Delivering a guest lecture at California State University, Long Beach
I’ve been invited to talk to Masters students at the California State University, Long Beach about starting a career in cyber security. My guest lecture at the Fundamentals of Security class was well...
View ArticleCybersecurity Canon: The Psychology of Information Security
My book has been nominated for the Cybersecurity Cannon, a list of must-read books for all cybersecurity practitioners. Review by Guest Contributor Nicola Burr, Cybersecurity Consultant Executive...
View ArticleAugusta University’s Cyber Institute adopts my book
Just received some great news from my publisher. My book has been accepted for use on a course at Augusta University. Here’s some feedback from the course director: Augusta University’s Cyber...
View ArticleInterview with the ISSA Journal
I’ve been interviewed by Geordie B Stewart for the ISSA Journal. What inspired you to write the book? I help companies develop and implement security strategy and transformation programmes. Working...
View ArticleSharing views on security culture
I’ve been invited to talk about human aspects of security at the CyberSecurity Talks & Networking event. The venue and the format allowed the audience to participate and ask questions and we had...
View ArticleMy book has been translated into Persian
My book has been translated into Persian – get in touch if you would like to learn more!
View ArticleEarly Stage Cybersecurity Accelerator Programme
A few weeks ago I learnt that my application to attend the HutZero cyber entrepreneur bootcamp had been successful. I am excited to start the programme next week and will keep you posted! Whether you...
View ArticleI’ve been shortlisted for Security Serious Unsung Hero award
I’ve been nominated for a Security Serious Unsung Hero award in the Best Educator category. This will be awarded to a professor, lecturer or teacher who leads by example to inspire and motivate the...
View ArticleSABSA Architecture and Design Case Study
Let’s talk about applying the SABSA framework to design an architecture that would solve a specific business problem. In this blog post I’ll be using a fictitious example of a public sector entity...
View ArticleUsing SABSA for application security
Aligning OWASP Application Security Verification Standard and SABSA Architecture framework. OWASP Application Security Verification Standard (Standard) is used at one of my clients to help develop and...
View ArticleBooks and blogs for cyber startup founders
HutZero, an early-stage entrepreneur bootcamp, kindly prepared a list of books and websites recommended for aspiring cyber startup founders. Books: The Lean Startup, Eric Reis Business Model...
View ArticleCyber startups: keys to success
What makes a cyber startup successful? From my working with a number of companies, there are four key areas cyber entrepreneurs should consider: Idea Are you passionate about the idea? How unique is...
View ArticleVienna Cyber Security Week 2018
I’ve spend last week in Vienna at the annual intergovernmental conference focused on protecting critical energy infrastructure. The first two days were dedicated to the issues of security and...
View ArticleNIS Directive: are you ready?
Governments across Europe recognised that with increased interconnectiveness a cyber incident can affect multiple entities spanning across a number of countries. Moreover, impact and frequency of...
View ArticleArtificial intelligence and cyber security: attacking and defending
Cyber security is a manpower constrained market – therefore the opportunities for AI automation are vast. Frequently, AI is used to make certain defensive aspects of cyber security more wide reaching...
View ArticleAmsterdam
This is one of these blog posts with no content. I just really wanted to share some pics from one of the coolest cities I had a privilege to live and work in for the past few months.
View ArticleSecurity architecture: how to
When building a house you would not consider starting the planning, and certainly not the build itself, without the guidance of an architect. Throughout this process you would use a number of experts...
View ArticleGovernance Models – Cloud
Your company has decided to adopt Cloud. Or maybe it was among the ones that relied on virtualised environments before it was even a thing? In either case, cloud security has to be managed. How do you...
View ArticleBehavioural science in cyber security
Why your staff ignore security policies and what to do about it. Dale Carnegie’s 1936 bestselling self-help book How To Win Friends And Influence People is one of those titles that sits...
View ArticleAn open source modelling toolkit for enterprise architects
Telling stories is one of the best ways to get your ideas across, especially when your audience is not technical. Therefore, as an architect, you might want to communicate in a way that can be easily...
View Article