Professor John Walker

431 0

john_walkerVisiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [to 2015], Independent Consultant, Practicing Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), Fellow of the British Computer Society (BCS), Fellow of the Royal Society of the Arts (RSA), Board Advisor to the Digital Trust, Writer for SC Magazine UK, Originator of DarkWeb Threat Intelligence, CSIRT, Attack Remediation and Cyber Training Service/Platform, Accreditation Assessor and Academic Practitioner and Accredited Advisor to the Chartered Society of Forensic Sciences in the area of Digital/Cyber Forensics.

Twitter: @SBLTD 

John Walker is also our Expert Panel member.  To find out more about our panel members visit the biographies page.

Articles by Professor John Walker


The Ever-Growing Cyber Risk

Multiples of past and present crime surveys have confirmed the ongoing impact of Cyber Crime against business was, and is high, and were measured to have increased by an average of up to 25% on previous years of reporting, and were seeing financial losses increase by 18%+ and rising. However, these statistics only represent the known …


The Shifting Landscape Of Cyber Threat

The Global Economy is in the grip of a digital fraud epidemic running at a current estimated $400 billion per year, with expectation that it will hit $2 Trillion by the year 1919. To date this has not only impacted unaware end users, but also big name brands such as Talk Talk, Yahoo, Tesco Bank, …


Just What Planet Are We On?

I have been listening to, and reading the debate relating to the safety of children when they are on-line, and the associated privacy/dangers which are ever-present when such young person’s engage with the World Wide Web – and I have become increasingly irritated, and frustrated by the comments made by those who call themselves professionals, …


Web Bait to Misery

The Internet is a wonderful thing, and since its conception it has brought joy to millions of people in the form of extended communication networks, education, on-line shopping, employment and opportunities. Reaching out to far-flung corners of the global community which once would have been neglected by their domicile locality. In fact, one may conclude, …


The Theoretical World Of Known Knowns And The Tesco Heist

The interesting thing about Incident Response, and the Discipline of Digital Forensics is the need to attempt to backtrack on 1) How a security breach occurred? 2) What Actors were in play? And 3) Where any vulnerabilities or points of exposure present which supported the breach to play? – or more the point, do they …

john walker

Black Sabbath

In a world of technological dependence, I like most other professionals suffer from increasing degrees of paranoia, and fear that my person, presence, and logical footprint may be subject to some form of compromise, interception, or manipulation from any one of many exposures – a Paranoid State which has driven my acquisition and use of …

security biscuit 2015

2015 Security Biscuit

When it comes to taking the security biscuit for 2015, I believe the recent discovery of a security flaw in FireEYE deserves the award for bringing the matter of Security Complexity to our operational attention. However, I do wish to clarify up front that this is by no means a dig at the product in question. In …

isb expert panel question

Defining Research Priorities in Cyber Security

For month of November, question to our expert panel members is: Which research topic or project in cyber security do you think deserves more funding from Government or other sources and why? and response is below: To find out more about our panel members, please visit the biographies page

essential security practice

Three Essential Security Practices that an Organization Must Adopt to Avoid IT Security Breaches

APRIL QUESTION TO OUR EXPERT PANEL MEMBERS:  If you have to choose three essential security practices that an organization must adopt to avoid IT security breaches, what will you choose and why? RESPONSES Professor John Walker | @SBLTD In this current cyber-storm of successful security breaches, the three practices I would include are: Deploy the capability …


The Box of Odd-Bedfellows

Considering the opinion of Martha Lane Fox who has called upon the UK to lead the way by setting up neutral, independent body to ensure that ‘privacy’, ‘security’ and ‘trust’ are maintained on the internet would seem to be a considerable expectation which, when conjoined represent a very big ask indeed, as when aggregated these …

1 comment