Holly performs security assessments of computer networks, mobile applications, web applications and buildings. She is qualified a CREST Certified Tester and has an MSc in Information Security. Not only that but she is a speaker on the topic!
Holly also has a wonderful website that is written in such a way that even the most technically illiterate can follow!
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Ray is the founder of Founder of www.digit.fyi - Scotland's IT & Digital News Portal with 50,000+ hits per month currently making this the largest tech hub, also organiser of Scotland's largest enterprise IT & Digital Events covering IoT, Digital Transformation, Cloud, Big Data, GDPR, FinTech, Digital Energy and DIGIT Expo in 2018
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Jennie is responsible for coordinating and delivering cyber messaging, developing business links, and working on 'Protect' strategies for Titan North West Regional Organised Crime Unit, covering Merseyside, Greater Manchester, Cheshire, Cumbria, Lancashire and North Wales.
She coordinates and facilitates communications and information sharing within the CiSP (Cyber Information Sharing Partnership) platform for the North West regional node, and works closely with counterparts in other regions to ensure consistent and coordinated messaging, support, advice and guidance nationally for businesses and individuals to help protect themselves against Cyber threats, and advising on what action to take should they become a victim of such attacks.
TITAN North West Regional Organised Crime Unit website
The National Cyber Security website
Cyber Information Sharing Partnership website
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Kai is an engaging and award-winning specialist on security behaviors and security culture, he provides organisations around the world with advice on assessing, building and maintaining good security culture using the Security Culture Framework. Kai is also working with researchers and practitioners worldwide to bring insights on human behavior from a security perspective, thus creating better products, services and organisations.
Build a Security Culture (Fundamentals)
Kai on LinkedIn - Kai Roer
Kai on Twitter - @kairoer
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Brian Shorten is the Co-Founder and Chairman of the Charities Security Forum, which was stated in 2007. He is a highly qualified information security management expert with experience in the financial and telecommunications industries and the charity sector.
Brian's email address - brian.shorten@charitiessecurityforum.org.uk
Brian on LinkedIn - Brian Shorten
Brian on Twitter - @brianshorten
Charities Security Forum website - Charities Security Forum site
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Rob Shapland is an ethical hacker with ten years of experience conducting penetration tests for hundreds of organizations, from small businesses to major international organizations.
He specializes in simulating advanced cyber attacks against corporate networks, combining technical attacks with his other hobby of dressing up and tricking his way into company headquarters using social engineering techniques.
He is also a regular speaker at events and conferences around Europe, and he has appeared on both BBC and ITV television and radio in the U.K. as a cybersecurity adviser.
Rob on LinkedIn - Rob Shapland
Rob on Twitter - @rdshapland
First Base Technologies website - First Base Technologies
First Base Technologies on Twitter - @FBTechies
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Rachel is the Co-founder and CEO of SocialProof Security where she focuses on helping people and companies keep their data safe through social engineering awareness.
Rachel was also a winner of the Social Engineering Capture the Flag (CTF), at DEFCON, 2 years in a row using mainly social media to infiltrate companies.
As Chair of the Board of Women in Security and Privacy, I advocate for women in technology, specifically the growing field of cyber security and privacy.
Rachel on Twitter - @RachelTobac
Rachel on LinkedIn - Rachel Tobac
SocialProof Security website - SocialProof Security
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Dan Raywood is the Contributing Editor for Infosecurity Magazine. He was a journalist covering IT and information security for five years from 2008 to 2013 for SC Magazine, and between September 2013 and April 2015 he was the relaunch editor of IT Security Guru where he interviewed CISOs, users and vendors from across the world.
Having spent six months as a security industry analyst for 451 Research, he is currently the contributing editor of the industry's most read magazine and website Infosecurity Magazine, heading up the audio channel, twice-annual Virtual Conference and contributed content.
Dan on LinkedIn - Dan Raywood
Dan on Twitter - @DanRaywood
Infosecurity Magazine Website - Infosecurity Magazine
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
From a background of threat intelligence, social engineering and incident response, Stuart Peck heads up Cyber Security Strategy for ZeroDayLab. Stuart regularly delivers threat briefings to FTSE-level executives and directors throughout the UK and Europe.
Stuart's key areas of expertise include: the dark web, social engineering, malware and ransomware analysis & trends, threat hunting, OSINT, HUMINT and attacker recon techniques.
Stuart on Twitter - @cybersecstu
Stuart on LinkedIn - Stuart Peck
Many Hats Club site - Many Hats Club
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Julie is a professional investigator who formerly was a police detective and undercover operator, that uses technology and her knowledge of cyber-psychology to bring to light those that hide in the digital shadows.
Julie is also the host of the World Class Investigator podcast, which is dedicated to helping people become or improve their investigation skills.
Julie on Twitter - @HuntedJulie
World Class Investigator Podcast - World Class Investigator Podcast
Links about Human Trafficking Site - Human Trafficking Foundation
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Claire is a communications expert, helping in the sectors of technology and security. Having recently completed her M.A., where her research focused on crisis communication and public relations, she is examining security information issues, particularly data breaches.
Claire's website - Claire Till's website
Claire on Twitter - @ClaireTills
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Chris is a 7 time Microsoft MVP in Consumer Security and former Director of Research for FaceTime Security Labs. He has presented at RSA, Rootcon, VB, and SecTor, and has been thanked by Google for his contributions to responsible disclosure in their Hall of Fame. Chris has been credited with finding the first rootkit in an IM hijack, the first rogue web browser installing without consent and the first DIY Twitter Botnet kit.
Chris's talk - Chris's talk
Chris on Twitter - @paperghost
Once upon a time in China 2 DVD
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Jessy is a security expert who excels in translating complex cybersecurity issues into simple, relatable terms for non-technical audiences. In her work as a consultant, security executive, and former Security Empress at 1Password, she's taught consumers how to better protect themselves, their data and their identities online.
Jessy is currently making security more accessible for the average person. In 2017, she was named one of the Top 20 Women in Cybersecurity by Cyberscoop.
Jessy on Twitter - @jessysaurusrex
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Pete Trainor is an author, behavioural designer, technologist, accidental polymath, mental health campaigner and co-founder of US Ai in London. He talks all over the world on creative & social technologies, data, artificial intelligence and the physiological & psychological effects on their audiences.
Over the last three years, Pete has helped to pioneer an entirely new approach to Ai focused services, one that looks at ‘self-evolving systems’ and ‘minimum viable personality’ to help solve societal and human issues.
His recently published, bestselling, book, Hippo - Human Focused Digital takes a philosophical look at technology and design, challenging us to look inwardly at the self when designing future technologies.
Pete's book - Hippo - Human Focused Digital
US Ai website - US Ai
Peter on Twitter - @petetrainor
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
White Hat Rally is a not for profit charitable organisation creating exciting non-competitive motor sports events to raise funds which go directly to our registered charities to support their work with vulnerable children and teenagers.
White Hat Rally website - White Hat Rally
White Hat Rall on Twitter - @WhiteHatRally
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Kieren is an experienced instructor and Communications & Information Management Specialist, who reached the rank of Lieutenant Commander, specialising in managing Communications and Information Systems (CIS). I now work as a Communications Security Implementation Manager & as an Instructor at the University of Cambridge.
Kieren on LinkedIn - Kieren Lovell
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
For this episode, I am joined by Yvonne MacHugh, Lisa Jane Dunn and Joanne Thomlinson, who are campaigning on behalf of the 35 innocent men who have been kept in prison for over four years in India.
I am asking you all to help support the men, their families and friends who are working so hard to secure their return home.
The Chennai 6 website - Chennai 6 where all the ways you can help are to be found
Chennai 6 on Twitter - @TheChennai6 and don't forget to use the hashtag #Chennai6
Chennai 6 Petition - Chennai 6 petition
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Rik Ferguson, Vice President of Security Research at Trend Micro, is a Special Advisor to Europol EC3, project leader with the International Cyber Security Prevention Alliance (ICSPA), Vice Chair of the Centre for Strategic Cyberspace & Security Science and advisor to various UK government technology forums. In April 2011 Rik was inducted into the Infosecurity Hall of Fame.
Cryptonomicon (Neal Stephenson)
Ready Player One (Ernest Cline)
Rik on Twitter - @rik_ferguson
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
As Head of Security at ZoneFox, Ian works across the business to define, create and execute security solutions and promote a safe, secure Internet for Small & Medium Businesses worldwide. He has deep experience with the threats facing small, medium and enterprise businesses – this research and experience has made him a sought-after cyber security resource for conference presentations, press commentary and keynote addresses worldwide.
Ian frequently provides in-depth analysis of current trends in cyber-crime as well as identifying the threats of the future. In 2016, Ian’s thoughts have been published in various tier one publications including SC Magazine, Infosecurity, IDG Connect, CBR, The Times, USA Today and The Sunday Herald.
Critical Conversations (Kerry Patterson, Joseph Grenny, Ron Mcmillan, Al Switzler)
Ian on LinkedIn - Ian Thornton-Trump
Ian on Twitter - @phat_hobbit
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Dominic has an established track record as a cyber security leader. He has a wide-range of experience overseeing numerous projects including security strategy development, policy development, endpoint security, and threat management in a multitude of industries (financial services, logistics, transportation, government, telecommunications, and critical infrastructure). Dominic actively participates in the local Vancouver security community and is a regular cyber security expert for Global BC (TV), CKNW (radio), News1130 (radio), and the Vancouver Sun (newspaper).
Currently, in his role as Chief Security Strategist at Cyber.SC, Dominic focuses much of his energy on helping start-ups and small/midsize businesses solve their cyber security challenges. He strives to provide practical cyber security advisory services to his clients.
CISO Desk Reference Guide (Bonney Hayslip Stamper, Bill Bonney, Gary Hayslip)
Dominic on LinkedIn - Dominic Vogel
Dominic on Twitter - @domvogel
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Whilst employed in the retail sector, Lee decided to change his life completely by entering the field of information security but the journey wasn't easy and took an insane amount of dedication and hard work.
Along the way, he gained a huge amount of passion for the topic through his own research, self-education, and writing on various aspects of the discipline.
This work allowed Lee to gain a unique insight into security. His expertise and knowledge on the subject is demonstrated by the continuing popularity of his own blog and the large network of like-minded individuals he has built up within the Information Security field.
Lee on Twitter - @Security_FAQs
Lee's website - Security FAQs
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Martin is an absolute techie at heart, having been involved in IT for over 15 years. He has spent the majority of his career at Chester Zoo, working his way up to Head of IT. However, he is now moved on to be Head of IT at Moneypenny.
Over the years he has been mainly focussed on the Network and Security side of IT, but has always thought of himself as an all-rounder. Once he started getting better at the technical side of security he noticed how vulnerable people were. Being a people person is how he differentiates himself to most “typical” IT people.
He became a CISSP (Certified Information Systems Security Professional) and has enjoyed volunteering for them too with their safe and secure online campaign.
With Moneypenny, he runs Business Classes with local schools which involve dumpster dives and Information Security briefings. I am also Membership Secretary for the BCS North Wales and Chester committee, regularly trying to encourage more and more people into IT.
Social Engineering Penetration Testing (Gavin Watson and Andrew Mason)
What Everybody is Saying (Joe Navarro)
The Grandmaster's Book of Ninja Training (Dr Masaaki Hatsumi)
The Way of the Ninja: Secret Techniques (Dr Masaaki Hatsumi)
Unarmed Fighting Techniques of the Samurai (Dr Masaaki Hatsumi)
Mr Robot (DVD) Season 1 and Season 2
Martin on Twitter - @martinking1983
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Allison Miller protects platforms and consumers from online threats. She has worked in in risk, security, payments, & business strategy at internet-scale technology companies.
O'Reilly CFP - https://conferences.oreilly.com/security/sec-ny/public/cfp/559
Center for Cyber Safety & Education - https://iamcybersafe.org/
Safe & Secure Online - https://safeandsecureonline.org/
Security checkup - https://myaccount.google.com/security
Safe Browsing Transparency Report - https://www.google.com/transparencyreport/safebrowsing/?hl=en
Safe Browsing Product site - https://safebrowsing.google.com/
Pattern Recognition (William Gibson)
Allison on Twitter - @selenakyle
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
Brian Honan is an independent security consultant with BH Consulting based in Dublin, Ireland, and is also the founder and head of IRISSCERT, Ireland's first CERT.
He is a Special Advisor to Europol's Cybercrime Centre (EC3), an expert advisor to the European Union Agency for Network and Information Security (ENISA), and sits on the advisory board for a number of innovative security companies.
In 2013 Brian was awarded "SC Magazine Information Security Person of the Year" for his contribution to the computer security industry. Brian Honan was also inducted into the 2016 Infosecurity Europe Hall of Fame."
The Cuckoo's Egg (Cliff Stoll)
Countdown to Zero Day (Kim Setter)
Brian on Twitter - @BrianHonan
BH Consulting Website - BH Consulting
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe
As Chief Information Security Officer of Publicis Groupe, Thom is responsible for all aspects of information security risk and compliance as well as managing the Groupe Information Security Programme. Additionally, the role is responsible for business continuity capabilities across the Groupe’s global operations.
Having successfully built security and IT programmes from the ground up Thom brings an often opinionated and forward thinking view of security risk, both in assessments and management, but is able to do so with humour and pragmatism (mostly).
An international public speaker and award-winning security blogger, Thom contributes to a number of industry blogs and publications. Thom is also the sole founder of Host Unknown, a loose collective of three infosec luminaries combined to make security education and infotainment films.
One Plus One Equals Three (Dave Trott)
Presentation Zen (Garr Reynolds)
The Psychology of Information Security (Leron Zinatullin)
The Black Swan (Nassim Nicholas Taleb)
Thom on LinkedIn - Thom Langford
Thom on Twitter - @ThomLangford
Host Unknown website - Host Unknown
Don't forget, to get in touch with me either try the contact page of the site or follow me on Twitter, where I can be found at @Jenny_Radcliffe