• United States



We Are Not Alone”Ś

Jun 12, 20071 min
Data and Information Security

Just when I thought that I was the only CISO using a Mac, I was proved wrong. Last week I attended the Gartner CISO Invitational Bootcamp and was pleased to see a number of my peers showing off their shiny silver Macs. Initially I was surprised, but the more that I think about it I realize that other security folks were bound to use the Mac for the same reasons that I do. If you’ve read any of my previous blog posts, you’ll know that I am a huge proponent of aligning security and business needs. The security officers at this conference were the cream of the crop. These are people responsible for the security of large global organizations using the Mac. And why not? These same people know better than most that business needs are the drivers behind security. They need to be able to communicate at the C – Level. I can’t think of a better tool to facilitate that communication than the Mac.

That being said, when will the rest of you get on board and pick up the Mac.

Chad McDonald, CISSP, CISA, C|EH, PMP is a Senior Professional Services Consultant with Imperva. Chad has worked previously at National Student Clearinghouse, Centers for Disease Control and Prevention, Georgia Department of Audits and Accounts and is the former Chief Information Security Officer at Georgia College & State University. Chad has addressed numerous groups on topics such as business continuity planning, incident response, and information security awareness. Chad has spent the bulk of his career building, managing, and assessing information security for educational and research organizations. Chad has earned multiple professional security certifications. He is a member of the Information Systems Audit and Control Association as well as InfraGard, an FBI Task Force charged with protecting the nation's information infrastructure. Chad is active in the security community He worked with law enforcement agencies to assist in the prosecution of the first computer crime on record in Georgia and continues to assist local and state authorities with computer based investigations. Chad has investigated computer and computer-related crimes for local and state law enforcement agencies. Chad is an avid Mac user, since he was rescued from the dark side eight years ago. He currently conducts the vast majority of his work using a MacBook Pro and a MacBook. Chad looks forward to the day that he can stop referring to himself in the third person and actually pay someone to write his bio for him. The opinions and statements expressed here are those of Chad McDonald and in no way reflect opinions or statements of any employer or organization with which Chad is affiliated.