You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Roger Smith
SME's Virtual Chief Information Security Officer (CISO) at Care MIT
Canberra, Australia
Are you feeling stressed, overwhelmed and frustrated with how to keep your organisation safe from the digital world?
Are you looking for a better way to navigate the minefield associated with business security and Cyber Risk?
Do you want to know how to protect your organisation from cybercriminals, hackers and script kiddies?
Building digital security into your business takes time, money and expertise, but most importantly, you need really good advice.
Talk to me for that good advice!
Roger Smith is funny, scary, on point and is focused on one thing - increasing everyone's awareness and understanding of the problems and issues associated with the digital or cyber world.
Roger is a veteran and an expert at creating and managing personal, digital and business security solutions for home users, SME's and not-for-profit organisations. He is focused on building them into more secure and resilient businesses.
Roger knows that the only way to defeat the cybercriminal, using the teachings of Sun Tzu, is to understand our enemy and how they target us. To ensure that we, our organisations and / or our clients are not the low-hanging fruit of the cyber world.
As well to his normal CEO activities for R & I ICT Consulting Services, Roger teaches at the Australian Defence Force Academy where he delivers the compulsory undergraduate course in cybersecurity. This course is where the students learn, using hands on experience, how cybercriminals work and how dangerous they can be.
Available For: Advising, Authoring, Consulting, Influencing, Speaking Travels From: Canberra Speaking Topics: Cybersecurity, Business security, awareness, culture
Speaking Fee
$1,980 (In-Person)
Roger Smith
Points
Academic
0
Author
276
Influencer
169
Speaker
14
Entrepreneur
100
Total
559
Points based upon Thinkers360 patent-pending algorithm.
Thought Leader Profile
Portfolio Mix
Company Information
Care MIT
SME's Virtual Chief Information Security Officer (CISO)
The Human Factor: Why Social Engineering Outsmarts Advanced Cybersecurity Technology
LinkedIn
March 20, 2023
In today's digitally connected world, the importance of cybersecurity has grown tremendously as businesses invest heavily in advanced technology to protect their valuable assets from cyber-attacks.
Cybersecurity for Non-Profits and Associations: Protecting Your Future
Simple cybersecurity tips!
February 24, 2023
Cybersecurity is essential for any organization, but non-profits and associations face unique challenges when it comes to protecting themselves against cyber threats. These organizations operate on limited budgets, often with limited IT resources, and handle sensitive information that is attractive to cyber criminals. That's why it's critical for non-profits and associations to take proactive steps to protect their valuable data and intellectual property, reduce the risk of a successful attack, and safeguard their reputation.
Building cyber resilience into a business is essential in today's increasingly digital world.
Simple cybersecurity tips!
January 02, 2023
With the increasing reliance on technology, businesses are exposed to a wide range of cyber threats, from data breaches and ransomware attacks to phishing scams and network intrusions.
Securing office 365 - 2 FA, security defaults, train your users, separate admin accounts,
Simple cybersecurity tips!
September 14, 2022
If you are using Office365 for a business there are a number of security protocols and business requirements that can be implemented to ensure that you are not a victim of Business Email Compromise (BEC).
You need to avoid a BEC for the simple fact that if the bad guys gain access to your email portal they can do irreparable damage to your business.
Technology budgets, security in depth and banners!
Simple cybersecurity tips!
August 17, 2022
Budgets for business can be an issue.
When it comes to technology, 5-year-old computers, printers, operating systems, routers, monitoring systems, switches and mobile devices are just asking to be breached.
Data encryption, Google alerts and why you need to manage administrator access
Simple cybersecurity tips!
August 03, 2022
When everything else fails and you have implemented data encryption there is still a chance that the information that is stolen in its encryption state is unreadable by the theif.
Tags: Cybersecurity, Business Continuity, Security
Three quick tips to build security in your organisation!
Linked In
May 12, 2022
If you are concerned why not complete our 30-question audit (https:\\action.scoreapp.com). It will give you great insight into areas where you may be lacking in your security.
IOT devices, no time for security.
Linked In
October 10, 2021
Leaving the house, locking the doors, setting the alarm - we make time to be secure
In the internet of things (#IOT) space, security is often an afterthought..
DIY code platforms, make the proliferation of IOT devices easy.
An open letter to retirees and the elderly
Linked In
September 29, 2021
The problem with today's digital devices is that we (yes me included) have been forced into their use.
If we want government services we have to use a device or get some help to work out what we need to do.
If we want to stay in contact with family and friends then we need some type of digital device.
To spend, move or borrow money we need some type of digital device to access websites and accounts.
Government departments post everything on their website so you need a device to see it.
Tags: Cybersecurity, Risk Management, Diversity and Inclusion
Cybersecurity, why CEOs and Boards have it wrong
Website
September 20, 2021
When it comes to digital and business security, board members and C level executives still have it wrong.
Business security is not an IT issue although there are some IT components!
Business security is not a compliance issue but there are compliance requirements!
Business security is all about protecting your assets but before you can protect them you have to identify them
Tags: Cybersecurity, Risk Management, Business Continuity
Cybersecurity for the C suite executive
Website
September 20, 2021
Let's look at the facts!
No matter the size, shape or industry of an organisation.
No one is fully prepared for a full-on, bare-knuckle, cyber ninja assault.
We are not talking about a random attack.
An attack that is being perpetrated against your organisation with Metasploit and a new copy of Kali.
Tags: Cybersecurity, Risk Management, Business Continuity
How do we convince the management of any organisation that cybersecurity is the key?
Website
September 20, 2021
“The irony is that a strong cybersecurity posture is one of the greatest business-enabling tools an organization can have in its arsenal.” Robert Herjavec
There is an area in business where the c suite and board members have limited understanding but require a huge focus
An area where getting it wrong could be the end.
That area is the cyber and digital space.
Tags: Cybersecurity, Risk Management, Business Continuity
Stopping a cyber event is harder than you think!
LinkedIn
March 26, 2021
There are two parts to a cyber event. Both of them are important!
Stopping it from happening and what happens if you cannot.
The business world relies heavily on everything digital to do what they do.
Tags: Cybersecurity, Risk Management, Business Continuity
To pay the ransom or not!
LinkedIn
March 03, 2021
If you ever have the unfortunate experience of having all of your data encrypted by a cryptovirus then you understand the frustration and sheer horror of the experience.
How do you prioritise security in business?
LinkedIn
August 30, 2020
#Businesssecurity is not simply about putting the right preventative technology and systems in place.
Most requirements for business security can be expensive, so finding ways to have big wins without huge costs is a win-win situation for SME's.
Good business security requires everyone in the organisation to understand their role in the protection of the data, systems and information gathered and used by the company.
September 2023 Newsletter
Simple cybersecurity tips!
September 13, 2023
Step into the future, where knights don’t just wear shining armour, they wear cyber-armour!
No, we aren't talking about the latest sci-fi blockbuster.
This is the realm of cybersecurity technology – your protective suit in a world brimming with digital dragons and cybernetic sorcerers.
So, what makes a good piece of cyber-armour?
It’s more than just flashy gadgets. Good cybersecurity technology is:
Smart:
Rolling the Dice: Why Tabletop Exercises Are a Game-Changer in Manufacturing
Simple cybersecurity tips!
August 15, 2023
In the complex world of manufacturing, disruptions can come unannounced. A sudden power outage, a cyber breach, or even a pandemic can send operations spiralling. But what if there was a fun way to tackle these challenges head-on, before they even occur? Enter tabletop exercises. Here's why they're indispensable..
CyberCrime - A Clear and Present Danger The CEO's Guide to Cyber Security
Lulu
July 01, 2014
Every business has something it needs to protect. Whether it’s top-secret IP, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren’t doing a very good job of protecting what’s theirs.
The digital world is changing fast—and cybercrime is changing with it. Whether it’s a 12-year-old “script kiddie” crippling your website with denial-of-service attacks, or a master hacker targeting a project leader with phishing e-mails, the bad guys have dozens of clever and creative ways to take your assets.
Why are there so many cybersecurity issues
LinkedIn
March 05, 2021
There are so many cybersecurity issues out there in the digital world actually focusing on any single problem is like nailing jelly to the wall.
Each of those issues has a focus, in some cases a single focus on what the problem is, how it can be managed and what business and organisations can do to counteract the issue.
Tags: Business Strategy, Cybersecurity, Risk Management
Office 365 is not a backup!
LinkedIn
March 01, 2020
Most businesses are using office 365 or google apps.
A cloud-based system that delivers access to software with a monthly subscription cost. What could be better for not just SME’s but for any organisation?
Tags: Business Strategy, Cybersecurity, Risk Management
1 Influencer Award
2019 Cybersecurity Educators Award
Cybersecurity Excellence Awards
February 21, 2019
The 2019 Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.
Thank you for your unique contributions to the cybersecurity industry - protecting data, workloads and systems for individuals and organizations.
Thought Leader Interview with Roger Smith, CEO, R and I ICT Consulting Services
Thinkers360
June 14, 2019
Thinkers360 Interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Roger Smith, CEO, R and I ICT Consulting Services.
The old persons take on protecting your stuff
Buzzsprout
January 01, 2022
When it comes to retirees, the elderly and mature aged people there is a huge issue with the digital components of their lives that have been forced on them through the embracing of the internet.
The complex world of protecting your organisation from the internet-based cybercriminal can be daunting for most.As a C-level executive, manager, owner or board member of a not-for-profit organisation, a charity or a small or medium enterprise you are faced with a number of issues related to data.This podcast is here to help you, from simple solutions to complex strategies. It will address as many as possible.Business is all about risk, revenue, brand and productivity.A cyber event can impact all of them.
TOO SMALL TO BE A TARGET?
LinkedIn
August 10, 2020
Are you safe from a cyber event?
SME's have issues with #businesssecurity.
80% of SMEs consider themselves safe from a cyber event, virus attack, malware or data breach although they have not invested in anything better than AV.
You are not immune just because you believe:
It will not happen to us
We have nothing worth stealing and
We are too small to be a target.
The digital world is having a significant impact on society as we know it.
It's the same in business, we are adopting platforms, systems and technology faster so that we can get that edge over our competitors.
Over our rivals.
One of the largest problems is understanding what we are collecting, where it is being stored, who has access to it and who is authorised to use it.
Changes to governance and compliance, if not already, will have an increased impact on SME’s, large corporations and multinational organisations worldwide.
More and more people are getting concerned about what we, as organisations, are doing with the information we are collecting.
Roger’s Security and Compliance Guide - white paper
Self
July 01, 2015
As a small and medium Business and not for profit organisation this white paper looks at the understanding that needs to be achieved to protect your business and company data from being compromised
In addition to the long term standard protective requirements against the cybercriminal and nation states. There are 3 areas of the digital world that will cause a shift in cybersecurity requirements is 2021.
Deep Fake will become mainstream. It will also become a mainstream problem and stopping it and exposing it will be a priority for social media companies.
AI - Artificial intelligence will be heavily deployed by nation states and criminal gangs. Both have the money, expertise, and capabilities to inject AI into their attack profiles and strategies.
Ransomware will have a bigger impact on business because the transition from encrypt to copy and encrypt. The new ransom will consist of "you may have a backup but we have a copy of your data and we will dump it on the internet if you do not pay us".
It's a big issue when your own people think that IT is security
Thinkers360
April 06, 2021
Convincing people that business security is a whole of business endeavor is a process that we often have to undertake.
At times it can be very difficult.
Invariably when Cybersecurity is mentioned the response is “oh, the IT department has that in hand”
When it comes to cybercrime, protecting 100 clients should be no different from protecting 1,000,000
Thinkers360
July 24, 2018
The bulk of cyber events in the news are focused on large multinational organizations and government departments. Newsworthy events are in fact always newsworthy.
These are the organizations we hope and believe are focused on protecting the information that we unwittingly give them through our interaction.
An attack on them makes for great copy. But, the overall problem with cyber events is not the big fish. The big fish are known to have millions of records that should be protected from a cyber-attack. Not protecting them reflects in spectacular thefts and large-scale reputation failures. Newsworthy events!
Large organizations have the expertise, the finances and the understanding that they have to protect their client’s information in the best way possible. SME’s do not!
How many SME’s have gone out of business after a cyber event is unknown. Some of the statistics are available, but not many are focused on whether it was poor management and cash flow or a cyber event that damaged their business to a point where it was unrecoverable.
Did it put them out of business?
One of the things I discovered a couple of years ago is the way the cybercriminal works.
There is a large correlation between the script kiddies and the true hackers, one that is not really known, but every now and then becomes visible.
The Internet is a great resource. It is a great resource for us, but it is an even greater resource for the budding cybercriminal. The Internet can put the budding script kiddy in contact with the true hacker. That contact can be very problematic for SME’s.
What are my targets, after a little research - SME’s with access to trusts, intellectual property, large amounts of cash or the new one, critical infrastructure?
These targets have reduced business intelligence, lack complex systems, lack digital expertise, but more importantly have a blaze attitude to security.
You know the attitude well - it will not happen to me, we have nothing worth stealing or she’ll be right.
Will an SME survive having its trust fund drained - probably not!
Protecting our digital assets is no longer a multinational organization’s problem, it is everyone’s problem, everyone with a digital device has the problem and has to be part of the solution.
http://business-security.com.au/when-it-comes-to-cybercrime-protecting-100-clients-should-be-no-different-from-protecting-1000000/
Cybersecurity as it relates to business capability
Location: Australia Date Available:
August 01st, 2018 Fees: 1,500 - 10,000
Submission Date:
August 07th, 2018 Service Type: Service Offered
Protecting business from a cyber event is all a process. Understanding and implementing that process is how SME's avoid a cyber event.
Let me show you how
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?