SlideShare a Scribd company logo
1 of 2
Download to read offline
There is a clear and present danger in the world of Technology
which spans companies, countries and Governments. This is the
ongoing threat around IT & Cyber Security. The challenges facing
companies continue to grow in volume and complexity as Cyber
Security threats constantly evolve.
Our ability to understand the risks, and know what role the best
Security talent plays in defending against those, has never been
more important.
Companies and organisations rely on Robert Walters Technology
to find high quality Security professionals on a Permanent,
Interim and Consultancy basis. We have a dedicated Security
Practice and our Consultants are well networked with the best
Security talent on the market across the UK and around the
world. All are truly versed in the governments cyber essentials
scheme and requirements.
CIOs, CEOs, CFOs and Board members will have to defend
Cyber Security Policies in court if a Cyber attack results in stolen
data, financial losses or damages corporate image. Are you
protected?
This is why we have developed our Robert Walters
Accredited Consultant programme, alongside some of the
best Cyber Security Interims and Consultants.
These are Security experts we have worked with previously who
have a proven track record in advising our clients on an Interim
basis, or a 2 – 3 days a week Consultancy agreement. More
importantly these are individuals who share our corporate values
and whom we trust to represent our brand.
www.robertwalters.co.uk
WE ARE ROBERT WALTERS
TECHNOLOGY
ROBERT WALTERS SECURITY PRACTICE – ACCREDITED CONSULTANTS
Andrea: Interim Security Expert (CISO)
•	Background which includes holding the position of Chief Information Security Officer for HP Enterprise Services for 4 years.
•	One recent role was one of worldwide influence addressing Security Policy and Risk Governance throughout the Enterprise Security
	domain.
•	Security strategy and operational delivery across global Data centres
•	Addressing internal Security Governance, Risk and Compliance
•	Advising & helping on Security strategy and putting together Frameworks for ISO Audits
•	Happy to put companies current Security procedures to the test and offer a full report to C/Board Level
•	Based in the Midlands
Alex: Security Solutions Architect & Design Authority
•	15 years experience
•	Previous roles focused on technical design and architecture of Cyber Solutions based on business requirements – either Physical,
	 Virtualised or Cloud Security services
•	Collaborative working with key Security technology vendors
•	Full management of IT Security engagements, Check Point Security Expert, CISSP & SC Security Cleared
•	Based in the Midlands
James: CISO/Head of IT Security
•	A track record in implementing and delivering major security, policy and standards change
•	Strong experience advising UK Banks on threat levels and vulnerability issues
•	Created Green Field Security departments within businesses
•	Previously mentored and trained a number of CIOs on Security issues
•	Led Security Architecture and delivered “Back to Basics” reviews of Security controls and mentored teams to carry out daily checks
	 and any remedial actions
•	Program managed the delivery of Critical Investment Security portfolios
•	Helped to set 5 year Security Strategy Roadmaps. CISA, CISM, CISSP, ISO27001 Lead Auditor
•	Based in the UK
www.robertwalters.co.uk
CURRENT ACCREDITED CONSULTANT PROFILES INCLUDE:
The above is an example of just 3 Security experts who Robert Walters Technology trust. We also have relationships with various other
Security experts, including Security Support Engineers, Security Analysts, Penetration Testers, Heads of Intelligence/Risk, Heads of
Cyber Security to Chief Information Security Officers (CISO). All Consultants come with references and proven track record. Daily rates
are sensible and transparently managed on our online time sheet system.
If you would like to discuss any of the above, please contact members of our Security Practice who would be more than happy to
advise you:
Ben Rowland – Senior Consultant, Security Practice
T: 0121 260 2544
E: benjamin.rowland@robertwalters.com
www.linkedin.com/in/benrowland85
Stuart Hope – Consultant, Security Practice
T: 0121 260 2562
E: stuart.hope@robertwalters.com
www.linkedin.com/in/stuarthoperobertwalters
Steve Corbett – Associate Director
T: 0121 260 2580
E: Steve.corbett@robertwalters.com
www.linkedin.com/in/steveacorbett
Robert Walters is one of the world’s leading professional IT recruitment consultancies, specialising in the placement of permanent,
contract and Interim positions across all levels. With 52 offices in 23 countries, our truly global network enables us to meet the
demands of clients and candidates whose needs extend beyond local markets, whilst our strong local foundations provide us with
unique insights into local industry and culture.
We are Robert Walters Technology
We are Robert Walters Security Practice

More Related Content

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Robert Walters - Security Practice, Accredited Consultants

  • 1. There is a clear and present danger in the world of Technology which spans companies, countries and Governments. This is the ongoing threat around IT & Cyber Security. The challenges facing companies continue to grow in volume and complexity as Cyber Security threats constantly evolve. Our ability to understand the risks, and know what role the best Security talent plays in defending against those, has never been more important. Companies and organisations rely on Robert Walters Technology to find high quality Security professionals on a Permanent, Interim and Consultancy basis. We have a dedicated Security Practice and our Consultants are well networked with the best Security talent on the market across the UK and around the world. All are truly versed in the governments cyber essentials scheme and requirements. CIOs, CEOs, CFOs and Board members will have to defend Cyber Security Policies in court if a Cyber attack results in stolen data, financial losses or damages corporate image. Are you protected? This is why we have developed our Robert Walters Accredited Consultant programme, alongside some of the best Cyber Security Interims and Consultants. These are Security experts we have worked with previously who have a proven track record in advising our clients on an Interim basis, or a 2 – 3 days a week Consultancy agreement. More importantly these are individuals who share our corporate values and whom we trust to represent our brand. www.robertwalters.co.uk WE ARE ROBERT WALTERS TECHNOLOGY ROBERT WALTERS SECURITY PRACTICE – ACCREDITED CONSULTANTS
  • 2. Andrea: Interim Security Expert (CISO) • Background which includes holding the position of Chief Information Security Officer for HP Enterprise Services for 4 years. • One recent role was one of worldwide influence addressing Security Policy and Risk Governance throughout the Enterprise Security domain. • Security strategy and operational delivery across global Data centres • Addressing internal Security Governance, Risk and Compliance • Advising & helping on Security strategy and putting together Frameworks for ISO Audits • Happy to put companies current Security procedures to the test and offer a full report to C/Board Level • Based in the Midlands Alex: Security Solutions Architect & Design Authority • 15 years experience • Previous roles focused on technical design and architecture of Cyber Solutions based on business requirements – either Physical, Virtualised or Cloud Security services • Collaborative working with key Security technology vendors • Full management of IT Security engagements, Check Point Security Expert, CISSP & SC Security Cleared • Based in the Midlands James: CISO/Head of IT Security • A track record in implementing and delivering major security, policy and standards change • Strong experience advising UK Banks on threat levels and vulnerability issues • Created Green Field Security departments within businesses • Previously mentored and trained a number of CIOs on Security issues • Led Security Architecture and delivered “Back to Basics” reviews of Security controls and mentored teams to carry out daily checks and any remedial actions • Program managed the delivery of Critical Investment Security portfolios • Helped to set 5 year Security Strategy Roadmaps. CISA, CISM, CISSP, ISO27001 Lead Auditor • Based in the UK www.robertwalters.co.uk CURRENT ACCREDITED CONSULTANT PROFILES INCLUDE: The above is an example of just 3 Security experts who Robert Walters Technology trust. We also have relationships with various other Security experts, including Security Support Engineers, Security Analysts, Penetration Testers, Heads of Intelligence/Risk, Heads of Cyber Security to Chief Information Security Officers (CISO). All Consultants come with references and proven track record. Daily rates are sensible and transparently managed on our online time sheet system. If you would like to discuss any of the above, please contact members of our Security Practice who would be more than happy to advise you: Ben Rowland – Senior Consultant, Security Practice T: 0121 260 2544 E: benjamin.rowland@robertwalters.com www.linkedin.com/in/benrowland85 Stuart Hope – Consultant, Security Practice T: 0121 260 2562 E: stuart.hope@robertwalters.com www.linkedin.com/in/stuarthoperobertwalters Steve Corbett – Associate Director T: 0121 260 2580 E: Steve.corbett@robertwalters.com www.linkedin.com/in/steveacorbett Robert Walters is one of the world’s leading professional IT recruitment consultancies, specialising in the placement of permanent, contract and Interim positions across all levels. With 52 offices in 23 countries, our truly global network enables us to meet the demands of clients and candidates whose needs extend beyond local markets, whilst our strong local foundations provide us with unique insights into local industry and culture. We are Robert Walters Technology We are Robert Walters Security Practice