- Mapping your organisation’s cyber risk profile and environment to your threat management approach
- Correlating identities and privileges to reduce your blast radius
- Threat modelling and profiling to mitigate the impact of cyber attacks
In this episode of teissTalk we discussed:
An experienced public speaker, he has given keynote talks at some of the UK’s largest tech events, in addition to hosting conferences and chairing panels at venues ranging from London’s Chatham House think-tank to the Latitude music festival.
Professional and motivated leader who has worked primarily in the Defence sector across air, land and sea environments. Skillset includes:
Technology leader with an extensive profile in managing government, defence and E-commerce digital eco-systems.
Highly driven, meticulous and dedicated. Experienced in a variety of roles and challenging environments around the world.
A seasoned professional, leading teams with a positive personality and delivering integral results.
I have helped to protect military helicopters, central banks and Yeezy sneakers over a 20+ year career in security, IT and financial crime.
A short stint in professional sport taught me about resilience, endurance and performance. Along the way I’ve picked up a few lessons in leadership and teamwork both in the office and on the pitch.
Ever since writing the business case for an Air Force which needed a new IT system to be able to fly its new generation of fighters, I have been passionate about the potential for technology to be a simultaneous cause of opportunity and risk.
I have 20 years’ experience in the field of Information Security, which includes extensive contracts with many global businesses, including BP and JPMorgan. Specialising in risk assessment, risk management, policy compliance, security reviews and managing network behaviour anomaly systems, I now lead Varonis’ engineering team in the UK, Ireland and Middle East, ensuring the team is helping customers and partners from a range of sectors in data governance projects, and organising, securing and managing their unstructured data.
[s2Member-Login login_redirect=”https://www.teiss.co.uk” /]