William Favre Slater, III
Writing
Sextortion: What You
Need to Know
IT
Industry and the 2022 Job Market - October 2022
Introduction to
Cybersecurity, CyberLaw, and CyberForensics Information - September 2022
Real Cybersecurity and
Managing and Reporting Metrics - March 2022
Presentation: Digital
Transformation Topic; - Pushing the Raspberry Pi: Ethereum on Pi and
Fluree on Pi. Low-cost and Open Source Enterprise Computing for Fun, Learning,
and Training - Prepared for
The CAPDA ICT Conference in Yaounde, Cameroon (Central Africa), August 24 - 26,
2021
Presentation: The Current
State of the Global COVID-19 Crisis, Impacts on Business and Society, the New
Normal, and a Unique, Secure, Web-based Contact Tracing App - Prepared for
The TIC Afrique Symposium CAPDA Conference in Yaounde, Cameroon (Central Africa),
December 18,
2020
Presentation: Digital
Transformation Topics, Perspectives and Opportunities to Help Cameroon Succeed
and Thrive in the Post COVID-19 World - Prepared for
The CAPDA Conference in Yaounde & Libreville, Cameroon (Central Africa), July 23,
2020
Presentation to the IGF
Cameroon Group: Leadership in Digital
Uncertainty: New Strategy to Cope with the New Normal - June 30, 2020
Blog Content for ISOC MANRS Secure Global Routing Course - A Proposal to Improve
MANRS Global Secure Internet Routing Policy ManagementUsing Blockchain
Technology - June 6, 2020
Presentation in PDF format for LeaderQuest & MISTI - Achieving Excellence, Success & Value Through
Best Practices in Cybersecurity Leadership & Management - May 21, 2020
Presentation on
Cybersecurity, CyberLaw, & CyberForensics for Chicagoland Detective Services,
Chicago, IL - October 8, 2019
A Brief
Introduction to Blockchain, Blockchain Security, & Blockchain Auditing - For
ASIS Northshore Chapter Meeting, August 15, 2019
2019 ISACA
NA CACS Conference - Workshop on Blockchain, Blockchain Security, and Blockchain
Auditing - Outline
2019 ISACA
NA CACS Conference - Workshop on Blockchain, Blockchain Security, and Blockchain
Auditing - Day 01 Presentation
2019
ISACA NA CACS Conference - Workshop on Blockchain, Blockchain Security, and
Blockchain Auditing - Day 02 Presentation
What’s Holding Blockchain Back from Mass Adoption? Quick Introduction to
Blockchain Security & Blockchain Auditing - Presented to Blockchain Weekly -
February 27, 2019
Introduction to Blockchain for Executives, Managers, & Decision Maker -
January 16, 2019
Becoming a Pentester -- December 25, 2018 - An article written for Publication in Test
Magazine, London, U.K. January 2019 - Cybersecurity Edition (Visit
https://www.softwaretestingnews.co.uk/products/test-magazine/
to see the actual printed version in Text Magazine.)
Quantum Computing Standards and Why We Need Them - November 25, 2018
Introduction of Blockchain and Blockchain Development - November 3, 2018
Roadmap to "Blockchain" Your IT Organization: How to Help your IT Staff Go from
Square One to Competence and Dominance in Blockchain Technologies - August 24,
2018
Introduction to Setting Up Ethereum on
a Small Raspberry Pi Network - April 21, 2018 - PDF
Blockchain Presentation from Forensecure 2018 - April 13,
2018 - PDF
How to Be Anonymous Online - Prepared for the Zurich North America CISO Summit -
March 2018
A Brief Introduction to Phishing, Spear Phishing, Whaling
and Social Engineering for the Northshore ASIS Chapter(2017) in PDF
A Brief Introduction to Phishing, Spear Phishing, Whaling
and Social Engineering for the Northshore ASIS Chapter(2017) in Powerpoint
Slideshow format
Mirai Botnet: How
IoT Botnets Performed Massive DDoS Attacks and Negatively Impacted Hundreds of
Thousands of Internet Businesses and Users in October 2016 (2017)
Internet of Things (2017)
Vulnerability Management: A Practitioner's Perspective (2016)
A Brief Introduction to Phishing, Spear Phishing, Whaling and Social
Engineering (2016) in PDF format
Is Your Data Center Prepared for the Zombie Apocalypse? (2016) in Powerpoint
slideshow format
Is Your Data Center Prepared for the Zombie Apocalypse? (2016) in PDF format
Information
Security Awareness Presentation (2012)
Information
Security Awareness Posters (2011)
Angry IP Scanner - Product Analysis and User Guide (2007)
Zero-Day Threats,
Vulnerabilities, and Remediation
Trip Report from a two-day Seminar on the Seven Habits of
Highly Effective Managers (from October 2007)
Telework: Risks, Challenges, Perils, and
Successes_by_William_Slater - for ISACA 2015
Telework: Risks, Challenges, Perils, and
Successes_by_William_Slater_and_Melanie_Thompson
Presentation for Northshore Chapter of ASIS: The Edward Snowden NSA Data Breach of 2013:
How it happened, and its consequences and implications for the U.S. and the IT
Industry - August 13, 2014
Presentation: Bitcoin: A Current Look at the World’s Most
Popular, Enigmatic and Controversial Digital Cryptocurrency
Presentation: The Edward Snowden NSA Data Breach of 2013:
How it happened, and its consequences and implications for the U.S. and the IT
Industry
Suppose They Gave a Cyberwar and EVERYBODY Came?
What's in Presidential Policy Directive 20 (PPD 20)? How
It Will Probably Affect America and Americans and Why You Should Care
ebook by William F. Slater III
Writings and Presentations
on Cyberwar, Cyberwarfare, and Cyberdeterrence
Presentation: Emergency Preparedness - 2014
Hacking Humans: The
Story of a Successful Well-planned Social Engineering Attack - February 19, 2013
BackTrack Linux: The 21st Century Network Hacker’s Dream Toolkit - February 10,
2013
Using ISO 27001 to Protect Your Organization in the Age of Cyberwarfare and Cyberattacks
-January 15, 2013 Cover Story at Hakin9 On Demand Magazine
William F. Slater III
Prepare your Organization for Cyberwarfare and Cyberattacks
Cover and Cover Story of Hakin9 On Demand Magazine
January 15, 2013
A Brief
Presentation on IT Governance and COBIT - January 27, 2013
( Kim Dotcom and Megaupload.com are back in 2013 )
(Latest Kim Dotcom News)
The Rise and Fall of
Megaupload.com and Kim Dotcom ( 2012 paper )
The Rise and Fall of Megaupload.com and Kim Dotcom ( 2012 presentation )
The Rise and Fall of
Megaupload.com and Kim Dotcom ( 2012 video )
William Slater interview with
Bellevue University - January 19, 2013
M.S. in Cybersecurity Coursework
Portfolio
A Short Presentation on IT Audit-related
Organizations and Certifications
Hackin9 Magazine Article: Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - December 2012
!
Technical Paper: The Roles of
the Internal Audit Team in Cloud Computing
Technical Paper: Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
Technical Presentation Video: Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
Technical Presentation in PowerPoint: Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
Policy Generation Related to
Cyberwarfare and
Cyberdeterrence -
November 11, 2012
Analysis of Symposium Discussion on Cyber Deterrence -
November 4, 2012
Conflict Resolution in Cyberwarfare and Cyberdeterrence -
October 28, 2012
Business Continuity Planning and the Small Business -
October 28, 2012
A Brief Analysis of Russian Cyberwarfare Capabilities –
Past, Present, and Future - October 21, 2012
Hackin9 Magazine Article - Using Wireshark and Other Tools to Help Solve the
Cyberwarfare Problem of Attribution - October 17, 2012
Strategic Comparative Analysis in Cyberwarfare and
Cyberdeterrence - October 14, 2012
Discussion of
Cloud Computing and Disaster Recovery as a Service - October 7, 2012
After Action Report and Incident Response Analysis for a
Large Chicago-based Retailer's 2005 Botnet Malware Disaster - September 30, 2012
U.S. Policy Appraisal Related to Cyberwarfare and
Cyberdeterrence - September 30, 2012
The Pro’s and Con’s of Using Open Source Software to
Defend an Enterprise Infrastructure
- September 23, 2012
Discussion Questions and Answers about Cyberwarfare -
September 23, 2012
Threat Assessment in Cyberwarfare and Cyberdeterrence -
September 16, 2012
Business Continuity Planning and Recovery - An Evaluation
of Oreck Corporation’s Hurricane Katrina Experience and Response - September 2,
2012
Recognizing and Mitigating the
Risks Associated with Teleworking Employees - July 22, 2012
Discussion Questions and Answers about the Stuxnet Worm -
December 20, 2011
Internet History and Growth - a 70-slide presentation
(updated October 27, 2011)
Can a Leadership Style Adversely Affect the State and
Quality of an Organization's Information Security?
Bellevue University Cybersecurity Program Blog
Course Blog for
CIS 537 - Introduction to CyberEthics
Course Blog for
CYBR 510 - Physical, Operantions, and Personnel Security
Course Blog for CIS
608 - Information Security Management
Course Blog for
CYBR 515 - Security Architecture and Design
Papers at University of Phoenix
William Slater's IPv4
Page
William Slater's
Time Tracker Application for a Microsoft Data Center Manager
William's Time Tracker Program (four
versions!)
Browser Popularity Analysis, 2004 -
2010
A 2009 article
I wrote about Cloud Computing
A 2002 article
I wrote on the October 2002 Internet_Outage_and DDoS_on the 13 DNS Root
Servers
An article I wrote about
creating web-based database applications
Performance Tuning and
Benchmarking in a Distributed Computing Environment (July 1997)
Free Secrets of
Success!
Thoughts
Blogs
Water's on the
Moon
Presentations
Suppose They Gave a Cyberwar and Everybody Came? (on YouTube.com)
Suppose They Gave a Cyberwar and Everybody Came?
(PDF version)
What's in Presidential Policy Directive 20 (PPD 20)? How It Will Affect
America and Americans and Why You Should Care (on YouTube.com)
What's in Presidential Policy Directive 20 (PPD 20)? How It Will Affect
America and Americans and Why You Should Care (PDF version)
Technical Presentation Video: Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
(on YouTube.com)
Technical Presentation Video (Slides Only): Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
(on YouTube.com)
Technical Presentation in PowerPoint: Case for Integration of Cyberwarfare and
Cyberdeterrence Strategies into the U.S. CONOPS Plan - November 18, 2012
= = = = = = = = = = = = = = = = = = = = =
= = = =
Quotes in News
Articles
= = = = = = = = = = = = = = = = = = = = = = = =
=
This is
the link is James Temple’s article in the San Francisco Chronicle regarding
recent computer security threats and issues.
Internet is still vulnerable to cyber-criminals
James Temple, Chronicle Columnist, Saturday, January 21, 2012
I was one of his subject matter experts that he interviewed for the article. He
found me because of a 2002 article I wrote for the
Internet Society about DDoS attacks on the 13 DNS Root Servers in October 2002.
Eulogies
Eulogy for Dale Carr - January
22, 2002 - - Friend, Colleague, Former Boss
Eulogy for Jim
Snyder - January 11, 2003 - Internet Society Colleague and Dear Friend
Eulogy for Robert Trent -
February 9, 2012 - Friend, Colleague, Boss
billslater.com
Visitor Information
Copyright 1996 - 2022 by
William Favre Slater, III,
Chicago, IL, USA
All
Rights Reserved, Nationally and Internationally.
Last Updated:
Tuesday, November 21, 2023
|