ºÝºÝߣshows by User: OllieWhitehouse / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: OllieWhitehouse / Mon, 25 Apr 2016 13:05:47 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: OllieWhitehouse Private sector cyber resilience and the role of data diodes /slideshow/private-sector-cyber-resilience-and-the-role-of-data-diodes/61321335 privatesectorcyberresilienceandtheroleofdatadiodes-160425130547
This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation.]]>

This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation.]]>
Mon, 25 Apr 2016 13:05:47 GMT /slideshow/private-sector-cyber-resilience-and-the-role-of-data-diodes/61321335 OllieWhitehouse@slideshare.net(OllieWhitehouse) Private sector cyber resilience and the role of data diodes OllieWhitehouse This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/privatesectorcyberresilienceandtheroleofdatadiodes-160425130547-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This whitepaper intended for enterprise architects and cyber security professionals looks at the role of data diodes in modern network design and operation.
Private sector cyber resilience and the role of data diodes from Ollie Whitehouse
]]>
448 4 https://cdn.slidesharecdn.com/ss_thumbnails/privatesectorcyberresilienceandtheroleofdatadiodes-160425130547-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NCC Group C Suite Cyber Security Advisory Services /slideshow/ncc-group-c-suite-cyber-security-advisory-services/56600293 c-suitecyberadvisoryservices2-160102072848
An overview of the CxO and board level cyber security services from NCC Group]]>

An overview of the CxO and board level cyber security services from NCC Group]]>
Sat, 02 Jan 2016 07:28:48 GMT /slideshow/ncc-group-c-suite-cyber-security-advisory-services/56600293 OllieWhitehouse@slideshare.net(OllieWhitehouse) NCC Group C Suite Cyber Security Advisory Services OllieWhitehouse An overview of the CxO and board level cyber security services from NCC Group <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/c-suitecyberadvisoryservices2-160102072848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An overview of the CxO and board level cyber security services from NCC Group
NCC Group C Suite Cyber Security Advisory Services from Ollie Whitehouse
]]>
741 8 https://cdn.slidesharecdn.com/ss_thumbnails/c-suitecyberadvisoryservices2-160102072848-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
NCC Group Pro-active Breach Discovery: Network Threat Assessment /OllieWhitehouse/ncc-group-proactive-breach-discovery-network-threat-assessment nccgroupnetworkthreatassessment-151104080207-lva1-app6892
NCC Group's Cyber Defense Operation team conduct pro-active network threat assessment exercises that help inform executives and their teams as to exposure exists today. As part of an NCC Group NTA we pro-active identify breaches, poor practices such as unencrypted protocol usage and unintended cloud service usage.]]>

NCC Group's Cyber Defense Operation team conduct pro-active network threat assessment exercises that help inform executives and their teams as to exposure exists today. As part of an NCC Group NTA we pro-active identify breaches, poor practices such as unencrypted protocol usage and unintended cloud service usage.]]>
Wed, 04 Nov 2015 08:02:07 GMT /OllieWhitehouse/ncc-group-proactive-breach-discovery-network-threat-assessment OllieWhitehouse@slideshare.net(OllieWhitehouse) NCC Group Pro-active Breach Discovery: Network Threat Assessment OllieWhitehouse NCC Group's Cyber Defense Operation team conduct pro-active network threat assessment exercises that help inform executives and their teams as to exposure exists today. As part of an NCC Group NTA we pro-active identify breaches, poor practices such as unencrypted protocol usage and unintended cloud service usage. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nccgroupnetworkthreatassessment-151104080207-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NCC Group&#39;s Cyber Defense Operation team conduct pro-active network threat assessment exercises that help inform executives and their teams as to exposure exists today. As part of an NCC Group NTA we pro-active identify breaches, poor practices such as unencrypted protocol usage and unintended cloud service usage.
NCC Group Pro-active Breach Discovery: Network Threat Assessment from Ollie Whitehouse
]]>
915 8 https://cdn.slidesharecdn.com/ss_thumbnails/nccgroupnetworkthreatassessment-151104080207-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds document 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Securing your supply chain & vicarious liability (cyber security) /slideshow/securing-your-supply-chain-vicarious-liability-cyber-security/54720165 2015-11-02-nccgroup-cyberriskandinsuranceevent-151104061810-lva1-app6892
A short 25 minute presentation given at the Cyber Risk and Insurance conference in London on November 3, 2015. It looks at supply chain cyber security and risk management as well as information classifications systems and what good today is. ]]>

A short 25 minute presentation given at the Cyber Risk and Insurance conference in London on November 3, 2015. It looks at supply chain cyber security and risk management as well as information classifications systems and what good today is. ]]>
Wed, 04 Nov 2015 06:18:10 GMT /slideshow/securing-your-supply-chain-vicarious-liability-cyber-security/54720165 OllieWhitehouse@slideshare.net(OllieWhitehouse) Securing your supply chain & vicarious liability (cyber security) OllieWhitehouse A short 25 minute presentation given at the Cyber Risk and Insurance conference in London on November 3, 2015. It looks at supply chain cyber security and risk management as well as information classifications systems and what good today is. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-11-02-nccgroup-cyberriskandinsuranceevent-151104061810-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A short 25 minute presentation given at the Cyber Risk and Insurance conference in London on November 3, 2015. It looks at supply chain cyber security and risk management as well as information classifications systems and what good today is.
Securing your supply chain & vicarious liability (cyber security) from Ollie Whitehouse
]]>
910 9 https://cdn.slidesharecdn.com/ss_thumbnails/2015-11-02-nccgroup-cyberriskandinsuranceevent-151104061810-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers /OllieWhitehouse/introductio-to-advanced-persistent-threats-apt-for-nonsecurity-engineers 2015-09-20-ietcybersecurityforcriticalinfrastructure-aptforengineers-noanimation-150921163955-lva1-app6892
This short 45 minutes presentation is aimed at ICS/SCADA and general IT engineers who want to understand basic concepts related to the much discussed threat that is APT. The audience is first introduced to the concepts, who employs APTs before going into how they manifest before finally closing out with mitigation and defense strategies.]]>

This short 45 minutes presentation is aimed at ICS/SCADA and general IT engineers who want to understand basic concepts related to the much discussed threat that is APT. The audience is first introduced to the concepts, who employs APTs before going into how they manifest before finally closing out with mitigation and defense strategies.]]>
Mon, 21 Sep 2015 16:39:55 GMT /OllieWhitehouse/introductio-to-advanced-persistent-threats-apt-for-nonsecurity-engineers OllieWhitehouse@slideshare.net(OllieWhitehouse) Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers OllieWhitehouse This short 45 minutes presentation is aimed at ICS/SCADA and general IT engineers who want to understand basic concepts related to the much discussed threat that is APT. The audience is first introduced to the concepts, who employs APTs before going into how they manifest before finally closing out with mitigation and defense strategies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-09-20-ietcybersecurityforcriticalinfrastructure-aptforengineers-noanimation-150921163955-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This short 45 minutes presentation is aimed at ICS/SCADA and general IT engineers who want to understand basic concepts related to the much discussed threat that is APT. The audience is first introduced to the concepts, who employs APTs before going into how they manifest before finally closing out with mitigation and defense strategies.
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers from Ollie Whitehouse
]]>
2382 10 https://cdn.slidesharecdn.com/ss_thumbnails/2015-09-20-ietcybersecurityforcriticalinfrastructure-aptforengineers-noanimation-150921163955-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Technology Horizon & Cyber Security from EISIC 2015 /slideshow/the-technology-horizon-cyber-security-from-eisic-2015/52545780 2015-09-08-eisic2015-manchester-thetechnologyhorizoncybersecurity-noanimation-150908161847-lva1-app6891
The Technology Horizon & Cyber Security talk delivered at EISIC 2015 ]]>

The Technology Horizon & Cyber Security talk delivered at EISIC 2015 ]]>
Tue, 08 Sep 2015 16:18:47 GMT /slideshow/the-technology-horizon-cyber-security-from-eisic-2015/52545780 OllieWhitehouse@slideshare.net(OllieWhitehouse) The Technology Horizon & Cyber Security from EISIC 2015 OllieWhitehouse The Technology Horizon & Cyber Security talk delivered at EISIC 2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-09-08-eisic2015-manchester-thetechnologyhorizoncybersecurity-noanimation-150908161847-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The Technology Horizon &amp; Cyber Security talk delivered at EISIC 2015
The Technology Horizon & Cyber Security from EISIC 2015 from Ollie Whitehouse
]]>
1109 8 https://cdn.slidesharecdn.com/ss_thumbnails/2015-09-08-eisic2015-manchester-thetechnologyhorizoncybersecurity-noanimation-150908161847-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains /slideshow/assuring-the-security-of-the-supply-chain/49773203 2015-06-23-2ndannualfinancialservicescybersecuritysummit-noanimation-150624081707-lva1-app6892
A presentation given at the 2nd Annual Financial Services Cyber Security Summit in London. Looking at cyber security risk and how it has historically applied to the supply chain. We present a maturity model, where the best or the rest are on it and how it can be applied.]]>

A presentation given at the 2nd Annual Financial Services Cyber Security Summit in London. Looking at cyber security risk and how it has historically applied to the supply chain. We present a maturity model, where the best or the rest are on it and how it can be applied.]]>
Wed, 24 Jun 2015 08:17:07 GMT /slideshow/assuring-the-security-of-the-supply-chain/49773203 OllieWhitehouse@slideshare.net(OllieWhitehouse) Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains OllieWhitehouse A presentation given at the 2nd Annual Financial Services Cyber Security Summit in London. Looking at cyber security risk and how it has historically applied to the supply chain. We present a maturity model, where the best or the rest are on it and how it can be applied. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-06-23-2ndannualfinancialservicescybersecuritysummit-noanimation-150624081707-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation given at the 2nd Annual Financial Services Cyber Security Summit in London. Looking at cyber security risk and how it has historically applied to the supply chain. We present a maturity model, where the best or the rest are on it and how it can be applied.
Assuring the Security of the Supply Chain - Designing best practices for cybersecurity in supply chains from Ollie Whitehouse
]]>
2064 4 https://cdn.slidesharecdn.com/ss_thumbnails/2015-06-23-2ndannualfinancialservicescybersecuritysummit-noanimation-150624081707-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Red Teaming and the Supply Chain /slideshow/red-teaming-and-the-supply-chain/49538810 2015-06-17-nccgroup-starredteamingandthesupplychain-release-noanimation-150618060544-lva1-app6892
A presentation given at a customer internal workshop around challenges we face and the value of red teaming in the supply chain.]]>

A presentation given at a customer internal workshop around challenges we face and the value of red teaming in the supply chain.]]>
Thu, 18 Jun 2015 06:05:44 GMT /slideshow/red-teaming-and-the-supply-chain/49538810 OllieWhitehouse@slideshare.net(OllieWhitehouse) Red Teaming and the Supply Chain OllieWhitehouse A presentation given at a customer internal workshop around challenges we face and the value of red teaming in the supply chain. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-06-17-nccgroup-starredteamingandthesupplychain-release-noanimation-150618060544-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation given at a customer internal workshop around challenges we face and the value of red teaming in the supply chain.
Red Teaming and the Supply Chain from Ollie Whitehouse
]]>
1471 3 https://cdn.slidesharecdn.com/ss_thumbnails/2015-06-17-nccgroup-starredteamingandthesupplychain-release-noanimation-150618060544-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Smart grid in the �Critical National Infrastructure /OllieWhitehouse/smart-grid-in-the-critical-national-infrastructure 2015-05-11-nccgroup-smartgridinthecriticalnationalinfrastructure-150519073752-lva1-app6891
A presentation from the IET's Cyber Security in Modern Power Systems held in Manchester, England in May 2015 on Smart grid in the Critical National Infrastructure.]]>

A presentation from the IET's Cyber Security in Modern Power Systems held in Manchester, England in May 2015 on Smart grid in the Critical National Infrastructure.]]>
Tue, 19 May 2015 07:37:52 GMT /OllieWhitehouse/smart-grid-in-the-critical-national-infrastructure OllieWhitehouse@slideshare.net(OllieWhitehouse) Smart grid in the �Critical National Infrastructure OllieWhitehouse A presentation from the IET's Cyber Security in Modern Power Systems held in Manchester, England in May 2015 on Smart grid in the Critical National Infrastructure. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-05-11-nccgroup-smartgridinthecriticalnationalinfrastructure-150519073752-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation from the IET&#39;s Cyber Security in Modern Power Systems held in Manchester, England in May 2015 on Smart grid in the Critical National Infrastructure.
Smart grid in the Critical National Infrastructure from Ollie Whitehouse
]]>
658 6 https://cdn.slidesharecdn.com/ss_thumbnails/2015-05-11-nccgroup-smartgridinthecriticalnationalinfrastructure-150519073752-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Incident Response & Digital Forensics Lecture /slideshow/cyber-incident-response-digital-forensics-lecture/47425615 2015-04-21-nccgroup-cyberincidentresponseanddigitalforensics-release-150426085711-conversion-gate01
Originally a two hour Cyber Incident Response / Digital Forensics and Incident Response Lecture given to BSc students at a UK university]]>

Originally a two hour Cyber Incident Response / Digital Forensics and Incident Response Lecture given to BSc students at a UK university]]>
Sun, 26 Apr 2015 08:57:11 GMT /slideshow/cyber-incident-response-digital-forensics-lecture/47425615 OllieWhitehouse@slideshare.net(OllieWhitehouse) Cyber Incident Response & Digital Forensics Lecture OllieWhitehouse Originally a two hour Cyber Incident Response / Digital Forensics and Incident Response Lecture given to BSc students at a UK university <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-04-21-nccgroup-cyberincidentresponseanddigitalforensics-release-150426085711-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Originally a two hour Cyber Incident Response / Digital Forensics and Incident Response Lecture given to BSc students at a UK university
Cyber Incident Response & Digital Forensics Lecture from Ollie Whitehouse
]]>
2335 10 https://cdn.slidesharecdn.com/ss_thumbnails/2015-04-21-nccgroup-cyberincidentresponseanddigitalforensics-release-150426085711-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Agile software security assurance /slideshow/agile-software-security-assurance/47242943 2015-04-21-nccgroup-agilesdl-150421092745-conversion-gate02
A short presentation covering the important aspects of an software security assurance effort in agile development environments. Towards the end we provide tips of how it can work in the real-world...]]>

A short presentation covering the important aspects of an software security assurance effort in agile development environments. Towards the end we provide tips of how it can work in the real-world...]]>
Tue, 21 Apr 2015 09:27:45 GMT /slideshow/agile-software-security-assurance/47242943 OllieWhitehouse@slideshare.net(OllieWhitehouse) Agile software security assurance OllieWhitehouse A short presentation covering the important aspects of an software security assurance effort in agile development environments. Towards the end we provide tips of how it can work in the real-world... <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-04-21-nccgroup-agilesdl-150421092745-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A short presentation covering the important aspects of an software security assurance effort in agile development environments. Towards the end we provide tips of how it can work in the real-world...
Agile software security assurance from Ollie Whitehouse
]]>
1746 3 https://cdn.slidesharecdn.com/ss_thumbnails/2015-04-21-nccgroup-agilesdl-150421092745-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical Security Assessments of �IoT Devices and Systems /slideshow/practical-security-assessments-of-iot-devices-and-systems/46210798 2015-02-15-nccgroup-practicalsecurityassessmentsofiotdevicesandsystems-150324044153-conversion-gate01
This talk briefly discusses strategies and methodologies than can be employed when assessing IoT devices. We look at how to develop credible threat scenarios for different IoT device and systems, perform static and dynamic attack surface mapping, perform static firmware analysis, perform static hardware analysis, undertake a dynamic device security analysis, sources of supporting information, supporting capability requirements and establishment, Execution of dynamic device analysis and approaches around network protocol analysis.]]>

This talk briefly discusses strategies and methodologies than can be employed when assessing IoT devices. We look at how to develop credible threat scenarios for different IoT device and systems, perform static and dynamic attack surface mapping, perform static firmware analysis, perform static hardware analysis, undertake a dynamic device security analysis, sources of supporting information, supporting capability requirements and establishment, Execution of dynamic device analysis and approaches around network protocol analysis.]]>
Tue, 24 Mar 2015 04:41:52 GMT /slideshow/practical-security-assessments-of-iot-devices-and-systems/46210798 OllieWhitehouse@slideshare.net(OllieWhitehouse) Practical Security Assessments of �IoT Devices and Systems OllieWhitehouse This talk briefly discusses strategies and methodologies than can be employed when assessing IoT devices. We look at how to develop credible threat scenarios for different IoT device and systems, perform static and dynamic attack surface mapping, perform static firmware analysis, perform static hardware analysis, undertake a dynamic device security analysis, sources of supporting information, supporting capability requirements and establishment, Execution of dynamic device analysis and approaches around network protocol analysis. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-02-15-nccgroup-practicalsecurityassessmentsofiotdevicesandsystems-150324044153-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This talk briefly discusses strategies and methodologies than can be employed when assessing IoT devices. We look at how to develop credible threat scenarios for different IoT device and systems, perform static and dynamic attack surface mapping, perform static firmware analysis, perform static hardware analysis, undertake a dynamic device security analysis, sources of supporting information, supporting capability requirements and establishment, Execution of dynamic device analysis and approaches around network protocol analysis.
Practical Security Assessments of IoT Devices and Systems from Ollie Whitehouse
]]>
3427 6 https://cdn.slidesharecdn.com/ss_thumbnails/2015-02-15-nccgroup-practicalsecurityassessmentsofiotdevicesandsystems-150324044153-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Finding The Weak Link in Windows Binaries /slideshow/finding-the-weak-link-in-windows-binaries/44075444 2012-10-11-findingtheweaklinkinbinaries-150130084321-conversion-gate02
How to enumerate the security properties of Microsoft Windows Binaries]]>

How to enumerate the security properties of Microsoft Windows Binaries]]>
Fri, 30 Jan 2015 08:43:21 GMT /slideshow/finding-the-weak-link-in-windows-binaries/44075444 OllieWhitehouse@slideshare.net(OllieWhitehouse) Finding The Weak Link in Windows Binaries OllieWhitehouse How to enumerate the security properties of Microsoft Windows Binaries <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2012-10-11-findingtheweaklinkinbinaries-150130084321-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How to enumerate the security properties of Microsoft Windows Binaries
Finding The Weak Link in Windows Binaries from Ollie Whitehouse
]]>
5452 1 https://cdn.slidesharecdn.com/ss_thumbnails/2012-10-11-findingtheweaklinkinbinaries-150130084321-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
From Problem to Solution: Enumerating Windows Firewall-Hook Drivers /slideshow/from-problem-to-solution-enumerating-windows-firewallhook-drivers/43315000 2015-01-08-nccgroup-fwhook-150108054647-conversion-gate02
A short talk walking through a problem we faced and how we solved it..]]>

A short talk walking through a problem we faced and how we solved it..]]>
Thu, 08 Jan 2015 05:46:46 GMT /slideshow/from-problem-to-solution-enumerating-windows-firewallhook-drivers/43315000 OllieWhitehouse@slideshare.net(OllieWhitehouse) From Problem to Solution: Enumerating Windows Firewall-Hook Drivers OllieWhitehouse A short talk walking through a problem we faced and how we solved it.. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2015-01-08-nccgroup-fwhook-150108054647-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A short talk walking through a problem we faced and how we solved it..
From Problem to Solution: Enumerating Windows Firewall-Hook Drivers from Ollie Whitehouse
]]>
1033 4 https://cdn.slidesharecdn.com/ss_thumbnails/2015-01-08-nccgroup-fwhook-150108054647-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Countering the Cyber Threat /slideshow/combating-the-cyber-threat/39228945 2014-09-01-nccgroup-westhousecybersecurityconference-release-140918024027-phpapp01
A presentation providing a high-level overview of the problems that organizations face with regards to cyber security and the available options to the,]]>

A presentation providing a high-level overview of the problems that organizations face with regards to cyber security and the available options to the,]]>
Thu, 18 Sep 2014 02:40:27 GMT /slideshow/combating-the-cyber-threat/39228945 OllieWhitehouse@slideshare.net(OllieWhitehouse) Countering the Cyber Threat OllieWhitehouse A presentation providing a high-level overview of the problems that organizations face with regards to cyber security and the available options to the, <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-09-01-nccgroup-westhousecybersecurityconference-release-140918024027-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation providing a high-level overview of the problems that organizations face with regards to cyber security and the available options to the,
Countering the Cyber Threat from Ollie Whitehouse
]]>
692 3 https://cdn.slidesharecdn.com/ss_thumbnails/2014-09-01-nccgroup-westhousecybersecurityconference-release-140918024027-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Designing and building post compromise recoverable services /slideshow/designing-and-building-post-compromise-recoverable-services-38020416/38020416 2014-08-15-nccgroup-designingandbuildingpostcompromiserecoverableservices-split-140815052218-phpapp02
A look at how to design and build services, systems, networks, hosts and applications that are designed to be able to successfully deal with a security compromise. The deck also touches on the topics of self-healing systems and potential applications of machine learning to the problem space.]]>

A look at how to design and build services, systems, networks, hosts and applications that are designed to be able to successfully deal with a security compromise. The deck also touches on the topics of self-healing systems and potential applications of machine learning to the problem space.]]>
Fri, 15 Aug 2014 05:22:18 GMT /slideshow/designing-and-building-post-compromise-recoverable-services-38020416/38020416 OllieWhitehouse@slideshare.net(OllieWhitehouse) Designing and building post compromise recoverable services OllieWhitehouse A look at how to design and build services, systems, networks, hosts and applications that are designed to be able to successfully deal with a security compromise. The deck also touches on the topics of self-healing systems and potential applications of machine learning to the problem space. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-08-15-nccgroup-designingandbuildingpostcompromiserecoverableservices-split-140815052218-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A look at how to design and build services, systems, networks, hosts and applications that are designed to be able to successfully deal with a security compromise. The deck also touches on the topics of self-healing systems and potential applications of machine learning to the problem space.
Designing and building post compromise recoverable services from Ollie Whitehouse
]]>
1470 3 https://cdn.slidesharecdn.com/ss_thumbnails/2014-08-15-nccgroup-designingandbuildingpostcompromiserecoverableservices-split-140815052218-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Why defensive research is sexy too.. … and a real sign of skill /slideshow/why-defensive-research-is-sexy-too/34098163 2014-04-14-nccgroup-bsides-london2014-140429155807-phpapp01
A presentation from BSides London 2014 on why defensive cyber security is a real sign of skill and one of the most rewarding things to do.]]>

A presentation from BSides London 2014 on why defensive cyber security is a real sign of skill and one of the most rewarding things to do.]]>
Tue, 29 Apr 2014 15:58:06 GMT /slideshow/why-defensive-research-is-sexy-too/34098163 OllieWhitehouse@slideshare.net(OllieWhitehouse) Why defensive research is sexy too.. … and a real sign of skill OllieWhitehouse A presentation from BSides London 2014 on why defensive cyber security is a real sign of skill and one of the most rewarding things to do. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-04-14-nccgroup-bsides-london2014-140429155807-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation from BSides London 2014 on why defensive cyber security is a real sign of skill and one of the most rewarding things to do.
Why defensive research is sexy too.. … and a real sign of skill from Ollie Whitehouse
]]>
1321 8 https://cdn.slidesharecdn.com/ss_thumbnails/2014-04-14-nccgroup-bsides-london2014-140429155807-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Technical Challenges in Cyber Forensics /slideshow/technical-challenges-in-cyber-forensics/32711493 2014-03-25-nccgroup-glasgowcali-140325090428-phpapp01
A presentation given at the Glasgow Caledonian University, Digital Forensics Student Conference in 2014 discussing some of the technical challenges we face in cyber forensics and possible research areas. ]]>

A presentation given at the Glasgow Caledonian University, Digital Forensics Student Conference in 2014 discussing some of the technical challenges we face in cyber forensics and possible research areas. ]]>
Tue, 25 Mar 2014 09:04:28 GMT /slideshow/technical-challenges-in-cyber-forensics/32711493 OllieWhitehouse@slideshare.net(OllieWhitehouse) Technical Challenges in Cyber Forensics OllieWhitehouse A presentation given at the Glasgow Caledonian University, Digital Forensics Student Conference in 2014 discussing some of the technical challenges we face in cyber forensics and possible research areas. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-03-25-nccgroup-glasgowcali-140325090428-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation given at the Glasgow Caledonian University, Digital Forensics Student Conference in 2014 discussing some of the technical challenges we face in cyber forensics and possible research areas.
Technical Challenges in Cyber Forensics from Ollie Whitehouse
]]>
2125 7 https://cdn.slidesharecdn.com/ss_thumbnails/2014-03-25-nccgroup-glasgowcali-140325090428-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Secure App Aspirations: Why it is very difficult in the real world /slideshow/secure-app-aspirations-why-it-is-very-difficult-in-the-real-world/32368006 2014-03-12-nccgroup-anzen-redacted-140316100837-phpapp01
Discussion on why developing secure software is actually quite hard in the real world.]]>

Discussion on why developing secure software is actually quite hard in the real world.]]>
Sun, 16 Mar 2014 10:08:37 GMT /slideshow/secure-app-aspirations-why-it-is-very-difficult-in-the-real-world/32368006 OllieWhitehouse@slideshare.net(OllieWhitehouse) Secure App Aspirations: Why it is very difficult in the real world OllieWhitehouse Discussion on why developing secure software is actually quite hard in the real world. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2014-03-12-nccgroup-anzen-redacted-140316100837-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Discussion on why developing secure software is actually quite hard in the real world.
Secure App Aspirations: Why it is very difficult in the real world from Ollie Whitehouse
]]>
803 5 https://cdn.slidesharecdn.com/ss_thumbnails/2014-03-12-nccgroup-anzen-redacted-140316100837-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Threat Intelligence - Routes to a Proactive Capability /slideshow/2007-1121-theatintelligencedevelopingaproactivecapability-1/31034046 2007-11-21theatintelligence-developingaproactivecapability1-140210081649-phpapp02
A presentation originally from 2007 on how organisations could look to build a threat intelligence capability.]]>

A presentation originally from 2007 on how organisations could look to build a threat intelligence capability.]]>
Mon, 10 Feb 2014 08:16:49 GMT /slideshow/2007-1121-theatintelligencedevelopingaproactivecapability-1/31034046 OllieWhitehouse@slideshare.net(OllieWhitehouse) Threat Intelligence - Routes to a Proactive Capability OllieWhitehouse A presentation originally from 2007 on how organisations could look to build a threat intelligence capability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2007-11-21theatintelligence-developingaproactivecapability1-140210081649-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation originally from 2007 on how organisations could look to build a threat intelligence capability.
Threat Intelligence - Routes to a Proactive Capability from Ollie Whitehouse
]]>
774 5 https://cdn.slidesharecdn.com/ss_thumbnails/2007-11-21theatintelligence-developingaproactivecapability1-140210081649-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-OllieWhitehouse-48x48.jpg?cb=1523648851 A technology focused executive with nearly two decades of experience with a specialism of information / cyber security working in consultancy, applied research and service delivery. Experienced people manager with a demonstrated track record in building both innovative teams/functions and supporting business processes for multinational firms. Significant experience in sponsoring, managing and actively delivering multi year activities from concept through to implementation and business-as-usual. Specialties: People Management, Program Design and Management, Applied Security Research, Information and Cyber Security, Software and System Development, Telecommunications & Mobile Security, In... https://www.nccgroup.trust/ https://cdn.slidesharecdn.com/ss_thumbnails/privatesectorcyberresilienceandtheroleofdatadiodes-160425130547-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/private-sector-cyber-resilience-and-the-role-of-data-diodes/61321335 Private sector cyber r... https://cdn.slidesharecdn.com/ss_thumbnails/c-suitecyberadvisoryservices2-160102072848-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ncc-group-c-suite-cyber-security-advisory-services/56600293 NCC Group C Suite Cybe... https://cdn.slidesharecdn.com/ss_thumbnails/nccgroupnetworkthreatassessment-151104080207-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds OllieWhitehouse/ncc-group-proactive-breach-discovery-network-threat-assessment NCC Group Pro-active B...