Home 2018-06-11T08:16:50+00:00

What we do

Security Training

  • The Cyber Environment
  • Key Threats & Controls
  • Cyber Incident Response Plans
  • Cyber Incident Response Scenarios
  • Phishing Attacks

General Consultancy

  • IS Policy & Standards
  • The Regulatory Framework
  • Technology Risk & Governance
  • Cloud Security
  • General Security Training
  • Technology Audit Preparation

Social Media

  • Social Media Security
  • Social Engineering Attacks
  • Protection Methods [LinkedIn, Twitter, FB]
  • Mobile Phone Security
  • Wife Security
  • The ‘Internet of Things’

Community Work

  • ISC[2] Active Member [CISSP]
  • ISC[2] London Chapter Secretary
  • Safe&Secure Online Practitioner [Schools]
  • Available to talk and participate in Panel Discussions

Latest Blog Posts

Asia Asset Management Seminar: 23rd March 2018

I was very excited to be invited to speak at the Asia Asset Management Seminar and Annual Awards event [23rd March] hosted by owner and founder Tan Lee Hock. The seminar was on Digital Asset Management and I was providing an overview of the cyber environment and landscape together with some of the key threats and controls that we should be preparing for across the globe. Very topical and timely considering that it is due to the Digital revolution [...]

The secureCISO Event: Women in Technology: 7th March 2018

The secureCISO event in London was a great opportunity to discuss ‘Women in Technology’ on International Women’s Day Education is key for enabling women to believe that they have an equal opportunity in the security field and in gaining traction in the behavioural changes required on a global scale in order to be more secure whilst embracing new technologies. I believe that cyber-security must be de-mystified and simplified so that people can understand how the risks apply to them both as individuals [...]