The Blog

Going to Microsoft’s Ignite 2016 Conference? Check out Chris’s session

For those folks heading up to Microsoft’s Ignite session in Auckland from the 25th October, check out Chris’ session on Thursday 27th – “A practical approach to security in the cloud”.
As a teaser this is the abstract for the session: “Is your organisation or the one that you look after looking to take advantage of the benefits that cloud computing offers? Are you unsure how to address security in the cloud? Are you overwhelmed by the volume of contradictory advice and guidance? Do you need a practical approach to managing security risks when migrating to the cloud? If you answered “YES!” to any or all of these, then this is the session for you! You’ll leave this presentation with some real-world practical techniques for clearing both real and perceived security roadblocks to moving your organisation to the cloud.”

Enjoy!

Rapid Reaction: A Series on Incident Management and Response

This is the first in a series of articles that aim to help organisations build and maintain their information security incident management and response capability.

With the exception of a few organisations, it seems that the effort put into establishing an information security incident management and response capability is limited to developing a documented process. Most do the bare minimum required to tick the “has an incident response process” box, with little to no regard about how effective the process is. That’s why very few organisations actually detect information security (or cyber security if you prefer) incidents in a timely manner, and fewer still are able to handle and resolve them in an efficient and effect way to minimise the impact.
Read More


Chris to present at COSAC 2016

Chris will be presenting two sessions at COSAC 2016 held in Ireland between the 2 – 6 October 2016.  The following provides a synopsis of his sessions, visit the COSAC website here for more information and the full conference schedule.
Read More

Who cares about unique identifiers?

Almost everyone has been on the receiving end of a request to provide photo identification (most commonly a drivers’ licence or a passport) when applying for a bank account, or purchasing a new mobile phone, or some similar account-based transaction. The person making the request typically either writes down the details of the document or photocopies it. But there is one piece of information that should not be captured unless there is a legitimate reason to – the unique identifier.
Read More


SEI Incident Handling Training

It is too late to start figuring out what to do when a cyber security incident occurs. If your organisation has not thought about how to identify a significant incident, who needs to be involved and what steps it needs to take to resolve the incident then it is likely to struggle to bring the incident to a timely resolution.
Read More

There is still only one way to eliminate risk

This is not a new post, I originally wrote and published it nearly six years ago. However, based on a number of discussions I have been party to over the last few weeks, not much has changed since it was published so I thought I would repost it as a prologue for a new series of blog posts about risk, risk assessment and risk management.

Read More