue to be a massive threat, especially…
Ransomware is a massive risk to enterprises in the west and it is not going away. Ransomware actors will continue to be a massive threat, especially…
Liked by Perry Carpenter
-
Thanks to my colleague and friend Anna Collard for making me aware of this interactive anti-sextortion video. If you've got teens or teenage…
Thanks to my colleague and friend Anna Collard for making me aware of this interactive anti-sextortion video. If you've got teens or teenage…
Liked by Perry Carpenter
-
Harsh Truth: You don’t need a cool logo, a good domain, or a big audience to build a business. All you need is to start now and find one…
Harsh Truth: You don’t need a cool logo, a good domain, or a big audience to build a business. All you need is to start now and find one…
Liked by Perry Carpenter
Experience & Education
Licenses & Certifications
-
-
-
Certified Information Privacy Professional
IAPP - International Association of Privacy Professionals
Issued ExpiresCredential ID 5399 -
Certified Information Security Professional
(ISC)²
Issued ExpiresCredential ID 47077
Publications
-
Forecast Snapshot: Security Awareness Computer-Based Training, Worldwide, 2017
Gartner
The security awareness computer-based training market will grow to over $1.1 billion by year-end 2020. Technology product marketing leaders must plan for pricing disruption, market consolidation, new integration models that help shape end-user behavior and continual demand for refreshed/new content.
Other authorsSee publication -
Magic Quadrant for Identity Governance and Administration
Gartner
Several vendors are accelerating efforts to offer cloud-delivered IGA, improve analytics and align with PAM products. Security and risk management leaders responsible for IAM should be aware of functional differences and trade-offs between on-premises and cloud-delivered IGA and plan accordingly.
Other authorsSee publication -
Market Insight: Security Market Transformation Disrupted by the Emergence of Smart, Pervasive and Efficient Security
Gartner
This report highlights eight significant trends that will transform the security market. Technology product marketing leaders should use this document to identify market implications, and potential risks and opportunities, as the security landscape continues to evolve.
Other authorsSee publication -
How to Gain Support for Your Security Awareness Program
Gartner
Securing investment dollars from executives for a security awareness program depends on persuasive communication and negotiation skills. Security and risk management leaders must package their approach to ensure executive understanding and support for programming.
Other authorsSee publication -
2016 Magic Quadrant for Security Awareness Computer-Based Training
Gartner (subscription required)
Humans can be either the strongest or weakest defense against threats. Security leaders are, more than ever, seeking to increase security awareness and influence end-user behavior while also boosting security performance, as well as supporting productivity, accountability and compliance.
Other authorsSee publication -
Avoid 10 Common Security Awareness Mistakes
Gartner (subscription required)
Most security and risk management leaders struggle to define their vision, objectives and outcomes to create an effective security awareness program. As a result, mistakes are made. By avoiding them, your program will be a key component in changing security behaviors across the enterprise.
Other authorsSee publication -
How to Use Technology to Support People-Centric Security
Gartner (subscription required)
While PCS heavily relies on people, security and risk leaders cannot ignore the role of tools and technology in a successful PCS implementation.
Other authorsSee publication -
Best Practices for Managing Insider Security Threats, 2016 Update
Gartner (subscription required)
Insider threats against IT assets are increasing across sectors, in part because of increasing connections of external threat actors to employees. CISOs and insider threat program managers should use a variety of nontechnical controls and technical methods to fend off these threats.
Other authorsSee publication -
Toolkit: Graphics Support for Using the Predict, Prevent, Detect, Respond Framework to Communicate Your Security Program Strategy
Gartner (subscription required)
This Toolkit is a companion to "Using the Predict, Prevent, Detect, Respond Framework to Communicate Your Security Program Strategy" (G00298589). It contains reusable graphics and example slides for use by CISOs and security leaders wishing to adopt the PPDR framework strategy.
-
10 Ways to Improve Security Awareness on a Tight Budget
Gartner (subscription required)
There is a perception that it takes significant funding to design an effective security awareness program. But with few resources and a lot of creativity, security professionals can build a program that will reinforce behaviors critical to protecting systems, employees and intellectual property.
Other authorsSee publication -
Using the Predict, Prevent, Detect, Respond Framework to Communicate Your Security Program Strategy
Gartner (subscription required)
CISOs need a clean and consistent way to categorize their communication efforts in easy-to-understand, outcome-focused terms. The predict, prevent, detect, respond framework can serve as a method for bringing clarity to strategic CISO communications.
-
Critical Capabilities for Identity Governance and Administration
Gartner (subscription required)
IGA tools are critical for controlling digital identities linked to accounts and entitlements maintained in repositories throughout organizations. Identity and access management leaders should incorporate the evaluation of critical capabilities as part of the formal selection process for IGA tools.
Other authorsSee publication -
Magic Quadrant for Identity Governance and Administration
Gartner (subscription required)
The IGA market is maturing into an early mainstream phase. IAM and security leaders should take note of emerging requirements around more risk-aware identity approaches and cloud adoption that are causing innovative vendors to integrate analytics with adjacent IT and data security technologies.
Other authorsSee publication
Courses
-
Internet Folklore and Digital Storytelling
-
Honors & Awards
-
Cybersecurity Canon Hall of Fame Inductee for "Transformational Security Awareness"
Cybersecurity Canon
Book reviews are collected via crowdsourcing throughout the year and are augmented by reviews completed by a volunteer committee of cybersecurity professionals. The reviews result in a recommendation (or not) that the book be nominated as a candidate for the Canon or the Hall of Fame. Each year, the committee evaluates the nominations and admits books into the Canon. A few exceptional candidates are awarded Hall of Fame status.
The criteria for a book to be admitted into the…Book reviews are collected via crowdsourcing throughout the year and are augmented by reviews completed by a volunteer committee of cybersecurity professionals. The reviews result in a recommendation (or not) that the book be nominated as a candidate for the Canon or the Hall of Fame. Each year, the committee evaluates the nominations and admits books into the Canon. A few exceptional candidates are awarded Hall of Fame status.
The criteria for a book to be admitted into the Cybersecurity Canon Hall of Fame is simple to understand; however, it is difficult for any one book to achieve this status. Such a book must explore a cybersecurity topic deeply, reference historical activities and themes, and have implications for the future of cybersecurity practitioners. In other words, the book must rise to the level of being required reading for anyone who wants to become an expert in the cybersecurity profession. -
National Silver Azbee Award: Feature Series for the 4 part series "Acme Corporation Suffers a Breach."
American Society of Business Publication Editors
National Silver Azbee Award from the American Society of Business Publication Editors for Feature Series for the 4 part series "Acme Corporation Suffers a Breach."
https://asbpe.org/wp-content/uploads/2021/04/2021-National-Azbee-Awards-Winners-by-Category.pdf
Recommendations received
9 people have recommended Perry
Join now to viewMore activity by Perry
-
⬛ Going to BlackHat -- make sure you register for one of our Cyber Range experiences. ☎ You never know who might be calling while you're in the…
⬛ Going to BlackHat -- make sure you register for one of our Cyber Range experiences. ☎ You never know who might be calling while you're in the…
Liked by Perry Carpenter
-
Once I heard this book by Jessica Barker MBE PhD was released, I included it on my To-Read list, and it was really worth the wait (and the time…
Once I heard this book by Jessica Barker MBE PhD was released, I included it on my To-Read list, and it was really worth the wait (and the time…
Liked by Perry Carpenter
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Perry Carpenter in United States
-
Perry Carpenter
-
Perry Carpenter
Entertainment News Writer and Lifestyle writer @ Reach plc | Journalism Degree
-
Perry Carpenter
Account Executive for the Henderson Silver Knights and Vegas Knight Hawks
-
Perry Carpenter
Chiropractor at Perry Carpenter Chiropractic Corporation
9 others named Perry Carpenter in United States are on LinkedIn
See others named Perry Carpenter