Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Oscar O'Connor

Founder & Chief Storyteller at Oscar O'Connor & Company Limited

Oxford, United Kingdom

After more than 30 years working in information technology and (cyber) security I have developed a passion for ensuring customers get what they need from the technology products and services they invest so heavily in. I believe very strongly that customers should be entitled to expect systems to be secure, resilient and should have performance, sustainability, security and privacy designed in from the earliest concept stages.

I can and will help you see through the snake oil, smoke and mirrors to turn your aspirations into achievable, structured and fully costed strategies, tactics and plans on whatever scale is appropriate to your business. I want to help you articulate why you do what you do, help you enthuse and captivate your people and external stakeholders to deliver tangible, beneficial growth. I am particularly interested in working with B Corporations where purpose has an equal priority to profit.

I have seen the benefits of this approach on numerous occasions during my career, but sadly it is not always compatible with corporate objectives prioritising shareholder value over customer success and employee wellbeing. I happily admit that initial costs for most projects would increase, but know from experience that the lifetime costs will be dramatically lower.

The experience for team members in this approach is also massively and demonstrably improved as they have fewer fires to fight and errors to correct so can spend their time and energy making the small and regular improvements that keep our products and services delivering success for our customers.

If you want to talk about how to make this inclusive, aware and people-focused approach to delivering customer success - let’s talk. I am open to part-time advisory and non-executive roles at flexible rates.

Bringing together people, processes and technology to deliver business outcomes is my prime speciality and I am looking to share my experience as a board advisor or NED with technology-dependent organisations needing to grow without compromising the safety, security, resilience or wellbeing of their staff, customers and suppliers

Key skillsets:
- Information technology
- Cybersecurity
- Risk management
- Business continuity and operational resilience
- Security architecture
- Cloud security
- Network security
- Application Security
- Identity and Access Management
- Infrastructure Security
- Data Protection & Privacy
- Coaching and mentoring
- Leadership
- Profitability
- Professional services

In terms of professorial credentials, I am a Fellow of the British Computer Society, a professional Member of the Chartered Institute of Information Security and the Business Continuity Institute, a Chartered Engineer, Chartered IT Professional, Fellow of the RSA, Certified Information Security Manager and Certified Data Privacy Solutions Engineer.

I have been published by the British Computer Society (BCS), the Business Continuity Institute (BCI), Continuity Insurance and Risk, and IT Week amongst others and has spoken at conferences and seminars on Information Security, Risk Management and Business Continuity for organisations such as the CBI, the BCI, the BCS, IAAC, SASIG, the Superyacht Security Forum, and the Public Policy Exchange.

Available For: Advising, Authoring, Consulting, Speaking
Travels From: Oxford, United Kingdom
Speaking Topics: cybersecurity, sustainability & resilience, risk management

Speaking Fee $5,000 (In-Person)

Oscar O'Connor Points
Academic 0
Author 91
Influencer 49
Speaker 62
Entrepreneur 0
Total 202

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Theatre: UK and Europe
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed
Media Experience: 25
Last Media Training: 12/31/1969
Last Media Interview: 08/02/2021

Areas of Expertise

Agile
Business Continuity 41.51
Business Strategy
Change Management 32.29
Cloud
CSR
Customer Experience
Cybersecurity 33.50
Data Center
Design Thinking 30.05
Digital Disruption 30.14
Digital Transformation 30.18
Diversity and Inclusion 30.36
Future of Work
Innovation
IoT
Leadership 30.06
Management
Marketing
Privacy
Procurement 30.04
Project Management 30.11
Retail
Risk Management 44.37
Sales
Startups
Sustainability
Supply Chain 30.04
Culture 31.11
COVID19 31.09
Security 31.82

Industry Experience

Aerospace & Defense
Automotive
Consumer Products
Engineering & Construction
Federal & Public Sector
Financial Services & Banking
Forest Products & Paper
Healthcare
High Tech & Electronics
Higher Education & Research
Insurance
Manufacturing
Media
Oil & Gas
Pharmaceuticals
Professional Services
Retail
Telecommunications
Travel & Transportation
Utilities

Publications

16 Article/Blogs
Who am I?
Import from wordpress feed
March 07, 2023
The post Who am I? appeared first on Oscar O'Connor.

See publication

Tags: Cybersecurity, Risk Management

Email Security – Are your teams secure?
Import from wordpress feed
May 05, 2022
Email security is a big deal with the recent data breaches and hacks appearing in the news daily, but many business owners don’t know how to secure their email. In this blog post, we’ll go over what you need to do to keep your teams safe from cybercriminals and data breaches. We’ll

See publication

Tags: Cybersecurity, Risk Management

Work from home – Do you have it all figured out?
Import from wordpress feed
May 05, 2022
In the modern digital age, working from home is a reality for many people. But with so many opportunities to work remotely, it’s important to take steps to protect your company data and keep it secure. This blog post will explore some of the best practices you can follow when working from home

See publication

Tags: Cybersecurity, Risk Management

Security Culture – It takes the whole team
Import from wordpress feed
May 05, 2022
A security culture is defined as “the set of shared beliefs among members of an organization about how they should act to protect themselves and the organization from harm” . It is created by leaders, managers, employees, and customers. If your team doesn’t have a security culture

See publication

Tags: Cybersecurity, Risk Management

A common sense approach to risk assessment
Import from wordpress feed
May 05, 2022
Before we begin A word to the wise There are circumstances, for example in complex systems engineering, where there are extensive sources of data on mean time between failures and so on which can support detailed and scientific assessment of risk. The purpose of this paper is to help people new to r

See publication

Tags: Cybersecurity, Risk Management

What are we not seeing?
Import from wordpress feed
May 05, 2022
Managing cyber risk beyond the obvious One of the most frustrating aspects of the cybersecurity landscape is the number of risk factors that are not visible at ground level, particularly those related to human factors. As humans, the way we view, assess and manage risk is quite different across coun

See publication

Tags: Cybersecurity, Risk Management

Seeing the wood for the trees
Import from wordpress feed
May 05, 2022
What do woods and trees have to do with Cybersecurity? The need for perspective. That and being able to understand the context in which things are happening. The online world is highly complex, it is volatile, ambiguous and often hard if not impossible to determine whether what we are seeing is real

See publication

Tags: Cybersecurity, Risk Management

Seeing the forest, focusing on the trees
The Cyber Eagles Podcast
January 07, 2022
This blog is about understanding, assessing and managing risk. We chose the title because it encapsulates one of the essential factors in effective risk management - understanding the context in which risk might materialise. It also implies that there will be different perspectives from different individuals.

See publication

Tags: Cybersecurity, Culture, Risk Management

What are we not seeing?
The Cyber Eagles Podcast
December 03, 2021
One of the most frustrating aspects of the cybersecurity landscape is the number of risk factors that are not visible at ground level, particularly those related to human factors.

As humans, the way we view, assess and manage risk is quite different across countries, regions, cultures, sectors, organisations, and even teams within the same organisation. Typically, risk management in cyber security has been focused on technical risk rather than business or human factors.

See publication

Tags: Cybersecurity, Culture, Security

A common sense approach to risk management
The Cyber Eagles Podcast
November 24, 2021
There are circumstances, for example in complex systems engineering, where there are extensive sources of data on mean time between failures and so on which can support detailed and scientific assessment of risk. The purpose of this paper is to help people new to risk assessment and management to approach the discipline for a business, a charity, a project or other endeavour where such data are neither available nor particularly relevant.

See publication

Tags: Culture, Cybersecurity, Risk Management

Why Security needs to stop blaming the end user
British Computer Society
September 14, 2021
An appeal to the technology industries to embed security and privacy into all systems from the design stage and stop placing the blame for security incidents so consistently at the door of the end user, when a major proportion of such attacks could and should have been prevented before the user ever saw the tempting link, file or whatever.

See publication

Tags: Cybersecurity, Design Thinking, Culture

Playing The Triangles (Part 2) – A New Approach to Business Transformation
Corix Partners
July 22, 2021
A New Approach for a Changing World?
The hardships and privations of 15 months (and counting) of pandemic lockdown in many developed countries has forced leaders in government, politics, industry, manufactures and commerce to adopt unfamiliar and, in some cases, unwelcome changes in approach.

See publication

Tags: Cybersecurity, Digital Transformation, Leadership

Playing The Triangles (Part 1) – Experiences of the Dynamics of Business Transformation
Corix Partners
July 15, 2021
When I started out in project management, my first mentor taught me about the mislabelled “Project Manager’s Dilemma”. He used to summarise it as being able to deliver a project or product quickly, cheaply or of high quality… but I could only pick two.

See publication

Tags: Cybersecurity, Digital Transformation, Change Management

Security & Resilience post COVID
The Security Company (International) Limited
June 14, 2021
An assessment of the lessons that could be learned for cybersecurity and business resilience as a result of the experiences of the COVID-19 global pandemic.

See publication

Tags: Business Continuity, COVID19, Cybersecurity

Connecting the dots; behaviour, reputation and the skills shortage
British Computer Society
July 06, 2015
An experience-based article on the issues affecting the ability of the technology sector to attract and retain new entrants due to the poor reputation of the sector for major failures, including an assessment of some of the behavioural factors contributing to those failures.

See publication

Tags: Change Management, Procurement, Project Management

Standards in the Supply Chain
Business Continuity Institute
July 02, 2007
An experience-based article on the benefits of consistent application of standards for security, continuity, risk management etc up and down the supply chain.

See publication

Tags: Business Continuity, Risk Management, Supply Chain

1 Book
PAS 77: Code of Practice for IT Service Continuity Management
British Standards Institution
August 11, 2006
The first informal standard for IT Service Continuity Management. Within 18 months this was upgraded to become a formal standard BS25777.

See publication

Tags: Change Management, Risk Management, Business Continuity

2 Keynotes
Engaging with the National Cyber Security Strategy: Working in Partnership to Reduce Risk in the Digital Age
Public Policy Exchange
May 23, 2017
Keynote presentation on how industry, academia and the civil society need to engage effectively with the national cyber security strategy in order for it to be successful.

See publication

Tags: Culture, Cybersecurity, Risk Management

Information Security at Sea
ECDIS Forum
March 08, 2012
An assessment of the factors affecting cybersecurity in the super- and mega-yacht sector.

See publication

Tags: Cybersecurity, Risk Management

1 Media Interview
Oscar O'Connor and JC Gaillard on Security Transformation, Covid-19, People and Trust
Anchor
August 12, 2021
JC Gaillard is joined by Oscar O'Connor to discuss "Playing the Triangles", his latest piece on the Corix Partners blog: A reflection on business and security transformation dynamics in the post-covid era

See publication

Tags: Cybersecurity, Digital Transformation, Leadership

5 Podcasts
The Cyber Eagles Podcast
The Cyber Eagles Podcast
December 03, 2021
he Cyber Eagles Podcast, the only place where you will hear a people-centric narrative about building safer cyber security cultures. Oscar is a vastly experienced cybersecurity leader with a track record of helping organizations manage cyber risk. Nadja is a former Senior Executive at NATO, the world’s largest security and crisis management organization, who dealt with cyber risk as if lives depended on it.

See publication

Tags: Cybersecurity, Culture, Security

Cyber Eagles Festive Special
Spotify
December 03, 2021
Oscar & Nadja talk about the risks and scams to be aware of around the festive period

See publication

Tags: Cybersecurity, Culture, Security

What are we not seeing?
Spotify
November 29, 2021
Oscar & Nadja talk about what we are not seeing in Cyber Security.

See publication

Tags: Culture, Cybersecurity, Security

Where do we begin?
Spotify
November 29, 2021
Oscar & Nadja talk about stakeholder engagement

See publication

Tags: Culture, Cybersecurity, Security

Welcome to the Cyber Eagle Podcast
Spotify
November 09, 2021
The place to hear a people-centric narrative about building safer cyber security cultures.

See publication

Tags: Culture, Cybersecurity, Security

2 Speaking Engagements
Cyber Eagles' perspective on the security landscape
Spotify
April 19, 2022

See publication

Tags: Cybersecurity, Digital Transformation, Security

Could cybercrime kill the information age?
eCrime Congress
April 12, 2013
An assessment of the advance of cybercrime and the risks it poses to the ongoing development and spread of information services for business, commerce, leisure, entertainment and sociability

See publication

Tags: Cybersecurity, Digital Disruption, Risk Management

12 Webinars
Tackling gender inequality in cybersecurity
Spotify
May 06, 2022
Today we're joined by Dr. Jane Frankland is an award-winning leader, best-selling author, speaker and women's change agent. She has spent over 24 years in cybersecurity, becoming one of the most celebrated female cybersecurity influencers in the world.

UNESCO has called her a trailblazing woman in tech. Jane has built her own global hacking firm in the 90s, she worked as an executive for some of the world's well, most well-known consultancies. Today, she's on a mission to make women in cyber the standard, not an exception. She does this through her writing keynotes consulting scholarships, and a brand new we're in the platform, the source, which is very exciting stuff.

The theme for this whole series is humanising cyber resilience. And part of that is about breaking down the barriers and the gender discrimination. Let's call a spade a spade that prevents so many women with great potential, both joining the industry and rising through the ranks. This is where Jane has been focusing for quite some time.

See publication

Tags: Cybersecurity, Digital Transformation, Diversity and Inclusion

Misinformation, disinformation and fake news
Spotify
April 22, 2022
It started with the 2016 presidential campaign in the US where it became part of the common parlance that there 's was this thing that we called fake news, which seemed to be an opinion, I don't like from the commentator. But we've also seen significant campaigns coming out of other countries, particularly in the run up to the invasion of Ukraine, and so on. So, Sarah, as the Chief Scientist, chief security adviser to Microsoft, in this part of the world, clearly has an inside track, which, we thought, would be very interesting to our listeners. And so Sarah, if you'd like to kind of throw the starter for 10 in there with how do we tell the difference between something, or how do we, how do we identify as an ordinary, an ordinary Joe or Josephine on the street, looking at stuff coming through the web or news channels? How on earth do we work out whether we're listening to effectively the truth or propaganda?

See publication

Tags: Cybersecurity, Digital Transformation, Security

Focus on long-term vision with short-term tactics
Spotify
January 07, 2022
A discussion on how our short-term risk and cybersecurity management tactics must always be informed by the overall long-term vision

See publication

Tags: Cybersecurity, Culture, Risk Management

Stop appealing to fear
Spotify
December 20, 2021
A discussion on stakeholder engagement and how the old tactics of spreading fear, uncertainty and doubt have no place in a modern conversation about security and risk management solutions

See publication

Tags: Cybersecurity, Culture, Risk Management

Why laser-focus eyesight matters
Spotify
December 13, 2021
A discussion on how the ability to focus on specific targets without being distracted by surrounding events can make the difference between success and failure

See publication

Tags: Culture, Cybersecurity, Risk Management

Seeing the forest, focusing on the trees
Spotify
December 06, 2021
A discussion on how specific tasks always must be viewed in their proper and actual context so that as the context evolves, so can the actions to reflect those changes

See publication

Tags: Culture, Cybersecurity, Risk Management

Becoming comfortable with being uncomfortable
Spotify
December 06, 2021
A discussion on how cyber threats evolve at such a pace and at such volume that we cannot ever afford to relax and consider our work complete, including coping strategies and ways in which we can thrive on ambiguity and constant change

See publication

Tags: Culture, Cybersecurity, Risk Management

Cyber Eagles Festive Special
Spotify
December 06, 2021
A discussion on how we can keep ourselves and our loved ones safe online

See publication

Tags: Culture, Cybersecurity, Risk Management

Where do we begin
Spotify
December 06, 2021
A discussion on how to get started with cybersecurity and risk management

See publication

Tags: Culture, Cybersecurity, Risk Management

What are we not seeing?
Spotify
December 06, 2021
A discussion on how cybersecurity threats are not always obvious and how to cope with that unpleasant reality

See publication

Tags: Culture, Cybersecurity, Risk Management

Welcome to the Cyber Eagles Podcast
Spotify
December 06, 2021
Introducing the Cyber Eagles and our desire to discuss and manage cybersecurity from a human perspective

See publication

Tags: Culture, Cybersecurity, Risk Management

Lessons for security and resilience from the COVID-19 Pandemic
Security Awareness Special Interest Group
June 23, 2021
Reflections on how working life for a security and resilience professional has changed through the period of the pandemic, and how the wider world of work in the knowledge economy has changed, discussing some of the lessons that the security and resilience sector could learn from this experience.

See publication

Tags: Risk Management, COVID19, Security

Thinkers360 Credentials

5 Badges

Radar

Blog

Opportunities

Contact Oscar O'Connor

Book Oscar O'Connor for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Oscar O'Connor