Peter H. Gregory Explained
Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.
Biography
Peter Hart Gregory is a member of the Board of Advisors and lecturer for the NSA-certified University of WashingtonCertificate in Information Security and Risk Management,[1] a member of the Board of Advisors for the University of Washington Certificate in Cloud Transition Strategies and Management,[2] and on the Board of Advisors and the lead instructor (emeritus) for the University of Washington Certificate in Information Systems Security.[3] He is a founding member of the Pacific CISO Forum.[4]
As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell.
Publications
- Gregory, Peter. Solaris Security, Prentice-Hall, 1999.
- Gregory, Peter. Solaris Security (Japanese Language Edition), Prentice-Hall, 1999.
- Gregory, Peter. Solaris Security (Chinese Language Edition), Prentice-Hall, 1999.
- Gregory, Peter. Sun Certified System Administrator for Solaris 8 Study Guide, Prentice-Hall, 2001.
- Gregory, Peter. Enterprise Information Security, Financial Times Management, 2003.
- Gregory, Peter. Enterprise Information Security (Romanian Language Edition), Financial Times Management, 2003.
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, John Wiley & Sons, 2003.
- Gregory, Peter; Miller, Lawrence. Security+ Certification for Dummies, John Wiley & Sons, 2003.
- Gregory, Peter. Computer Viruses for Dummies, John Wiley & Sons, 2004.
- Gregory, Peter; Simon, Mike. Blocking Spam and Spyware for Dummies, John Wiley & Sons, 2005.
- Gregory, Peter. VoIP Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006.
- Gregory, Peter. SIP Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006.
- Gregory, Peter. Converged Network Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007.
- Gregory, Peter. IP Multimedia Subsystems for Dummies, Radisys Limited Edition, John Wiley & Sons, 2007.
- Gregory, Peter. Midsized Communications Solutions for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007.
- Gregory, Peter. Comunicaciones para Medianas Empresas para Dummies, Edicion Limitada de Avaya, John Wiley & Sons, 2007.
- Gregory, Peter. Unified Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007.
- Gregory, Peter. Comunicações Unificadas, Edicao Espeçial da Avaya, John Wiley & Sons, 2007.
- Gregory, Peter. Securing the Vista Environment, O'Reilly Media, 2007.
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Second Edition, John Wiley & Sons, 2007.
- Gregory, Peter. IT Disaster Recovery Planning for Dummies, John Wiley & Sons, 2007.
- Gregory, Peter; Simon, Mike. Biometrics for Dummies, John Wiley & Sons, 2008.
- Gregory, Peter; Miller, Lawrence. SIP Communications For Dummies, Avaya 2nd Custom Edition, John Wiley & Sons, 2009.
- Gregory, Peter. CISSP Guide to Security Essentials, Thomson Course Technology, 2009.
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, McGraw-Hill, 2009.
- Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Third Edition, John Wiley & Sons, 2009.
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Second Edition, McGraw-Hill, 2011.
- Gregory, Peter. Data Backup For Dummies, eVault Data Protection Edition, John Wiley & Sons, 2009.
- Gregory, Peter. Firewalls For Dummies, Sonicwall Edition, John Wiley & Sons, 2011.
- Gregory, Peter. Advanced Physical Access Control For Dummies, HID Global Edition, John Wiley & Sons, 2011.
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Fourth edition, John Wiley & Sons, 2012.
- Gregory, Peter. CISSP Guide to Security Essentials, Second Edition, Cengage Learning, 2015.
- Gregory, Peter. Advanced Persistent Threat Protection For Dummies, John Wiley & Sons, 2013.
- Gregory, Peter. Stopping Zero Day Exploits For Dummies, John Wiley & Sons, 2013.
- Gregory, Peter. Getting An Information Security Job For Dummies, John Wiley & Sons, 2015.
- Gregory, Peter; Hughes, Bill. Getting A Networking Job For Dummies, John Wiley & Sons, 2015.
- Gregory, Peter; DRaaS For Dummies, Veeam Software Special Edition, John Wiley & Sons, 2016.
- Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Fifth edition, John Wiley & Sons, 2016.
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, McGraw-Hill, 2016.
- Gregory, Peter. CISM Certified Information Security Manager All-in-One Exam Guide, McGraw-Hill, 2018.
- Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Sixth edition, John Wiley & Sons, 2018.
- Gregory, Peter. CISM Certified Information Security Manager Practice Exams, McGraw-Hill, 2019.
- Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, McGraw-Hill, 2019.
- Gregory, Peter. CISA Certified Information Systems Auditor Practice Exams, McGraw-Hill, 2020.
- Gregory, Peter. Chromebook For Dummies, Second edition, John Wiley & Sons, 2020.
- Gregory, Peter. CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide, McGraw-Hill, 2021.
- Gregory, Peter. CIPM Certified Information Privacy Manager All-in-One Exam Guide, McGraw-Hill, 2021.
- Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Seventh edition, John Wiley & Sons, 2022.
- Gregory, Peter; Rogers, Bobby; Dunkerley, Dawn. CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second edition, McGraw-Hill, 2022.
- Gregory, Peter. The Art of Writing Technical Books, Waterside Productions, 2022.
- Gregory, Peter. CISM Certified Information Security Manager All-in-One Exam Guide, Second edition, McGraw-Hill, 2022.
- Gregory, Peter. CISM Certified Information Security Manager Practice Exams, Second edition, McGraw-Hill, 2023.
- Gregory, Peter. Chromebook For Dummies, Third edition, John Wiley & Sons, 2023.
Gregory has written several articles for Computerworld and Software Magazine including:
- Protect Apps and Data with a Disaster Recovery Plan[5]
- Identify Vulnerabilities with Application Scanning Tools[6]
- Integrity begins within: Security pros lead by example[7]
- Vulnerability Management Ushers an Era of Technical Risk Management[8]
- Security in the software development life cycle[9]
- Tipping sacred cows: Make bold decisions to protect your information[10]
- Lessons learned from the blaster worm[11]
- For an infosecurity career, get the technical basics first[12]
Gregory has been interviewed by trade publications including Information Security Magazine,[13] [14] [15] CIO Magazine,[16] Computerworld,[17] eWeek,[18] SearchSecurity,[19] [20] and Forbes.[21] [22]
See also
External links
Notes and References
- Web site: Certificate in Information Security and Risk Management . 2010-09-17 . September 2010 . University of Washington.
- Web site: Certificate in Cloud Transition Strategies and Management . 2016-03-10 . March 2016 . University of Washington.
- Web site: Certificate in Information Systems Security . 2010-09-17 . September 2010 . University of Washington.
- Web site: Peer to Peer . 2008-04-20 . Sherman . Erik . Information Security Magazine.
- Web site: Protect Apps and Data with a Disaster Recovery Plan . 2008-08-24 . Gregory . Peter . Software Magazine . https://web.archive.org/web/20080823173856/http://www.softwaremag.com/L.cfm?Doc=1157-8%2F2008 . 2008-08-23 . dead .
- Web site: Identify Vulnerabilities with Application Scanning Tools . 2008-04-20 . Gregory . Peter . Software Magazine . https://web.archive.org/web/20070708183321/http://www.softwaremag.com/L.cfm?Doc=1058-5%2F2007 . 2007-07-08 . dead .
- Web site: Integrity begins within: Security pros lead by example . 2008-04-20 . Gregory . Peter . Computerworld.
- Web site: Vulnerability Management Ushers an Era of Technical Risk Management . 2008-04-20 . Gregory . Peter . Software Magazine . https://web.archive.org/web/20061110214453/https://www.softwaremag.com/L.cfm?doc=2003-11%2F2003-11security . 2006-11-10 . dead .
- Web site: Security in the software development life cycle . 2008-04-20 . Gregory . Peter . SearchSecurity.
- Web site: Tipping sacred cows: Make bold decisions to protect your information . 2008-04-20 . Gregory . Peter . Computerworld.
- Web site: Lessons learned from the blaster worm . 2008-04-20 . Gregory . Peter . Computerworld.
- Web site: For an infosecurity career, get the technical basics first . 2008-04-20 . Gregory . Peter . Computerworld.
- Web site: Moving On Up . 2008-04-20 . Damore . Kelley . Information Security Magazine.
- Web site: Token Support Isn't Enough . 2008-04-20 . Damore . Kelley . Information Security Magazine.
- Web site: Best Advice . 2008-04-20 . Mimoso . Michael . Information Security Magazine.
- Web site: Data Breach History Includes Plenty of Big Names . 2008-04-20 . Brandel . Mary . CIO Magazine.
- Web site: Legal Niceties . 2008-04-20 . Brandel . Mary . Computerworld Magazine.
- Web site: Two Years In, IT Thought Leaders Judge GDPR's Impact . 2021-05-10 . Preimesberger . Chris . eWeek. 22 May 2020 .
- Web site: The who, what, why -- and challenges -- of CISM certification . 2021-05-10 . Shea . Sharon . SearchSecurity.
- Web site: CISA practice questions to prep for the exam . 2021-05-10 . Shea . Sharon . SearchSecurity.
- Web site: The CISO/Security Vendor Relationship: The "15 Minutes of Your Time" Request . 2021-05-10 . Spark . David . Forbes.
- Web site: Do CISOs Fall for Obvious Sales Ploys? - CISO/Security Vendor Relationship . 2021-05-10 . Spark . David . Forbes.