Peter H. Gregory

{{short description|American information security advisor}}

Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.

File:Peter h gregory at uw copy.jpg

Biography

Peter Hart Gregory is a member of the Board of Advisors and lecturer for the NSA-certified University of Washington

Certificate in Information Security and Risk Management,{{cite web |url= http://www.pce.uw.edu/prog.aspx?id=4065 |title= Certificate in Information Security and Risk Management |accessdate= 2010-09-17 |date= September 2010 |work= University of Washington}} a member of the Board of Advisors for the University of Washington Certificate in Cloud Transition Strategies and Management,{{cite web |url= https://www.pce.uw.edu/certificates/cloud-transition-strategies-and-management |title= Certificate in Cloud Transition Strategies and Management |accessdate= 2016-03-10 |date= March 2016 |work= University of Washington}} and on the Board of Advisors and the lead instructor (emeritus) for the University of Washington Certificate in Information Systems Security.{{cite web |url=http://www.pce.uw.edu/prog.aspx?id=4067 |title= Certificate in Information Systems Security |accessdate= 2010-09-17 |date= September 2010 |work= University of Washington}} He is a founding member of the Pacific CISO Forum.{{cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1256996,00.html | title=Peer to Peer | accessdate=2008-04-20 | last=Sherman | first=Erik | work=Information Security Magazine}}

As an InfraGard member, Gregory served as an expert witness in the 2006 cybercrime case, United States vs. Christopher Maxwell.

Publications

  • Gregory, Peter. Solaris Security, Prentice-Hall, 1999. {{ISBN|0-13-096053-5}}
  • Gregory, Peter. Solaris Security (Japanese Language Edition), Prentice-Hall, 1999. {{ISBN|4-88135-974-6}}
  • Gregory, Peter. Solaris Security (Chinese Language Edition), Prentice-Hall, 1999. {{ISBN|7-115-08728-8}}
  • Gregory, Peter. Sun Certified System Administrator for Solaris 8 Study Guide, Prentice-Hall, 2001. {{ISBN|0-13-040933-2}}
  • Gregory, Peter. Enterprise Information Security, Financial Times Management, 2003. {{ISBN|0-273-66157-4}}
  • Gregory, Peter. Enterprise Information Security (Romanian Language Edition), Financial Times Management, 2003. {{ISBN|973-722-043-9}}
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, John Wiley & Sons, 2003. {{ISBN|0-7645-1670-1}}
  • Gregory, Peter; Miller, Lawrence. Security+ Certification for Dummies, John Wiley & Sons, 2003. {{ISBN|0-7645-2576-X}}
  • Gregory, Peter. Computer Viruses for Dummies, John Wiley & Sons, 2004. {{ISBN|0-7645-7418-3}}
  • Gregory, Peter; Simon, Mike. Blocking Spam and Spyware for Dummies, John Wiley & Sons, 2005. {{ISBN|0-7645-7591-0}}
  • Gregory, Peter. VoIP Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. {{ISBN|978-0-470-00987-1}}
  • Gregory, Peter. SIP Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2006. {{ISBN|0-470-04149-8}}
  • Gregory, Peter. Converged Network Security for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. {{ISBN|978-0-470-12098-9}}
  • Gregory, Peter. IP Multimedia Subsystems for Dummies, Radisys Limited Edition, John Wiley & Sons, 2007. {{ISBN|978-0-470-13587-7}}
  • Gregory, Peter. Midsized Communications Solutions for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. {{ISBN|978-0-470-16552-2}}
  • Gregory, Peter. Comunicaciones para Medianas Empresas para Dummies, Edicion Limitada de Avaya, John Wiley & Sons, 2007. {{ISBN|978-0-470-27666-2}}
  • Gregory, Peter. Unified Communications for Dummies, Avaya Limited Edition, John Wiley & Sons, 2007. {{ISBN|0-470-17495-1}}
  • Gregory, Peter. Comunicações Unificadas, Edicao Espeçial da Avaya, John Wiley & Sons, 2007. {{ISBN|978-0-470-27690-7}}
  • Gregory, Peter. Securing the Vista Environment, O'Reilly Media, 2007. {{ISBN|0-596-51430-1}}
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Second Edition, John Wiley & Sons, 2007. {{ISBN|0-470-12426-1}}
  • Gregory, Peter. IT Disaster Recovery Planning for Dummies, John Wiley & Sons, 2007. {{ISBN|0-470-03973-6}}
  • Gregory, Peter; Simon, Mike. Biometrics for Dummies, John Wiley & Sons, 2008. {{ISBN|0-470-29288-1}}
  • Gregory, Peter; Miller, Lawrence. SIP Communications For Dummies, Avaya 2nd Custom Edition, John Wiley & Sons, 2009. {{ISBN|978-0-470-38114-4}}
  • Gregory, Peter. CISSP Guide to Security Essentials, Thomson Course Technology, 2009. {{ISBN|1-4354-2819-6}}
  • Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, McGraw-Hill, 2009. {{ISBN|0-07-148755-7}}
  • Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Third Edition, John Wiley & Sons, 2009. {{ISBN|0-470-53791-4}}
  • Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Second Edition, McGraw-Hill, 2011. {{ISBN|0-07-176910-2}}
  • Gregory, Peter. Data Backup For Dummies, eVault Data Protection Edition, John Wiley & Sons, 2009. {{ISBN|978-0-470-58024-0}}
  • Gregory, Peter. Firewalls For Dummies, Sonicwall Edition, John Wiley & Sons, 2011. {{ISBN|978-1-118-06194-7}}
  • Gregory, Peter. Advanced Physical Access Control For Dummies, HID Global Edition, John Wiley & Sons, 2011. {{ISBN|978-1-118-12847-3}}
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Fourth edition, John Wiley & Sons, 2012. {{ISBN|978-1118362396}}
  • Gregory, Peter. CISSP Guide to Security Essentials, Second Edition, Cengage Learning, 2015. {{ISBN|978-1285060422}}
  • Gregory, Peter. Advanced Persistent Threat Protection For Dummies, John Wiley & Sons, 2013. {{ISBN|978-1-118-76385-8}}
  • Gregory, Peter. Stopping Zero Day Exploits For Dummies, John Wiley & Sons, 2013. {{ISBN|978-1-118-75850-2}}
  • Gregory, Peter. Getting An Information Security Job For Dummies, John Wiley & Sons, 2015. {{ISBN|978-1-119-00281-9}}
  • Gregory, Peter; Hughes, Bill. Getting A Networking Job For Dummies, John Wiley & Sons, 2015. {{ISBN|978-1-119-01594-9}}
  • Gregory, Peter; DRaaS For Dummies, Veeam Software Special Edition, John Wiley & Sons, 2016. {{ISBN|978-1-119-28845-9}}
  • Gregory, Peter; Miller, Lawrence. CISSP for Dummies, Fifth edition, John Wiley & Sons, 2016. {{ISBN|978-1-119-21023-8}}
  • Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition, McGraw-Hill, 2016. {{ISBN|978-1-259-58416-9}}
  • Gregory, Peter. CISM Certified Information Security Manager All-in-One Exam Guide, McGraw-Hill, 2018. {{ISBN|978-1-26-002703-7}}
  • Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Sixth edition, John Wiley & Sons, 2018. {{ISBN|978-1119505815}}
  • Gregory, Peter. CISM Certified Information Security Manager Practice Exams, McGraw-Hill, 2019. {{ISBN|978-1-260-45611-0}}
  • Gregory, Peter. CISA Certified Information Systems Auditor All-in-One Exam Guide, Fourth Edition, McGraw-Hill, 2019. {{ISBN|978-1-26-045880-0}}
  • Gregory, Peter. CISA Certified Information Systems Auditor Practice Exams, McGraw-Hill, 2020. {{ISBN|978-1260459845}}
  • Gregory, Peter. Chromebook For Dummies, Second edition, John Wiley & Sons, 2020. {{ISBN|978-1119651710}}
  • Gregory, Peter. CDPSE Certified Data Privacy Solutions Engineer All-in-One Exam Guide, McGraw-Hill, 2021. {{ISBN|978-1260474824}}
  • Gregory, Peter. CIPM Certified Information Privacy Manager All-in-One Exam Guide, McGraw-Hill, 2021. {{ISBN|978-1260474091}}
  • Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Seventh edition, John Wiley & Sons, 2022. {{ISBN|978-1119806820}}
  • Gregory, Peter; Rogers, Bobby; Dunkerley, Dawn. CRISC Certified in Risk and Information Systems Control All-in-One Exam Guide, Second edition, McGraw-Hill, 2022. {{ISBN|978-1260473339}}
  • Gregory, Peter. The Art of Writing Technical Books, Waterside Productions, 2022. {{ISBN|978-1957807492}}
  • Gregory, Peter. CISM Certified Information Security Manager All-in-One Exam Guide, Second edition, McGraw-Hill, 2022. {{ISBN|978-1264268313}}
  • Gregory, Peter. CISM Certified Information Security Manager Practice Exams, Second edition, McGraw-Hill, 2023. {{ISBN|978-1264693740}}
  • Gregory, Peter. Chromebook For Dummies, Third edition, John Wiley & Sons, 2023. {{ISBN|978-1394168804}}
  • Gregory, Peter; Miller, Lawrence. CISSP For Dummies, Eighth edition, John Wiley & Sons, 2024. {{ISBN|978-1394261772}}
  • Gregory, Peter. Elementary Information Security, Fourth edition, Jones & Bartlett Learning, 2024. {{ISBN|978-1284305937}}
  • Gregory, Peter; Chapple, Mike. CISA Study Guide, John Wiley & Sons, 2025. {{ISBN|978-1394288380}}

Gregory has written several articles for Computerworld and Software Magazine including:

  • Protect Apps and Data with a Disaster Recovery Plan{{cite web | url=http://www.softwaremag.com/L.cfm?Doc=1157-8/2008 | title=Protect Apps and Data with a Disaster Recovery Plan | accessdate=2008-08-24 | last=Gregory | first=Peter | work=Software Magazine | archive-url=https://web.archive.org/web/20080823173856/http://www.softwaremag.com/L.cfm?Doc=1157-8%2F2008 | archive-date=2008-08-23 | url-status=dead }}
  • Identify Vulnerabilities with Application Scanning Tools{{cite web | url=http://softwaremag.com/L.cfm?Doc=1058-5/2007 | title=Identify Vulnerabilities with Application Scanning Tools | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Software Magazine | archive-url=https://web.archive.org/web/20070708183321/http://www.softwaremag.com/L.cfm?Doc=1058-5%2F2007 | archive-date=2007-07-08 | url-status=dead }}
  • Integrity begins within: Security pros lead by example{{cite web |url=http://www.computerworld.com/securitytopics/security/story/0,,91832,00.html?SKC=security-91832 | title=Integrity begins within: Security pros lead by example | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld}}
  • Vulnerability Management Ushers an Era of Technical Risk Management{{cite web | url=http://www.softwaremag.com/L.cfm?Doc=2003-11/2003-11security | title=Vulnerability Management Ushers an Era of Technical Risk Management | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Software Magazine | archive-url=https://web.archive.org/web/20061110214453/https://www.softwaremag.com/L.cfm?doc=2003-11%2F2003-11security | archive-date=2006-11-10 | url-status=dead }}
  • Security in the software development life cycle{{cite web |url=http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci915821,00.html | title=Security in the software development life cycle | accessdate=2008-04-20 | last=Gregory | first=Peter | work=SearchSecurity}}
  • Tipping sacred cows: Make bold decisions to protect your information{{cite web |url=http://www.computerworld.com/securitytopics/security/story/0,10801,81788,00.html | title=Tipping sacred cows: Make bold decisions to protect your information | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld}}
  • Lessons learned from the blaster worm{{cite web |url=http://www.computerworld.com/securitytopics/security/story/0,10801,85247,00.html | title=Lessons learned from the blaster worm | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld}}
  • For an infosecurity career, get the technical basics first{{cite web |url=http://www.computerworld.com/newsletter/0,4902,96090,00.html?nlid=SEC2 | title=For an infosecurity career, get the technical basics first | accessdate=2008-04-20 | last=Gregory | first=Peter | work=Computerworld}}

Gregory has been interviewed by trade publications including Information Security Magazine,{{cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257071_idx1,00.html | title=Moving On Up | accessdate=2008-04-20 | last=Damore | first=Kelley | work=Information Security Magazine}}{{cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257115_idx2,00.html |

title=Token Support Isn't Enough | accessdate=2008-04-20 | last=Damore | first=Kelley | work=Information Security Magazine}}{{cite web |url=http://searchsecurity.techtarget.com/magazineFeature/0,296894,sid14_gci1257032,00.html | title=Best Advice | accessdate=2008-04-20 | last=Mimoso | first=Michael | work=Information Security Magazine}} CIO Magazine,{{cite web |url=http://www.cio.com/article/12541 | title=Data Breach History Includes Plenty of Big Names | accessdate=2008-04-20 | last=Brandel | first=Mary | work=CIO Magazine}} Computerworld,{{cite web |url=http://www.computerworld.com/securitytopics/security/story/0,10801,105064,00.html | title=Legal Niceties | accessdate=2008-04-20 | last=Brandel | first=Mary | work=Computerworld Magazine}} eWeek,{{cite web |url=https://www.eweek.com/security/two-years-in-it-thought-leaders-evaluate-gdpr-s-impact/ | title=Two Years In, IT Thought Leaders Judge GDPR's Impact | accessdate=2021-05-10 | last=Preimesberger | first=Chris | work=eWeek| date=22 May 2020 }} SearchSecurity,{{cite web |url=https://searchsecurity.techtarget.com/feature/The-who-what-why-and-challenges-of-CISM-certification | title=The who, what, why -- and challenges -- of CISM certification | accessdate=2021-05-10 | last=Shea | first=Sharon | work=SearchSecurity}}{{cite web |url=https://searchsecurity.techtarget.com/quiz/CISA-practice-questions-to-prep-for-the-exam | title=CISA practice questions to prep for the exam | accessdate=2021-05-10 | last=Shea | first=Sharon | work=SearchSecurity}} and Forbes.{{cite web |url=https://www.forbes.com/sites/davidspark/2018/01/31/the-cisosecurity-vendor-relationship-the-15-minutes-of-your-time-request/ | title=The CISO/Security Vendor Relationship: The "15 Minutes of Your Time" Request | accessdate=2021-05-10 | last=Spark | first=David | work=Forbes}}{{cite web |url=https://www.forbes.com/sites/davidspark/2018/01/30/the-cisosecurity-vendor-relationship-do-cisos-fall-for-obvious-sales-ploys/ | title=Do CISOs Fall for Obvious Sales Ploys? - CISO/Security Vendor Relationship | accessdate=2021-05-10 | last=Spark | first=David | work=Forbes}}

See also

References

{{reflist}}