James Bore

James Bore Email and Phone Number

Managing Director and Principal Consultant @ Bores Group Ltd
Woking, GB
James Bore's Location
Woking, England, United Kingdom, United Kingdom
James Bore's Contact Details
About James Bore

To answer the regular questions I get:Yes, technical debt collector is hilarious as well as describing some of what I do working with clients. Clearing out inefficient processes, making sure technology is actually used, dealing with all those legacy problems and making development sustainable - with genuinely useful documentation.Quality is a security metric after all, and information security includes the integrity of information about what you're building, not just personal data.I speak a lot at all sorts of events, often covering technology, security, and various other educational and awareness topics. I also do demotivational speaking - which includes outstanding presentations on topics like 'no one cares so just stand up and do it', 'it's better to be wrong than right', and 'we're all making it up as we go'. As you might guess there's a bit of dry humour involved, and they are genuinely inspirational in a very pragmatic way.And yes, I do a lot of security - after two decades working for other people I took over the family business in 2020, and we've continued to deliver fantastic (according to our customers) security consultancy and services since, carrying on a proud history from our original founding in 1988.

James Bore's Current Company Details
Bores Group Ltd

Bores Group Ltd

View
Managing Director and Principal Consultant
Woking, GB
Website:
bores.com
Employees:
6
James Bore Work Experience Details
  • Bores Group Ltd
    Managing Director And Principal Consultant
    Bores Group Ltd
    Woking, Gb
  • Bores Group Ltd
    Managing Director
    Bores Group Ltd Jun 2020 - Present
    Continuing to provide security expertise to organisations with the goal of enabling you to become fully self-sustaining in security. Bores offers:- fully interactive incident response tabletop exercises delivered online- motivated intruder assessments of data models and tests of sample data sets- expert consultancy in security and data protection, including implementation of ISO 27001 and fulfilling SOC Type II trust principles- security hygiene checks in partnership with your IT teams to make sure use of existing solutions are maximised and the fundamental gaps which lead to the majority of breaches are addressed effectively- comprehensive training in threat modelling, incident response scenario pre-enactments, and security awareness and understanding.
  • Cs Hub
    Contributor
    Cs Hub Dec 2023 - Present
    London, Gb
    The Cyber Security Hub is an online news source for global cyber security professionals and business leaders who leverage technology and services to secure the entire perimeter of their enterprise.
  • Reunivous
    Founding Director
    Reunivous Jan 2021 - Present
    We build bespoke virtual venues and support online events for busy event planners looking to make the most of technology and their community. With custom maps and our various platforms, we give events an organic feel and a degree of community engagement and interactivity rarely seen online.With experience in fully virtual distributed offices, short exhibition gallery events and multi-day conferences we can support the full range of options and help you make the best possible use of the technologies available.
  • Capslock
    Cyber Security Tutor
    Capslock Feb 2021 - Present
    Manchester, Greater Manchester, Gb
    We’ll always strive to give career-changing opportunities to those who show the right attitude, not just those who can afford it.We’ll always strive to innovate in ways which makes our education affordable & accessible to everyone. We’ll always advocate for under-represented demographics, such as women, BAME, and those who are neuro-diverse. We’ll always strive to deliver a world-class experience for those who enrol with us.We’ll always strive to keep our education up to date, outcomes focused, and aligned with industry requirements.
  • Hackernoon
    Verified Contributor
    Hackernoon Jan 2023 - Present
    Edwards, Colorado, Us
    Hacker Noon is a leading tech media platform that provides insightful and informative content to a global audience of tech enthusiasts, developers, and entrepreneurs. The platform features articles, podcasts, and videos that cover a wide range of topics, including artificial intelligence, blockchain, cybersecurity, and software development. Hacker Noon's mission is to democratize knowledge and provide a platform for independent tech writers to share their perspectives and insights with a global community.
  • Agileventures.Org
    Trustee
    Agileventures.Org Mar 2018 - Sep 2021
    London, England, Gb
    Agile Ventures is a non-profit organization dedicated to crowdsourced learning and project development. We follow the agile approach to software development (see below), and do so online everyday using remote pair programming technologies such as google hangouts. Anyone at any skill level can participate or simply observe in the remote pair programming sessions and planning meetings as we develop solutions for real customers in the non-profit sector. There are no minimum requirements, simply an interest to learn.
  • Underwriteme
    Cyber Security Consultant
    Underwriteme Dec 2019 - Sep 2020
    London, London, Gb
    Providing subject matter expertise and technical guidance in security governance, compliance, and implementation. Working to mature security posture and understanding across the company.
  • Dzing Finance
    Security Officer
    Dzing Finance Jul 2019 - Nov 2019
    London, Uk, Gb
    Responsible for all cyber security monitoring and implementation, producing, managing, and monitoring all information security policies in collaboration with the DPO. Working with the CTO to implement security technologies within infrastructure. Responsible for business continuity planning and testing.
  • Merlin Entertainments Plc
    It Security Manager
    Merlin Entertainments Plc Nov 2018 - Jun 2019
    Poole, England, Gb
    At Merlin I was responsible for co-ordinating incident response, technical measures to ensure PCI DSS compliance, and the full vulnerability management lifecycle. I also provided internal consultation to ensure that security by design was implemented into the project lifecycle.
  • O2 (Telefónica Uk)
    It Security Manager
    O2 (Telefónica Uk) Sep 2016 - Nov 2018
    Reading, England, Gb
    Heading up vulnerability assessment, management, and strategic security improvements across the IT estate, developing and reporting to security KPIs, providing subject-matter expertise for all areas of in-life cyber security. Developing and providing training on security and threat modelling for project and architecture teams.
  • Csc
    Threat Intelligence Scientist
    Csc Jul 2015 - Sep 2016
    Global, Us
    - Proactively raising awareness of latest threats and vulnerabilities- Assisting analysts with alert assessment and investigations- Cultivating OSINT sources and development of processing tools- Designing and implementing lab for automated analysis and reconnaisance- First glance malware and attacker analysis- ArcSight monitoring and investigation- Developing end user security training materials
  • Esure
    Information Security Analyst
    Esure Sep 2014 - Jul 2015
    Reigate, Surrey, Gb
    - Risk assessment and analysis- Development of internal malware analysis capability- Implementation and operation of vulnerability management programme- Incident response- Reporting on current and future threats- Guidance on technical aspects of cloud architecture- Implementation and management of ASV scanning system- Recommendation and specification of IDS/IPS systems on AWS
  • Kingston University
    Guest Lecturer
    Kingston University Mar 2015 - Mar 2015
    London, Greater London, Gb
    Prepared and delivered a guest lecture on Information and Cyber Security to computing undergraduates.

James Bore Skills

Active Directory Networking Windows Server Virtualization Cloud Computing Infrastructure Management Security Cyber Security Enterprise Architecture Security Training Information Security System Deployment Collaboration Solutions System Architecture Information Security Management Network Security Enterprise Storage Automation Project Management Program Management Portfolio Management Prince2 Intrusion Detection Threat And Vulnerability Management Togaf Malware Analysis Threat Intelligence Security Awareness

James Bore Education Details

  • Northumbria University
    Northumbria University
    Cyber Security

Frequently Asked Questions about James Bore

What company does James Bore work for?

James Bore works for Bores Group Ltd

What is James Bore's role at the current company?

James Bore's current role is Managing Director and Principal Consultant.

What is James Bore's email address?

James Bore's email address is ja****@****ail.com

What is James Bore's direct phone number?

James Bore's direct phone number is +4411327*****

What schools did James Bore attend?

James Bore attended Northumbria University.

What are some of James Bore's interests?

James Bore has interest in Networking, Psychology, Homebrew, Computer Security, Encryption, Education, Beekeeping, Environment, Cycling, Reading.

What skills is James Bore known for?

James Bore has skills like Active Directory, Networking, Windows Server, Virtualization, Cloud Computing, Infrastructure, Management, Security, Cyber Security, Enterprise Architecture, Security Training, Information Security.

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant

Download 750 million emails and 100 million phone numbers

Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.