Rich Owen
EUASU expert, Cybersecurity Leader, Speaker, Author, member of the Information Security Hall of Fame. Withover 50 years of experience he has created 5 very successful Cybersecurity programs, the most notable being for Mission Operations at Johnson Space Center, NASA, for which the astronauts awarded him a “Silver Snoopy”.
Rich Owen is an EUASU expert, Cybersecurity Leader, Speaker, Author, member of the Information Security Hall of Fame. Withover 50 years of experience he has created 5 very successful Cybersecurity programs, the most notable being for Mission Operations at Johnson Space Center, NASA, for which the astronauts awarded him a “Silver Snoopy”. Although mainly retired now, he is still a strong evangelist for cybersecurity and has had the following certifications: CISSP, CRISC, CISM, CPP, CIPT, FAIR& MBCI.
He is a past international president of the Information Systems Security Association (ISSA), where his also a Distinguished Fellow and member of the Honor Roll. He is the 2021 ISC2 recipient of the Lifetime Achievement Award and a member of the Ponemon Institute & Cloud Security Alliance (AKA Johnny Security Seed).
Rich created the information security programs for:
• Mission Operations, at Johnson Space Center, NASA,
• Texas Attorney General,
• Early Warning Services,
• American Traffic Solutions
• Cable One
His current mission at Johnny Security Seed is to help individuals and companies protect their information. As a part of this effort, he has begun a series of books to promote an interest in Cyber Security in today’s youth.
The Alchemy of Information Protection: A Cybersecurity Druid's Spell Book Cybersecurity is not a one size fits all solution; therefore, security must be tailored to the needs of the individual. The purpose of this book is to provide readers with rational business processes by which they can understand what information is important, and why. "The Alchemy of Information Protection" was specifically written for: | |
Your Personal Information Is At Risk: A Guide For Protecting Yourself This book is very well-written, organized, and clearly presented. This is a very complex topic, and there is quite a bit of information to learn. The author has done an excellent job of presenting the information in an easy-to-read platform that conveys all of the information in an appropriately serious tone, so that the reader fully understands both the information, and the need to be fully aware of the threats. The author also provides solutions to confront the risk and ensure that there is no breach of personal information.
| |
The Continuing Adventures of Cyber Security Sam: Time Out Meanwhile, smaller mysteries seem to present themselves: the buses seem to arrive late to bring the students home, and students feel rushed in their classes. Sam's first unlikely suspect is the language arts teacher, who seems to have used her computer access to alter the timing system for the basketball game and to shorten the duration of all the classes. Ultimately, the authorities are called, and, with Sam's help, they determine that Sam's friend, Frederica, had stolen the teacher's password (which had been written and kept in an unsecure desk drawer), changed her status to ADMIN, and altered time programs and grades. |