Who am I?
Import from wordpress feed
March 07, 2023
The post Who am I? appeared first on Oscar O'Connor.
See publication
Tags: Cybersecurity, Risk Management
Email Security – Are your teams secure?
Import from wordpress feed
May 05, 2022
Email security is a big deal with the recent data breaches and hacks appearing in the news daily, but many business owners don’t know how to secure their email. In this blog post, we’ll go over what you need to do to keep your teams safe from cybercriminals and data breaches. We’ll
See publication
Tags: Cybersecurity, Risk Management
Work from home – Do you have it all figured out?
Import from wordpress feed
May 05, 2022
In the modern digital age, working from home is a reality for many people. But with so many opportunities to work remotely, it’s important to take steps to protect your company data and keep it secure. This blog post will explore some of the best practices you can follow when working from home
See publication
Tags: Cybersecurity, Risk Management
Security Culture – It takes the whole team
Import from wordpress feed
May 05, 2022
A security culture is defined as “the set of shared beliefs among members of an organization about how they should act to protect themselves and the organization from harm” . It is created by leaders, managers, employees, and customers. If your team doesn’t have a security culture
See publication
Tags: Cybersecurity, Risk Management
A common sense approach to risk assessment
Import from wordpress feed
May 05, 2022
Before we begin A word to the wise There are circumstances, for example in complex systems engineering, where there are extensive sources of data on mean time between failures and so on which can support detailed and scientific assessment of risk. The purpose of this paper is to help people new to r
See publication
Tags: Cybersecurity, Risk Management
What are we not seeing?
Import from wordpress feed
May 05, 2022
Managing cyber risk beyond the obvious One of the most frustrating aspects of the cybersecurity landscape is the number of risk factors that are not visible at ground level, particularly those related to human factors. As humans, the way we view, assess and manage risk is quite different across coun
See publication
Tags: Cybersecurity, Risk Management
Seeing the wood for the trees
Import from wordpress feed
May 05, 2022
What do woods and trees have to do with Cybersecurity? The need for perspective. That and being able to understand the context in which things are happening. The online world is highly complex, it is volatile, ambiguous and often hard if not impossible to determine whether what we are seeing is real
See publication
Tags: Cybersecurity, Risk Management
Seeing the forest, focusing on the trees
The Cyber Eagles Podcast
January 07, 2022
This blog is about understanding, assessing and managing risk. We chose the title because it encapsulates one of the essential factors in effective risk management - understanding the context in which risk might materialise. It also implies that there will be different perspectives from different individuals.
See publication
Tags: Cybersecurity, Culture, Risk Management
What are we not seeing?
The Cyber Eagles Podcast
December 03, 2021
One of the most frustrating aspects of the cybersecurity landscape is the number of risk factors that are not visible at ground level, particularly those related to human factors.
As humans, the way we view, assess and manage risk is quite different across countries, regions, cultures, sectors, organisations, and even teams within the same organisation. Typically, risk management in cyber security has been focused on technical risk rather than business or human factors.
See publication
Tags: Cybersecurity, Culture, Security
A common sense approach to risk management
The Cyber Eagles Podcast
November 24, 2021
There are circumstances, for example in complex systems engineering, where there are extensive sources of data on mean time between failures and so on which can support detailed and scientific assessment of risk. The purpose of this paper is to help people new to risk assessment and management to approach the discipline for a business, a charity, a project or other endeavour where such data are neither available nor particularly relevant.
See publication
Tags: Culture, Cybersecurity, Risk Management
Why Security needs to stop blaming the end user
British Computer Society
September 14, 2021
An appeal to the technology industries to embed security and privacy into all systems from the design stage and stop placing the blame for security incidents so consistently at the door of the end user, when a major proportion of such attacks could and should have been prevented before the user ever saw the tempting link, file or whatever.
See publication
Tags: Cybersecurity, Design Thinking, Culture
Playing The Triangles (Part 2) – A New Approach to Business Transformation
Corix Partners
July 22, 2021
A New Approach for a Changing World?
The hardships and privations of 15 months (and counting) of pandemic lockdown in many developed countries has forced leaders in government, politics, industry, manufactures and commerce to adopt unfamiliar and, in some cases, unwelcome changes in approach.
See publication
Tags: Cybersecurity, Digital Transformation, Leadership
Playing The Triangles (Part 1) – Experiences of the Dynamics of Business Transformation
Corix Partners
July 15, 2021
When I started out in project management, my first mentor taught me about the mislabelled “Project Manager’s Dilemma”. He used to summarise it as being able to deliver a project or product quickly, cheaply or of high quality… but I could only pick two.
See publication
Tags: Cybersecurity, Digital Transformation, Change Management
Security & Resilience post COVID
The Security Company (International) Limited
June 14, 2021
An assessment of the lessons that could be learned for cybersecurity and business resilience as a result of the experiences of the COVID-19 global pandemic.
See publication
Tags: Business Continuity, COVID19, Cybersecurity
Connecting the dots; behaviour, reputation and the skills shortage
British Computer Society
July 06, 2015
An experience-based article on the issues affecting the ability of the technology sector to attract and retain new entrants due to the poor reputation of the sector for major failures, including an assessment of some of the behavioural factors contributing to those failures.
See publication
Tags: Change Management, Procurement, Project Management
Standards in the Supply Chain
Business Continuity Institute
July 02, 2007
An experience-based article on the benefits of consistent application of standards for security, continuity, risk management etc up and down the supply chain.
See publication
Tags: Business Continuity, Risk Management, Supply Chain
The Cyber Eagles Podcast
The Cyber Eagles Podcast
December 03, 2021
he Cyber Eagles Podcast, the only place where you will hear a people-centric narrative about building safer cyber security cultures. Oscar is a vastly experienced cybersecurity leader with a track record of helping organizations manage cyber risk. Nadja is a former Senior Executive at NATO, the world’s largest security and crisis management organization, who dealt with cyber risk as if lives depended on it.
See publication
Tags: Cybersecurity, Culture, Security
Cyber Eagles Festive Special
Spotify
December 03, 2021
Oscar & Nadja talk about the risks and scams to be aware of around the festive period
See publication
Tags: Cybersecurity, Culture, Security
What are we not seeing?
Spotify
November 29, 2021
Oscar & Nadja talk about what we are not seeing in Cyber Security.
See publication
Tags: Culture, Cybersecurity, Security
Where do we begin?
Spotify
November 29, 2021
Oscar & Nadja talk about stakeholder engagement
See publication
Tags: Culture, Cybersecurity, Security
Welcome to the Cyber Eagle Podcast
Spotify
November 09, 2021
The place to hear a people-centric narrative about building safer cyber security cultures.
See publication
Tags: Culture, Cybersecurity, Security
Tackling gender inequality in cybersecurity
Spotify
May 06, 2022
Today we're joined by Dr. Jane Frankland is an award-winning leader, best-selling author, speaker and women's change agent. She has spent over 24 years in cybersecurity, becoming one of the most celebrated female cybersecurity influencers in the world.
UNESCO has called her a trailblazing woman in tech. Jane has built her own global hacking firm in the 90s, she worked as an executive for some of the world's well, most well-known consultancies. Today, she's on a mission to make women in cyber the standard, not an exception. She does this through her writing keynotes consulting scholarships, and a brand new we're in the platform, the source, which is very exciting stuff.
The theme for this whole series is humanising cyber resilience. And part of that is about breaking down the barriers and the gender discrimination. Let's call a spade a spade that prevents so many women with great potential, both joining the industry and rising through the ranks. This is where Jane has been focusing for quite some time.
See publication
Tags: Cybersecurity, Digital Transformation, Diversity and Inclusion
Misinformation, disinformation and fake news
Spotify
April 22, 2022
It started with the 2016 presidential campaign in the US where it became part of the common parlance that there 's was this thing that we called fake news, which seemed to be an opinion, I don't like from the commentator. But we've also seen significant campaigns coming out of other countries, particularly in the run up to the invasion of Ukraine, and so on. So, Sarah, as the Chief Scientist, chief security adviser to Microsoft, in this part of the world, clearly has an inside track, which, we thought, would be very interesting to our listeners. And so Sarah, if you'd like to kind of throw the starter for 10 in there with how do we tell the difference between something, or how do we, how do we identify as an ordinary, an ordinary Joe or Josephine on the street, looking at stuff coming through the web or news channels? How on earth do we work out whether we're listening to effectively the truth or propaganda?
See publication
Tags: Cybersecurity, Digital Transformation, Security
Focus on long-term vision with short-term tactics
Spotify
January 07, 2022
A discussion on how our short-term risk and cybersecurity management tactics must always be informed by the overall long-term vision
See publication
Tags: Cybersecurity, Culture, Risk Management
Stop appealing to fear
Spotify
December 20, 2021
A discussion on stakeholder engagement and how the old tactics of spreading fear, uncertainty and doubt have no place in a modern conversation about security and risk management solutions
See publication
Tags: Cybersecurity, Culture, Risk Management
Why laser-focus eyesight matters
Spotify
December 13, 2021
A discussion on how the ability to focus on specific targets without being distracted by surrounding events can make the difference between success and failure
See publication
Tags: Culture, Cybersecurity, Risk Management
Seeing the forest, focusing on the trees
Spotify
December 06, 2021
A discussion on how specific tasks always must be viewed in their proper and actual context so that as the context evolves, so can the actions to reflect those changes
See publication
Tags: Culture, Cybersecurity, Risk Management
Becoming comfortable with being uncomfortable
Spotify
December 06, 2021
A discussion on how cyber threats evolve at such a pace and at such volume that we cannot ever afford to relax and consider our work complete, including coping strategies and ways in which we can thrive on ambiguity and constant change
See publication
Tags: Culture, Cybersecurity, Risk Management
Cyber Eagles Festive Special
Spotify
December 06, 2021
A discussion on how we can keep ourselves and our loved ones safe online
See publication
Tags: Culture, Cybersecurity, Risk Management
Where do we begin
Spotify
December 06, 2021
A discussion on how to get started with cybersecurity and risk management
See publication
Tags: Culture, Cybersecurity, Risk Management
What are we not seeing?
Spotify
December 06, 2021
A discussion on how cybersecurity threats are not always obvious and how to cope with that unpleasant reality
See publication
Tags: Culture, Cybersecurity, Risk Management
Welcome to the Cyber Eagles Podcast
Spotify
December 06, 2021
Introducing the Cyber Eagles and our desire to discuss and manage cybersecurity from a human perspective
See publication
Tags: Culture, Cybersecurity, Risk Management
Lessons for security and resilience from the COVID-19 Pandemic
Security Awareness Special Interest Group
June 23, 2021
Reflections on how working life for a security and resilience professional has changed through the period of the pandemic, and how the wider world of work in the knowledge economy has changed, discussing some of the lessons that the security and resilience sector could learn from this experience.
See publication
Tags: Risk Management, COVID19, Security