Before you think about working with me, take a look at what I’ve done for my existing clients. If you like what you see, go ahead and get in touch.

Case Studies

CIHS Assessment Helps Plymouth University Prepare for ISO20000 Certification (CIH Solutions)

CIHS Consultants Help CJC Ltd Select, Configure & Implement ITSM Solution (CIH Solutions)

Articles

Threat Intelligence

3 Signs Your Information Security Team Needs Threat Intelligence (Recorded Future)

Improve Your Threat Intelligence Strategy with These Ideas (Recorded Future)

Threat Intelligence Tweaks That’ll Take Your Security to the Next Level (Recorded Future)

Proactive Defense: Understanding the 4 Main Threat Actor Types (Recorded Future)

Top 6 Sources for Identifying Threat Actor TTPs (Recorded Future)

6 Surprising Benefits of Threat Intelligence From the Web (Recorded Future)

How Analyzing Threat Actor TTPs Can Bolster Your Information Security Program (Recorded Future)

 

Vulnerability Management

The Minimalist Guide to Vulnerability Management (Trace Security)

Vulnerability Management Research: How To Invest Your Resources for Maximum Results (Trace Security)

How to Approach Vulnerability Management: The View From 10,000 Feet (Trace Security)

How To Start Your Vulnerability Management Off With a Bang: Roles and Responsibilities (Trace Security)

The 10 Step Checklist for Pain-Free Vulnerability Management (Trace Security)

5 Common Vulnerability Management Mistakes… and How To Avoid Them (Trace Security)

An Expert’s Take on Vulnerability Management (Trace Security)

Conquer Vulnerability Management with TraceCSO (Trace Security)

 

PCI DSS Compliance

PCI Compliance: What, Who, and How? (Trace Security)

How To Conduct a PCI DSS Risk Assessment (Even if You Have No Idea What You’re Doing) (Trace Security)

How To Manage Your PCI DSS Security Policy… And Why That Isn’t Enough (Trace Security)

Why Most PCI Training Programs Are Ineffective… And What To Do About It (Trace Security)

How To Conduct PCI Penetration Tests for Security & Compliance (Trace Security)

 

Phishing

How To Make the Most of Reported Phishing Emails… Even if There are Way Too Many (PhishLabs)

Phishing, Whaling & The Surprising Importance Of Privileged Users (PhishLabs/Dark Reading)

Why Your Users Keep Falling for Phishing Scams (PhishLabs)

Hitting Back Against Security Awareness Training Nay Sayers (PhishLabs)

Why Some Phishing Emails Will Always Get Through Your Spam Filter (PhishLabs)

 

Ransomware

The Anatomy of a Successful Ransomware Attack (PhishLabs)

A Spotter’s Guide to Ransomware (PhishLabs)

How to Defend Against Ransomware: The Three Stages (PhishLabs)

So You’ve Been Infected with Ransomware… (PhishLabs)

 

Security Awareness Training

How To Develop Security Awareness Training That Works (Trace Security)

How to Convince Your Employees to Take Identity Management Seriously (Trace Security)

Designing Physical Security Awareness Training (That Won’t Be Forgotten in Five Minutes) (Trace Security)