Personal Information
Organization / Workplace
Twickenham, United Kingdom United Kingdom
Occupation
Security and Risk Professional
Industry
Technology / Software / Internet
Website
blog.blackswansecurity.com
About
I am a delivery-focused security and risk professional with extensive experience of governance, management, system engineering and practical architecture across a wide range of disciplines and technologies. I have often had to move between roles to ensure programmes get delivered including security, infrastructure, application architecture and data analysis.
I have advised global financial services organisations and national regulators on cyber resilience and cyber security.
I am a Chartered Fellow of the British Computer Society (FBCS CITP). I am a member of the London South BCS branch committee. I am a Registered Security Specialist on the BCS Professional Advice Register and I achi...
Tags
security
cyber
forensic readiness
incident response
risk
44con
cyber resilience
targeted attack
apt
cyber security
security architecture
quantification
cyber risk
pianos
solution security
intelligence
architecture
blackswansecurity
uk
visualisation
risk visualisation
risk universe
engagement
management
advice
board
executive
threats
regulations
incident responde
cyber resistance
cyber regulation
fund management
insider
critical pathway
global
data
risk analysis
scenarios
pestle
strategy
horizon scanning
telecoms
trends
bigdata
analytics
critical security controls
network reconaissance
security analytics
big data
data-driven security
attack surface
testing
requirements
delivery
project
penetration testing
pen testing
activism
digital activism
hacktivism
security metrics
metricon
interception
forensics
law
security principles
dsm
design structure matrix
architecture risk assessment
attack tree
architecture analysis
probability
uncertainty
foxes
hedgehogs
ernst & young
bae systems
detica
threat
smart grid
smart meters
See more
Presentations
(35)Likes
(33)Capability profile mapping at Map Camp 2019
Emily Webber
•
4 years ago
Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)
Tony Martin-Vegue
•
5 years ago
Security And The Future Generation Presentation Ciso Orlando April 2010
Larry Taylor Ph.D.
•
13 years ago
Attack monitoring using ElasticSearch Logstash and Kibana
Prajal Kulkarni
•
9 years ago
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
Sematext Group, Inc.
•
9 years ago
Big Data
NGDATA
•
13 years ago
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates
•
8 years ago
Enterprise Security Architecture
Kris Kimmerle
•
10 years ago
On Cyber
grugq
•
8 years ago
Careers in Security
Jason Chan
•
8 years ago
Hackmageddon stats: 4 Year of Cyber Attacks
Paolo Passeri
•
9 years ago
Introduction to Chainer: A Flexible Framework for Deep Learning
Seiya Tokui
•
8 years ago
Security models for security architecture
Vladimir Jirasek
•
12 years ago
Organize for Complexity - keynote at Dare Festival 2014 (Antwerp/BE)
Niels Pflaeging
•
9 years ago
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto
•
9 years ago
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
Alex Pinto
•
9 years ago
Best Practices for Leveraging Security Threat Intelligence
AlienVault
•
9 years ago
The Heatmap - Why is Security Visualization so Hard?
Raffael Marty
•
9 years ago
Fix What Matters: A Data Driven Approach to Vulnerability Management
Michael Roytman
•
10 years ago
Effective approaches to web application security
Zane Lackey
•
11 years ago
Some Thoughts On Bitcoin
Dan Kaminsky
•
12 years ago
Designing Big Data Interactions Using the Language of Discovery
Joe Lamantia
•
11 years ago
Bay threat2011
Ed Bellis
•
12 years ago
Building Better Analytics Workflows (Strata-Hadoop World 2013)
Wes McKinney
•
10 years ago
Text Indexing in Accumulo
Aaron Cordova
•
12 years ago
Don't Let Security Be The 'Elephant in the Room'
Hortonworks
•
10 years ago
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Data Platform
Hortonworks
•
10 years ago
A Fast and Dirty Intro to NetworkX (and D3)
Lynn Cherny
•
12 years ago
ruxc0n 2012
mimeframe
•
11 years ago
Attack-driven defense
Zane Lackey
•
10 years ago
Personal Information
Organization / Workplace
Twickenham, United Kingdom United Kingdom
Occupation
Security and Risk Professional
Industry
Technology / Software / Internet
Website
blog.blackswansecurity.com
About
I am a delivery-focused security and risk professional with extensive experience of governance, management, system engineering and practical architecture across a wide range of disciplines and technologies. I have often had to move between roles to ensure programmes get delivered including security, infrastructure, application architecture and data analysis.
I have advised global financial services organisations and national regulators on cyber resilience and cyber security.
I am a Chartered Fellow of the British Computer Society (FBCS CITP). I am a member of the London South BCS branch committee. I am a Registered Security Specialist on the BCS Professional Advice Register and I achi...
Tags
security
cyber
forensic readiness
incident response
risk
44con
cyber resilience
targeted attack
apt
cyber security
security architecture
quantification
cyber risk
pianos
solution security
intelligence
architecture
blackswansecurity
uk
visualisation
risk visualisation
risk universe
engagement
management
advice
board
executive
threats
regulations
incident responde
cyber resistance
cyber regulation
fund management
insider
critical pathway
global
data
risk analysis
scenarios
pestle
strategy
horizon scanning
telecoms
trends
bigdata
analytics
critical security controls
network reconaissance
security analytics
big data
data-driven security
attack surface
testing
requirements
delivery
project
penetration testing
pen testing
activism
digital activism
hacktivism
security metrics
metricon
interception
forensics
law
security principles
dsm
design structure matrix
architecture risk assessment
attack tree
architecture analysis
probability
uncertainty
foxes
hedgehogs
ernst & young
bae systems
detica
threat
smart grid
smart meters
See more