RANT is a monthly networking event in London for IT security managers and CISOs to discuss topical issues without sales vendors present. It attracts 40-60 attendees each month who provide feedback on discussion topics. Past attendees praise RANT for being a relaxed, informal environment to meet peers, exchange ideas, and get industry perspectives from presentations. RANT is held at a central London pub on the last Wednesday of each month.
Raise The Cybersecurity Curtain!
With a clear grasp of systems theory and revelation of pervasive, persistent, and resilient interconnectedness, I set out on the journey to interact with 100 "best of the best" Cybersecurity / Information Security professionals to learn about their own EXPERIENCES and gain INSIGHTS from their personal perspectives.
I was truly blessed to have had a wide variety of insightful conversations with leaders who are serving their organizations at various levels.
I sincerely wanted to expand the impact of the lessons I learned from these interactions by sharing them with Cybersecurity enthusiasts around the globe - people who are paving their own way towards a successful Cybersecurity career.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
Operational space of digital (r)evolution requires an instantaneous reaction. Seeking knowledge has brought me far beyond my personal horizons of discernment.
With hope to create and scale globally an inclusive ‘authors-publisher-readers’ circle of wisdom and expertise; with channeled determination to gain understanding by carefully selecting the best information sources (Dis moi où cherche! Mais où?) and reading between the lines, I invited the Cyber Warriors ‘Men and Women on the Arena’ with hope to “Raise the Cybersecurity Curtain”.
A central topic of these thoughts is cybersecurity. A fundamental and delicate question at the heart of my work is: how to inspire readers' thirst for knowledge, for learning.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
How Should Risk Leaders of Future Work With AI.pdfThe IRM India
This publication starts by explaining the concepts of AI, machine learning, and deep learning. Next, it describes what AI does and what impact it will have. It compares Human vs AI and states the AI risks in context. It also explains the role and future of AI and the CRO. It concludes with a summary of AI and a Case study.
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
"One of the main Cyber risks is to think they don't exist. The other is to try to treat all risks".
Key cybersecurity quotes, key methodologies, and advanced risk management approches. Seeking for simplicity and efficiency in the complex realm... Do read.
[Note to the reader: This presentation was given in front of a large technology firm, very active in the defence and security industries]
IT has always been on the side of order AND disorder. These 2 approaches conflict with one another.
The presentation explores how Cyber Security should be considered surrounding the use of IoT within different applications and contexts of use. Application areas include consumer personal devices, Public Safety wearables and smart city sensors. Information is the key asset, and we explore the risks associated with gathering, processing and sharing of information both intentionally and maliciously.
By David Lund, HW Communications
The presentation was made at the Fraunofer Innovation Days on 22nd-23rd May 2017 in Bonn.
Raise The Cybersecurity Curtain!
With a clear grasp of systems theory and revelation of pervasive, persistent, and resilient interconnectedness, I set out on the journey to interact with 100 "best of the best" Cybersecurity / Information Security professionals to learn about their own EXPERIENCES and gain INSIGHTS from their personal perspectives.
I was truly blessed to have had a wide variety of insightful conversations with leaders who are serving their organizations at various levels.
I sincerely wanted to expand the impact of the lessons I learned from these interactions by sharing them with Cybersecurity enthusiasts around the globe - people who are paving their own way towards a successful Cybersecurity career.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
Operational space of digital (r)evolution requires an instantaneous reaction. Seeking knowledge has brought me far beyond my personal horizons of discernment.
With hope to create and scale globally an inclusive ‘authors-publisher-readers’ circle of wisdom and expertise; with channeled determination to gain understanding by carefully selecting the best information sources (Dis moi où cherche! Mais où?) and reading between the lines, I invited the Cyber Warriors ‘Men and Women on the Arena’ with hope to “Raise the Cybersecurity Curtain”.
A central topic of these thoughts is cybersecurity. A fundamental and delicate question at the heart of my work is: how to inspire readers' thirst for knowledge, for learning.
I hope readers will gain insights into how they can guide their career path to the success they desire and benefit the global security community through their unique contributions.
How Should Risk Leaders of Future Work With AI.pdfThe IRM India
This publication starts by explaining the concepts of AI, machine learning, and deep learning. Next, it describes what AI does and what impact it will have. It compares Human vs AI and states the AI risks in context. It also explains the role and future of AI and the CRO. It concludes with a summary of AI and a Case study.
Stephane Nappo. January 2023. Top Cyber News MAGAZINE.pdfStéphane Nappo
"One of the main Cyber risks is to think they don't exist. The other is to try to treat all risks".
Key cybersecurity quotes, key methodologies, and advanced risk management approches. Seeking for simplicity and efficiency in the complex realm... Do read.
[Note to the reader: This presentation was given in front of a large technology firm, very active in the defence and security industries]
IT has always been on the side of order AND disorder. These 2 approaches conflict with one another.
The presentation explores how Cyber Security should be considered surrounding the use of IoT within different applications and contexts of use. Application areas include consumer personal devices, Public Safety wearables and smart city sensors. Information is the key asset, and we explore the risks associated with gathering, processing and sharing of information both intentionally and maliciously.
By David Lund, HW Communications
The presentation was made at the Fraunofer Innovation Days on 22nd-23rd May 2017 in Bonn.
We live in a digital world in which our happiness, health, and even our lives can depend on the performance of technology. From medical equipment to cars, and home security systems to smartphones, computerized equipment plays a greater role in the human experience with each passing year.
Own Your Future!
“It is time for us all to stand and cheer for the doer, the achiever - the one who recognizes the challenges and does something about it.” Vince Lombardi
ONLY talents! NO ranking here!
With the global skills shortage, it is crucial to encourage talents who dedicate their life and career to cybersecurity.
This special edition spotlights remarkable cybersecurity and industry 4.0 professionals. Top Cyber News Magazine is pleased to unveil a constellation of young and devoted men and women: amabasadors, erudites, and influencers.
All, part and inspiring force behind the global Cybersecurity Awareness movement. These talented experts and brilliant people coming from nineteen countries and five continents.
I invite you to discover these wonderful people. Speak about them. See the light in others and you will be stunned how this light comes back to you! Enjoy reading! Share! Learn!
40 under 40! Move to the Front Lines!
Editorial by Steve KING
Managing Director at CyberTheory
As the gap expands between supply and demand in cybersecurity skills, we now see over 70 online eLearning courses available that focus across a wide range of upskilling opportunities from data privacy to compliance to risk and vulnerability assessment and audit. As we celebrate our newest class of 40 under 40, we are optimistic that this generation of cybersecurity enthusiasts are interested in the actual battle zones upon which our current war is being fought and not on preparation for the administrative roles which are also necessary in battle, yet not feeling the pressure from the current skills gap.
In our work with our own eLearning platform, CyberEd.io, we have discovered that the key employment opportunities lie along the front lines of deployment, where trained cyber-warriors are so necessary not just to defend our critical assets but to serve as a deterrent to the flood of cyber-criminals assaulting our fortresses. Every CISO we talk to confirms this requirement with both anecdotal and empirical evidence that is leading to almost daily breaches across all industrial sectors with specific threats to banking, education, healthcare, military and industrial control systems in automated factories (OT).
The cyber-warrior education career path starts with a solid grasp of network engineering fundamentals, followed by security architecture & engineering with an emphasis on Cloud/SysOps/*nix (*Unix/Linux Linux, FreeBSD, and Mac OS X), ICS/IoT, identity access management, security assessment & testing, current threat profiles and malware infrastructure and architecture, vector identification, incident detection, security operations with forensics and incident handling, pen testing, and exploitation.
Without properly trained resources in advanced cyber-warfare, we will never prevail in our constant challenge to protect and defend, let alone being able to take the threat to the enemy. As more and more entry candidates choose training to prepare them for ...
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreClearedJobs.Net
Please join us if you have cyber security education or experience.
If you're cleared, visit: https://clearedjobs.net/job-fair/fair/104/
If you're not cleared, visit: https://cybersecjobs.com/job-fair/fair/79/
In the Forefront Exemplary Leaders of the Business World.pdfCIO Look Magazine
This edition features a handful of The Exemplary Leaders of the Business World to Watch that are leading us to a better future
Read More: https://ciolook.com/in-the-forefront-exemplary-leaders-of-the-business-world-november2023/
In the Forefront Exemplary Leaders of the Business World.pdf
Rant Testimonials
1. RANT
Risk and Network Threat Forum
RANT is a regular, informal networking event specifically for IT Security
Managers, Directors and CISO’s who work within End User organisations.
It provides an opportunity to discuss topical issues and to network with
like-minded individuals. Launched by Acumin Consulting and NGS Secure
in 2007, RANT attracts between 40-60 attendees each month and provides
guests with the ability to contribute their opinions to the discussion which aims
to provoke participation and debate.
RANT prides itself on being a sales free event and it is closed to security vendors and consultancies
however it is open for sponsorship and speaking opportunities. Following the discussion, guests are free to
network, and further discuss the topic.
Here is some of the positive feedback RANT has received over the past couple of years:
Speakers Sponsors Attendees
“The most relaxed way of “RANT provides you with a rare “RANT is a good networking event; “The hospitality of the evening
encountering new security ideas chance to stand up in front of lots important for you to get a range of is unbeatable. There is no better
and meeting old and new colleagues of highly strung, pessimistic security levels involved and encourage event in the City for IT Security
that I know” professionals prepared to jaunt, people to mix” and Corporate Governance
Professor Paul Dorey, CISM laugh and heckle their way through Head of Information Security, professionals”
M.Inst.ISP, Professor Royal your perfectly crafted presentation, St Andrews Health Care Head of Information Security, Capita
Holloway, University of London. with a beer in one hand and a
Chairman, IISP battered onion ring in the other... “RANT is sufficiently sized and “I found it well run and very
and yet strangely provide you with informal to encourage a free entertaining and a good course of
“It is extremely enjoyable to talk at some of the best feedback and exchange of ideas and information. 'ammunition' for using in security
the RANT. A lively and interactive lightly argumentative advice on a Being sales-free is invaluable” awareness presentations”
crowd that have much to contribute topic you 'thought' you were an Information Risk Manager, Information Security Officer, CAF
to off-beat and informal discussions expert on. Deutsche Bank
about the things that really matter in “A roomful of security people
information risk but nobody is willing RANT gave us some real thought “A fun, laid-back event where like enjoying themselves over great beer,
to talk about elsewhere” provoking comments and some minded individuals with similar wine, food and friendly arguments
Stephen Bonner, MD Information great takeaways... I can't wait to challenges can meet in a social - must be RANT!”
risk management for a leading do another.” atmosphere” VP, Commerzbank
financial services organisation A successful start up security Group IT Security Officer, Talbot
vendor organisation Underwriting Ltd “I cant imagine a more friendly and
hospitable way to take part in such a
challenging learning environment”
Head of Data Protection
Dept of Health
RANT is held on the last Wednesday of every month at one of London’s most well known, centrally located
Public Houses. Please visit www.rantforum.com for a full update on all past and future RANT forums.
If you would like to enquire about attending or presenting at the RANT Forum, please contact us on the
number below.
Acumin is an international Information Security and Information Risk Management recruitment firm providing Permanent, Contract and Executive Search
recruitment services to SMB and Enterprise clients including End Users, IT Security Vendors and Consultancies. We specialise in Information Risk Management,
Governance & Compliance, Penetration Testing & Forensics, Technical Security, Business Continuity, Sales Engineering, Sales & Marketing and Executive
Management positions. Acumin also provide bespoke Marketing Services to enhance and support business development for IT Vendors and Consultancies.
Call us today on email info@acumin.co.uk @acumin
+44 (0)20 7987 3838 web www.acumin.co.uk @rantforum