ACING EVIL

Acing Evil Measures Up! Format Copy
Acing Evil

.
.

The Right Name... The Right Stuff... The Right Service

Acing Evil "Measures Up!"
 To The Definitions Of Ace / Acing / Aced
( American Heritage Dictionary )
The Right Name...
 
ACING:  THE VERB
Transitive
 ( Ace / Aced / Acing )
To get a grade of A 
To serve an Ace against
To get the better of
The Right Stuff...
 
 
 
ACE:   THE NOUN
An expert in one's field 
A serve which one's opponent
fails to return
 
ACE:  THE ADJECTIVE
Top-notch... First-rate
The Right Service...
 
ACE:  THE IDIOM
A hidden advantage...
as in having an
"Ace In The Hole"

acingevilaceofspades25sizered.jpg
 
WAYNE PIERCE
 
Wayne started his security career in the US Marine Corps as a computer specialist at COMCABWEST, an organization encompassing the five Marine air stations on the West Coast.  He was responsible for security on a 10,000 host network while stationed at the Marine Corps Air Station, Miramar, CA.
 
Wayne was recalled into the Marine Corps after September 11, 2001 in support of OPERATION ENDURING FREEDOM. During this time, Wayne was responsible for overseeing the proper routing, classification, and delivery of government information with varying degrees of sensitivity.  READ ON

acingevilaceofspades25sizered.jpg
 
JOHN DERVISHIAN
 
Dervishian has been in computer security for over 7 years.  Most recently, he co-founded Mishre Advisory Group, Inc., a cyber security firm that specializes in helping organizations evolve their security defenses. At Mishre, Dervishian has been working closely with the Massachusetts law enforcement community to evaluate systems/practices for computer-related homeland defense initiatives. 

Before Mishre, John conceived, cofounded, and basically staffed Athena Security, Inc. where he was Vice President of Operations.  There he worked closely with the engineering team to deliver security assessment services to several high-profile clients. Further, he spearheaded the development of Athena's Enterprise Security Review (ESR), a comprehensive threat analysis tool that provided organizations with a no-nonsense approach to evaluating their security defenses.
 
John is a former U.S. Marine.  He spent 15 years working in public safety as a professional firefighter where he was able to develop his skills in computer security.   READ ON

acingevilaceofspades25sizered.jpg
 
RODNEY SHEPARDSON
 
Rod has worked with the FBI, the U. S. Secret Service, the U. S. Customs Service, and the Royal Canadian Mounted Police, as well as several state and local police agencies on computer crime cases.  For more than thirty years he has worked in computer technology covering software and hardware support, software engineering and computer (information) security...  His experience in computer security includes work as a software engineer on a security kernel for Digital Equipment Corporation's VAX computers, and system management and security for the Delphi Service, the first online service providing full Internet access.  READ ON

acingevilaceofspades25sizered.jpg
 
JOHN SOTTILE
 
John has over 30 years, selling / marketing leading cyber technology to improve business information systems: Mainframe hardware and software, timesharing services, distributed information systems, micro applications, database systems / services, consulting, training, and a range of marketing services.
 
He grew a young software company from $100,000 to $5,000,000 per year... and an IPO... within four years (1979-1983). Average sale of $30,000+ (all sold by telephone)  Big Bucks then and even now.  Prior to forming S*W*A*T Tactical Marketing Agency (sm), he achieved assigned quotas 17 of 19 years. 
 
John is the author or courses and articles on selling, marketing, negotiating as well as original research. 
 
Currently, his concerns regard the corruption of the Internet as a viable marketing medium, just as today's telemarketing has "corrupted" the ethical B-to-B telemarketing approaches which he pioneered in the 70's.  READ ON 

acingevilanimationcateyes.gif