Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Roger Smith

SME's Virtual Chief Information Security Officer (CISO) at Care MIT

Canberra, Australia

Are you feeling stressed, overwhelmed and frustrated with how to keep your organisation safe from the digital world?
Are you looking for a better way to navigate the minefield associated with business security and Cyber Risk?
Do you want to know how to protect your organisation from cybercriminals, hackers and script kiddies?
Building digital security into your business takes time, money and expertise, but most importantly, you need really good advice.
Talk to me for that good advice!
Roger Smith is funny, scary, on point and is focused on one thing - increasing everyone's awareness and understanding of the problems and issues associated with the digital or cyber world.
Roger is a veteran and an expert at creating and managing personal, digital and business security solutions for home users, SME's and not-for-profit organisations. He is focused on building them into more secure and resilient businesses.
Roger knows that the only way to defeat the cybercriminal, using the teachings of Sun Tzu, is to understand our enemy and how they target us. To ensure that we, our organisations and / or our clients are not the low-hanging fruit of the cyber world.
As well to his normal CEO activities for R & I ICT Consulting Services, Roger teaches at the Australian Defence Force Academy where he delivers the compulsory undergraduate course in cybersecurity. This course is where the students learn, using hands on experience, how cybercriminals work and how dangerous they can be.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Canberra
Speaking Topics: Cybersecurity, Business security, awareness, culture

Speaking Fee $1,980 (In-Person)

Roger Smith Points
Academic 0
Author 274
Influencer 169
Speaker 14
Entrepreneur 100
Total 557

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Business security
Theatre: Australia/asia
Media Experience: 9
Last Media Training: 05/25/2018
Last Media Interview: 02/23/2022

Areas of Expertise

AI 30.01
AR/VR
Big Data 30.14
Business Continuity 33.87
Business Strategy 33.75
Cloud 30.07
Culture
Cybersecurity 48.69
Digital Disruption 30.19
Digital Transformation
Diversity and Inclusion 30.16
EdTech
Emerging Technology
GovTech
Innovation
IoT 30.07
Leadership 30.19
Legal and IP 30.29
Management 30.26
Privacy 30.62
Risk Management 45.20
Security 38.27
Startups
Supply Chain 30.04
Social 30.35

Industry Experience

Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Manufacturing
Media
Pharmaceuticals
Professional Services
Real Estate
Retail
Telecommunications
Travel & Transportation

Publications

77 Article/Blogs
The Human Factor: Why Social Engineering Outsmarts Advanced Cybersecurity Technology
LinkedIn
March 20, 2023
In today's digitally connected world, the importance of cybersecurity has grown tremendously as businesses invest heavily in advanced technology to protect their valuable assets from cyber-attacks.

See publication

Tags: Cybersecurity, Privacy, Security

Cybersecurity for Non-Profits and Associations: Protecting Your Future
Simple cybersecurity tips!
February 24, 2023
Cybersecurity is essential for any organization, but non-profits and associations face unique challenges when it comes to protecting themselves against cyber threats. These organizations operate on limited budgets, often with limited IT resources, and handle sensitive information that is attractive to cyber criminals. That's why it's critical for non-profits and associations to take proactive steps to protect their valuable data and intellectual property, reduce the risk of a successful attack, and safeguard their reputation.

See publication

Tags: Cybersecurity, Privacy, Security

Building cyber resilience into a business is essential in today's increasingly digital world.
Simple cybersecurity tips!
January 02, 2023
With the increasing reliance on technology, businesses are exposed to a wide range of cyber threats, from data breaches and ransomware attacks to phishing scams and network intrusions.

See publication

Tags: Cybersecurity, Security

Securing office 365 - 2 FA, security defaults, train your users, separate admin accounts,
Simple cybersecurity tips!
September 14, 2022
If you are using Office365 for a business there are a number of security protocols and business requirements that can be implemented to ensure that you are not a victim of Business Email Compromise (BEC).
You need to avoid a BEC for the simple fact that if the bad guys gain access to your email portal they can do irreparable damage to your business.

See publication

Tags: Cybersecurity, Security

Breach plan, website security and monitoring administrators
LinkedIn
August 31, 2022
Have you done everything to stop the bad guys from gaining access to your stuff.

See publication

Tags: Cybersecurity, Leadership, Security

Technology budgets, security in depth and banners!
Simple cybersecurity tips!
August 17, 2022
Budgets for business can be an issue.
When it comes to technology, 5-year-old computers, printers, operating systems, routers, monitoring systems, switches and mobile devices are just asking to be breached.

See publication

Tags: Cybersecurity, Security

Data encryption, Google alerts and why you need to manage administrator access
Simple cybersecurity tips!
August 03, 2022
When everything else fails and you have implemented data encryption there is still a chance that the information that is stolen in its encryption state is unreadable by the theif.

See publication

Tags: Cybersecurity, Security

Social engineering - what tha???, avoiding the scams, and let's get rid of those default passwords
LinkedIn
July 20, 2022
Social engineering is the process used by the cyber criminal to get you to make a mistake.

See publication

Tags: Cybersecurity, Security

Passwords same/same/different, backing up the right way and understanding social media
LinkedIn
July 06, 2022
Password, aren't they a problem.

See publication

Tags: Cybersecurity, Security

Three more tips to secure your business!
Linked In
June 08, 2022

See publication

Tags: Cybersecurity, Business Continuity, Security

Why you need passwords, test your BC and DR plan and secure your WiFi!
LinkedIn
May 26, 2022
Are you using complex, unique passwords with more than 10 characters to access your systems and there are no shared accounts?

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

What happens when you get infected with malware!
Linked In
May 24, 2022
I am often rebuked with comments like “we are too small to be a target” or “we have nothing worth stealing”

So I thought I would look at a small scenario!

To set the scene - Let’s take a micro-business making $200k per year

See publication

Tags: Cybersecurity, Business Continuity, Security

Three quick tips to build security in your organisation!
Linked In
May 12, 2022
If you are concerned why not complete our 30-question audit (https:\\action.scoreapp.com). It will give you great insight into areas where you may be lacking in your security.

See publication

Tags: Cybersecurity, Business Continuity, Security

Putting 3 more cybersecurity myths to bed!
Linked In
April 29, 2022
Not the normal ones here are 3 more myths that need to be debunked

See publication

Tags: Cybersecurity, Risk Management, Security

Cybersecurity - why don't we do it the right way?
Linked In
April 21, 2022
The excuses are quite astounding

See publication

Tags: Cybersecurity, Risk Management, Security

IOT devices, no time for security.
Linked In
October 10, 2021
Leaving the house, locking the doors, setting the alarm - we make time to be secure
In the internet of things (#IOT) space, security is often an afterthought..
DIY code platforms, make the proliferation of IOT devices easy.

See publication

Tags: Cybersecurity, IoT, Risk Management

An open letter to retirees and the elderly
Linked In
September 29, 2021
The problem with today's digital devices is that we (yes me included) have been forced into their use.
If we want government services we have to use a device or get some help to work out what we need to do.
If we want to stay in contact with family and friends then we need some type of digital device.
To spend, move or borrow money we need some type of digital device to access websites and accounts.
Government departments post everything on their website so you need a device to see it.

See publication

Tags: Cybersecurity, Risk Management, Diversity and Inclusion

Cybersecurity, why CEOs and Boards have it wrong
Website
September 20, 2021
When it comes to digital and business security, board members and C level executives still have it wrong.
Business security is not an IT issue although there are some IT components!
Business security is not a compliance issue but there are compliance requirements!
Business security is all about protecting your assets but before you can protect them you have to identify them

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

Cybersecurity for the C suite executive
Website
September 20, 2021
Let's look at the facts!
No matter the size, shape or industry of an organisation.
No one is fully prepared for a full-on, bare-knuckle, cyber ninja assault.
We are not talking about a random attack.
An attack that is being perpetrated against your organisation with Metasploit and a new copy of Kali.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

How do we convince the management of any organisation that cybersecurity is the key?
Website
September 20, 2021
“The irony is that a strong cybersecurity posture is one of the greatest business-enabling tools an organization can have in its arsenal.” Robert Herjavec
There is an area in business where the c suite and board members have limited understanding but require a huge focus
An area where getting it wrong could be the end.
That area is the cyber and digital space.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

Stopping a cyber event is harder than you think!
LinkedIn
March 26, 2021
There are two parts to a cyber event. Both of them are important!
Stopping it from happening and what happens if you cannot.
The business world relies heavily on everything digital to do what they do.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

To pay the ransom or not!
LinkedIn
March 03, 2021
If you ever have the unfortunate experience of having all of your data encrypted by a cryptovirus then you understand the frustration and sheer horror of the experience.

See publication

Tags: Business Continuity, Cybersecurity, Supply Chain

Why good business security is all about increasing profits, productivity and resilience.
LinkedIn
December 02, 2020
There is a downside to a cyber event and I can tell you, every part is down!

Our role in business security (#cybersecurity) is not to scare the crap out of you but more to educate you in the ways of the cybercriminal.

Have you ever thought about what could happen to your company if you did get hacked?

If your organisation was breached by a target cyber attack?

Here are some calculations for you to think about that are factored in when discussing a breach and calculating the impact.

See publication

Tags: Cybersecurity

How do you prioritise security in business?
LinkedIn
August 30, 2020
#Businesssecurity is not simply about putting the right preventative technology and systems in place.

Most requirements for business security can be expensive, so finding ways to have big wins without huge costs is a win-win situation for SME's.

Good business security requires everyone in the organisation to understand their role in the protection of the data, systems and information gathered and used by the company.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Stop thinking cybercrime is about YOU!
linkedin
June 22, 2020
Users of the digital world, especially in business have a litany of reasons why a cyber event would not happen them!

See publication

Tags: Cybersecurity, Management, Privacy

Are you a leader for today?
linkedin
March 21, 2020
If you are in business, leadership is one of those intangible tangibles that makes it work.

This is March 2020, running your SME is now all about survival. There are not many organisations today, that are not in survival mode...

See publication

Tags: Cybersecurity, Management, Leadership

Office 365 is not a backup!
linkedin
March 01, 2020
Most businesses are using office 365 or google apps.

A cloud-based system that delivers access to software with a monthly subscription cost. What could be better for not just SME’s but for any organisation?

We all have now become fans of the software because you can work anywhere and have access to your data at any time.

See publication

Tags: Cybersecurity, Privacy

Why your ICT department is overwhelmed with securing your organisation!
linkedin
February 02, 2020
When it comes to business security, outsourcing to a business security provider, is not, in reality, outsourcing.

See publication

Tags: Cybersecurity

Is training your staff about cyber more important than any other component in business?
linkedin
January 25, 2020
Any cyber event can have serious implications for your business.

Before you say, that wouldn't happen to us!
Let me explain.
From a simple malware infection to a fully compromised system the results on your business can be devastating.

See publication

Tags: Cybersecurity

Why 2020 could be a bad cybersecurity year for SME’s
linkedin
January 11, 2020
SME’s are a prime target for cybercrime.

They have reduced expertise, minimal money, and an attitude, we are too small to be a target, that leaves them wide open to a cyber event.

See publication

Tags: Cybersecurity

Only next year will tell!
linkedin
December 11, 2019
Everyone is doing it so I am going to throw my 10 cents in.

3 Security Predictions for 2020
Manipulation of AI and machine learning by criminal organisations and nation-states.
We constantly underestimate the criminal mind.

See publication

Tags: Cybersecurity, Digital Disruption, Risk Management

If government departments cannot protect their data how do we expect SME’s to do it?
linkedin
November 23, 2019
We keep running into the same major problems when it comes to business and digital security.

If the large corporations, multi nationals and government departments can’t implement decent security and still get hacked after a significant investment in time, money, knowledge and effort, how are small and medium enterprises, charity organisations and not for profits (SME’s) suppose to protect their information.

See publication

Tags: Cybersecurity, Digital Disruption

Calculate the cost of a cyber event
linkedin
November 22, 2019
The internet is rife with automated systems designed to steal information or compromise the unaware, ill-informed and lazy amongst us.

See publication

Tags: Cybersecurity

Digital disruption and business security - are they compatible?
linkedin
November 05, 2019
We have been told digital disruption will change the world. In a number of ways, yes I think that is correct. Where I see a problem is the simple fact that although digital disruption will change the face of business, cybercrime will not be far behind.

See publication

Tags: Cybersecurity, Digital Disruption, Security

The question “How secure are we?” is not helpful!
linkedin
September 25, 2019
When it comes to cybersecurity, risk management and protecting an organisation from a significant cyber event, “How secure are we?” is not a question that should be asked.

See publication

Tags: Cybersecurity

A new breed of service provider and why you need them!
linkedin
July 15, 2019
In the last 20 years, there has been a slow change in how business approaches the management of the ICT component.

See publication

Tags: Cybersecurity, Risk Management

Cybersecurity, Why you need someone who knows what they are doing!
linkedin
July 07, 2019
I was recently the recipient of an email from a company who is selling cybersecurity. Not business to business, not selling to SME’s, but as a vendor selling to managed services providers.

See publication

Tags: Cybersecurity

Is it about time we talked about who owns your data, systems and information?
linkedin
July 01, 2019
One of the things that I have been talking about for the last couple of years is who has sovereignty over your data.

See publication

Tags: Big Data, Cloud

Obviously, we are not learning from other's mistakes!
linkedin
June 21, 2019
"Florida city pays $600,000 ransom to save computer records"
This should never happen, but it does. It regularly happens because there is a fundamental problem with security, cybersecurity and business security.

See publication

Tags: Cybersecurity

You just want to run your business! Here are 7 reasons why you can’t!
linkedin
June 16, 2019
You just want to run your business!

You just want to make enough money to live a nice life. Not rich and famous but not broke either. A fair income for a fair days work.

See publication

Tags: Big Data, Cybersecurity

How can my website be targeted?
linkedin
June 01, 2019
We are often told that a website is not important and does not need any level of protection.
It's just a marketing tool!
This is an assumption that can have devastating effects.

See publication

Tags: Cybersecurity

The difference between large organisations and SME’s in security is significant.
linkedin
May 05, 2019
Mom and pop organisations are the lifeblood of our world and the driving force of the economy. Because they are the powerhouse of the economy they have become a primary target of cybercriminals.

See publication

Tags: Cybersecurity

This is why you need a friggin backup!
linkedin
April 07, 2019
Not just any backup, but a comprehensive copy of everything that is important to your business, organisation or yourself in two different locations.

In three weeks we have been called into five organisaions to get them up and working after a failure, attack or cyber event.

See publication

Tags: Cybersecurity

The Importance of a secure website!
linkedin
January 09, 2019
We are often told that a website is not important and does not need any level of protection. It’s just a marketing tool!
This is an assumption that can have devastating effects.

See publication

Tags: Cybersecurity

AI - Smart or just plain creepy?
linkedin
January 05, 2019
No matter which way you look at it artificial intelligence (AI) is here and in some areas of business here with a bang.

We are constantly told that AI is the only way "us humans" are going to be able to handle the impact of big data. Make sense of all of that information.

See publication

Tags: AI, Cybersecurity

A digital device does what it’s told, the results depend on who’s doing the telling!
linkedin
December 26, 2018
If you are one of the people who only use computers, phones and tablets for what they are designed to do - email, social, banking, you are not in a minority.
You probably have the attitude that that is all they can do!
When it comes to digital device usage, probably 80% of user have this attitude.

See publication

Tags: Cybersecurity

Why Domain Name Services (DNS) keeps your business on line!
linkedin
December 23, 2018
Recently I was talking to a colleague about his email not working.
He had just recently had a new web site built and was told by the designer that it would only work if he changed his web hosting to his hosting company.
He was a very good designer but knew absolutely squat about how the Internet works.

See publication

Tags: Cybersecurity

How safe will your child's Christmas be this year?
linkedin
November 28, 2018
Christmas is coming
Top of the list for children is technology based toys.
Interactive toys!
Smart toys!
You know the ones, digital toys!
Toys that have chips and computers installed in them that allows your children to interact with the toys.
From fluffy toys for 4 year olds to computer based systems for the teens.
But, the security of these systems has to part of your purchasing process.
How can you make sure that the toys that you are purchasing for your kids will not be hijacked by the hackers and their privacy compromised, their information stolen.

See publication

Tags: Cybersecurity

You need a different mind set to manage business security!
linkedin
October 21, 2018
When it comes to cybersecurity, digital security and business security:
Governments are not doing enough,
big business are not doing enough and
especially SMB are not doing enough.
I was recently grading student assignments and there was a something that was mentioned in 95% of them all. Education is the key and we are not doing enough

See publication

Tags: Cybersecurity, Security

Why is it so hard to fix business security?
LinkedIn
September 15, 2018
The responsibilities that boards and management have in today business world are scary.
All the old requirements, of which there are a fair number, are being overshadowed but not replaced by new business insights based on compliance, regulations, ethics and risk.
The old issues and problems have been taught in universities and through the school of hard knocks for years. The new problems are only becoming a reality now. In most cases boards and management are playing catch up.

See publication

Tags: Cybersecurity, Security

What is wrong with today’s managed service providers?
Self
September 13, 2018
In the last 3 weeks we have had a number of new clients, thanks to our sales team, come to us with a problem.

Their problem is that their Managed Services is costing a fortune but they do not seem to get anything in return.

Not that they are not getting support, the problem is that the support they are getting is not noticeable. It is hidden behind service level agreements (SLA) that promote remote work, reporting based on vanity metrics and no contact except through email, SMS or phone.

If you want someone on site, well, that’s an extra cost. It should be included in the SLA because it is not the client’s fault that your skills do not fit the requirements and they should not be paying for your learning curve.

See publication

Tags: Cybersecurity

The results are in - we suck at business security!
Self
September 01, 2018
Last week I was having a go at the managed services industry, this week it is small and medium business and not for profit organisations turn.

The information from the most recent surveys on cybersecurity is in, Telstra and Security in Depth have completed their surveys and it is not looking good for SME's

Some of the stats from the survey are:

60% of all targeted cyber attacks were aimed at SME's

See publication

Tags: Cybersecurity, Security

Why organisations need to change to OFFENSIVE SECURITY to protect their assets.
Self
August 08, 2018
Compliance led soft security is failing.

It leave too many unknowns, creates unpredictable situations and give a false sense of security.

In most cases it just does not work.

But, it looks so good on paper.

If your business security relies on a form, completed by anyone who is available, then the problems associated with a cyber event are not being taken seriously.

Lets face it, if the hackers are saying this,

‘it is not the case that we are so smart, but more a case of the average organisation is deploying inadequate security’.

Then we have a problem with our reality.

See publication

Tags: Cybersecurity

When it comes to cybercrime, protecting 100 clients should be no different from protecting 1,000,000
Self
July 22, 2018
The bulk of cybercrime and cyber events in the news are focused on large multi national organisations and government departments.   Newsworthy events are in fact always newsworthy.

These are the organisations we hope and believe are focused on protecting the information that we unwittingly give them through our interaction.

An attack on them makes for great copy.   But, the overall problem with cybercrime and cyber events is not the big fish.   The big fish are known to have millions of records that should be protected from a cyber attack.   Not protecting them reflects in spectacular thefts and large scale reputation failures.   Newsworthy events!

See publication

Tags: Cybersecurity

How do you handle the "insider" threat?
LinkedIn
July 14, 2018
The internal “spy” - the insider threat
The hardest attack to defend against in cybersecurity.
There are three types of spy

See publication

Tags: Cybersecurity, Digital Disruption

In today's world, why do you need a good backup!
LinkedIn
June 30, 2018
The focus in todays business world is all about using, collecting and managing data.
Every organisation is collecting information about their customers and clients. Who they are, what their likes and dislikes are, how interested are they in the products and services, that you sell. All of this information is stored somewhere.

See publication

Tags: Cybersecurity

Why we think we are immune to cybercrime!
LinkedIn
June 09, 2018
"As a person, you would not be particularly worried about a trained Ninja accosting you on the street or jumping out at you in a dark alley and beating you senseless.

See publication

Tags: Cybersecurity

Business security needs a quantum attitude change!
LinkedIn
June 03, 2018
The digital world is rife with huge problems mainly derived from the attitudes of the people using it.
The single utterance of “I am too small to be a target” is a good place to start.

See publication

Tags: Cybersecurity, Security

Why do we have the stereotypical attitude that ICT = Cybersecurity
LinkedIn
May 28, 2018
For the last 15 years, ICT departments have been seen as the leading lights when it comes to security. It is no longer their job and their job alone...

See publication

Tags: Cybersecurity

Why do we have the stereotypical attitude that ICT = Cybersecurity
LinkedIn
May 28, 2018
I was recently at a networking event, where everyone was delivering their pitch and listening to everyone else's.

See publication

Tags: Cybersecurity

Cybersecurity, why we have to change, NOW!
LinkedIn
April 08, 2018
Starting to feel like a broken record, But, why do we have to change our attitude to cybersecurity? , “Kicking soapbox along”

See publication

Tags: Cybersecurity

Cybersecurity - we still have the wrong focus!
LinkedIn
March 04, 2018
With the expected $660 billion loss to cybercrime this year, we definitely have to change our understanding, our focus and most importantly our attitude when it comes to business security and cybersecurity.

See publication

Tags: Cybersecurity

When it comes to Business Security, why do we all want to do it ourselves?
LinkedIn
February 04, 2018
Good at your job?
So good in fact that you are doing everything right.
You have the education, experience and drive to make your dream a reality.

See publication

Tags: Cybersecurity, Security

The insider threat, the hardest cybercriminal to keep out!
LinkedIn
January 13, 2018
The internal “spy” - the insider threat
The hardest attack to defend against in cybersecurity.
There are three types of spy

See publication

Tags: Cybersecurity

Are big business, politics and government being outpaced by the digital world?
LinkedIn
December 24, 2017
Disruptive technologies are splintering society. Changing the way that people think, act and communicate.

See publication

Tags: Cybersecurity

Why is there so much CRAP on the internet?
LinkedIn
November 27, 2017
I recently overheard one of my brighter students comment that if you are only researching using the internet then you are not getting the facts.

In some cases you are getting facts out of context or they are out and out lies.

See publication

Tags: Cybersecurity

Why our understanding of illegal has to change!
LinkedIn
November 27, 2017
That was a comment I got from a student recently when I was doing a demonstration of hacking an exploit and taking a picture of the class.

See publication

Tags: Cybersecurity, Legal and IP

How simple is it to perpetrate a cybercrime?
LinkedIn
November 27, 2017
We have bad rabbit, equifax, NSA, Ashley Madison, Sony(x2), Mirai and Eternalblue in just the last 12 months and everyone of them will have a significant impact on anyone who had information in those systems.

See publication

Tags: Cybersecurity

Why is one dimensional business security still sold?
LinkedIn
November 11, 2017
To protect your organisation a number of questions have to be asked, they have minimal involvement from the IT world, they are all fact based and relate to risk management.

See publication

Tags: Cybersecurity, Security

Is our attitude to the digital world the same as our attitude to science 1000 years ago?
LinkedIn
November 04, 2017
Artificial intelligence, machine learning, robotics, drones and 3D printing, technologies that are going to change the world, once again.

See publication

Tags: Cybersecurity

Digital transformation and the Cybersecurity envelope
LinkedIn
October 30, 2017
Digital transformation - the new catch phrase of organisations. Bleeding edge systems that have started to be used in business!
It allows business to do things faster, better and with more control than ever before.

See publication

Tags: Cybersecurity

Patch management - when can you find the time to patch and why it is a problem!
LinkedIn
October 20, 2017
The Equifax issue has highlighted the importance of patching and patching systems within a timely period of time.
In today's world, especially in large organisations, this simple process becomes highly controversial and difficult.

See publication

Tags: Cybersecurity

Security experts needed, but are we listening!
LinkedIn
October 09, 2017
We are a necessary evil because we say and do things that people think only we know how to do it and the bad guys would never do that.

See publication

Tags: Cybersecurity

What every CEO and CIO should know about cybersecurity
LinkedIn
October 01, 2017
The problem with cybersecurity is it is not sexy.
In most cases it is down right boring.
Although not sexy and down right boring it is still something that every CEO, manager, owner and board member has to focus on.

See publication

Tags: Cybersecurity

We are constantly reminded that the digital world is unsafe but are we listening?
LinkedIn
September 16, 2017
Cyber attack after cyber attack.
This company has been breached.
That information has been leaked to the Dark Web

See publication

Tags: Cybersecurity

Weakening encryption - definitely erring on the side of STUPID
linkedin
July 14, 2017
Once again we have seen politicians step in to change the very face of science and mathematics. This is one of the articles.
To me the argument for unsecured communication via the Australian government shows just how out of sync they really are with reality and especially the digital world.
Apart from all of the other half baked idiotic ideas that they come up with - a back door to encryption is one of the stupidest.

See publication

Tags: Cybersecurity

Shiny and new is great but don’t forget security!
Self
July 01, 2011
If you remove these restrictions then any organisation can be secure.

To change our attitude we have to do something to protect the organisation. That something is focus.

Using a framework allows them to focus on each little thing that when combined with all of the other little things builds into a way to protect the organisation.

See publication

Tags: Cybersecurity

3 Books
How do you handle the "insider" threat?
LinkedIn
July 14, 2018
The internal “spy” - the insider threat, The hardest attack to defend against in cybersecurity. There are three types of spy

See publication

Tags: Cybersecurity

CyberCrime - A Clear and Present Danger The CEO's Guide to Cyber Security
Lulu
July 01, 2014
Every business has something it needs to protect. Whether it’s top-secret IP, an exclusive client list, or a secure payment portal, your data is what sets you apart from the competition. But most businesses aren’t doing a very good job of protecting what’s theirs.
The digital world is changing fast—and cybercrime is changing with it. Whether it’s a 12-year-old “script kiddie” crippling your website with denial-of-service attacks, or a master hacker targeting a project leader with phishing e-mails, the bad guys have dozens of clever and creative ways to take your assets.

See publication

Tags: Cybersecurity

The Basics of Business Information Security
Lulu
July 01, 2011
How normal people can understand the complexity of cybersecurity.

See publication

Tags: Cybersecurity

10 Executives
Why are there so many cybersecurity issues
LinkedIn
March 05, 2021
There are so many cybersecurity issues out there in the digital world actually focusing on any single problem is like nailing jelly to the wall.

Each of those issues has a focus, in some cases a single focus on what the problem is, how it can be managed and what business and organisations can do to counteract the issue.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

3 philosophies we rely on to be secure!
LinkedIn
February 10, 2021
These three philosophies for business security have nothing to do with security.

Business security is many things to many people and companies

It is the driving force ensuring you are not the news on the internet.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Why good business security is all about increasing profits, productivity and resilience.
LinkedIn
December 03, 2020
There is a downside to a cyber event and I can tell you, every part is down!

Our role in business security (#cybersecurity) is not to scare the crap out of you but more to educate you in the ways of the cybercriminal.

See publication

Tags: Cybersecurity, Risk Management, Security

How do you prioritise security in business?
LinkedIn
August 31, 2020
#Businesssecurity is not simply about putting the right preventative technology and systems in place.

See publication

Tags: Risk Management, Business Strategy, Security

Stop thinking cybercrime is about YOU!
LinkedIn
June 22, 2020
Users of the digital world, especially in business have a litany of reasons why a cyber event would not happen them!

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Are you a leader for today?
LinkedIn
March 21, 2020
If you are in business, leadership is one of those intangible tangibles that makes it work.

This is March 2020, running your SME is now all about survival. There are not many organisations today, that are not in survival mode.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Office 365 is not a backup!
LinkedIn
March 01, 2020
Most businesses are using office 365 or google apps.

A cloud-based system that delivers access to software with a monthly subscription cost. What could be better for not just SME’s but for any organisation?

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Why your ICT department is overwhelmed with securing your organisation!
LinkedIn
February 03, 2020
When it comes to business security, outsourcing to a business security provider, is not, in reality, outsourcing.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Is training your staff about cyber more important than any other component in business?
LinkedIn
January 25, 2020
Any cyber event can have serious implications for your business.

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

Why 2020 could be a bad cybersecurity year for SME’s
LinkedIn
January 12, 2020
It is hard to predict an outcome when it comes to business security - Boy was this prediction wrong

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

1 Influencer Award
2019 Cybersecurity Educators Award
Cybersecurity Excellence Awards
February 21, 2019
The 2019 Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.
Thank you for your unique contributions to the cybersecurity industry - protecting data, workloads and systems for individuals and organizations.

See publication

Tags: Cybersecurity

1 Media Interview
Thought Leader Interview with Roger Smith, CEO, R and I ICT Consulting Services
Thinkers360
June 14, 2019
Thinkers360 Interviews profile prominent members of the Thinkers360 community who embody the power of ideas in their work. In this edition, we speak with Roger Smith, CEO, R and I ICT Consulting Services.

See publication

Tags: Cybersecurity, Privacy

2 Podcasts
The old persons take on protecting your stuff
Buzzsprout
January 01, 2022
When it comes to retirees, the elderly and mature aged people there is a huge issue with the digital components of their lives that have been forced on them through the embracing of the internet.

See publication

Tags: Cybersecurity, Security, Social

Need help - Ask Roger
Buzzsprout
January 01, 2022
The complex world of protecting your organisation from the internet-based cybercriminal can be daunting for most.As a C-level executive, manager, owner or board member of a not-for-profit organisation, a charity or a small or medium enterprise you are faced with a number of issues related to data.This podcast is here to help you, from simple solutions to complex strategies. It will address as many as possible.Business is all about risk, revenue, brand and productivity.A cyber event can impact all of them.

See publication

Tags: Business Strategy, Cybersecurity, Security

1 Speaker Award
Cybersecurity Excellence Awards educator of the year
Cybersecurity Insiders
January 25, 2018

See publication

Tags: Cybersecurity, Leadership

3 Speaking Engagements
TOO SMALL TO BE A TARGET?
LinkedIn
August 10, 2020
Are you safe from a cyber event?

SME's have issues with #businesssecurity.

80% of SMEs consider themselves safe from a cyber event, virus attack, malware or data breach although they have not invested in anything better than AV.

You are not immune just because you believe:
It will not happen to us
We have nothing worth stealing and
We are too small to be a target.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Using the 2 person rule for security
LinkedIn
August 09, 2020
How does an internet scam work?

The most important part of any scam is making you believe, above everything else, that what they say is true.

Protecting a business from that eventuality can be achieved with a couple of very simple rules:

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

Business Security Insights
LinkedIn
August 06, 2020
There is a huge difference between the skill level of an ICT team and those required to secure an organisation.

Good IT deliver the opportunities that can only come from good computer support.

We are told - "It is all about computers!"

In the last couple of years, ICT teams are required to function as a high-end security team without additional budgets, skills or training.

See publication

Tags: Cybersecurity, Risk Management, Business Strategy

1 Video
What security is around your website and social media?
YouTube
May 02, 2020
Your website is a critical component of your business.
Make sure it is as safe as possible!
Social media is the same!

See publication

Tags: Cybersecurity, Management

2 Whitepapers
Great ICT v's Cybersecurity
Self
July 09, 2018
The digital world is having a significant impact on society as we know it.
It's the same in business, we are adopting platforms, systems and technology faster so that we can get that edge over our competitors.
Over our rivals.
One of the largest problems is understanding what we are collecting, where it is being stored, who has access to it and who is authorised to use it.
Changes to governance and compliance, if not already, will have an increased impact on SME’s, large corporations and multinational organisations worldwide.
More and more people are getting concerned about what we, as organisations, are doing with the information we are collecting.

See publication

Tags: Cybersecurity

Roger’s Security and Compliance Guide - white paper
Self
July 01, 2015
As a small and medium Business and not for profit organisation this white paper looks at the understanding that needs to be achieved to protect your business and company data from being compromised

See publication

Tags: Cybersecurity

Thinkers360 Credentials

7 Badges

Radar

1 Prediction
2021 Predictions for Cybersecurity

Date : October 22, 2020

In addition to the long term standard protective requirements against the cybercriminal and nation states. There are 3 areas of the digital world that will cause a shift in cybersecurity requirements is 2021.

Deep Fake will become mainstream. It will also become a mainstream problem and stopping it and exposing it will be a priority for social media companies.

AI - Artificial intelligence will be heavily deployed by nation states and criminal gangs. Both have the money, expertise, and capabilities to inject AI into their attack profiles and strategies.

Ransomware will have a bigger impact on business because the transition from encrypt to copy and encrypt. The new ransom will consist of "you may have a backup but we have a copy of your data and we will dump it on the internet if you do not pay us".

See Radar

Blog

2 Article/Blogs
It's a big issue when your own people think that IT is security
Thinkers360
April 06, 2021
Convincing people that business security is a whole of business endeavor is a process that we often have to undertake. At times it can be very difficult. Invariably when Cybersecurity is mentioned the response is “oh, the IT department has that in hand”

See blog

Tags: Cybersecurity, Risk Management

When it comes to cybercrime, protecting 100 clients should be no different from protecting 1,000,000
Thinkers360
July 24, 2018
The bulk of cyber events in the news are focused on large multinational organizations and government departments. Newsworthy events are in fact always newsworthy. These are the organizations we hope and believe are focused on protecting the information that we unwittingly give them through our interaction. An attack on them makes for great copy. But, the overall problem with cyber events is not the big fish. The big fish are known to have millions of records that should be protected from a cyber-attack. Not protecting them reflects in spectacular thefts and large-scale reputation failures. Newsworthy events! Large organizations have the expertise, the finances and the understanding that they have to protect their client’s information in the best way possible. SME’s do not! How many SME’s have gone out of business after a cyber event is unknown. Some of the statistics are available, but not many are focused on whether it was poor management and cash flow or a cyber event that damaged their business to a point where it was unrecoverable. Did it put them out of business? One of the things I discovered a couple of years ago is the way the cybercriminal works. There is a large correlation between the script kiddies and the true hackers, one that is not really known, but every now and then becomes visible. The Internet is a great resource. It is a great resource for us, but it is an even greater resource for the budding cybercriminal. The Internet can put the budding script kiddy in contact with the true hacker. That contact can be very problematic for SME’s. What are my targets, after a little research - SME’s with access to trusts, intellectual property, large amounts of cash or the new one, critical infrastructure? These targets have reduced business intelligence, lack complex systems, lack digital expertise, but more importantly have a blaze attitude to security. You know the attitude well - it will not happen to me, we have nothing worth stealing or she’ll be right. Will an SME survive having its trust fund drained - probably not! Protecting our digital assets is no longer a multinational organization’s problem, it is everyone’s problem, everyone with a digital device has the problem and has to be part of the solution. http://business-security.com.au/when-it-comes-to-cybercrime-protecting-100-clients-should-be-no-different-from-protecting-1000000/

See blog

Tags: Cybersecurity

Opportunities

1 Speaker
Cybersecurity as it relates to business capability

Location: Australia    Date Available: August 01st, 2018     Fees: 1,500 - 10,000

Submission Date: August 07th, 2018     Service Type: Service Offered

Protecting business from a cyber event is all a process. Understanding and implementing that process is how SME's avoid a cyber event.
Let me show you how

Respond to this opportunity

Contact Roger Smith

Book Roger Smith for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Roger Smith