Michael Angelo

Contact Michael Angelo

Member since
1/29/2015

About Michael Angelo

I am the Chief Security Architect at NetIQ. As such I am responsible for driving product security. This includes working with our engineers to create and complete Threat / Mitigation Models, proving government and CMM compliance (508, certificates of originality, escrow, copyright, BAA, TAA, export ), compliance and planning for standards and regultory changes (from a technology point of view, i.e. FIPS, IPv6, etc), and multiple Common Criteria Certifications. I also drive / facilitate compliance to our product release process. I have been designing, developing, implementing and deploying security products and architectures in multi-national corporate environments for over thirty years. This includes over twenty years participating, driving, and creating security standards and over fifteen years working on corporate policy, national and international legislation, as well as multi-national regulatory issues. In 2004 I was named a Sigma-Xi distinguished lecturer for the areas of Biometrics and Access Authentication, and was awarded a TCPA achievement award, and was the chair of a number of TCG working groups. In addition to these honors I have 51 granted patents and am an active participant in a number of technology boards.

User Points

0 points earned on legacy (former) Cool Solutions site
0 points earned on this site

Author Archives

Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrusion Software, Network Surveillance and Cybersecurity in Practice at ACI’s Global Encryption Controls. On first glance, one may wonder what Export Compliance has to do with cybersecurity. If you do, then you have probably missed the recent debate around cybersecurity tools and…

+ read more

Mar 18, 2016
12:14 pm
Reads:
19,169
Score:
Unrated

On February 9, President Obama published “Protecting U.S. Innovation from Cyberthreats” in The Wall Street Journal. The article outlined the cyber-focused portion of the federal budget proposal, which includes a new national plan giving $3 billion to kick-start an overhaul of the federal computer systems. According to the article, Obama’s new Cybersecurity National Action Plan…

+ read more

Feb 24, 2016
8:17 am
Reads:
6,811
Score:
4

Recently I was cleaning out my home office and came across a white paper that I had worked on years ago. This is not directly IT Security related, but this paper was a team effort and was assembled by the Center for National Research Initiative’s Cross-Industry Working Team (CNRI XIWT). It was entitled Visions of…

+ read more

Aug 20, 2012
9:49 am
Reads:
8,014
Score:
Unrated

As some have noticed, I have been holding off on posting over the past six months. This is because I have become confused with respect as to what to comment on and what to motivate changes for. If we look at the areas I typically track (certifications, cyber legislation / controls, security incidents and technology), we…

+ read more

Aug 16, 2012
9:02 am
Reads:
4,072
Score:
Unrated

As some of you may be aware, Ron Lapedis and I are providing the Biometrics and Access Token Technology, 10 Years Later session  at the 2012 RSA Conference. Our original thought in proposing the session was that given the various hacks, attacks, and leaks of last year there was too much snake oil oozing out…

+ read more

Jan 25, 2012
3:15 pm
Reads:
4,250
Score:
Unrated

In the past any industry desiring to provide technology to government agencies was compelled to submit their products to be certified. For each country and government market the company would have to go through a certification process. The certification was required to be considered as a qualified vendor in the acquisition process. Given the numerous…

+ read more

Dec 1, 2011
12:20 pm
Reads:
4,487
Score:
Unrated

Recently I attended the 2011 ISSA International Conference. At it I was honored as the 2011 ISSA Professional of the Year. This was somewhat of a surprise when they first announced it, and was greatly appreciated. I also had the privilege of being recognized as the chair of the ISSA International Webinar Committee. Finally I…

+ read more

Oct 31, 2011
12:25 pm
Reads:
2,981
Score:
Unrated

In an earlier blog post: Cloud Computing Brings Chance of Showers, published by SC Magazine in their The SC Magazine Awards Blog, I identified potential security issues associated with cloud computing. While those issues may slightly reduce the full potential of the cloud, the question you have to ask yourself is: “Does the value of…

+ read more

Feb 25, 2011
10:30 am
Reads:
3,926
Score:
Unrated

Joe Tasker, former General Counsel of ITAA and VP of Government Affairs at Compaq, had attended a webinar that went over the newly published draft NIST Guidelines on Security and Privacy in Public Cloud Computing, and asked me what I thought. Lucky for me I just completed two blog posts for SC Magazine on issues with…

+ read more

Feb 10, 2011
1:22 pm
Reads:
4,091
Score:
Unrated