Quantcast
Channel: Cyber Security Leadership
Browsing all 231 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Delivering a guest lecture at California State University, Long Beach

I’ve been invited to talk to Masters students at the California State University, Long Beach about starting a career in cyber security.  My guest lecture at the Fundamentals of Security class was well...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Canon: The Psychology of Information Security

  My book has been nominated for the Cybersecurity Cannon, a list of must-read books for all cybersecurity practitioners. Review by Guest Contributor Nicola Burr, Cybersecurity Consultant Executive...

View Article


Image may be NSFW.
Clik here to view.

Augusta University’s Cyber Institute adopts my book

Just received some great news from my publisher.  My book has been accepted for use on a course at Augusta University. Here’s some feedback from the course director: Augusta University’s Cyber...

View Article

Image may be NSFW.
Clik here to view.

Interview with the ISSA Journal

I’ve been interviewed by Geordie B Stewart for the ISSA Journal. What inspired you to write the book? I help companies develop and implement security strategy and transformation programmes. Working...

View Article

Image may be NSFW.
Clik here to view.

Sharing views on security culture

I’ve been invited to talk about human aspects of security at the CyberSecurity Talks & Networking event.  The venue and the format allowed the audience to participate and ask questions and we had...

View Article


Image may be NSFW.
Clik here to view.

My book has been translated into Persian

My book has been translated into Persian – get in touch if you would like to learn more!

View Article

Image may be NSFW.
Clik here to view.

Early Stage Cybersecurity Accelerator Programme

A few weeks ago I learnt that my application to attend the HutZero cyber entrepreneur bootcamp had been successful.  I am excited to start the programme next week and will keep you posted! Whether you...

View Article

Image may be NSFW.
Clik here to view.

I’ve been shortlisted for Security Serious Unsung Hero award

I’ve been nominated for a Security Serious Unsung Hero award in the Best Educator category. This will be awarded to a professor, lecturer or teacher who leads by example to inspire and motivate the...

View Article


Image may be NSFW.
Clik here to view.

SABSA Architecture and Design Case Study

Let’s talk about applying the SABSA framework to design an architecture that would solve a specific business problem.  In this blog post I’ll be using a fictitious example of a public sector entity...

View Article


Image may be NSFW.
Clik here to view.

Using SABSA for application security

Aligning OWASP Application Security Verification Standard and SABSA Architecture framework. OWASP Application Security Verification Standard (Standard) is used at one of my clients to help develop and...

View Article

Image may be NSFW.
Clik here to view.

Books and blogs for cyber startup founders

HutZero, an early-stage entrepreneur bootcamp, kindly prepared a list of books and websites recommended for aspiring cyber startup founders. Books: The Lean Startup, Eric Reis Business Model...

View Article

Image may be NSFW.
Clik here to view.

Cyber startups: keys to success

What makes a cyber startup successful? From my working with a number of companies, there are four key areas cyber entrepreneurs should consider: Idea Are you passionate about the idea? How unique is...

View Article

Image may be NSFW.
Clik here to view.

Vienna Cyber Security Week 2018

I’ve spend last week in Vienna at the annual intergovernmental conference focused on protecting critical energy infrastructure. The first two days were dedicated to the issues of security and...

View Article


Image may be NSFW.
Clik here to view.

NIS Directive: are you ready?

Governments across Europe recognised that with increased interconnectiveness a cyber incident can affect multiple entities spanning across a number of countries. Moreover, impact and frequency of...

View Article

Artificial intelligence and cyber security: attacking and defending

Cyber security is a manpower constrained market – therefore the opportunities for AI automation are vast.  Frequently, AI is used to make certain defensive aspects of cyber security more wide reaching...

View Article


Image may be NSFW.
Clik here to view.

Amsterdam

This is one of these blog posts with no content. I just really wanted to share some pics from one of the coolest cities I had a privilege to live and work in for the past few months.

View Article

Image may be NSFW.
Clik here to view.

Security architecture: how to

When building a house you would not consider starting the planning, and certainly not the build itself, without the guidance of an architect. Throughout this process you would use a number of experts...

View Article


Image may be NSFW.
Clik here to view.

Governance Models – Cloud

Your company has decided to adopt Cloud. Or maybe it was among the ones that relied on virtualised environments before it was even a thing? In either case, cloud security has to be managed. How do you...

View Article

Behavioural science in cyber security

Why your staff ignore security policies and what to do about it.                Dale Carnegie’s 1936 bestselling self-help book How To Win Friends And Influence People is one of those titles that sits...

View Article

Image may be NSFW.
Clik here to view.

An open source modelling toolkit for enterprise architects

Telling stories is one of the best ways to get your ideas across, especially when your audience is not technical. Therefore, as an architect, you might want to communicate in a way that can be easily...

View Article
Browsing all 231 articles
Browse latest View live