ºÝºÝߣshows by User: JohnPalfreyman / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: JohnPalfreyman / Fri, 04 Nov 2016 13:20:07 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: JohnPalfreyman Car lease demo instructions /slideshow/car-lease-demo-instructions/68191307 carleasedemo-instructions-161104132007
Instructions for running the blockchain car leasing demo app. To set up the demo, follow this link > http://ibm.biz/BlockDemoApp]]>

Instructions for running the blockchain car leasing demo app. To set up the demo, follow this link > http://ibm.biz/BlockDemoApp]]>
Fri, 04 Nov 2016 13:20:07 GMT /slideshow/car-lease-demo-instructions/68191307 JohnPalfreyman@slideshare.net(JohnPalfreyman) Car lease demo instructions JohnPalfreyman Instructions for running the blockchain car leasing demo app. To set up the demo, follow this link > http://ibm.biz/BlockDemoApp <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/carleasedemo-instructions-161104132007-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Instructions for running the blockchain car leasing demo app. To set up the demo, follow this link &gt; http://ibm.biz/BlockDemoApp
Car lease demo instructions from John Palfreyman
]]>
1156 8 https://cdn.slidesharecdn.com/ss_thumbnails/carleasedemo-instructions-161104132007-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing Systems of Engagement /slideshow/securing-so-e-v1/49865465 securingsoev1-150626075646-lva1-app6892
My presentation to Warwick Manufacturing Group MSc course on 25th June 2015]]>

My presentation to Warwick Manufacturing Group MSc course on 25th June 2015]]>
Fri, 26 Jun 2015 07:56:46 GMT /slideshow/securing-so-e-v1/49865465 JohnPalfreyman@slideshare.net(JohnPalfreyman) Securing Systems of Engagement JohnPalfreyman My presentation to Warwick Manufacturing Group MSc course on 25th June 2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securingsoev1-150626075646-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> My presentation to Warwick Manufacturing Group MSc course on 25th June 2015
Securing Systems of Engagement from John Palfreyman
]]>
452 2 https://cdn.slidesharecdn.com/ss_thumbnails/securingsoev1-150626075646-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cloud for the Military - Projects, Promise /slideshow/mil-cloudist/49399705 milcloudist-150615102658-lva1-app6892
Cloud computing offers much promise to the military by addressing the fundamentals of increasing mission agility / complexity in a climate of economic constraint. This presentation - given to the NATO IST-125 panel in Ankara, Turkey on the 11th Jun 2015 - analyses cloud usage in three project case studies then specifically considers the SECURITY challenge and how this can be addressed as cloud evolves in future.]]>

Cloud computing offers much promise to the military by addressing the fundamentals of increasing mission agility / complexity in a climate of economic constraint. This presentation - given to the NATO IST-125 panel in Ankara, Turkey on the 11th Jun 2015 - analyses cloud usage in three project case studies then specifically considers the SECURITY challenge and how this can be addressed as cloud evolves in future.]]>
Mon, 15 Jun 2015 10:26:58 GMT /slideshow/mil-cloudist/49399705 JohnPalfreyman@slideshare.net(JohnPalfreyman) Cloud for the Military - Projects, Promise JohnPalfreyman Cloud computing offers much promise to the military by addressing the fundamentals of increasing mission agility / complexity in a climate of economic constraint. This presentation - given to the NATO IST-125 panel in Ankara, Turkey on the 11th Jun 2015 - analyses cloud usage in three project case studies then specifically considers the SECURITY challenge and how this can be addressed as cloud evolves in future. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/milcloudist-150615102658-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Cloud computing offers much promise to the military by addressing the fundamentals of increasing mission agility / complexity in a climate of economic constraint. This presentation - given to the NATO IST-125 panel in Ankara, Turkey on the 11th Jun 2015 - analyses cloud usage in three project case studies then specifically considers the SECURITY challenge and how this can be addressed as cloud evolves in future.
Cloud for the Military - Projects, Promise from John Palfreyman
]]>
991 5 https://cdn.slidesharecdn.com/ss_thumbnails/milcloudist-150615102658-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Smarter Cyber Security /slideshow/smarter-cyber-security/48835736 eztnl2ketscmdanjzbex-signature-5f0b7383a3199dd76d3607f46c3cfec29aaa36262776aceab43affe22992acf8-poli-150601110320-lva1-app6891
There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it's increasingly difficult to know where information systems start and end. This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach.]]>

There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it's increasingly difficult to know where information systems start and end. This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach.]]>
Mon, 01 Jun 2015 11:03:20 GMT /slideshow/smarter-cyber-security/48835736 JohnPalfreyman@slideshare.net(JohnPalfreyman) Smarter Cyber Security JohnPalfreyman There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it's increasingly difficult to know where information systems start and end. This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/eztnl2ketscmdanjzbex-signature-5f0b7383a3199dd76d3607f46c3cfec29aaa36262776aceab43affe22992acf8-poli-150601110320-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> There are many challenges to organisations that wish to protect themselves against cyber threat. The threats are constantly evolving and it&#39;s increasingly difficult to know where information systems start and end. This presentation discusses the challenges presented by the explosive growth of SmartPhones and Social Medial usage. It also discusses modern mitigation approaches and explains effective containment thorough a risk based, intelligence led approach.
Smarter Cyber Security from John Palfreyman
]]>
463 5 https://cdn.slidesharecdn.com/ss_thumbnails/eztnl2ketscmdanjzbex-signature-5f0b7383a3199dd76d3607f46c3cfec29aaa36262776aceab43affe22992acf8-poli-150601110320-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security at CTX15, London /slideshow/cyber-security-at-ctx15-london/47320575 btonbh0xqqylkl3q1qm0-signature-ea26ec3ff2539d4d27fb90fc78167fe2b96a28ab1126000c2fec33d5e3072925-poli-150423025308-conversion-gate02
]]>

]]>
Thu, 23 Apr 2015 02:53:08 GMT /slideshow/cyber-security-at-ctx15-london/47320575 JohnPalfreyman@slideshare.net(JohnPalfreyman) Cyber Security at CTX15, London JohnPalfreyman <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/btonbh0xqqylkl3q1qm0-signature-ea26ec3ff2539d4d27fb90fc78167fe2b96a28ab1126000c2fec33d5e3072925-poli-150423025308-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Cyber Security at CTX15, London from John Palfreyman
]]>
802 1 https://cdn.slidesharecdn.com/ss_thumbnails/btonbh0xqqylkl3q1qm0-signature-ea26ec3ff2539d4d27fb90fc78167fe2b96a28ab1126000c2fec33d5e3072925-poli-150423025308-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber crime in a Smart Phone & Social Media Obsessed World /slideshow/cyber-crime-v2a/46435272 wdvxj1srrbeettp0cxcy-signature-3f333ac0d85f03ab6e593249f92f0be620b60ab4ccaf23d2dd97cbf73ae8b2ed-poli-150330015902-conversion-gate01
With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure.]]>

With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure.]]>
Mon, 30 Mar 2015 01:59:02 GMT /slideshow/cyber-crime-v2a/46435272 JohnPalfreyman@slideshare.net(JohnPalfreyman) Cyber crime in a Smart Phone & Social Media Obsessed World JohnPalfreyman With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wdvxj1srrbeettp0cxcy-signature-3f333ac0d85f03ab6e593249f92f0be620b60ab4ccaf23d2dd97cbf73ae8b2ed-poli-150330015902-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> With so much hype, and shrouded in technical gobbledygook it&#39;s hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it&#39;s relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a &quot;smarter&quot; approach can be adopted to make systems secure.
Cyber crime in a Smart Phone & Social Media Obsessed World from John Palfreyman
]]>
2113 5 https://cdn.slidesharecdn.com/ss_thumbnails/wdvxj1srrbeettp0cxcy-signature-3f333ac0d85f03ab6e593249f92f0be620b60ab4ccaf23d2dd97cbf73ae8b2ed-poli-150330015902-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Smarter cyber security v8 /slideshow/smarter-cyber-security-v8/43210060 wllppol3sdyhzt5pssxp-signature-2d8ea9f5d75b4ad63554be2a21edf84357fd5ed35d5f0f9394d428ccc23c9d3c-poli-150105083653-conversion-gate01
Systems of Engagement offer much value to industry & government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement & illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.]]>

Systems of Engagement offer much value to industry & government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement & illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.]]>
Mon, 05 Jan 2015 08:36:53 GMT /slideshow/smarter-cyber-security-v8/43210060 JohnPalfreyman@slideshare.net(JohnPalfreyman) Smarter cyber security v8 JohnPalfreyman Systems of Engagement offer much value to industry & government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement & illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wllppol3sdyhzt5pssxp-signature-2d8ea9f5d75b4ad63554be2a21edf84357fd5ed35d5f0f9394d428ccc23c9d3c-poli-150105083653-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Systems of Engagement offer much value to industry &amp; government alike but care needs to be taken in how they are protected against cyber attack. In this presentation I explain Systems of Engagement &amp; illustrate the benefits using government case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.
Smarter cyber security v8 from John Palfreyman
]]>
999 6 https://cdn.slidesharecdn.com/ss_thumbnails/wllppol3sdyhzt5pssxp-signature-2d8ea9f5d75b4ad63554be2a21edf84357fd5ed35d5f0f9394d428ccc23c9d3c-poli-150105083653-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Big Data & Analytics for Government - Case Studies /slideshow/big-data-for-government-case-studies/41394086 jlxl7zwgsaug8ydfq5mz-signature-6b45c658a10d403d52bd4071e5ee43d5686e80fcc9682ca67c76f727438749c6-poli-141111031104-conversion-gate01
This presentation explains the future challenges that Governments face, and illustrates how Big Data & Analytics technologies can help address these challenges. Four case studies - based on recent customer projects - are used to show the value that the innovative application of these technologies can bring.]]>

This presentation explains the future challenges that Governments face, and illustrates how Big Data & Analytics technologies can help address these challenges. Four case studies - based on recent customer projects - are used to show the value that the innovative application of these technologies can bring.]]>
Tue, 11 Nov 2014 03:11:04 GMT /slideshow/big-data-for-government-case-studies/41394086 JohnPalfreyman@slideshare.net(JohnPalfreyman) Big Data & Analytics for Government - Case Studies JohnPalfreyman This presentation explains the future challenges that Governments face, and illustrates how Big Data & Analytics technologies can help address these challenges. Four case studies - based on recent customer projects - are used to show the value that the innovative application of these technologies can bring. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/jlxl7zwgsaug8ydfq5mz-signature-6b45c658a10d403d52bd4071e5ee43d5686e80fcc9682ca67c76f727438749c6-poli-141111031104-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation explains the future challenges that Governments face, and illustrates how Big Data &amp; Analytics technologies can help address these challenges. Four case studies - based on recent customer projects - are used to show the value that the innovative application of these technologies can bring.
Big Data & Analytics for Government - Case Studies from John Palfreyman
]]>
4766 9 https://cdn.slidesharecdn.com/ss_thumbnails/jlxl7zwgsaug8ydfq5mz-signature-6b45c658a10d403d52bd4071e5ee43d5686e80fcc9682ca67c76f727438749c6-poli-141111031104-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure Systems of Engagement /slideshow/secure-systems-of-engagement/38905690 5uqqv9wariioawkiqpzh-signature-0e1a6e58b7357f5babdfa1993f0c8d4af8f0ea38192014511240cd2dd49ca2ec-poli-140910020127-phpapp01
Systems of Engagement offer much value to the military, but care needs to be taken in how they are protected against cyber attack. In this presentation (given to EUCOM Cyber Endeavour on the 9th September 2014) I explain Systems of Engagement & illustrate the military benefits using case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology. ]]>

Systems of Engagement offer much value to the military, but care needs to be taken in how they are protected against cyber attack. In this presentation (given to EUCOM Cyber Endeavour on the 9th September 2014) I explain Systems of Engagement & illustrate the military benefits using case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology. ]]>
Wed, 10 Sep 2014 02:01:27 GMT /slideshow/secure-systems-of-engagement/38905690 JohnPalfreyman@slideshare.net(JohnPalfreyman) Secure Systems of Engagement JohnPalfreyman Systems of Engagement offer much value to the military, but care needs to be taken in how they are protected against cyber attack. In this presentation (given to EUCOM Cyber Endeavour on the 9th September 2014) I explain Systems of Engagement & illustrate the military benefits using case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/5uqqv9wariioawkiqpzh-signature-0e1a6e58b7357f5babdfa1993f0c8d4af8f0ea38192014511240cd2dd49ca2ec-poli-140910020127-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Systems of Engagement offer much value to the military, but care needs to be taken in how they are protected against cyber attack. In this presentation (given to EUCOM Cyber Endeavour on the 9th September 2014) I explain Systems of Engagement &amp; illustrate the military benefits using case studies. I then discuss the security challenges Systems of Engagement pose and how to address them with commercial software technologies. Finally I look ahead to how to defend Systems of Insight hosted on future generations of cloud technology.
Secure Systems of Engagement from John Palfreyman
]]>
1120 1 https://cdn.slidesharecdn.com/ss_thumbnails/5uqqv9wariioawkiqpzh-signature-0e1a6e58b7357f5babdfa1993f0c8d4af8f0ea38192014511240cd2dd49ca2ec-poli-140910020127-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NATO Federated Mission Networking /slideshow/nato-federated-mission-networking/33262311 fmnn-c4isr14v4-140408040445-phpapp02
This is a synopsis of my presentation to the NATO C4ISR Conference in Bucharest on 26th March 2014. NATO is keen to learn the lessons from networked operations in the Afghan theater, and build these into their mission networking plans. This presentation draws on IBM’s experience in defence projects, NATO concept developments and recent exercises, and puts forward our key learning points & recommendations.]]>

This is a synopsis of my presentation to the NATO C4ISR Conference in Bucharest on 26th March 2014. NATO is keen to learn the lessons from networked operations in the Afghan theater, and build these into their mission networking plans. This presentation draws on IBM’s experience in defence projects, NATO concept developments and recent exercises, and puts forward our key learning points & recommendations.]]>
Tue, 08 Apr 2014 04:04:44 GMT /slideshow/nato-federated-mission-networking/33262311 JohnPalfreyman@slideshare.net(JohnPalfreyman) NATO Federated Mission Networking JohnPalfreyman This is a synopsis of my presentation to the NATO C4ISR Conference in Bucharest on 26th March 2014. NATO is keen to learn the lessons from networked operations in the Afghan theater, and build these into their mission networking plans. This presentation draws on IBM’s experience in defence projects, NATO concept developments and recent exercises, and puts forward our key learning points & recommendations. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fmnn-c4isr14v4-140408040445-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This is a synopsis of my presentation to the NATO C4ISR Conference in Bucharest on 26th March 2014. NATO is keen to learn the lessons from networked operations in the Afghan theater, and build these into their mission networking plans. This presentation draws on IBM’s experience in defence projects, NATO concept developments and recent exercises, and puts forward our key learning points &amp; recommendations.
NATO Federated Mission Networking from John Palfreyman
]]>
4886 11 https://cdn.slidesharecdn.com/ss_thumbnails/fmnn-c4isr14v4-140408040445-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-JohnPalfreyman-48x48.jpg?cb=1550838964 I am a highly motivated, customer focused and creative leader / practitioner with over thirty years experience in information technology. I have practical experience in using emerging technology to solve customer problems - reducing costs, improving efficiency and / or growing revenue. I am able to balance deep technical knowledge with an informed industry viewpoint. I have had the privilege of leading teams in the UK, Germany, across Europe and Globally, taking General Management responsibility in challenging of business climates and achieving outstanding results. I am committed to motivating colleagues and team members to give of their best, and have much experience in working in a ... https://cdn.slidesharecdn.com/ss_thumbnails/carleasedemo-instructions-161104132007-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/car-lease-demo-instructions/68191307 Car lease demo instr... https://cdn.slidesharecdn.com/ss_thumbnails/securingsoev1-150626075646-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/securing-so-e-v1/49865465 Securing Systems of En... https://cdn.slidesharecdn.com/ss_thumbnails/milcloudist-150615102658-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/mil-cloudist/49399705 Cloud for the Military...