Contact us:

Beyond CIA Triad

Wednesday, March 17, 2021, Austin ISSA Chapter Meeting

Click here to Register for Free

Beyond CIA Triad

There is an undeniable need for security policies and mitigation strategies to review more security principles than the common CIA triad of confidentiality, integrity, and availability that most security professionals are trained on. Security programs often fail to breaches and threats because of principles forgotten such as possession, privacy, and utility. This paper takes this application one step further to show a visual alignment of the nine core security principles and apply it to a risk appetite chart

About Speaker

Jim West

Chief Information Officer
Cyber Security Expert

m West possesses over 25 years’ experience in the Information Technology field with over 15 years focused within Cyber Security. He has worked in the IT and Security industry across many sectors of commercial, space, federal, and defense with expertise in Biometrics, Risk Management, Security Analysis, and Network and Systems Auditing. Jim holds
multiple certifications which include; CISSP-ISSEP, ISSMP, CAP, GSLC, GCIH, GSNA, GCWN, G2700, PMP, CIPP, C-CISO, CEH, and many others.

Jim has been invited to speak at Cyber Security conferences and events worldwide to include the NSA IA Symposium, Texas Technology Summit, ISACA Asia CACS, CSfC Tech Day, TechNet Korea, TechNet Pacific, Cyber Bowl, Best Cyber Ranger, and many others. He was shortlisted as a finalist for Personality of the Year for the 2018, 2019, and 2020 Cyber Security Awards. Jim is also an Award Winning author and writer. Recently Jim’s “Cyber Security and Test Tips” ebook placed in the 100 Best Cyber Security Books of All Time list by

Currently Jim develops and oversees IT and Cybersecurity strategy and solutions for TRECIG which solves complex problems for National Security systems and networks. TRECIG provides a wide range of IT specialization, to include systems and software integration, enterprise-wide and cloud security, network engineering, penetration testing, and more.

Skip to content