William Favre Slater, III

Writing

 

 

 

Presentation: Bitcoin: A Current Look at the World’s Most Popular, Enigmatic and Controversial Digital Cryptocurrency

 

Presentation: The Edward Snowden NSA Data Breach of 2013: How it happened, and its consequences and implications for the U.S. and the IT Industry

 

ebook by William F. Slater III (

 

Writings and Presentations on Cyberwar, Cyberwarfare, and Cyberdeterrence

 

Presentation: Emergency Preparedness - 2014 !

 

Hacking Humans: The Story of a Successful Well-planned Social Engineering Attack - February 19, 2013 !

 

BackTrack Linux: The 21st Century Network Hacker’s Dream Toolkit - February 10, 2013 !

 

Using ISO 27001 to Protect Your Organization in the Age of Cyberwarfare and Cyberattacks -January 15, 2013 Cover Story at Hakin9 On Demand Magazine !

 


William F. Slater III
Prepare your Organization for Cyberwarfare and Cyberattacks
Cover and Cover Story of Hakin9 On Demand Magazine
January 15, 2013

 

A Brief Presentation on IT Governance and COBIT - January 27, 2013  !

 

( Kim Dotcom and Megaupload.com are back in 2013 ) (Latest Kim Dotcom News!)

 

The Rise and Fall of Megaupload.com and Kim Dotcom ( 2012 paper )  (New!)

 

The Rise and Fall of Megaupload.com and Kim Dotcom ( 2012 presentation ) (New!)

 

The Rise and Fall of Megaupload.com and Kim Dotcom ( 2012 video ) (New!)

 

William Slater interview with Bellevue University - January 19, 2013 (New!)

 

M.S. in Cybersecurity Coursework Portfolio !

 

A Short Presentation on IT Audit-related Organizations and Certifications  (New!)

 

Hackin9 Magazine Article: Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - December 2012 !

 

Technical Paper: The Roles of the Internal Audit Team in Cloud Computing

 

Technical Paper: Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012

 

Technical Presentation Video: Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012

 

Technical Presentation in PowerPoint: Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012

 

Policy Generation Related to Cyberwarfare and Cyberdeterrence - November 11, 2012

 

Analysis of Symposium Discussion on Cyber Deterrence - November 4, 2012

 

Conflict Resolution in Cyberwarfare and Cyberdeterrence - October 28, 2012

 

Business Continuity Planning and the Small Business - October 28, 2012

 

A Brief Analysis of Russian Cyberwarfare Capabilities – Past, Present, and Future - October 21, 2012  

 

Hackin9 Magazine Article - Using Wireshark and Other Tools to Help Solve the Cyberwarfare Problem of Attribution - October 17, 2012

 


 

Strategic Comparative Analysis in Cyberwarfare and Cyberdeterrence - October 14, 2012

 

Discussion of Cloud Computing and Disaster Recovery as a Service - October 7, 2012  

 

After Action Report and Incident Response Analysis for a Large Chicago-based Retailer's 2005 Botnet Malware Disaster - September 30, 2012

 

U.S. Policy Appraisal Related to Cyberwarfare and Cyberdeterrence - September 30, 2012

 

The Pro’s and Con’s of Using Open Source Software to Defend an Enterprise Infrastructure - September 23, 2012

 

Discussion Questions and Answers about Cyberwarfare - September 23, 2012

 

Threat Assessment in Cyberwarfare and Cyberdeterrence - September 16, 2012  

 

Business Continuity Planning and Recovery - An Evaluation of Oreck Corporation’s Hurricane Katrina Experience and Response - September 2, 2012

 

Recognizing and Mitigating the Risks Associated with Teleworking Employees - July 22, 2012

 

Discussion Questions and Answers about the Stuxnet Worm - December 20, 2011

 

Internet History and Growth - a 70-slide presentation (updated October 27, 2011)

 

Can a Leadership Style Adversely Affect the State and Quality of an Organization's Information Security?  (New!)

 

Bellevue University Cybersecurity Program Blog (New!)

 

Course Blog for CIS 537 - Introduction to CyberEthics  (New!)

 

Course Blog for CYBR 510 - Physical, Operantions, and Personnel Security  (New!)

 

Course Blog for CIS 608 - Information Security Management  (New!)

 

Course Blog for CYBR 515 - Security Architecture and Design  (New!)

 

Papers at University of Phoenix

 

William Slater's IPv4 Page

 

William Slater's Time Tracker Application for a Microsoft Data Center Manager

 

William's Time Tracker Program (four versions!)

 

Browser Popularity Analysis, 2004 - 2010 (New!)

 

A 2009 article I wrote about Cloud Computing

 

A 2002 article I wrote on the October 2002 Internet_Outage_and DDoS_on the 13 DNS Root Servers

 

An article I wrote about creating web-based database applications

 

Free Secrets of Success!

 

Thoughts

 

Blogs

 

Water's on the Moon

 

 

Presentations

Suppose They Gave a Cyberwar and Everybody Came? (on YouTube.com)

Suppose They Gave a Cyberwar and Everybody Came? (PDF version)

What's in Presidential Policy Directive 20 (PPD 20)?  How It Will Affect America and Americans and Why You Should Care  (on YouTube.com)

What's in Presidential Policy Directive 20 (PPD 20)?  How It Will Affect America and Americans and Why You Should Care  (PDF version)

Technical Presentation Video: Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012 (on YouTube.com)

 

Technical Presentation Video (Slides Only): Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012 (on YouTube.com)

 

Technical Presentation in PowerPoint: Case for Integration of Cyberwarfare and Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012

 

= = = = = = = = = = = = = = = = = = = = = = = = =

Quotes in News Articles
= = = = = = = = = = = = = = = = = = = = = = = = =

This is the link is James Temple’s article in the San Francisco Chronicle regarding recent computer security threats and issues.
Internet is still vulnerable to cyber-criminals
James Temple, Chronicle Columnist, Saturday, January 21, 2012
I was one of his subject matter experts that he interviewed for the article. He found me because of a 2002 article I wrote for the Internet Society about DDoS attacks on the 13 DNS Root Servers in October 2002.

 

Eulogies

Eulogy for Dale Carr - January 22, 2002 -  - Friend, Colleague, Former Boss

Eulogy for Jim Snyder - January 11, 2003 - Internet Society Colleague and Dear Friend

Eulogy for Robert Trent - February 9, 2012 - Friend, Colleague, Boss

 


Visitor Count

invisible counter
Aliens in the Attic

 

billslater.com

 

Visitor Information

Amazing Counters
Playstation 3 Games

 

 

Locations of Site Visitors

 

 

Copyright 1996 - 2013 by William Favre Slater, III,
Chicago, IL, USA
All Rights Reserved, Nationally and Internationally.


Last Updated: Wednesday, April 23, 2014