Books:

Author

Computer Forensics and Digital Investigations with EnCase Forensic, published by McGraw-Hill, 2014.

Technical Editor

Computer Forensics InfoSec Pro Guide by David Cowen

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, by N. K. McCarthy

 

Reports:

The Verizon 2013 Data Breach Investigations Report, by the Verizon RISK Team (I'm a co-author).

 

Papers:

How Bad Is It?  A Branching Activity Model to Estimate the Impact of Information Security Breaches by Thomas, Antkiewicz, Florer, Widup and Woodyard, presented at WEIS 2013.

The Leaking Vault 2011 - Six Years of Data Breaches, published by the Digital Forensics Association, 2011.

The Leaking Vault - Five Years of Data Breaches, published by the Digital Forensics Association, 2010.

Business Continuity Planning in Difficult Economic Times, SANS GSEC Gold paper, 2003.

 

Articles:

The leaking vault - Five years of data breaches, a series of three articles on data breaches and the study by the same name; a collaboration with M.E. Kabay.  NetworkWorld, 2011.

Breaches and vectors, the second of the series mentioned above.  NetworkWorld, 2011.

Threat actors and victims, the third of the series mentioned above.  NetworkWorld, 2011.

 Caring for Fine Jewelry, Budget Savvy Magazine, 2006.

 Buying Wedding Rings, Budget Savvy Magazine, 2003 (link not available on their site).

 

 Speaking Engagements:

BSides Vancouver 2014, where I presented with Kevin Thompson (@bfist) on Ripped from the Headlines: What the news tells us about Information Security Incidents

BSidesSF 2014, where I presented with Kevin Thompson (@bfist) on Ripped from the Headlines: What the news tells us about Information Security Incidents

ISSM Engage Spring Conference 2013 where I a panelist on Managing Social and Mobile Risk.

CEIC 2013 where I presented The 2013 Verizon Data Breach Investigations Report.

UCDPER's Cyber Terrorism and Health Care where I presented The 2013 Verizon Data Breach Investigations Report with special emphasis on risks to the Healthcare sector.

The Leaking Vault - Five Years of Data Breaches, SecureWorld Expo, 2010.  The slides from my presentation can be found here.

Compliance is Not the Same as Security! Panelist, Cornerstones of Trust, 2009. 

Data Breaches - Where are the Biggest Risks? SecureWorld Expo, 2009.  The slides from my presentation can be found here.

 e-Discovery & Federal Rule 26 – The Technical & Legal Implications?  Panelist, SecureWorld Expo, 2007.