James Bore Email and Phone Number
James Bore work email
- Valid
- Valid
- Valid
- Valid
James Bore personal email
- Valid
James Bore phone numbers
To answer the regular questions I get:Yes, technical debt collector is hilarious as well as describing some of what I do working with clients. Clearing out inefficient processes, making sure technology is actually used, dealing with all those legacy problems and making development sustainable - with genuinely useful documentation.Quality is a security metric after all, and information security includes the integrity of information about what you're building, not just personal data.I speak a lot at all sorts of events, often covering technology, security, and various other educational and awareness topics. I also do demotivational speaking - which includes outstanding presentations on topics like 'no one cares so just stand up and do it', 'it's better to be wrong than right', and 'we're all making it up as we go'. As you might guess there's a bit of dry humour involved, and they are genuinely inspirational in a very pragmatic way.And yes, I do a lot of security - after two decades working for other people I took over the family business in 2020, and we've continued to deliver fantastic (according to our customers) security consultancy and services since, carrying on a proud history from our original founding in 1988.
-
Managing Director And Principal ConsultantBores Group LtdWoking, Gb -
Managing DirectorBores Group Ltd Jun 2020 - PresentContinuing to provide security expertise to organisations with the goal of enabling you to become fully self-sustaining in security. Bores offers:- fully interactive incident response tabletop exercises delivered online- motivated intruder assessments of data models and tests of sample data sets- expert consultancy in security and data protection, including implementation of ISO 27001 and fulfilling SOC Type II trust principles- security hygiene checks in partnership with your IT teams to make sure use of existing solutions are maximised and the fundamental gaps which lead to the majority of breaches are addressed effectively- comprehensive training in threat modelling, incident response scenario pre-enactments, and security awareness and understanding. -
ContributorCs Hub Dec 2023 - PresentLondon, GbThe Cyber Security Hub is an online news source for global cyber security professionals and business leaders who leverage technology and services to secure the entire perimeter of their enterprise. -
Founding DirectorReunivous Jan 2021 - PresentWe build bespoke virtual venues and support online events for busy event planners looking to make the most of technology and their community. With custom maps and our various platforms, we give events an organic feel and a degree of community engagement and interactivity rarely seen online.With experience in fully virtual distributed offices, short exhibition gallery events and multi-day conferences we can support the full range of options and help you make the best possible use of the technologies available. -
Cyber Security TutorCapslock Feb 2021 - PresentManchester, Greater Manchester, GbWe’ll always strive to give career-changing opportunities to those who show the right attitude, not just those who can afford it.We’ll always strive to innovate in ways which makes our education affordable & accessible to everyone. We’ll always advocate for under-represented demographics, such as women, BAME, and those who are neuro-diverse. We’ll always strive to deliver a world-class experience for those who enrol with us.We’ll always strive to keep our education up to date, outcomes focused, and aligned with industry requirements. -
Verified ContributorHackernoon Jan 2023 - PresentEdwards, Colorado, UsHacker Noon is a leading tech media platform that provides insightful and informative content to a global audience of tech enthusiasts, developers, and entrepreneurs. The platform features articles, podcasts, and videos that cover a wide range of topics, including artificial intelligence, blockchain, cybersecurity, and software development. Hacker Noon's mission is to democratize knowledge and provide a platform for independent tech writers to share their perspectives and insights with a global community. -
TrusteeAgileventures.Org Mar 2018 - Sep 2021London, England, GbAgile Ventures is a non-profit organization dedicated to crowdsourced learning and project development. We follow the agile approach to software development (see below), and do so online everyday using remote pair programming technologies such as google hangouts. Anyone at any skill level can participate or simply observe in the remote pair programming sessions and planning meetings as we develop solutions for real customers in the non-profit sector. There are no minimum requirements, simply an interest to learn. -
Cyber Security ConsultantUnderwriteme Dec 2019 - Sep 2020London, London, GbProviding subject matter expertise and technical guidance in security governance, compliance, and implementation. Working to mature security posture and understanding across the company. -
Security OfficerDzing Finance Jul 2019 - Nov 2019London, Uk, GbResponsible for all cyber security monitoring and implementation, producing, managing, and monitoring all information security policies in collaboration with the DPO. Working with the CTO to implement security technologies within infrastructure. Responsible for business continuity planning and testing. -
It Security ManagerMerlin Entertainments Plc Nov 2018 - Jun 2019Poole, England, GbAt Merlin I was responsible for co-ordinating incident response, technical measures to ensure PCI DSS compliance, and the full vulnerability management lifecycle. I also provided internal consultation to ensure that security by design was implemented into the project lifecycle. -
It Security ManagerO2 (Telefónica Uk) Sep 2016 - Nov 2018Reading, England, GbHeading up vulnerability assessment, management, and strategic security improvements across the IT estate, developing and reporting to security KPIs, providing subject-matter expertise for all areas of in-life cyber security. Developing and providing training on security and threat modelling for project and architecture teams. -
Threat Intelligence ScientistCsc Jul 2015 - Sep 2016Global, Us- Proactively raising awareness of latest threats and vulnerabilities- Assisting analysts with alert assessment and investigations- Cultivating OSINT sources and development of processing tools- Designing and implementing lab for automated analysis and reconnaisance- First glance malware and attacker analysis- ArcSight monitoring and investigation- Developing end user security training materials -
Information Security AnalystEsure Sep 2014 - Jul 2015Reigate, Surrey, Gb- Risk assessment and analysis- Development of internal malware analysis capability- Implementation and operation of vulnerability management programme- Incident response- Reporting on current and future threats- Guidance on technical aspects of cloud architecture- Implementation and management of ASV scanning system- Recommendation and specification of IDS/IPS systems on AWS -
Guest LecturerKingston University Mar 2015 - Mar 2015London, Greater London, GbPrepared and delivered a guest lecture on Information and Cyber Security to computing undergraduates.
James Bore Skills
James Bore Education Details
-
Northumbria UniversityCyber Security
Frequently Asked Questions about James Bore
What company does James Bore work for?
James Bore works for Bores Group Ltd
What is James Bore's role at the current company?
James Bore's current role is Managing Director and Principal Consultant.
What is James Bore's email address?
James Bore's email address is ja****@****ail.com
What is James Bore's direct phone number?
James Bore's direct phone number is +4411327*****
What schools did James Bore attend?
James Bore attended Northumbria University.
What are some of James Bore's interests?
James Bore has interest in Networking, Psychology, Homebrew, Computer Security, Encryption, Education, Beekeeping, Environment, Cycling, Reading.
What skills is James Bore known for?
James Bore has skills like Active Directory, Networking, Windows Server, Virtualization, Cloud Computing, Infrastructure, Management, Security, Cyber Security, Enterprise Architecture, Security Training, Information Security.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial