Personal Information
Entreprise/Lieu de travail
Twickenham, United Kingdom United Kingdom
Profession
Security and Risk Professional
Secteur d’activité
Technology / Software / Internet
Site Web
blog.blackswansecurity.com
À propos
I am a delivery-focused security and risk professional with extensive experience of governance, management, system engineering and practical architecture across a wide range of disciplines and technologies. I have often had to move between roles to ensure programmes get delivered including security, infrastructure, application architecture and data analysis.
I have advised global financial services organisations and national regulators on cyber resilience and cyber security.
I am a Chartered Fellow of the British Computer Society (FBCS CITP). I am a member of the London South BCS branch committee. I am a Registered Security Specialist on the BCS Professional Advice Register and I achi...
Mots-clés
security
cyber
forensic readiness
incident response
risk
44con
cyber resilience
targeted attack
apt
cyber security
security architecture
quantification
cyber risk
pianos
solution security
intelligence
architecture
blackswansecurity
uk
visualisation
risk visualisation
risk universe
engagement
management
advice
board
executive
threats
regulations
incident responde
cyber resistance
cyber regulation
fund management
insider
critical pathway
global
data
risk analysis
scenarios
pestle
strategy
horizon scanning
telecoms
trends
bigdata
analytics
critical security controls
network reconaissance
security analytics
big data
data-driven security
attack surface
testing
requirements
delivery
project
penetration testing
pen testing
activism
digital activism
hacktivism
security metrics
metricon
interception
forensics
law
security principles
dsm
design structure matrix
architecture risk assessment
attack tree
architecture analysis
probability
uncertainty
foxes
hedgehogs
ernst & young
bae systems
detica
threat
smart grid
smart meters
Tout plus
Présentations
(35)J’aime
(33)Capability profile mapping at Map Camp 2019
Emily Webber
•
il y a 4 ans
Crowdsourced Probability Estimates: A Field Guide (FAIR Institute)
Tony Martin-Vegue
•
il y a 5 ans
Security And The Future Generation Presentation Ciso Orlando April 2010
Larry Taylor Ph.D.
•
il y a 13 ans
Attack monitoring using ElasticSearch Logstash and Kibana
Prajal Kulkarni
•
il y a 9 ans
From Zero to Hero - Centralized Logging with Logstash & Elasticsearch
Sematext Group, Inc.
•
il y a 9 ans
Big Data
NGDATA
•
il y a 13 ans
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates
•
il y a 8 ans
Enterprise Security Architecture
Kris Kimmerle
•
il y a 10 ans
On Cyber
grugq
•
il y a 8 ans
Careers in Security
Jason Chan
•
il y a 8 ans
Hackmageddon stats: 4 Year of Cyber Attacks
Paolo Passeri
•
il y a 9 ans
Introduction to Chainer: A Flexible Framework for Deep Learning
Seiya Tokui
•
il y a 8 ans
Security models for security architecture
Vladimir Jirasek
•
il y a 12 ans
Organize for Complexity - keynote at Dare Festival 2014 (Antwerp/BE)
Niels Pflaeging
•
il y a 9 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto
•
il y a 9 ans
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
Alex Pinto
•
il y a 9 ans
Best Practices for Leveraging Security Threat Intelligence
AlienVault
•
il y a 9 ans
The Heatmap - Why is Security Visualization so Hard?
Raffael Marty
•
il y a 9 ans
Fix What Matters: A Data Driven Approach to Vulnerability Management
Michael Roytman
•
il y a 10 ans
Effective approaches to web application security
Zane Lackey
•
il y a 11 ans
Some Thoughts On Bitcoin
Dan Kaminsky
•
il y a 12 ans
Designing Big Data Interactions Using the Language of Discovery
Joe Lamantia
•
il y a 11 ans
Bay threat2011
Ed Bellis
•
il y a 12 ans
Building Better Analytics Workflows (Strata-Hadoop World 2013)
Wes McKinney
•
il y a 10 ans
Text Indexing in Accumulo
Aaron Cordova
•
il y a 12 ans
Don't Let Security Be The 'Elephant in the Room'
Hortonworks
•
il y a 10 ans
Modern Data Architecture for a Data Lake with Informatica and Hortonworks Data Platform
Hortonworks
•
il y a 10 ans
A Fast and Dirty Intro to NetworkX (and D3)
Lynn Cherny
•
il y a 12 ans
ruxc0n 2012
mimeframe
•
il y a 11 ans
Attack-driven defense
Zane Lackey
•
il y a 10 ans
Personal Information
Entreprise/Lieu de travail
Twickenham, United Kingdom United Kingdom
Profession
Security and Risk Professional
Secteur d’activité
Technology / Software / Internet
Site Web
blog.blackswansecurity.com
À propos
I am a delivery-focused security and risk professional with extensive experience of governance, management, system engineering and practical architecture across a wide range of disciplines and technologies. I have often had to move between roles to ensure programmes get delivered including security, infrastructure, application architecture and data analysis.
I have advised global financial services organisations and national regulators on cyber resilience and cyber security.
I am a Chartered Fellow of the British Computer Society (FBCS CITP). I am a member of the London South BCS branch committee. I am a Registered Security Specialist on the BCS Professional Advice Register and I achi...
Mots-clés
security
cyber
forensic readiness
incident response
risk
44con
cyber resilience
targeted attack
apt
cyber security
security architecture
quantification
cyber risk
pianos
solution security
intelligence
architecture
blackswansecurity
uk
visualisation
risk visualisation
risk universe
engagement
management
advice
board
executive
threats
regulations
incident responde
cyber resistance
cyber regulation
fund management
insider
critical pathway
global
data
risk analysis
scenarios
pestle
strategy
horizon scanning
telecoms
trends
bigdata
analytics
critical security controls
network reconaissance
security analytics
big data
data-driven security
attack surface
testing
requirements
delivery
project
penetration testing
pen testing
activism
digital activism
hacktivism
security metrics
metricon
interception
forensics
law
security principles
dsm
design structure matrix
architecture risk assessment
attack tree
architecture analysis
probability
uncertainty
foxes
hedgehogs
ernst & young
bae systems
detica
threat
smart grid
smart meters
Tout plus