Lynndon Michael Guard has a unique combination of strengths in law and technology as a licensed patent attorney, seasoned banking and commercial lawyer, Certified Information Systems Security Professional, and a telecommunications expert.
Since 1982, Michael has had a varied law practice that has included commercial law, commercial litigation, corporate law, intellectual property law, and complex commercial transaction contracts. He has consulted with both individuals and corporations on patent, trademark and copyright applications, as well as patent and trademark disputes.
Michael earned an MS in Telecommunications Management from Oklahoma State University in December, with a 4.0 GPA and has completed most of the coursework toward a Ph.D. in the same field. He also serves as General Counsel and Chief Technology Officer of Glia Group, Inc.
A founding co-partner in a ten-year-old company called BankGuard Resources, Michael has also been involved in the development of educational resources for the banking industry, including training videos and seminars, has provided consulting on networking and network security issues, and has taught and written on various subjects of interest to bankers. He devotes substantial time these days to real estate investments.
Areas of Expertise:
Information Security Training Video
You can contact Michael via email at email@example.com or by telephone at (405) 503-4737.
What kind of pre-employment screening should we do on prospective new employees? What are we required to do? What do you think of psychological testing?Are there particular questions you would recommend we ask all prospective bank employees?
Our customer says he didn't make several ATM withdrawals that showed up on his last statement. We tend to think he's lying, but the ATMs that were used didn't have cameras. What is the downside of just refusing to give his money back?
How do banks intend to monitor their service providers to confirm that they are maintaining appropriate securitymeasures to safeguard the bank's customer information? We are looking for a practical, reasonable way to do this.
How could hackers figure out what our Internet server is running?
Our Internet Service Provider just went broke, leaving us high and dry. We're gun-shy about choosing a new one because we thought we knew what we were doing the first time. It isn't like this is the kind of service where the vendors have been in business for 20 years, and it's not like we have a whole lot of choices. It's been a bad experience. Any advice?
Do you have any suggestions for keeping a good inventory of hardware and software? We have a lot of "Frankenstein" machines that have had so much stuff changed out on them (motherboard, memory chips, video card, sound card) that they are almost unrecognizable from the original specs, yet when it's time to figure out if a particular new piece of software will run on them, we need to know the current configuration. I'm hoping there's an easy way to do this.
What are the key elements of an information security program under the Guidelines?
The federal banking regulators have agreed to on final Interagency Guidelines Establishing Standards for Safeguarding Customer Information ("Guidelines"). You previously wrote two articles for us on the proposed guidelines. (See <a href="gurus_technology1211.html">Part 1</a> and <a href="gurus_technology1218.html">Part 2</a>.) Were there any surprises for you in the final version of Interagency Guidelines Establishing Standards for Safeguarding Customer Information? And could you give us a quick heads-up on what the final guidelines provide?
Can you refer me to anything that would assist me in knowing what should be performed for monitoring our online banking Web site? I've been through bank security seminars that cover non-technology security. Our external auditor was not able to assist us.