Richard Kirk
A results-driven information security professional with over 20 years of expertise and experience improving and evolving IT infrastructure and security processes. I drive businesses forward by applying robust security measures that defend companies, their brand, and their reputations.
I deliver positive outcomes by collaborating with senior executives and key stakeholders to optimise innovation and productivity and by executing appropriate control measures to reduce risk and distribution while aligning strategic roadmaps and risk appetites to overall objectives.
I’m a critical thinker who confidently manages conflict, navigates ambiguity, and challenges norms. I am currently on a Level 7 executive leadership course with Corndel University. I am about to be part of a fireside panel at a Microsoft event in London, discussing Co-Pilot and how it has helped our colleagues with neurodivergent conditions. I am also part of our group disability and neurodiversity committees, helping improve access to tools, coaching and support for all.
Seeking a senior position to continue to provide key performance measures, governance knowledge, and an independent mindset to identify business gaps and transform operations.
Session
Do you actually know if you have been breached? Do you know your critical assets, what you can't see? Monitoring and logging is a simple construct, however most companies see it as a tick-box exercise. This presentation looks into the following, eyes on the ground approach.
- answers the why, how , what
- looks in to basics around asset management, critical data, users, end points, networks, etc
- key missed areas, like policy, people, and physical.
- summaries an approach based on a risk based approach.
this will cover examples and be lighted hearted and funny at times.
- questions
- end