Meeting the Cyber Security Needs of Global Enterprises

The Parenty Consulting Group – including Hong Kong-based Parenty Consulting Limited and United States-based Cyber Security Consulting LLC – assists clients in understanding and effectively managing the cyber risks they face.
This is accomplished through a unique methodology of matching information security protections to an enterprise’s business operations and objectives.


The Parenty Consulting Group provides services that protect enterprises’ most sensitive assets, both intellectual and financial. We work closely with business and technology management and staff to understand clients’ unique requirements and situations in order to evaluate, design and select security solutions that are aligned with business and operational objectives. While each client engagement is unique, the following service offerings are representative.

Proactive Information Security Risk Assessment


Information Security Organizational and Governance Development


Post-Incident Analysis and Remediation


About Thomas Parenty

With over thirty years of experience in the computer security and cryptography fields, including employment with the National Security Agency, Thomas Parenty has designed and evaluated the information security protections of numerous national and global systems, including those for banking, electronic commerce, payment card processing, healthcare, manufacturing, on-line gaming, mining, shipping, electric power generation, and nuclear command and control.

Mr. Parenty has testified five times before the United States Congress on global competitiveness, national security, law enforcement, and encryption export controls.

Thomas is the author of the Harvard Business School book, Digital Defense: What You Should Know About Protecting Your Company’s Assets, and has been featured over 100 times in international television, web and print media ranging from CNN’s Global Office to The Economist, The New York Times and South China Morning Post.

He advised the President’s Commission on Critical Infrastructure Protection and assessed the quality of the information security work done by the National Institute of Standards and Technology (NIST) on behalf of the National Academy of Sciences.

Thomas has worked in over 25 countries spanning North America, Asia, Europe, and the Middle East. He lived in Hong Kong and Mainland China for a decade and continues to assist clients across Asia from Mongolia to Indonesia. This gives him a unique understanding of the information security risks and challenges facing multinational corporations operating in this dynamic part of the world.

Press and Media



Q&A: While in China, Protect Your Devices and Data
China is one of the world’s most dangerous Internet environments, with risks including government-sponsored on­line attacks, piracy and malware.



China, a Fish Barrel for Cybercriminals
“Efforts by companies to ensure that employees do not inadvertently compromise corporate networks have ranged from negligence to draconian measures”, according to Thomas Parenty, the head of the information security firm Parenty Consulting.



Analysis: The hidden cost of cybercrime
When bandits make off with intellectual property, the cost to the company does not equal the money made by cybercriminals. “It’s like in the Cold War — the amount of money spies got paid to give away state secrets was absolutely inconsequential compared to the cost of the damage,” Parenty says.



Companies more at risk from internal attacks
“When considering how to protect corporate computer networks from attack it is important to understand what types of threats a particular security measure protects you from.”



The leaky corporation
“But the problem is often a lack of understanding by senior managers not just of technology but of business processes”, says Thomas Parenty, author of “Digital Defense: What You Should Know About Protecting Your Company’s Assets (Harvard Business School Press, 2003). “No one in the organisation bothers to look at the value of what data they hold, the consequences if something bad happens to it, and the appropriate mechanisms to prevent that from happening,” he says.

Retailers need to focus holistically on Cybersecurity
FBIC Global Retail Research & Intelligence
November 20, 2014

Chinese cyber attacks on West are widespread, experts say
February 1, 2013

Chinese Authorities Putting Pressure on Businesses to Help Censor the Web
The New York Times
November 13, 2012

QBPC Warns Members About Risk of China-Mandated Software
August 28, 2012

International firms caught in China’s security Web
August 24, 2012

The Cyber Scare
Insight: The Journal of the American Chamber of Commerce in Shanghai
June 4, 2012

Wannabe infosec kingpins: Forget tech, grab a clipboard
The Register
April 25, 2012

“Analysis: The hidden cost of cybercrime”
June 7, 2011

Gmail attack shows growing cybercrime sophistication
June 2, 2011

How to Have World Class Data Management
Fashion Technology Magazine
March/April 2010

Avoid being victimized in Internet scam
TVB: Money Magazine
March 26, 2010

How safe is cloud computing?
March 12, 2010

Confab vets data security
Viet Nam News
December 12, 2009

US testing new system to bypass web filters
China Daily
August 15, 2009

China: Filtering software will not be required
August 14, 2009

Cyber attacks touching celebrities, governments
July 10, 2009

China’s ‘Green Dam’ unleashes flood of business complaints
July 1, 2009

Dollars and sense
Computerworld Hong Kong
March 11, 2009

Does your business have the stomach for risk?
Computerworld Hong Kong
June 5, 2008

The past may come back to haunt you
South China Morning Post
April 29, 2008

Plugging the holes
April 2, 2008

Strengthening Security Awareness and Deployment
Vietnam Business Forum
March 11, 2008

Companies More At Risk from Internal Attacks
South China Morning Post
September 25, 2007

Internet censorship gathers steam
April 24, 2007

Homework: Realities of a remote workforce part 1
HR Hong Kong
February 2007

Gangs Flooding the Web for prey, analysts say
December 20, 2006

Rethinking Your Computer Security Systems
Tradelink e-Biz
December 2006

HSBC reassures on security flaw
South China Morning Post
August 12, 2006

Security Summit
Computerworld Hong Kong
October 1, 2005

The leaky corporation
The Economist
June 25, 2005

Staying Connected…Safely
BusinessForum China
March/April 2005
(Download Article)

Good habits may offer best defense
South China Morning Post
March 22, 2005

Moving Target
Asian Wall Street Journal
February 25 -27, 2005

ID card numbers not secure passwords
South China Morning Post
June 8, 2004

IT Security: What The Experts Say
Far Eastern Economic Review
April 22, 2004

Strategic Imperatives – Security Gets A Business Framework
Microsoft Executive Circle
Summer 2004

Cyber-Security Enters Boardroom
December 10, 2003

Information Security: Beyond Firewalls
Optimize, Business Strategy & Execution for CIOs
December 1, 2003

Digital Defense: Establishing Identity
November 25, 2003

Are You A Technical Guru Or An Enlightened Friend?
Ubiquity, An ACM IT Magazine and Forum
November 5, 2003

Of Security, And Change
The Hindu Business Line
October 29, 2003

Required Reading
October 23, 2003

New Rules For Information Security
Harvard Business School Working Knowledge
October 20, 2003

Digital Defense
IT Conversations
October 8, 2003

A New Approach To Information Security
UNISYS Exec online
October 2003

Who Are You? And How Do I Know You Are Who You Say You Are? Learning To Rely On Digital Identity
October 2003

Stopping The Flow:
It’s Easier To Keep Hackers Out Of Corporate Computers Than To Keep Data In

CFO Magazine
September 1,2003

Asia Travel Scare: Worries About The Spread Of Mystery
Illness Prompt Firms To Curtail Business Overseas

San Francisco Chronicle
April 2, 2003

Not As Secure As You Think
Sybase Magazine
First Quarter 2003

Strong Cryptography, The Global Tide Of Change
CATO Institute Briefing Papers
September 17, 1999

The latest encryption bills still won’t bring the
United States up to international standards

Red Herring Magazine
September 1999

Encryption experts cheer introduction of SAFE Act
The Freedom Forum Online
March 8, 1999

Administration Attacks Encryption Bill
PC World News
March 4, 1999

Industry takes crypto to the Hill
March 4, 1999

The $237 Billion Conundrum
Electronic Business
November 1998


Biblioteques de la UPC. Unitat de Suport en Informacio Electronica
15 Octubre 1998

Telecom users need education
The National
Port Moresby, Papua New Guinea
September 8, 1998

Encryption And You
June 29, 1998

Encryption exports not easy
April 6, 1998

Securing the Net
Computerworld New Zealand
March 16, 1998

Senate Hearing on Encryption Could Stir Up Constitutional Debate
Dow Jones Online News
March 13, 1998

Partisans on Both Sides Await Senate Hearing on Encryption
The Wall Street Journal Interactive Edition
March 13, 1998

Commercial Perspectives on Information Assurance Research
Report to the President’s Commission on Critical Infrastructure Protection
October 1997

Online Update
The American Spectator
September 23 – 29, 1997

In Dispute: Access Rights To Coded Messages
Computer News Daily
The New York Times Syndicate
September 5, 1997

Industry blast domestic key-escrow proposal
September 4, 1997

Encryption Ruling Won’t Help Exports
San Francisco Chronicle
August 27, 1997

Encryption Gyrations
Software Magazine
August 1997

It’s Only The Beginning
Financial Service ONLINE
July/August 1997

Decoding The Real Meaning Behind The New Encryption Policy
Financial Service ONLINE
June 1997

SAFE Meets More Opposition
The Export Practitione
June 1997

Privacy: ‘First Holy War of the Information Age’
Computer News Daily
NY Times News Service
May 27, 1997

Battle Over Internet Privacy Heats Up On Capitol Hill
NY Times News Service
May 25, 1997

Sybase Gets Government Waiver for Encryption Software Exports
May 21, 1997

Sybase crypto OK for export
May 21, 1997

Daily Report for Executives
May 20, 1997

Goodlatte takes lead role in taming of cyberspace
The Roanoke Times
April 21, 1997

Banks May Be Forced To Give Up The Keys To Their Internet Gateway
Report on Home Banking & Financial Services
April 15, 1997

US encryption export rule critics blast proposal
March 26, 1997

Hot Connections — Secure edges Check Point’s Interne
firewalls, but Alta Vista sells best

March 1, 1997

Computer Crime Adds Fuel To Firewall Market
Inter@ctive Week
February 24, 1997

Security: It’s Your Call
December 9, 1996

Web security threat grows
Electronic Engineering Times
November 4, 1996

Is Terrorism the Net’s Fault?
November 1, 1996

Planning Your Intranet
The Washington Post
September 30, 1996

Channel feels pinch of export limitations — VARs Hit Encryption Roadblock
Computer Reseller News
August 5, 1996

Critics Claim US Encryption Policies Inefficient, Self-Serving
July 29, 1996

Computer Industry Off-line with US Encryption Control
Morning Edition, National Public Radio
July 5, 1996

Silicon Valley Fights Limits on Exporting Encryption Software
The Christian Science Monitor
July 5, 1996

The Third World War Will Be An Information War
IDG News Service
July 1996

The Rush to the Net
Data Based Advisor
May 1996

New Proposals on Encryption get Tepid Response
The Wall Street Journal
February 26, 1996

The Proxy’s Price
LAN Times
February 19, 1996

Encryption Exports Could Hurt US Software Market
Electronic Messaging News
November 29, 1995

Sybase Sites to Get Web Links
Communications Week
November 13, 1995

IFIP WG11.3 Conference on Database Security
Electronic CIPHER
November 1, 1995

Is Your LAN Data Secure?
Software Magazine
May 1992

Sybase Shipping a ‘Secure’ RDBMS
UNIX Today
March 5, 1990

Sybase Unveils Multilevel Secure DBMS
Federal Computer Week
February 19, 1990

Integration Issues for Multilevel Systems
Data Security Digest, Emmeloord, The Netherlands
Volume II, #3, 1990

Placing trust in UNIX
Systems Integration
September 1989

Secure DBMS Companies on Hold Pending NCSC Revision of Guide
Federal Computer Week
August 14, 1989

Secure UNIX Standards Heat Up
Data Security Letter
December 1988

More Press and Media

Speaking Engagements

STEP Global Congress
Cyber-security for you and your clients in the digital age
Miami, FL, USA
November 7, 2014

International Security Management Association (ISMA) Bi-Annual Meeting
Emerging Risks Posed by the Collision of the Digital and Physical Worlds
San Diego, California, USA
February 3, 2014

The 5th CIO Executive Summit 2012
Proactive Risk Management Against Advanced Threats in the World of Cloud, Mobile Computing and Big Data
Hong Kong, China
September 5, 2012

Pacific Basic Economic Council
Managing and Mitigating Cyber Security and Data Breaches
Hong Kong, China
May 23, 2012

5th Annual HTCIA Asia Pacific Training Conference
Whodunnit? Anatomy of a Credit Card Fraud
Hong Kong, China
December 7, 2011

Bay Area Council & National Cyber Security Alliance: Town Hall
Cybersecurity and Critical Infrastructure
San Francisco, California, USA
October 29, 2015

Berkeley Startup Cluster: INFUSION Lunch
Martial Artist and Cybersecurity Expert Thomas Parenty on IP Protection
Berkeley, California, USA
January 23, 2013

The 4th InfoSecurity Summit 2012
C-Level Security Perspectives
Hong Kong, China
April 24, 2012

Security And Privacy Forum On A Practical Guide For IT Managers And Professionals On The Personal Data (Privacy) Ordinance
Data Protection Principles
Hong Kong, China
January 12, 2012

Information Security Summit 2011
Security Risks of Cloud, Mobile and Social Networking Environments
Hong Kong, China
November 30, 2011

Information Security Summit
Global Security Risks and Trends 2011
Kuala Lumpur, Malaysia
June 20, 2011

InfoSec Macau
The Enemy Within; the Enemy Without: A Strategic Overview of Threats to Organizational Information Security
Macau, China
June 16, 2011

The 12th Info-Security Conference 2011
Security Conundrum: Balancing Control vs. Choice
Hong Kong, China
May 17, 2011

The 2nd BankTech Executive Summit 2011
Information Security Concerns & Challenges in FSI
Hong Kong, China
January 25, 2011

Information Security Summit 2010
“Cloud and Mobile Security in a Blurred Perimeter Environment”
Hong Kong, China
November 17, 2010

rIGF.ASIA (regional Internet Governance Forum)
“Security: Cyber-Security and Network Confidence”
Hong Kong, China
June 3, 2010

INSEC@Asian Securitex 2010
“The Enemy Within, The Enemy Without: Protecting Companies in Asia”
Hong Kong, China
June 3, 2010

2nd Annual Hong Kong InfoSecurity Summit 2010
“Information Security Concerns & Challenges 2010-2015”
Hong Kong, China
March 17, 2010

CSO Conference and Awards 2009
“A Guide for the New CSO”
Ho Chi Minh City Vietnam
December 11, 2009

HTCIA 3rd Annual Asia Pacific Regional Training Conference
“Digital Forensics – Specialists, eDiscoverers, Lawyers & Managers? How each role shapes the future of forensics.”
Hong Kong, China
December 2, 2009

Information Security Summit 2009
“Security In The Age Of Cloud Computing, Virtualisation And Social Networking”
Hong Kong, China
November 18, 2009

International Industrial Security Conference 2009
“Unified Approach to Protecting Enterprise Assets”
Seoul, Korea
October 28, 2009

InfoSecurity Summit 2009
“Driving Business Value with Security Innovation”
Hong Kong, China
May 6, 2009

South China OSAC Conference
“Staying Connected Securely in China”
Hong Kong, China
March 23, 2009

Cyberport Speaker Series
“Creating Safe Collaborative Environments”
Hong Kong, China
March 11, 2009

BankTech Executive Summit 2009
“Information Security Risk Management: Emerging Threats and Insights for Financial Institutions”
Hong Kong, China
February 26, 2009

Information Security Summit 2008
“Security Challenges Facing Mobile Executives”
Hong Kong, China
November 19, 2008

Information Security Summit 2008
“Enhancing Mobility Security In An Information Collaboration World ”
Hong Kong, China
November 19, 2008

Hospital Facility Physical & Integrated Security System Seminar & Demonstration
“Digital Protections for Patient Data”
Seoul, Korea
October 28, 2008

CIO Executive Summit 2008
“The Transformation of Enterprise Security”
Hong Kong, China
September 3, 2008

9th Info-Security Conference 2008
“Effective Strategies to Safeguard Business from Critical Data Loss”
Hong Kong, China
May 21, 2008

Security World 2008 Conference and Showcase
“Best Practice and Solutions for Business Information System Security”
Hanoi, Vietnam
March 19, 2008

Chinese University of Hong Kong
“How Companies Do and Don’t Protect Themselves”
Hong Kong, China
February 2, 2008

2007 HTCIA Asia Pacific Training Conference
“Picking up the Pieces: The Aftermath of Computer Crime”
Hong Kong, China
December 12, 2007

Information Security Summit 2007
“Information Security Evolution – Convergence/Compliance/Certification”
Hong Kong, China
December 5, 2007

In-House Congress Seoul 2007
“Beyond Fake Watches: Protecting Intellectual Property in Asia”
Seoul, Korea
August 30, 2007

Visa Asia Pacific Risk Conference
“Payment Data Security: Making Audits Effective”
July 2, 2007

American Chamber of Commerce
“Digital Defense: What You Should Know About Protecting Your Company’s Assets”
Bangkok, Thailand
June 19, 2007

Hong Kong Business Excellence Forum
“Digital Defense: Key to Corporate Success”
Hong Kong, China
June 14, 2007

American Consulate General Network Security Executive Luncheon
“Collaborating Safely”
Hong Kong, China
June 13, 2007

Banking Vietnam 2007
“Security in Credit Card Transactions”
Hanoi, Vietnam
June 1, 2007

The 2nd Info-Security and Storage Solution Forum Asia
“Digital Defense: What You Should Know About Protecting Your Assets”
Hong Kong, China
May 22, 2007

8th Info-Security Conference2007
“Sacrificing the Possible for the Perfect: Why ISO27001 Undermines Security”
Hong Kong, China
May 16, 2007

Security World 2007
“Digital Defense: What You Should Know About Protecting Your Assets”
Hanoi, Vietnam
March 21, 2007

Chinese University of Hong Kong
“Managing Information-Based Risk”
Hong Kong, China
January 27, 2007

AmCham Human Resources Committee
“Pandemic Preparedness V: Working Away from the Office and Related Policies/Challenges”
Hong Kong, China
January 11, 2007

The China Economic Growth Forum 2006
“What Makes Companies Winning Innovators? New Approaches to Global Collaboration”
Suzhou, China
October 22, 2006

Sixth Annual Value-added Internal Audit & Risk Control Conference
“Building a Proactive Security Infrastructure Across the Enterprise”
Shanghai, China
July 13, 2006

Internal Audit, Corporate Governance & Compliance World 2006 Summit
“Proactive Protection of Financial/Corporate/Sensitive Information”
Shanghai, China
April 27, 2006

HKCS – ISSG Special Forum
“Data Privacy & IT Security Governance – What has the IPCC incident taught us?”
Hong Kong, China
March 31, 2006

Telecom Infotech Forum: e-Security in the Broadband Age
“Enterprise E-Security”
Hong Kong, China
March 27, 2006

Fraud, Oprisk and Security World
“Proactive IP Protection: Managing the risk before it’s too late”
Hong Kong, China
March 23, 2006

US Commercial Service: Security Luncheon Seminar
“Email Security Threats”
Hong Kong, China
February 17, 2006

Visa International Merchant Forum
“Securing Confidence”
Milan, Italy
February 14, 2006

Chinese University of Hong Kong
“Digital Business: What’s The Right Protection?”
Hong Kong, China
February 4, 2006

Speaking Engagements from 1997-2005

Guangzhou’s German Chamber of Commerce Business
“IT Security with Special Guest Thomas Parenty”
Shenzhen, China
November 30, 2005

Information Security Summit 2005
“Best Practices for Forensically Sound Information Security Management”
Hong Kong, China
November 9, 2005

Information Security Summit 2005
“Security Architectures for Lifecycle Intellectual Property Protection”
Hong Kong, China
November 8, 2005

Joint AmCham Information Technology & Telecom and Intellectual Property Committee
“Beyond Copy Watches: Protecting Intellectual Property in Asia”
Hong Kong, China
November 8, 2005

CIO Forum Asia 2005
“CIO’s Information Security Agenda”
Hong Kong, China
September 6, 2005

Chinese University of Hong Kong
“Digital Identities: Misplaced Trust”
Hong Kong , China
January 22, 2005

Protecting Intellectual Property (IP) in China — German Chamber of Commerce
“IT Strategies to Protect Intellectual Capital”
Guangzhou, China
January 12, 2005

Information Security Summit 2004
“Developing Effective Encryption Systems”
Hong Kong, China
November 11, 2004

The Center for Secure Information Management
“Protect Your Business, Not Just Its Computers”
World-wide Broadcast
October 30, 2004

Information Systems Audit and Control Association
“Digital Hacking: Cracking E-Commerce Transactions”
Hong Kong, China
August 5, 2004

Hong Kong Computer Society EBIZ SIG & Hong Kong Society of Accountants ITIG
“eBusiness Objectives Drive Security”
Hong Kong, China
July 27, 2004

Information Security Showcase 2004
“How to Steal Identities for Fun and Profit”
Hong Kong, China
June 2, 2004

Hong Kong Knowledge Management Society
“Information Security & KM”
Hong Kong, China
May 18, 2004

Integrated Security Conference & Expo 2004
“A Comprehensive Approach to Business Protection”
“CIO Interview: Getting the Most out of Security Investment”
Hong Kong, China
February 18, 2004

The Young Entrepreneurs Development Council’ Roundtable Forum
“Common lessons in starting different companies”
Hong Kong, China
January 15, 2004

American Chamber of Commerce in Hong Kong, Information Technology Committee
“What you should know about protecting your company’s assets”
Hong Kong, China
January 13, 2004

CNN’s Global Office
“Cyber-security enters boardroom”
World-wide Broadcast
December, 2003

Harvard Business School Audio Conference
“Essential Information Security for Non-Technical Managers”
World-wide Broadcast
December 2, 2003

Economist Conferences: Asia Pacific Chief Information Officers’ Roundtable
“Now a risk manager as well…”
Hong Kong, China
November 26, 2003

University Rotary Club of Palo Alto
“Executive Perspectives on Information Security”
Palo Alto, CA, USA
September 23, 2003

Executive Luncheon: Unlock The Secrets of Corporate Governance
“What You Should Know About Protecting Your Company’s Assets”
Hong Kong, China
September 23, 2003

Hong Kong PKI Forum
“Truth in Advertising: What PKI Can Really Deliver to Business”
Hong Kong, China
September 15, 2003

Hong Kong General Chamber of Commerce (HKGCC) Roundtable Luncheon
“Digital Defense: Who’s the Enemy?”
Hong Kong, China
July 18, 2003

Rotary Club of Wanchai, Hong Kong
“Information Security: A Business Focus”
Hong Kong, China
July 14, 2003

Project Management Institute (PMI) Annual Business Meeting, Northern Utah Chapter
“Think Before You Spend: Making Your IT Security Dollars Count”
Salt Lake City, UT, USA
June 26, 2003

Sybase Webcast “Ensuring Secure, Personalized Information Access”
“Security’s Role in a Portal”
World-wide Broadcast
January 24, 2002
February 5, 2002

Sun Microsystems Web Conference
“Secure Applications for the Web Services Environment”
“The Rules for Application Security are Changing from Product to Service”
World-wide Broadcast
December 13, 2001

The MIS and IIA Annual Conference on Control,
Audit & Security of Information Systems: Focus 2000 and Beyond
“Sybase: Security for Internet Computing”
Washington D.C., USA
October 13, 1999

TechWave 1999
“Securing Your Multi Tier Environment with Enterprise
Application Server” Orlando, FL, USA
August 24, 1999

Eleventh Annual Software Technology Conference
“Security for Transaction Server-based Architectures”
Salt Lake City, UT, USA
May 5, 1999

Connect ’99
“Sybase Security for E-Commerce”
Sydney, Australia
February 23, 1999

Java Business Expo
“Security Requirements for Electronic Commerce”
New York, USA
December 9, 1998

1998 ISUG European Conference
“Sybase Internet Security”
Hamburg, Germany
October 7, 1998

Asia Pacific Economic Cooperation (APEC-TEL 18th Meeting)
“Authentication of Electronic Commerce Transactions”
Port Moresby, Papua New Guinea
September 7, 1998

1998 International Sybase User Group North American Conference
“Internet Security with Sybase”
Washington, DC, USA
May 4, 1998

Internet Commerce Expo
“Understanding & Using Public Key Cryptography for Secure Internet Transactions”
Boston, MA, USA
April 26, 1998

VIENNA ’97: Harmonizing Technology & Business
“Internet Security”
Vienna, Austria
November 5, 1997

20th National Information Systems Security Conference
“Database Security: Browsers, Encryption, Certificates and More”
Baltimore, MD, USA
October 8, 1997

Internet Commerce Expo
“Understanding & Using Public Key Cryptography for Secure Internet Transactions”
Los Angeles, CA, USA
September 11, 1997

Internet Commerce Expo
“Understanding & Using Public Key Cryptography for Secure Internet Transactions”
Atlanta, GA, USA
April 11, 1997

Sybase International Users Group
“Sybase Internet Security”
Orlando, FL, USA
April 10, 1997

DCI’s Internet Expo & C/S Internet Conference
“Internet Security: Is It Achievable?”
San Jose, CA, USA
February 20, 1997

Haas School of Business University of California, Berkeley
“How can you trust Ecommerce”
Berkeley, CA, USA
October 14, 1997

Speaking Engagements from 1989-1996
19th National Information System Security Conference
“Database Systems Today: Safe Information at My Fingertips?”
Baltimore, MD, USA
October 21, 1996

SAFE Forum, Stanford Law School The Cryptographer’s Report:
“Forty Bits is Not Enough”
Palo Alto, CA, USA
July 1, 1996

18th National Information System Security Conference
“Directions for Database Security”
Baltimore, MD, USA
October 1995

15th National Computer Security Conference
“Making it Work: Applying INFOSEC to the Real World”
Baltimore, MD, USA
October 15, 1992

UCLA Extension, Department of Business, Engineering and Management
“Trusted Database Management Systems”
Los Angeles, CA, USA
April 3, 1991

1989 IEEE Computer Society Symposium on Security and Privacy
“The Incorporation of Multi-Level IPC into UNIX”
Oakland, CA, USA
May 1, 1989

More Speaking Engagements

Get the Book

Digital Defense


Parenty Consulting Limited

+852 9766 3844
Hong Kong

Cyber Security Consulting LLC

+1 510 882 3530
United States