

Speaking at ComputerWeekly 500 C Level Event on Cyber Security - Enterprise & Data May 22 London
“Data protection, privacy and the IT department – how to manage the proliferation of data in your organisation” Hosted by Brian Glick,...


Speaking on behalf of CSRN at Cyber Security and Global Governance June 3 at Warwick
Prof. Malcolm Macdonald (on behalf of Global Research Priorities, Global Governance group) Warwick University has a roundtable discussion...


Im speaking on Panel at European Information Security Summit 2014 18-19 February
Separating hype from reality British Museum, London . Register Here Host & Moderator: Jon Bentley, TV presenter, The Gadget Show...


Presentation-Knowing where the safe zone is – Defining security perimeter access strategies for an e
From 2nd Annual Identity Access Management – Ovum Forum 22 October 2013. http://www.slideshare.net/mrskilton/knowing-where-the-safe-zon...


Quantifying the assessment of security risk in your Enterprise architecture
The question of what is the level of security risk to your architecture? Often arises in conferences I attend. It’s a great point to...


Speaking at 2nd Ovum Identity & Access Management Forum 22 October 11 Cavendish Sq, London
http://identitymanagement.ovumevents.com/ Follow event on Twitter, the hash tag is #OvumIAM Scheduled to speak at 15:00 in the panel...


Measuring Cyber Crime – how do you quantify how serious is it ?
The Open group Cloud Computing Work Group (http://www.opengroup.org) have been working on a Cloud Performance Metrics Paper that explores...


Security and the impact of technology on work/life balance and the greater legal questions
Some thoughts on security and the impact of technology on work/life balance and the greater legal questions Enabling technology vs....


Security and cloud computing
How can we ensure Enterprise data is protected in transit to the cloud, and once in storage (and when subsequently accessed), how is it...


The need for Multiplicity and maintaining encryption persistence – a mathematical milestone broken
Interesting blog entry on the CCIF around IBM Solves Cryptographic Cloud Security. http://www.elasticvapor.com/2009/06/ibm-solves-cryptog...