“Ian is a unique, no frills, no nonsense type of leader that has an incredible ability to identify an issue from a high level and then quickly / efficiently transition into getting his hands dirty to solve the issue with mutual benefit for both his client and his own organization. Ian is a methodical, organized and dedicated sales & operations leader that WILL run a large organization someday. He is a leader who you can turn the keys over to and allow his insights and critical thinking to take over and produce results. Ian's decision making and leadership are his leading attributes and because of the care and hard work he puts in, he is quickly able to motivate, align and inspire his team. I would strongly recommend Ian and any organization would benefit greatly from his leadership and creative thinking. Ian is already very accomplished but is also just getting started.”
Sign in to view Ian’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
London Area, United Kingdom
Contact Info
Sign in to view Ian’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
2K followers
500+ connections
Sign in to view Ian’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Ian
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Ian
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Sign in to view Ian’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Recommendations received
1 person has recommended Ian
Join now to viewView Ian’s full profile
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
-
Rich Best
LondonConnect -
Daryl Cornelius
Building Data Driven, Predictable, Scalable Go to Market Teams
PortsmouthConnect -
Steve Norman
CalverleyConnect -
Mitchell Powers
LondonConnect -
John Wilkinson
LondonConnect -
Ripunjaya Rawat
Associate Director-Enterprise Architect- Financial Services -Digital Transformation | Cloud| DC
WatfordConnect -
Colin McGregor
Digital Nomad & Business Creator:- Associate Partner at Takiwatanga Consulting / MLM Expert
United KingdomConnect -
Moshe Benjo
LondonConnect -
Andrew Jones
United KingdomConnect -
Mike Hills
CoventryConnect -
Darren Brackwell
Barrow-In-FurnessConnect -
Albert Saffari
General Manager at beamLive
Greater LondonConnect -
Simon Johnson
LondonConnect -
Kevin Robertson
General Manager at Bilge Adam Technologies
SheffieldConnect -
Ricardo Diniz
SpainConnect -
Martin Dean
United KingdomConnect -
Martin Darling
Greater LondonConnect -
Ross Taylor
Cyber Security Leader - Europe at DXC Technology
LondonConnect -
Pete Rhodes
West MidlandsConnect -
Eleanor Lightbody
United KingdomConnect
Explore more posts
-
Arctic Wolf
The cyber threat landscape is a constant avalanche of emerging threats and evolving attacks. To fight back, join Arctic Wolf at DTX Manchester! Find us at stand F120 and learn how to combat the uncertain threat landscape and scale the summit of cybersecurity maturity. https://ow.ly/qeFn50RqR6O #DTXM24 #EndCyberRisk
8
-
TechFinitive.com
Invite Dominic Trott, UK Director of Strategy and Alliances at Orange Cyberdefense, into your board meetings at your peril. For let’s just say he has firm views. “Unfortunately, there are still businesses that view security as a checkbox on their compliance list,” he told us. “In such cases, organisations are unable to address security as part of a broader and consistent enterprise risk management strategy.” This is why – as the title of this interview suggests – Dominic believes that security begins in the boardroom. And they must think more deeply than they currently are, making it part of their strategy rather than an add-on. Just as foolishly, they could waste money on the wrong things whilst not investing where they should: “A lack of business focus on the security strategy can lead to organisations missing out on adopting new tools and technologies that could provide a competitive advantage.” So, on second thought, perhaps you should invite Dominic to your meetings. After all, Orange Cyberdefense is Europe’s largest managed security services provider. And, Dominic himself has plenty of experience, as his answer to our first question shows. https://lnkd.in/gkQQtBTz
3
-
NGS | Next Generation Security
In an exclusive interview with Computing last week, our CISO Neil shared his insights on the latest security trends and developments. With his recent nomination for CISO of the Year, Neil's expertise and forward-thinking approach have earned him well-deserved industry recognition. 🏆 During this in-depth discussion Neil delves into the key shifts and innovations that organizations should be aware of in 2024. You can also see what he's been up to here at NGS | Next Generation Security over the last 12 months! Read the full article here to hear more from Neil and get some detailed insights! ➡ https://lnkd.in/eed9ktM2
16
-
CodeShield UK
Considered switching up your approach to Penetration Testing? CodeShield’s UK based CREST certified professionals are experts in tailored: • Web Application Assessments • Internal & External Network Testing • Mobile Application Assessments • Cloud Testing • Social Engineering Exercises Interested to learn more? Reach out now and our team will be happy to help. 📱Call us on - +44 20 4539 4508 📧Email us at - hello@codeshield.co.uk 🌐Get in touch here - www.codeshield.co.uk #cybersecurity #penetrationtesting #pentesting
5
-
Quod Orbis
Responding to the breaking news that the MoD been subject to a data breach that compromised the personal information of UK military personnel, our CEO, Martin Greenfield, shared his expert insights with i News. As Martin highlights, this breach is part of a larger trend of cyber-attacks targeting nationally sensitive data, with over half of UK organisations experiencing a breach or attack in the last year. Silos in cyber security monitoring contribute to the vulnerability of organisations, making it more challenging to identify and mitigate potential threats. To effectively combat the growing threat of cyber-attacks, organisations across both the public and private sectors must adopt a holistic and unified approach to cybersecurity. This requires dismantling the silos that often hinder communication and collaboration between different teams and departments. Read Martin's full comments in: https://lnkd.in/eKfXsyej #MoDBreach #CyberSecurity #CyberResilience #QuodOrbis
7
-
Cognisys
4-6 June 2024 ExCeL London Come say hi at stand B60 👋 We’ve got all your cyber security and compliance needs covered including: 🦉Security testing 🦉SmartScan – The Future of Vulnerability Management 🦉Compliance powered by Vanta (ISO 27001, SOC 2, CE+) #InfoSecurity #Compliance #CyberSecurity #InfosecurityEurope2024
12
-
JT Mobile Intelligence Solutions
Great to see the UK Governments new Product Security and Telecommunications Infrastructure (PSTI) regulation come into action, forcing manufacturers of internet enabled devices to follow new requirements around cyber security. At JT our IOT Cetfication Manager (ICM) focusses on similar challenges that this new law aims to address. JT ICM helps networks to identify disruptive and rogue devices by consolidating data sources to ensure only trusted and secure devices connect to networks, reducing the the risk of network infiltration by bad actors and improving network performance. Find out more about JT ICM: https://hubs.ly/Q02vnG-_0
5
1 Comment -
Richard Brooks
Read the latest Armour Communications Blog: Management of instant messaging apps is like the wild west. What are the risks to your organisation? https://lnkd.in/ePBi6UPz #cyberuk #gdpr #grc #securemessaging #instantmessagimg #deepfake #compliance #securecommunications #riskmanagement #operationalrisk
1
-
Osborne Clarke - UK
The widely reported cyber-security hack into the UK's Ministry of Defence has again raised the issue of third-party supplier security. 👨💻 Read the full article here >https://lnkd.in/e3Z-N3si In this article in leading tech title Computer Weekly, Osborne Clarke lawyer Philip Tansley explains how vulnerabilities in the supply chain can pose a risk if not managed properly. 🔎 For more information on issues and opportunities around supply chains visit our website > https://lnkd.in/eE5g-5YE #Cybersecurity
8
-
Darren Fields
Exciting announcement 📣 We are delighted to announce the upcoming IGEL Secure event in London on the 12th of June 2024—an unmissable gathering tailored just for YOU. Whether you're in enterprise or SMB, healthcare or logistics, finance or the public sector, this event promises solutions that work specifically for your needs. Join us for a day filled with insightful discussions, cutting-edge technology showcases, and unparalleled networking opportunities. At IGEL Secure, you'll gain an inside look at how we’re simplifying security, optimising endpoint strategies, and enhancing user experiences across various industries. Through curated breakout sessions spanning healthcare, the public sector, finance, and modern workplace strategies, attendees delve deep into industry-specific challenges and opportunities, gaining practical insights and fostering meaningful relationships. Navigate through the innovation showcase, where the latest advancements in security, endpoint strategies, and user experiences are showcased. Engage with sponsors, industry leaders, and peers in authentic conversations that go beyond surface-level networking, laying the foundation for lasting connections and collaborations. As the day unfolds, participants find themselves immersed in a collaborative environment where knowledge is shared freely, and expertise is valued. Through genuine interactions and shared experiences, attendees cultivate a sense of camaraderie and support that extends far beyond the confines of the event. IGEL Secure isn't just about what happens during those transformative hours—it's about the lasting impact to leverage the insights gained and relationships forged, attendees will be equipped to navigate the complexities of their respective industries. Join us at IGEL Secure on a journey of growth, connection, and professional development. Please register to reserve your place. #IGEL #EUC #Connection https://lnkd.in/e8XviQ9j
18
-
CyberWhite Ltd
Data breaches and device losses within UK government departments have potentially put the information of over 10,000 customers at risk😰 What recommendations can you follow to avoid becoming a stat?👇 We're here to help. 1. Check - "HaveIBeenPwned" is a great free tool for users to check if their email / password is compromised; if so, change their passwords promptly. 2. MFA - Many re-use the same passwords between accounts. An extra layer of authentication can be enough to stop a threat actor and alert a user of an attempted login. 3. Caution - Leaked data can be utilised for other attack vectors, such as phishing. Users should remain vigilant when anyone online asks for their information. Verify the requester is legitimate (i.e. Bank asks for details via email, call them up to check it's them). Get in contact today 🔗 https://loom.ly/fHi7t30 #CyberSecurity #Cyber #Security #DataLeak #DataProtection
1 Comment -
IFB
Last week, King Charles introduced a pivotal bill for the Tech sector at the opening of the UK Parliament: 𝐭𝐡𝐞 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐞𝐬𝐢𝐥𝐢𝐞𝐧𝐜𝐞 𝐁𝐢𝐥𝐥. This bill aims to help strengthen the UK's cyber defences and ensure that critical infrastructure and the digital services that companies rely on are secure. It covers three main areas: 🔒 𝐒𝐭𝐫𝐞𝐧𝐠𝐭𝐡𝐞𝐧𝐢𝐧𝐠 𝐝𝐞𝐟𝐞𝐧𝐜𝐞𝐬 𝐫𝐮𝐥𝐞𝐬 ensuring critical infrastructure and digital services are secure 🔒 𝐈𝐦𝐩𝐥𝐞𝐦𝐞𝐧𝐭𝐢𝐧𝐠 𝐦𝐨𝐫𝐞 𝐜𝐨𝐦𝐩𝐫𝐞𝐡𝐞𝐧𝐬𝐢𝐯𝐞 𝐦𝐨𝐧𝐢𝐭𝐨𝐫𝐢𝐧𝐠 𝐚𝐧𝐝 𝐝𝐞𝐟𝐞𝐧𝐬𝐢𝐯𝐞 𝐦𝐞𝐚𝐬𝐮𝐫𝐞𝐬 🔒 𝐈𝐧𝐜𝐫𝐞𝐚𝐬𝐢𝐧𝐠 𝐢𝐧𝐜𝐢𝐝𝐞𝐧𝐭 𝐫𝐞𝐩𝐨𝐫𝐭𝐢𝐧𝐠 for better attack responses. If you are looking for strategies to help improve your IT and cyber security, get in touch with our team. 📞 0845 270 2101 📧 geton@ifb.net 🌐 www.ifb.net #CyberSecurity #CyberResilience #KingsSpeech Graeme Gordon Jana Vidis Mark Kuszpit Jessa Newton-Cook Gary Wilson
7
-
iCyberDefence
According to The Record, the UK government is planning to make reporting of #Ransomware attacks mandatory and to require a licence to be obtained before making ransom payments. The consultation - due to start next month - is also set to propose banning extortion payments by #CriticalNationalInfrastructure bodies. Are these proposals you would support? #Malware #Cybersecurity
14
-
Center for Cybersecurity Policy and Law
Exciting news in the world of tech security! Today, the UK's Product Security and Telecoms Infrastructure (PSTI) Act officially comes into effect. Whether you're a manufacturer, retailer, or consumer, understanding its implications is crucial. Dive into the details in our latest blog post: https://lnkd.in/eJjJ5TXG #PSTIAct #Cybersecurity
2
-
Technology Regulation Forum
💡 The UK's Product Security and Telecommunications Infrastructure Act 2022 (the "PSTI Act") came into effect on 29 April 2024. It is the UK’s new consumer products cybersecurity regime and aims to ensure that UK consumers are not put at risk by insecure technology products. In this Q&A, Aonghus Heatley and Frankie Everitt address the requirements of the PSTI Act for products such as smartphones, smart TVs, smart speakers, connected baby monitors and connected alarm systems. If you are a manufacturer, importer or retailer of smart products, watch the video to learn more. Fieldfisher #Cybersecurity #ConnectableProducts #PSTI #IoT #SmartDevices
23
-
Fieldfisher
💡 The UK's Product Security and Telecommunications Infrastructure Act 2022 (the "PSTI Act") came into effect on 29 April 2024. It is the UK’s new consumer products cybersecurity regime and aims to ensure that UK consumers are not put at risk by insecure technology products. In this Q&A, Aonghus Heatley and Frankie Everitt address the requirements of the PSTI Act for products such as smartphones, smart TVs, smart speakers, connected baby monitors and connected alarm systems. If you are a manufacturer, importer or retailer of smart products, watch the video to learn more. #Cybersecurity #ConnectableProducts #PSTI #IoT #SmartDevices
31
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More