CYBER AWARENESS LEARNING – MOTIVATE AND EMPOWER YOUR EMPLOYEES

12 November 2019 - AXELOS

Organisations want to feel their efforts have made a difference to answering the question “are we secure?” However, there is no perfect solution or ability to be 100% secure; the real aim is to lower the risk – it’s a balancing act.

VOICES FROM INFOSEC WITH ZOË ROSE

06 November 2019 - Breaking Badness

Welcome to a special edition of Breaking Badness. In this bonus episode, you’ll hear from cybersecurity specialist and ethical hacker, Zoe Rose. Co-hosts Tarik Saleh and myself sat down with Zoe (and her ferrets) to discuss her life as a cybersecurity consultant, experience in the industry, and advice for fellow practitioners.

THE 50 MOST INFLUENTIAL WOMEN IN CYBER SECURITY

04 November 2019 - SC Magazine UK

SC is delighted to honour & recognise the 50 women who, in our opinion, have had the most influence in the UK cyber-security sector over the past year as role models or campaigners.

PRIVSEC 200

27 August 2019

The PrivSec200 sponsored by OneTrust recognises and celebrates those individuals who have made significant contributions to the privacy and security sectors. Our editorial team considered several factors in compiling this list, including; social media impact, knowledge sharing and community support.

WHO’S HOME? KNOW WHO IS ON YOUR NETWORK

22 May 2019 - Aruba Networks

Security isn't simply having the sexiest controls or the most exciting rock stars — it's knowing what happens when those packets flow, and who's accessing them.

Over the years, security has become more complex. We have hundreds — in some cases, thousands of devices in the office at once — and each device has a variety of settings and operating systems. All of these devices make the jobs of the system administration and security teams more complex and causes not just frustration, but also leads to an increased threat landscape and increased vulnerabilities.

TECHNOLOGY THAT “JUST WORKS” IS THE KEY TO CYBERSECURITY EFFECTIVENESS

8 May 2019 - Aruba Networks

As an ethical hacker or cybersecurity specialist, I am often asked what is the most important thing when it comes to an organization’s cybersecurity program, and what can we do to make sure our security culture is focused effectively? To the surprise of most, I say user experience. I couldn’t tell you the number of cybersecurity teams I have come across throughout my career who are absolutely exhausted trying to keep up. The issues aren’t solely about available analysts, budget, controls, etc. Often, there is a major concern that cybersecurity teams are rarely equipped to handle: user acceptance.

YELLOW CAPES AND SAFE ESCAPES – THE JOURNEY OF ZOË ROSE

8 May 2019 - Gestalt IT,  Tom Hollingsworth

Working with Tom through the Tech Field Day, I got to know one of the most encouraging and supportive people in technology. Being surprised with an article like this is just another reminder of how brilliant, kind, and committed Tom is to changing the world of technology - creating an inclusive, positive, and safe atmosphere to help our society grow.

SEMINAR ROUND-UP: CYBERSECURITY AND THE INTERNET IN INTERNATIONAL INVESTMENT ARBITRATION

11 April 2019 - Hogan Lovells

On 11 April 2019 the Hogan Lovells International Arbitration team hosted a seminar on cybersecurity and the internet in International Investment Arbitration. It was a thoroughly interesting and informative session. Our twin panels of preeminent lawyers and industry experts delivered an insightful discussion, followed by a lively Q&A session.

STAYING CALM DURING A SECURITY INCIDENT: IS IT UTOPIA OR IS IT GOOD DESIGN?

16 April 2019 - Aruba Networks

Picture this: the latest security breach hits the media. Front page, it is the most invasive breach yet. You decide to scan the first few sentences, bored now of all these announcements. Suddenly your stomach drops–this breach affects you. What do you do?

MOBILITY FIELD DAY EXCLUSIVE AT ARUBA ATMOSPHERE 2019 - OPENCONFIG

3 April 2019 - Tech Field Day

Listen to the panel of Mobile Field Day Extra (#MFDx) at Aruba Atmosphere 2019 (#ATM19).

MOBILITY FIELD DAY EXCLUSIVE AT ARUBA ATMOSPHERE 2019 - CLOUD AND SECURITY

3 April 2019 - Tech Field Day

Listen to the panel of Mobile Field Day Extra (#MFDx) at Aruba Atmosphere 2019 (#ATM19).

LIVE BLOG BY TOM HOLLINGSWORTH AT GESTALT IT LTD

3 April 2019 - Gestalt IT

Live blogging of my keynote Discovering Security, at Aruba Atmosphere H.E.R. session. 

MEET THE #ATM19 INFLUENCERS: ZOË ROSE

1 April 2019 - Aruba Networks

Interview by Jamie Easley regarding who I am and what to expect from Aruba's Atmosphere conference. ​

THE 50 MOST INFLUENTIAL WOMEN IN CYBER SECURITY

26 November 2018 - SC Magazine UK

From high level hard tech to senior leadership & management, our 50 women list exemplifies women contributing to the cyber-security sector at every level, despite representing just 10 percent of the workforce.

THEWALL: CONSUMER AWARENESS: BE VIGILANT ONLINE, SAYS ETHICAL HACKER

25 December 2018 - The Edge Malaysia

While it may be hard to stop a cyberattack, individuals can take some steps to protect themselves online, says Zoë Rose, an ethical hacker and consultant at Baringa Partners. “What they can do is maintain their awareness..."

CYBER SECURITY MUST BE A KEY PART OF BANKS' RISK MANAGEMENT STRATEGY

4 December 2018 - Islamic Finance News

Considering that most cyber attacks are financially motivated, banks are choice targets for hackers. Hence, implementing a holistic cyber security strategy must be a key part of their risk management strategy. MARC ROUSSOT explores.

CYBER STAR: ETHICAL HACKER IS A TOP-FLIGHT SECURITY EXPERT

26 October 2018 - Red River College

Cyber security specialist Zoë Rose’s career has really taken flight since she graduated in 2015 from Red River College’s Business Information Technology (BIT) program.

The 28-year-old globetrotter has plane-hopped around the world, speaking at conferences on four continents and, since March 2016, plying her trade from a home base in London, England, where she is currently a security consultant with technology firm Baringa Partners.

WYWIAD Z PRELEGENTKĄ INFOSHARE 2018: ZOË ROSE [+KONKURS]

15 March 2018 - Kobiety do kodu

We don’t write in English too often on this blog, but this time we will make an exception. As partners of infoShare 2018, we got the possibility to interview one of their speakers: Zoë Rose.

18 EXPERT TIPS FOR EFFECTIVE AND SECURE CLOUD MIGRATION

TripWire

"To help organizations with these tasks, Tripwire spoke with 18 experts on how enterprises can secure their cloud environments. Their comments provide key guidance on best practices for effective and secure cloud migration."

INSECURITY PODCAST: ZOË ROSE – OPSEC FOR PERSONAL SECURITY

Cylance Podcasts

Originally a military term, OPSEC has become an important part of business processes and even our personal safety online. Practicing OPSEC is important to protecting IP and employee’s personal information.

In this episode of the InSecurity Podcast, host Shaun Walsh is joined by special guest Zoë Rose who explains how to protect critical information and determine threats to your personal security, and how practicing OPSEC when posting on social media and elsewhere online can help keep you and your family safe

THE INFAMOUS PASSWORD

Tripwire - The State of Security

There seems to have always been this debate on the use and actual benefit of passwords. How do we make them secure without being impossible to remember, and what is the best expiry plan?

PLUGGING THE GAP: WHY ARE FEWER WOMEN GETTING INTO CYBERSECURITY?

16 June 2017

The latest figures show the number of female cyber security professionals is reducing compared with previous years. What, SC's Kate O'Flaherty asks, is the industry doing wrong?

GONE PHISHING

British Vogue

Simon Usborne meets the new wave of cyber detectives who guard the elite against blackmail, ransom and theft.

CYBER SECURITY HEROES PART 5: SCOTT HELME

Tripwire - The State of Security

If you don’t know Scott and you’re a web security person, you need to fix this. Scott clarifies the mysterious world of web security; he focuses on what others may not know, what vital aspects we’re forgetting, and where he can help in automating the process. Check out his extremely helpful and free products at SecurityHeaders.io and report-uri.io.

RANSOMWARE AND THE INTERNET OF THINGS

Schillings Partners

In 2016 malicious emails containing Ransomware skyrocketed 6,000% compared with 2015, according to research carried out by IBM.

Cybercriminals are nothing if not imaginative. That is why Ransomware is constantly evolving to keep up with the changes in technology.

CYBER SECURITY HEROES PART 4: PER THORSHIEM

TripWire - The State of Security

Per has always seemed to see the world through a slightly different lens. When the world was blaming users on their password and security shortcomings, Per fought back by pointing out that our systems were allowing it and that we, not the users, were to blame.

CYBER SECURITY HEROES PART 3: HOLLY WILLIAMS

Tripwire - The State of Security

While watching Holly's talk “Offensive Anti-Analysis,” at BSides London 2016, I was completely amazed at her pure technical skill. Holly stood out because she is so technical and passionate. Even better, she never looks down on others who are just starting out. Her passion carried through to every aspect of her being, and her friendliness made me want to join her adventures.

CYBER SECURITY HEROES PART 2: DAVID PRINCE

Tripwire - The State of Security

David and I met on Twitter back in December 2015 while I was looking for a job. Fortunately, David was looking to build out his team, and I seemed to fit (perfectly). David was an inspiration the second we connected. He gave relevant advice and never once questioned my abilities. David is one of those people who are natural leaders and can see potential where others see only challenge. He is able to show you parts of the puzzle while still allowing you time to learn and discover on your own.

CYBER SECURITY HEROES PART 1: DR JESSICA BARKER

Tripwire -  The State of Security

They say you should never meet your heroes, often they will just disappoint you, but thankfully there’s also exceptions to this rule. When I first met Jess she was speaking at BSides London. My initial thought was how passionate she seemed to be on this; it fascinated me. Her talk was a good mix between funny and factual, and I walked away feeling like I learned a new perspective on the Cyberz.

STARTING YOUR CAREER IN CYBER SECURITY

Tripwire - The State of Security

As your career goes on, you may find yourself traveling down different routes than you originally planned. This article is a follow-up to Starting Your Career In Information Technology, designed to give an idea of what cyber security has become for me after I transitioned from strictly networking.

IT SECURITY HORROR STORIES: WHERE FOUNDATIONAL SECURITY CONTROLS WENT OVERLOOKED

Tripwire - The State of Security

As one of my good friends and mentor, David Prince, loves to call it, the “Brilliant Basics” are often forgotten when designing or maintaining our cyber security systems. Unfortunately, this is one of the most important areas we need to lock down because if you can’t get the foundations right you better believe that will carry into the more complex situations.

IMPLEMENTING A PASSWORD SECURITY POLICY AT THE WORKPLACE FOR NCSAM

Tripwire - The State of Security

Positive user experience is lacking when dealing with passwords, never mind with multi-factor authentication. The culture surrounding authentication is confusion. Users aren’t aware of why they need to care, and therefore they don’t.

THREAT HUNTING

Schillings Partners

Many organisations are still lacking the adequate tools, processes and procedures to identify cyber-attacks against their organisations. Consequently, customers are often the first to learn that their data has been compromised. Not only does this cause immediate and sustained corporate embarrassment, but with little control over how the news is communicated and disseminated, this can have a devastating impact on any strategies put in place to mitigate the reputation impact of a cyber-attack and data loss.

MY TIME AT CISCO LIVE 2015

Tripwire - The State of Security

As anyone who has attended a Cisco Live event knows, it is huge! Last year, there were over 25k attendees spanning across the bayside Hilton, the San Diego Convention Centre, and the Hyatt. Armed with the resources of the Cisco NOC team, as well as a whole lot of tape and cables, we met amazing people like Adam, Carlo and Remco, who mentored us in the black arts of conference network architecture.

TIME TO GET RANSOM AWARE

Schillings Partners

Late last year, Joseph Bonavolonta, Assistant Special Agent in charge of Cyber and Counter Intelligence at the FBI made the following statement about Ransomware: “The Ransomware is that good... To be honest, we often advise people just to pay the ransom”. While your default position may be to pay the ransom in line with this advice, it’s worth bearing in mind that paying a ransom is not a guaranteed to result in the release of your data.

STARTING YOUR CAREER IN INFORMATION TECHNOLOGY

Tripwire - The State of Security

Beginning a new career can be an intimidating and frustrating endeavour. You begin by looking for entry-level and junior positions; even those jobs require some level of experience! This is the chicken and the egg question or a catch-22. What differentiates you from the next candidate?

CISCO LIVE DREAM TEAM SELECTION

Red River College

Zoe, a term 6 BIT Network Management student, has been selected as Cisco Live Dream Team Canadian Representative for this year.

 

ZOË ROSE

©2019 by Zoë Rose.