Bloggers
Paul Masson
Paul Masson has not set their biography yet
- View author's profile
- 1 Posts
- 0 Comments
- 1 Categories
-
0
Tags
Recent Posts
-
Ken Kousky wins 'Coach of the Year' at ACE '10
in MyBlog - 0 CommentsThe great lakes area Annual Collaboration for Entrepreneurship elected Ken Kousky as 'Coach of the Year'. The 10th annual event featured over 900 guests and 175 companies. Ken was recognized for his mentoring work with students and emerging businesses throughout Michigan. The fruits of his efforts were demonstrated by Kenneth Lang, one of Ken's s ...Jan 22 Tags: Untagged -
Other entries by Paul Masson
Ken Kousky
Ken Kousky has not set their biography yet
- View author's profile
- 20 Posts
- 0 Comments
- 2 Categories
-
56
Tags
viruses, cyber warfare, risk, regulation, information, botnet, Strategy to Reality, hack, stuxnet, News, Egypt, Operation Shady RAT, attack, mobile security, risk management, CPE, Certification, Advanced Persistent Threat, phishing, emerging technology, network security, Breaking News, fraud, gain, potential loss, reactive, adhoc, IT security, information assurance, information assurance, IT security, adhoc, reactive, potential loss, gain, fraud, EdX, Harvard, MIT, pass rate, drop rate, elearning, learner, online, learner, elearning, drop rate, pass rate, MIT, Harvard, EdX, content learning, contextual learning, learning, Study, Training
Recent Posts
-
Why we fail at leveraging technology in education
in Uncategorized - 0 CommentsThere are three reasons why we fail at leveraging technology in education. First, we are undoubtedly missing the root cause of the systemic failure. It’s not content, it’s context. The content must be made meaningful to the learner. Second, we’ve failed to apply the fat tail principles of mass customization. Anchoring a concept for a learner is uni ...Aug 16 Tags: Untagged -
Learning Through Context
in Uncategorized - 0 CommentsWhat do we mean by context exactly and why do we believe teaching contextual based is better than content? By context, I mean three things. First, we need to understand the where/when for studying. We should all know and understand that the "interrupt machines" that drive our always-on communications (PCs, smart phones, tablets) are the very worst ...Aug 07 Tags: content learning, content learning, contextual learning, EdX, Harvard, information, learner, learning, Study, Training -
The Ongoing Revolution in Learning Through Technology
in Uncategorized - 0 CommentsOver the past month, thoughts about the education paradigm have been something like the modern 4th of July fireworks — always a big bang and a new twist. I’ve followed the MIT/Harvard EdX online class of 155,000 students. I even thought about the incredible process of trying to grade the exams and student authentication challenges. If you’re not fa ... -
Understanding Risk - a 5-step risk management strategy
in Uncategorized - 0 CommentsSo, what is risk? What does it mean? We can define risk as the possibility that bad, unplanned or unexpected things happen. It implies, most often, after the fact, that something could have been done about the “risk” to prevent the bad things. In many of the most disastrous events, there were clear warnings and a multitude of actions that should ha ...Jul 11 Tags: Untagged -
A Dike and Three Dutch Boys...is this enough?
in Uncategorized - 0 Comments...Applying a triad methodology for risk management. Similar to the Dutch boys and their dike, securing the barrier between your IT infrastructure and the rest of the world, rely primarily on:Plugging the known holes.Posturing to plug holes based on historical data and not overreacting to an acute event.Making educated guesses where to reinforce t ...Jul 03 Tags: adhoc, adhoc, fraud, fraud, gain, gain, information assurance, information assurance, IT security, IT security, potential loss, potential loss, reactive, reactive, risk management -
Other entries by Ken Kousky
Brian Edmiston
Brian Edmiston has not set their biography yet
- View author's profile
- 2 Posts
- 1 Comments
- 1 Categories
- 28 Tags
Recent Posts
-
5 Key Items to Target When Searching for CISSP Training
in Uncategorized - 0 CommentsThe Certified Information Systems Security Professional (CISSP) certification continues to be THE widely recognized credential for broad information security expertise. The certification requires that the student obtain a wide range of security knowledge, making passing scores on the exam challenging, regardless of the level of security experience ... -
CISSP Online Exam Format: Pro & Con
in Uncategorized - 3 CommentsA lot of attention has been given to the new computer-based testing (CBT) exam format for CISSP® certification. This may be merited. There is an ongoing debate about the integrity of the exam itself when delivered in such an environment and the possible repercussions to the quality of the credential itself.The concern over whether or not this deliv ...Jun 20 Tags: Breaking News, CBT, Certification, CISSP, computer based testing, Controversy, physical security -
Other entries by Brian Edmiston