Safe-HEX, and The Age of Digital Insecurity

Prof John W. Walker SpeakerNet Sponsor


Region:
Anywhere
Notice Period:
Regular (more than one month's notice)
Type:
Professional
Fee:
Paid: within 50 miles radius - £125
Category:
Science
Updated:
21st September 2025
Tagged:
Hacking | Viruese | Osint | Cyber

Be it business, or personal, from Corporate to the SME Sector we all possess a Digital Footprint which is open to the potential of exploitation by adversarial actors. By inference, and associated to this factor, the end users are also exposed to Malware (Computer Viruses), Ransomware and multiple other forms of Digitised exploitation which can lead to compromise of the human element.

This talk will lift the covers on the complexities and Digital Exposures which are suffered on a daily basis – according to a UK Government Survey, of businesses, and approximately 32% of charities report having experienced some form of Cyber Security breach, compromise or attack in 12 months of 2024, with the SME Sector suffering an impact of 70%, whilst at the Corporate end of the problem, large businesses encountering 74% adverse impact.

I will be sharing with the delegates, real-world evidence, by example of just how weak some so called robust security postures have proven to be. I will share from my own experiences the Modus Operandi of a Real Hackers toolset and experience as a Virus Author/Researcher – and their ability to exploit and acquire subject focused intelligence for onward exploitation.

On the positive side of the education, we will consider how to practice Safe HEX (Safe Digital Security), and look to the methodologies which may be practiced discovering, and securing our own Digital Footprint, including Open Source Intelligence (OSINT ) – focusing in particular on the SME. We will conclude this session with sharing tools, techniques which may be leveraged to keep the Digital Wolf from the door.

Views: 179 | Enquiries: 0

About Prof John W. Walker

Served in the RAF for 22 years in the roles of Policing, Nuclear Security, advancing into the world of Counterintelligence, working with Police, UK Agencies such as GCHQ/CESG, the CIA, and other ‘specialist’ Intelligence Agencies in the areas of SIGINT, COMINT and TK Satellite Communications. Held the position of System ITSO for CIA Accredited SCIF based IT Systems. Post the RAF he held roles in IT/Cyber for Logica, BAe, GM (US), Experian, TSol, Betfair, Palace of Westminster (Commons and Lords) and provided Consultancy to the Saudi Arabian MOD, and the Military Academy of Malaysia (KL) on Digital Forensics and OSINT. Have specialisation in the field of Geopolitics in the Middle East. Consulted in Dubai and the wider UAE region for 10 years, and have presented to Global audiences from Argentina, Brazil, Las Vegas, San Diego, Costa Mesa, Chicago, Detroit, Atlanta, Washington DC, New Jersey and New York, Finland, Sweden, Norway, India, Pakistan and others in the EU.


Send a message to the speaker

If you are interested in this talk and wish to contact the speaker, please complete the following form:

 
Please provide your contact name
 
Please provide the name of your group
 
Your phone number so that the speaker can contact you
 
Your email address so that the speaker can contact you
 
Give details about the event, time of day and location
Prove you are human please.
Use the slider to drag the puzzle so that the top and bottom are aligned , or use an alternate text based challenge by clicking here.
Question: Is water wet?
 

Site Search

Search across all speakers, topics and tags. Put your search term in the box and press enter or hit search

Use quotes around exact multiple word searches, eg "winston churchill".