Professor John Walker

1736 0

john_walkerVisiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia [to 2015], Independent Consultant, Practicing Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), Fellow of the British Computer Society (BCS), Fellow of the Royal Society of the Arts (RSA), Board Advisor to the Digital Trust, Writer for SC Magazine UK, Originator of DarkWeb Threat Intelligence, CSIRT, Attack Remediation and Cyber Training Service/Platform, Accreditation Assessor and Academic Practitioner and Accredited Advisor to the Chartered Society of Forensic Sciences in the area of Digital/Cyber Forensics.

Twitter: @SBLTD 

John Walker is also our Expert Panel member.  To find out more about our panel members visit the biographies page.

Articles by Professor John Walker

Threat Intelligence

Historical General Knowledge

Let’s start the article with a little general knowledge question from 2009 – which of the following statements from way then is the most accurate in respect to the state of the UK economy and what it was suffering: a) Economic Downturn, b) Global Recession, or c) Diminished GDP. My assertion is most, if not all readers will …


That #Cloud Thing

We live in the age of economic downturn, placing both the Private and Public Sectors in a very tight financial corner. This same economic downturn has been driving Commercial, and Government leaders to seek out opportunities to reduce spend, to balance the organisational books a little closer to the black side of the accounting scale. …


Step Up To The Pragmatic Cyber Security Challenge

There is a shortage of skill in the disciplines of Cybersecurity – but at the same time, such skills are in high demand, driven by the high levels of Cyber-Attacks, Cyber Criminality, and regular breaches and compromises of big name organizations. Thus, companies are seeking out skills from qualified and competent professionals to assist with securing systems, data, and …


These Are Some Of My Favourite Things

As an Expert Witness, Digital Forensics First Responder Investigator, and a provider of specialist training in the disciplines of in-depth Cyber Security Management, and Digital Forensics and Investigations, to underpin both operational engagements, and my academic teaching, and training commitments in Dubai for Meirc, I need to selected a trusted tool-sets and utilities to support …


The Ever-Growing Cyber Risk

Multiples of past and present crime surveys have confirmed the ongoing impact of Cyber Crime against business was, and is high, and were measured to have increased by an average of up to 25% on previous years of reporting, and were seeing financial losses increase by 18%+ and rising. However, these statistics only represent the known …


The Shifting Landscape Of Cyber Threat

The Global Economy is in the grip of a digital fraud epidemic running at a current estimated $400 billion per year, with expectation that it will hit $2 Trillion by the year 1919. To date this has not only impacted unaware end users, but also big name brands such as Talk Talk, Yahoo, Tesco Bank, …


Just What Planet Are We On?

I have been listening to, and reading the debate relating to the safety of children when they are on-line, and the associated privacy/dangers which are ever-present when such young person’s engage with the World Wide Web – and I have become increasingly irritated, and frustrated by the comments made by those who call themselves professionals, …


Web Bait to Misery

The Internet is a wonderful thing, and since its conception it has brought joy to millions of people in the form of extended communication networks, education, on-line shopping, employment and opportunities. Reaching out to far-flung corners of the global community which once would have been neglected by their domicile locality. In fact, one may conclude, …


The Theoretical World Of Known Knowns And The Tesco Heist

The interesting thing about Incident Response, and the Discipline of Digital Forensics is the need to attempt to backtrack on 1) How a security breach occurred? 2) What Actors were in play? And 3) Where any vulnerabilities or points of exposure present which supported the breach to play? – or more the point, do they …

john walker

Black Sabbath

In a world of technological dependence, I like most other professionals suffer from increasing degrees of paranoia, and fear that my person, presence, and logical footprint may be subject to some form of compromise, interception, or manipulation from any one of many exposures – a Paranoid State which has driven my acquisition and use of …