Kenneth G. Hartman, CISSP
Technology Leadership & Information Security
LinkedIn Twitter
  Menu
Skip to content
  • Welcome
  • Articles & Presentations
  • Blog
  • Personal Branding Workbook
  • Quotations
  • Reading List
  • Contact Ken
LinkedIn Twitter

Tag Archives: Courage

Eight Traits for Vision

By Kenneth | January 2, 2013 - 12:37 am |January 13, 2019 Leadership
Comments Off on Eight Traits for Vision

1. Vision always entails change. 2. Vision always involves risk. 3. Vision always entails growth. 4. Vision always requires innovation. 5. Vision always requires passion. 6. Vision always requires focus. 7. Vision always requires courage. 8. Vision always requires evaluation. —Author Unknown

Tagged Change, Courage, Focus, Growth, Passion, Vision
  • Search this site

  • Check out my other project…

    forensicate.cloud
  • Categories

    • CISSP
    • Coding
    • Hacking
    • Leadership
    • Privacy
    • Security Awareness
    • Security Management
    • Systems Administration
    • Uncategorized
    • Vulnerability Management
  • Recent Posts

    • InfosecConsultCon
    • Create an EC2 that runs Chrome for sandboxed websurfing
    • Check Multiple AWS S3 Buckets for Missing Default Encryption
    • The Equifax Data Breach and the Apache Struts Vulnerability
    • Test Early, Test Often
    • Linux Hardening
    • Information Security at Startup Companies
    • Timestamp bash_history with every command
  • Tweets

    Kenneth G. HartmanFollow

    Kenneth G. Hartman
    KennethGHartmanKenneth G. Hartman@KennethGHartman·
    7 Apr

    https://strangesounds.org/2021/04/researchers-can-now-collect-and-sequence-dna-from-the-air-2.html

    Reply on Twitter 1379919923397410816Retweet on Twitter 1379919923397410816Like on Twitter 1379919923397410816Twitter 1379919923397410816
    KennethGHartmanKenneth G. Hartman@KennethGHartman·
    7 Apr

    Thinking about mental models lately in preparation for an upcoming talk. found this research paper fascinating: "How Hackers Think: A Study of Cybersecurity Experts and Their Mental Models" https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2326634

    Reply on Twitter 1379800404922396672Retweet on Twitter 1379800404922396672Like on Twitter 1379800404922396672Twitter 1379800404922396672
    KennethGHartmanKenneth G. Hartman@KennethGHartman·
    3 Apr

    Need a crash course on Terraform +Git with a security use case? Here is my gift to you...

    SANS Cloud Security@SANSCloudSec

    NEW YouTube Video by @KennethGHartman !

    Heavy hands-on demo to "Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation"

    View it here: https://youtu.be/5L6yxXXn0-I

    Reply on Twitter 1378448458214965252Retweet on Twitter 13784484582149652521Like on Twitter 13784484582149652522Twitter 1378448458214965252
    KennethGHartmanKenneth G. Hartman@KennethGHartman·
    1 Apr

    "The mass media shall conduct targeted cybersecurity publicity and education aimed at the public." -- https://www.dezshira.com/library/legal/cyber-security-law-china-8013.html

    Reply on Twitter 1377577205987954691Retweet on Twitter 1377577205987954691Like on Twitter 1377577205987954691Twitter 1377577205987954691
    KennethGHartmanKenneth G. Hartman@KennethGHartman·
    30 Mar

    Chilling on Baker Beach, San Francisco a couple of years ago, Labor Days Weekend.

    #GoodReading
    #InfoSecRockstar

    https://infosecrockstar.com/

    Reply on Twitter 1376961924781445126Retweet on Twitter 1376961924781445126Like on Twitter 1376961924781445126Twitter 1376961924781445126
    Load More...
  • Tags

    Amazon Linux Brand bruce schneier Chrome collision Consulting Continuous Improvement Debian Defense-in-Depth EC2 Encryption Hardening Identification John Maxwell Layers of Security Linkedin Linux Martial Arts MBWA Measurements MobaXterm netstat non-interactive install Tshark OWASP Oz Data Centa Passion Pastebin Performance Management Processes Python Quality Quality Improvement SDLC Security Security Controls Security Policy Seth Godin SHA1 Shannon Entropy silent install TShark SSH Success Trust TShark ZeroBin
  • Welcome
  • Articles & Presentations
  • Blog
  • Personal Branding Workbook
  • Quotations
  • Reading List
  • Contact Ken
© Kenneth G. Hartman 2015-2020
Kenneth G. Hartman, CISSP | Powered by Mantra & WordPress.
LinkedIn Twitter