Rich Zaluski

President, Chairman, CEO at The Centre for Strategic Cyberspace + International Studies
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
West End, England, United Kingdom, UK
Languages
  • Polish -

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

LinkedIn User

I am delighted to write this commendation for Richard Zaluski. In a world where the ever increasing chorus is "Not Me", Mr. Zaluski is a perfect example of outstanding global leadership. He always rises to meet every challenge and willingly not only accepts, but pursues new cybersecurity facing industry issues. Mr. Zaluski is extremely highly regarded in the global cyber security community and is widely acknowledged as a key expert. Mr. Zaluski exemplifies today's top technology professionals by combining innovation, persistence and focus with an extremely powerful "Can Do" attitude and work ethic. The technology profession definitely needs more highly skilled leaders like Mr. Zaluski. He has my high recommendation and I would be delighted to speak with anyone personally on his behalf.

You need to have a working account to view this content.
You need to have a working account to view this content.

Experience

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • President, Chairman, CEO
      • Feb 2010 - Present

      The Centre for Strategic Cyberspace + International Studies (CSCIS) is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works… Show more The Centre for Strategic Cyberspace + International Studies (CSCIS) is a multilateral, international not-for-profit organization that conducts independent cyber-centric research, development, analysis, and training in the areas of cyberspace, defence intelligence, cyber security, and science while addressing the threats, trends, and opportunities shaping international security policies and national cyberspace cyber security initiatives. CSCSS, as a strategic leader in cyberspace, works jointly with key partners to address, develop, and define cyber technologies, cyber defence force capabilities, information dominance, and concept operations. We deliver practical recommendations and innovative solutions and strategies to advance a secure cyberspace domain. CSCSS is committed to: Strengthening cyberspace at an organizational, national, and international level Protecting key elements of the information and critical infrastructure which are crucial to the continued delivery of essential services and national security Preventing loss, through espionage, of intellectual property and/or of sensitive information that could damage national and economic security and well-being Reducing the vulnerability of national critical infrastructure to cyber warfare, cyber-terrorism, and other threats

    • Opening Keynote Speaker -Smart Cities Summit, Yinchuan China
      • Nov 2018 - Nov 2018

      Co-hosted by Yinchuan Municipal People’s Government and China Electronics Corporation, the 2018 Global Smart City Summit (Yinchuan) will be held at Yinchuan International Convention Centre in Yinchuan city, Ningxia Hui Autonomous Region from November 14th to 16th, 2018. I gave the opening keynote at the Summit on Smart Cities Threats.

    • Broadcast Media Production and Distribution
    • Presenter : The CYBERTRIBE
      • Jul 2021 - Present

      The CYBERTRIBE is an cyber community that features different cyber-themed ‘tribes’ which people can join, post to, watch, and listen to, live chat with guests and share content on the cyber world. Our focus is on all things cyber. As cyber is a fragmented interest area, with people passionate about immensely different, moving parts, we strive on getting the right content in front audiences who are most likely to want to engage. The CYBERTRIBE is an cyber community that features different cyber-themed ‘tribes’ which people can join, post to, watch, and listen to, live chat with guests and share content on the cyber world. Our focus is on all things cyber. As cyber is a fragmented interest area, with people passionate about immensely different, moving parts, we strive on getting the right content in front audiences who are most likely to want to engage.

  • DHSS19
    • Lisbon Area, Portugal
    • Track Chair - DHSS - INTERNATIONAL DEFENCE AND HOMELAND SECURITY SIMULATION
      • Jan 2018 - Present

      DHSS is a workshop focusing on the advances and potential of using M&S in Defense and Homeland Security framework. It will bring experts together for the purpose of presenting and discussing all type of innovation related to the use of Modeling & Simulation in Defense and Homeland Security applications. DHSS will focus on new concepts, methods, techniques and tools for advancing in the modeling & simulation sector. I am the Track Chair and leading this track. DHSS is a workshop focusing on the advances and potential of using M&S in Defense and Homeland Security framework. It will bring experts together for the purpose of presenting and discussing all type of innovation related to the use of Modeling & Simulation in Defense and Homeland Security applications. DHSS will focus on new concepts, methods, techniques and tools for advancing in the modeling & simulation sector. I am the Track Chair and leading this track.

  • Cyber Africa Conference - South Africa
    • Johannesburg, South Africa
    • Conference Chairman
      • May 2015 - Present

      I am conference Chair for the CyberAfrica Event taking place Johannasburg South Africa on 24-25th 2016 The CyberAfrica conference is designed to deliver the latest cybersecurity, information, trends, impact and the role of cyber intelligence. You will discover the critical strategies your organization needs to make sound cyber security planning decisions. Cyber-attacks are increasing in intensity and no single process will stop data breaches, cybercrime or cyber terrorism.… Show more I am conference Chair for the CyberAfrica Event taking place Johannasburg South Africa on 24-25th 2016 The CyberAfrica conference is designed to deliver the latest cybersecurity, information, trends, impact and the role of cyber intelligence. You will discover the critical strategies your organization needs to make sound cyber security planning decisions. Cyber-attacks are increasing in intensity and no single process will stop data breaches, cybercrime or cyber terrorism. Sessions will focus on data security & privacy breaches, retail & financial data security, cybercrime, cyber terrorism, cyber security standards, and Advanced Persistent Threat (APT). This one-of-a-kind event will allow you to engage and learn about cyber-attacks through of insightful and thought-provoking discussion. It will provide resilient capabilities for mitigating risks associated with advanced targeted attacks; security analytics tools and techniques that can support or be applied to big data are necessary. Show less I am conference Chair for the CyberAfrica Event taking place Johannasburg South Africa on 24-25th 2016 The CyberAfrica conference is designed to deliver the latest cybersecurity, information, trends, impact and the role of cyber intelligence. You will discover the critical strategies your organization needs to make sound cyber security planning decisions. Cyber-attacks are increasing in intensity and no single process will stop data breaches, cybercrime or cyber terrorism.… Show more I am conference Chair for the CyberAfrica Event taking place Johannasburg South Africa on 24-25th 2016 The CyberAfrica conference is designed to deliver the latest cybersecurity, information, trends, impact and the role of cyber intelligence. You will discover the critical strategies your organization needs to make sound cyber security planning decisions. Cyber-attacks are increasing in intensity and no single process will stop data breaches, cybercrime or cyber terrorism. Sessions will focus on data security & privacy breaches, retail & financial data security, cybercrime, cyber terrorism, cyber security standards, and Advanced Persistent Threat (APT). This one-of-a-kind event will allow you to engage and learn about cyber-attacks through of insightful and thought-provoking discussion. It will provide resilient capabilities for mitigating risks associated with advanced targeted attacks; security analytics tools and techniques that can support or be applied to big data are necessary. Show less

    • Panel Member : Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure
      • Jun 2015 - Present

      I speaker on the PANEL: Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure taking place in Toronto, Sept 29-30th 2015 Global cyber-attacks on critical infrastructure continue to increase in frequency and severity and Canada is by no means exempt. The country's ten pillars of critical infrastructure have to protect themselves from hacktivism, state sponsored attacks, cyber terrorism, industrial espionage and other damaging emerging… Show more I speaker on the PANEL: Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure taking place in Toronto, Sept 29-30th 2015 Global cyber-attacks on critical infrastructure continue to increase in frequency and severity and Canada is by no means exempt. The country's ten pillars of critical infrastructure have to protect themselves from hacktivism, state sponsored attacks, cyber terrorism, industrial espionage and other damaging emerging threats. Antiquated strategies, such as anti-viruses and firewalls are no longer a match for the hackers of today. Show less I speaker on the PANEL: Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure taking place in Toronto, Sept 29-30th 2015 Global cyber-attacks on critical infrastructure continue to increase in frequency and severity and Canada is by no means exempt. The country's ten pillars of critical infrastructure have to protect themselves from hacktivism, state sponsored attacks, cyber terrorism, industrial espionage and other damaging emerging… Show more I speaker on the PANEL: Information Sharing as a Collaborative and Dedicated Approach to Safeguarding Critical Infrastructure taking place in Toronto, Sept 29-30th 2015 Global cyber-attacks on critical infrastructure continue to increase in frequency and severity and Canada is by no means exempt. The country's ten pillars of critical infrastructure have to protect themselves from hacktivism, state sponsored attacks, cyber terrorism, industrial espionage and other damaging emerging threats. Antiquated strategies, such as anti-viruses and firewalls are no longer a match for the hackers of today. Show less

    • Summit Chairman
      • Feb 2015 - Present

      Summit will present threats and trends, methods and cases cyber intelligence and the role of geopolitics on strategic, corporate decision-making from international government, industry, and think-tank experts. Summit will present threats and trends, methods and cases cyber intelligence and the role of geopolitics on strategic, corporate decision-making from international government, industry, and think-tank experts.

  • CSCSS Select Committee on Cyber Intelligence
    • United Kingdom / London | USA / Washington D.C
    • CSCSS / Associate Chair : C3i Group Select Committee on Cyber Intelligence (SCCI)
      • May 2014 - Present

      The CSCSS / C3i Group Select Committee on Cyber Intelligence (SCCI) provides leadership through CSCSS and C3i to deliver a proactive stance on cyber intelligence and provide for the sharing of certain cyber threat intelligence and cyber threat information between elements of the private-sector + intelligence community to share cyber threat to address the threat proactively. Mission: The Committee was created to provide an independent framework of convergence for the public-private… Show more The CSCSS / C3i Group Select Committee on Cyber Intelligence (SCCI) provides leadership through CSCSS and C3i to deliver a proactive stance on cyber intelligence and provide for the sharing of certain cyber threat intelligence and cyber threat information between elements of the private-sector + intelligence community to share cyber threat to address the threat proactively. Mission: The Committee was created to provide an independent framework of convergence for the public-private sector, academia and to make continuing studies of the intelligence activities and programs of on the global stage to provide leadership, and promote, recommend and deliver guidance on intelligence and information sharing. The committee well works to advise on and submit appropriate proposals for public special projects, intelligence sharing within industry sectors, commissioned studies and provide input to policy on intelligence. It will also provide leadership on legislation and intelligence activities and programs, and provide vigilant oversight over the intelligence activities to assure that such activities are in conformity within the international law. Show less The CSCSS / C3i Group Select Committee on Cyber Intelligence (SCCI) provides leadership through CSCSS and C3i to deliver a proactive stance on cyber intelligence and provide for the sharing of certain cyber threat intelligence and cyber threat information between elements of the private-sector + intelligence community to share cyber threat to address the threat proactively. Mission: The Committee was created to provide an independent framework of convergence for the public-private… Show more The CSCSS / C3i Group Select Committee on Cyber Intelligence (SCCI) provides leadership through CSCSS and C3i to deliver a proactive stance on cyber intelligence and provide for the sharing of certain cyber threat intelligence and cyber threat information between elements of the private-sector + intelligence community to share cyber threat to address the threat proactively. Mission: The Committee was created to provide an independent framework of convergence for the public-private sector, academia and to make continuing studies of the intelligence activities and programs of on the global stage to provide leadership, and promote, recommend and deliver guidance on intelligence and information sharing. The committee well works to advise on and submit appropriate proposals for public special projects, intelligence sharing within industry sectors, commissioned studies and provide input to policy on intelligence. It will also provide leadership on legislation and intelligence activities and programs, and provide vigilant oversight over the intelligence activities to assure that such activities are in conformity within the international law. Show less

    • Conference Chair - Computer Simulation for Security
      • Nov 2013 - Present

      The European Modeling and Simulation Symposium is one of the most important Simulation Appointment in Europe. As tradition the conference focuses on Modeling & Simulation in Industry taking into consideration both applications and theoretical approaches. The conference proposes a multi-sides perspective to Modeling & Simulation environment. Tracks organization is intended to cover different research macro-areas dedicated to Industrial Engineering, Effective Design, Business, Economy and… Show more The European Modeling and Simulation Symposium is one of the most important Simulation Appointment in Europe. As tradition the conference focuses on Modeling & Simulation in Industry taking into consideration both applications and theoretical approaches. The conference proposes a multi-sides perspective to Modeling & Simulation environment. Tracks organization is intended to cover different research macro-areas dedicated to Industrial Engineering, Effective Design, Business, Economy and Finance, Medicine, Methodologies, Techniques and Applications. Such framework gives to scientists, technicians and users the opportunity to interact, collaborate on the most challenging research topics in the field of Modeling & Simulation. Show less The European Modeling and Simulation Symposium is one of the most important Simulation Appointment in Europe. As tradition the conference focuses on Modeling & Simulation in Industry taking into consideration both applications and theoretical approaches. The conference proposes a multi-sides perspective to Modeling & Simulation environment. Tracks organization is intended to cover different research macro-areas dedicated to Industrial Engineering, Effective Design, Business, Economy and… Show more The European Modeling and Simulation Symposium is one of the most important Simulation Appointment in Europe. As tradition the conference focuses on Modeling & Simulation in Industry taking into consideration both applications and theoretical approaches. The conference proposes a multi-sides perspective to Modeling & Simulation environment. Tracks organization is intended to cover different research macro-areas dedicated to Industrial Engineering, Effective Design, Business, Economy and Finance, Medicine, Methodologies, Techniques and Applications. Such framework gives to scientists, technicians and users the opportunity to interact, collaborate on the most challenging research topics in the field of Modeling & Simulation. Show less

    • Conference Chair - International Defense and Homeland Security
      • Apr 2011 - Present

      Modeling and simulation are essential to research, development and adoption of the next generation of technologies. Nevertheless, these technologies must be delivered to different industries in a close collaboration with academia through public-private partnerships. On the other hand, modeling and simulation are now key competencies to be incorporated by the security workforce. Security is sometimes an obscure topic because of the needs to preserve privacy but simulation is one possible way to… Show more Modeling and simulation are essential to research, development and adoption of the next generation of technologies. Nevertheless, these technologies must be delivered to different industries in a close collaboration with academia through public-private partnerships. On the other hand, modeling and simulation are now key competencies to be incorporated by the security workforce. Security is sometimes an obscure topic because of the needs to preserve privacy but simulation is one possible way to address this issue. Examples of new approaches include agent based simulation and similar techniques that may be used to model behaviors, malicious or not. These simulations favor relevant discoveries while being commonly used to test current or experimental detection methods at low cost. In this way, the goal of this track is consider the state of the art in security within the perspective of simulation. Show less Modeling and simulation are essential to research, development and adoption of the next generation of technologies. Nevertheless, these technologies must be delivered to different industries in a close collaboration with academia through public-private partnerships. On the other hand, modeling and simulation are now key competencies to be incorporated by the security workforce. Security is sometimes an obscure topic because of the needs to preserve privacy but simulation is one possible way to… Show more Modeling and simulation are essential to research, development and adoption of the next generation of technologies. Nevertheless, these technologies must be delivered to different industries in a close collaboration with academia through public-private partnerships. On the other hand, modeling and simulation are now key competencies to be incorporated by the security workforce. Security is sometimes an obscure topic because of the needs to preserve privacy but simulation is one possible way to address this issue. Examples of new approaches include agent based simulation and similar techniques that may be used to model behaviors, malicious or not. These simulations favor relevant discoveries while being commonly used to test current or experimental detection methods at low cost. In this way, the goal of this track is consider the state of the art in security within the perspective of simulation. Show less

    • Advisory Board Member - Ideas That Shape (ITS)
      • Jun 2012 - Present

      Member of the International Advisory Board at - Ideas That Shape (ITS). ITS is a nonpartisan and autonomous Think-Tank that has been active since April 2010. Ideas That Shape (ITS) serves as a medium and portal for exchange of ideas, knowledge and information. Ideas That Shape (ITS) is dedicated to present, publish and discuss various articles, research papers, scholarly works and analyses, that their areas of focus are Geopolitical and Sociopolitical Studies, International Relations… Show more Member of the International Advisory Board at - Ideas That Shape (ITS). ITS is a nonpartisan and autonomous Think-Tank that has been active since April 2010. Ideas That Shape (ITS) serves as a medium and portal for exchange of ideas, knowledge and information. Ideas That Shape (ITS) is dedicated to present, publish and discuss various articles, research papers, scholarly works and analyses, that their areas of focus are Geopolitical and Sociopolitical Studies, International Relations, International Trade, Global Energy Analysis, Cultural Studies, and International and Security Studies. Show less Member of the International Advisory Board at - Ideas That Shape (ITS). ITS is a nonpartisan and autonomous Think-Tank that has been active since April 2010. Ideas That Shape (ITS) serves as a medium and portal for exchange of ideas, knowledge and information. Ideas That Shape (ITS) is dedicated to present, publish and discuss various articles, research papers, scholarly works and analyses, that their areas of focus are Geopolitical and Sociopolitical Studies, International Relations… Show more Member of the International Advisory Board at - Ideas That Shape (ITS). ITS is a nonpartisan and autonomous Think-Tank that has been active since April 2010. Ideas That Shape (ITS) serves as a medium and portal for exchange of ideas, knowledge and information. Ideas That Shape (ITS) is dedicated to present, publish and discuss various articles, research papers, scholarly works and analyses, that their areas of focus are Geopolitical and Sociopolitical Studies, International Relations, International Trade, Global Energy Analysis, Cultural Studies, and International and Security Studies. Show less

  • Yinchuan Smart Cities Summit
    • Yinchuan, Ningxia, China
    • Keynote
      • Nov 2018 - Jan 2019

      Opening Keynote Smart Cities Conference China. Presented to more than 1500 international business, government and industry leaders focusing on the 'Internet of Things" and 'Smart Cities" My keynote was on the evolving threats of IOT posed to Smart Cities Development . Opening Keynote Smart Cities Conference China. Presented to more than 1500 international business, government and industry leaders focusing on the 'Internet of Things" and 'Smart Cities" My keynote was on the evolving threats of IOT posed to Smart Cities Development .

    • Workshop - Cyber Terroism + Attack - Protecting Your Network
      • Jun 2016 - Jun 2016

      The workshop will provided delegates with a solid understanding the systemic issues of cyber-attack, it’s motivations attack methodologies and defences, and the impact of cyber-attack. It will included the tools, technologies, policies, methodologies, to understand cybersecurity, intelligence, and countermeasures and their related roles in the direct threats posed by cyber-attacks. The workshop will promoted initiatives that increase ROI while addressing risks within organisations and… Show more The workshop will provided delegates with a solid understanding the systemic issues of cyber-attack, it’s motivations attack methodologies and defences, and the impact of cyber-attack. It will included the tools, technologies, policies, methodologies, to understand cybersecurity, intelligence, and countermeasures and their related roles in the direct threats posed by cyber-attacks. The workshop will promoted initiatives that increase ROI while addressing risks within organisations and provide a deep understanding of the direct issues cyber-attack, its countermeasures and fundamental protection methods.

    • Workshop - CyberStorm Cyber Security Breach Scenario Excercise - Workshop
      • Jun 2016 - Jun 2016

      Cyber Shock: The exercise requires critical decision-making and delivers a unique experience by allowing all participants to feel pressure as they make fast paced assessments, decisions and to see the impact and consequences of their actions in.

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Panel Member : Emergency Planning for Critical Infrastructure – Collaboration in Action
      • Jul 2015 - Oct 2015

      i am presenting on : PANEL: What Every Emergency Manager Needsto Know About Cyber Security Tuesday, October 20 to Wednesday, October 21, 2015 The Canadian Institute's Emergency Planning for Critical Infrastructure – Collaboration in Action conference is unlike any other event on the market. Loaded with thought provoking discussions on the most pressing issues, a diverse faculty of experts representing the country's critical infrastructure sectors and four strategically designed… Show more i am presenting on : PANEL: What Every Emergency Manager Needsto Know About Cyber Security Tuesday, October 20 to Wednesday, October 21, 2015 The Canadian Institute's Emergency Planning for Critical Infrastructure – Collaboration in Action conference is unlike any other event on the market. Loaded with thought provoking discussions on the most pressing issues, a diverse faculty of experts representing the country's critical infrastructure sectors and four strategically designed scenario-based interactive activities, delegates will return to their respective organizations with the information and tools they need to properly prepare, plan and rapidly respond to the most challenging emergency situations. Show less i am presenting on : PANEL: What Every Emergency Manager Needsto Know About Cyber Security Tuesday, October 20 to Wednesday, October 21, 2015 The Canadian Institute's Emergency Planning for Critical Infrastructure – Collaboration in Action conference is unlike any other event on the market. Loaded with thought provoking discussions on the most pressing issues, a diverse faculty of experts representing the country's critical infrastructure sectors and four strategically designed… Show more i am presenting on : PANEL: What Every Emergency Manager Needsto Know About Cyber Security Tuesday, October 20 to Wednesday, October 21, 2015 The Canadian Institute's Emergency Planning for Critical Infrastructure – Collaboration in Action conference is unlike any other event on the market. Loaded with thought provoking discussions on the most pressing issues, a diverse faculty of experts representing the country's critical infrastructure sectors and four strategically designed scenario-based interactive activities, delegates will return to their respective organizations with the information and tools they need to properly prepare, plan and rapidly respond to the most challenging emergency situations. Show less

  • Advisory Member
    • Brussels, Belgium
    • Organizing Committee & Advisory Board Member - "Security in Europe” Conference and Expo 2014
      • Nov 2013 - Jul 2014

      Conference Program Committee and Advisory Board for “Security in Europe” Conference and Expo, which will be held June 4-5 2014, in Brussels. - Provide strategic insight, leadership to the conference to address the major cyber and physical security concerns throughout the continent. Best of breed technologies, products and services from around the globe will be on display, providing solutions to Europe’s security concerns. Security Europe is an opportunity to tap into the hundreds of millions… Show more Conference Program Committee and Advisory Board for “Security in Europe” Conference and Expo, which will be held June 4-5 2014, in Brussels. - Provide strategic insight, leadership to the conference to address the major cyber and physical security concerns throughout the continent. Best of breed technologies, products and services from around the globe will be on display, providing solutions to Europe’s security concerns. Security Europe is an opportunity to tap into the hundreds of millions of euros being spent in an effort to ensure the continent’s safety. Show less Conference Program Committee and Advisory Board for “Security in Europe” Conference and Expo, which will be held June 4-5 2014, in Brussels. - Provide strategic insight, leadership to the conference to address the major cyber and physical security concerns throughout the continent. Best of breed technologies, products and services from around the globe will be on display, providing solutions to Europe’s security concerns. Security Europe is an opportunity to tap into the hundreds of millions… Show more Conference Program Committee and Advisory Board for “Security in Europe” Conference and Expo, which will be held June 4-5 2014, in Brussels. - Provide strategic insight, leadership to the conference to address the major cyber and physical security concerns throughout the continent. Best of breed technologies, products and services from around the globe will be on display, providing solutions to Europe’s security concerns. Security Europe is an opportunity to tap into the hundreds of millions of euros being spent in an effort to ensure the continent’s safety. Show less

    • IT Services and IT Consulting
    • 1 - 100 Employee
    • Executive Vice President, International
      • Sep 2010 - Feb 2012

      The Global Institute for Cyber Security and Research [GICSR] is a non-profit organization seeking to advance comprehensive cyber security initiatives, cyber innovation, and research by providing strategic focus, critical insight, recommendations, and practical policy solutions. The Global Institute for Cyber Security and Research [GICSR] is a non-profit organization seeking to advance comprehensive cyber security initiatives, cyber innovation, and research by providing strategic focus, critical insight, recommendations, and practical policy solutions.

    • President, CEO / COO
      • Sep 2008 - Jan 2011

      The two day CXO Summit presents a forum for the development of realistic approaches and corporate strategies to effectively converge and integrate security into business goals and objectives, and into the corporate culture. Ultimately, security must serve business and clearly achieve the business objective that spawned it. It is critical for business and security communities to align and to integrate security as an essential part of the constant change process of business. The… Show more The two day CXO Summit presents a forum for the development of realistic approaches and corporate strategies to effectively converge and integrate security into business goals and objectives, and into the corporate culture. Ultimately, security must serve business and clearly achieve the business objective that spawned it. It is critical for business and security communities to align and to integrate security as an essential part of the constant change process of business. The CXO Summit focuses on the top priority of the contemporary CXO: Merging business and security. Show less The two day CXO Summit presents a forum for the development of realistic approaches and corporate strategies to effectively converge and integrate security into business goals and objectives, and into the corporate culture. Ultimately, security must serve business and clearly achieve the business objective that spawned it. It is critical for business and security communities to align and to integrate security as an essential part of the constant change process of business. The… Show more The two day CXO Summit presents a forum for the development of realistic approaches and corporate strategies to effectively converge and integrate security into business goals and objectives, and into the corporate culture. Ultimately, security must serve business and clearly achieve the business objective that spawned it. It is critical for business and security communities to align and to integrate security as an essential part of the constant change process of business. The CXO Summit focuses on the top priority of the contemporary CXO: Merging business and security. Show less

    • President, CEO
      • Sep 2004 - Dec 2010

    • Subject Matter Expert
      • Jan 2004 - Dec 2010

      As a course author I have written and delivered the following courseware: Applied Penetration Testing, Network Security Assessment and Open Source Security Tools which has been taught at IBM to IBM global Partners as well as the University of Ontario, Institute of Technology and Bank of Montreal. As a course author I have written and delivered the following courseware: Applied Penetration Testing, Network Security Assessment and Open Source Security Tools which has been taught at IBM to IBM global Partners as well as the University of Ontario, Institute of Technology and Bank of Montreal.

Education

  • Flemming College, Ryerson University, Humber College
    Information Security
    1984 - 1996

Community

You need to have a working account to view this content. Click here to join now