John T. Email and Phone Number
John T. work email
- Valid
- Valid
- Valid
- Valid
John T. personal email
John T. phone numbers
Are you falling behind your competitors, are you concerned about your company’s cyber maturity, do you know if there are any information security gaps that need to be plugged before you suffer from a cyber incident, which attracts the attention of regulators, your customers, and damages your reputation? Or do you just think things could be much better….If anything above rings true, I can help. I am an experienced Information/Cyber Security specialist who has worked with a number of large organisations to define, build and improve information security. This has included ‘tweaking’ what is already in place to long term cyber transformation programmes. I have held CISO positions and built CISO offices for several companies, including a well-known, global manufacturing company. I originally come from a technical background which allows me to maintain strong relationships with technical authorities and have adapted my style to translate complex security challenges into ‘business speak’. I thrive in challenging environments where I apply my creative and innovation skills to the benefit of my customer. My skills include: ★ Architectures and controls assurance frameworks★ Cyber strategies★ Budget management★ Building and leading information security teams★ Winning and delivering large scale cyber transformation programmes★ Identifying information/cybersecurity risks through assessment, testing, and gap analysis★ Security Target Operating Models★ Controlling access to information assets through Identity and Access Management programmes ★ ISO 27001 and Cyber Essentials + certification ★ NIST CSF★ Forensic exercises and security investigations ★ Cross function collaboration and mentoring/coaching incumbent teams★ Security awareness★ Third-party due diligence and security assessment★ Developing/maintaining policies and monitoring complianceWorking experience in the following sectors:★ Automotive★ Banking (Investment & Retail)★ Building services ★ Financial Services★ Insurance★ IT management consultancy★ Legal★ Local Government★ Oil & Gas★ Media★ UtilitiesCertifications:★ EC-Council - C|CISO (lapsed)★ ISACA CISM★ ISC2 CISSP
Bms Group
View-
Chief Information Security OfficerBms Group May 2021 - PresentLondon, Gb -
DirectorAligo Ltd Jul 2015 - May 2021Providing senior Information Security/Cyber consultancy and leadership services on an interim or permanent basis.Specialist in Cyber/Security transformation across multiple sectors incl. Legal, Financial Services, Insurance, Manufacturing and Healthcare.
-
Interim Head Of Information Security And Assurance/Interim CisoLloyd'S Of London Nov 2018 - Sep 2020Responsible for a team of 10+ providing information security services to the Lloyd's of London Corporation. Repurposed and built out Lloyd's NIST CSF framework. Drove the cybersecurity strategy, chaired the information security governance committee, and provided through-leadership on all matters multi-year cyber/Information Security. Acquired Cyber Essentials + certification and built/led a cyber transformation project. Responsible for cyber incidents, remedial activities to drive down information risk. Supported the Operational Resilience program, implemented a third-party SOC, maximised security product capability, and elevated the security testing regime incl. Pen Testing, vulnerability accessement and ethical hacking. Reorganised the Information Security function, built the CISO Target Operating model and improved security over the business supply chain. Instrumental in PRA/FCA and BBA regulator reviews.
-
Interim Ciso (Ftc)Deloitte Uk May 2018 - Oct 2018Worldwide, OoHired as Interim CISO for the UK and Switzerland during a period of significant change together with a 5 year, $500m group-wide Cyber transformation programme (40 project streams). Deloitte have a 3LOD model and to get the most from the CISO function, the decision was made to transfer the CISO from the second to the first line, under the CIO. The role had a dual reporting line into the Risk and Quality Partner (second line), which at times caused conflict and required objectivity and resolve. Key to the success of the engagement was significant stakeholder management across all business lines; whilst exploiting the situation to introduce best practice and adopt pockets of excellence from across the firm. In addition to redefining the 3LOD, the firm was collapsing locales in favour of regional hubs by creating a North West Europe organisation, which resulted in a new security organisation and target operating model -
Information Security ManagerPartnership Feb 2016 - Feb 2018London, GbHired to repurpose and improve the information security function, build a Cyber Security function, strategy and ultimately see the organisation through a period of significant transformation, whilst the company merged with a competitor. The success of the role depended on a full range of skills from low-level IT Security experience through to governance, Cyber Incident Response, and third party management. -
Interim Head Of Information SecurityJust Group Plc Feb 2016 - Feb 2018
-
Football Coach U16'SWeald Wolves Junior Football Club Jan 2006 - May 2016Weald Wolves U16's football team coach. Hold's FA Club Coach Lvl 1.
-
Information Risk Specialist, Cyber SecuritySchroders Jul 2015 - Jan 2016London, Greater London, GbBuilding a cyber security defence controls framework which is aligned to business risk and will ultimately shape the information security strategy for the foreseeable future. -
Global Chief Information Security Officer (Ciso)Ntt Com Security Mar 2014 - Jul 2015London, United Kingdom , GbOn behalf of the Executive Board my overarching goal was to protect the organisations information or information entrusted by customers, partners and third parties. I am responsible for building a global information risk organisation, whilst ‘keeping the show on the road’, not impacting business operations and migrating from ISO27001:2005 to ISO27001:2013. Published a 3 years strategy and drove implementation, projects included the delivery of: education & awareness, governance, risk management (Archer), policy management and compliance, third-party management, security improvement, technology blueprint, Cyber security, executive metrics and dashboard, identity & access management and implementing an enterprise risk management framework. Successes included delivering the strategy on time and within budget whilst improving the security posture, driving down security events and optimising the use of people, process and technology. -
Managing ConsultantNtt Com Security Jul 2011 - Feb 2014London, United Kingdom , GbEngagements have included:• Jaguar LandRover - £12bn+ revenue. Extensive Information Security Transformation programme covering the entire governance life-cycle from developing and embedding a Target Operating Model through to establishing the technical architecture. Also included: building a security model for new markets, publishing a 5 year security strategy, shaping the Cyber security strategy and interim management. • Major Health care company. Interim Head of Information Security, driving a transformation programme and leading a team responsible for strategic programmes such as DDoS mitigation, PCI-DSS, ISO 27001 & defining the overall security strategy.• Global Hedge Fund Company. Identity & Access Management programme from drafting the policies and standards through to evaluating and implementing the chosen solution. • Legal Practice. Addressing weaknesses in the Information Security management system, identified by two of the firm’s most important customers. • Multinational Property Management Company. Information Security review to measure the security posture, comparing the results against competitors and industry leaders - scoring based on the COBIT maturity model. • Media Company. Large Information Security Transformation programme covering the entire governance lifecycle from building the security team through to establishing the technical architecture. -
Interim Management - Information SecurityAligo Ltd Dec 2010 - Jul 2011Functional leadership in quantifying the following: - Dependency on information for critical business processes from acquisition to disposal (follow the data)- Risk vs. reward analysis prioritising risk mitigation strategies within the organisations risk appetite- Policies, standards & compliance indicators required to maintain security- Effectiveness of security countermeasures and adherence to both internal and external requirements.
-
Principal ConsultantAligo Ltd Jul 2010 - Jul 2011Aligo consulting services include risk/threat & vulnerability assessments, security healthchecks, ISO27001 reviews & certification programme management, policy creation and interim security management.
-
Risk Management ConsultantMajor Global Llp Jun 2011 - Jun 2011Responsible for appraising the Information Security management system and completing a supplier third-party questionnaire on behalf of the customer.
-
Interim Head Of Information Security & RiskBupa Mar 2011 - May 2011Responsible for Information Security management and setting the strategic direction.
-
Information Risk SpecialistKennedys Jan 2011 - Feb 2011City Of London, England, GbResponsibility for maintaining ISO27001 certification by refining the existing Information Security Management System and building maturity into established processes and controls.Implementing an ISMS toolset to maintain compliance with ISO27001, whilst sharing a common architecture with other standards such as ISO14001, BS25999, ISO9001 and ISO20000 - Thus, mapping business processes with the information systems (physical, logical, people, third parties) they depend upon and the influence of incidents and threats & vulnerabilities.Conducting risk assessment of third parties and partners. -
Programme ManagerKennedys Jul 2010 - Oct 2010City Of London, England, GbResponsible for gaining ISO27001 certification. Built the ISMS and associated components. Assumed functional leadership for the project against a very restricted timeframe. Established the policies, standards & processes which led to certification. -
Interim Information Security SpecialistSeeking Other Employment Whilst Enjoying The Sun! Jun 2010 - Jul 2010
-
Head Of Information Risk ManagementBarclays Grcb Jun 2007 - Jun 2010London, GbResponsibility for the global information risk management (IRM) organisation. Team in the UK supported by central head of IRM in each business unit (Europe, Emerging Markets, South Africa, UK) & in-country risk managers (130k users). Ensuring that corporate information (physical, electronic & spoken word) is protected in accordance with its value & sensitivity. Publish standards to support Group level policies, regulatory & legal requirements. Drive the implementation of the standards & embed in business processesInformation Management teams responsible for Classification, Records Management, Privacy, Quality and Logical Access ManagementImplement an extended functional organisation & lead risk management initiatives across each of the business units. Implement compliance toolset producing KPI’s and compliance statsDetect & remediate incidents (e.g. leakage, compliance issues), continuously improve the risk posture.Board level reporting for internal/external policy, audit & group wide initiatives. -
Senior Programme ManagerBarclays Global Retail Commerical Banking Jun 2007 - Jan 2008
-
Principal ConsultantI-Defence Limited Jul 2003 - Jun 2007RBS Financial Markets – Global Head of Information Security (Interim)The Technologies Group BS7799 certification – Certificate – GB04/61920 Kennedys Solicitors BS7799 certification – Certificate GB04/63287Mutual Shipping CompanySecurity framework built upon ISO-17799Major ConglomerateForensics exercise – One of the largest in history!Hart County CouncilFormulation of an Information Security Management System.
-
Professional Services DirectorIkan Plc Nov 1999 - Nov 2002Building the professional services division providing secuirty, BCM & OpRisk based services
-
Global It Security Manager (Interim)Natwest Global Financial Markets Jun 1999 - Nov 1999GbTemporary head of IT security managing a team of 10 specialists in the UK and three outside of the UK.
John T. Skills
John T. Education Details
-
Kemnal Manor
Frequently Asked Questions about John T.
What company does John T. work for?
John T. works for Bms Group
What is John T.'s role at the current company?
John T.'s current role is CISO / Head of Information Security, Cyber transformation. VCISO. Not open to cold calling, account management introductions, the next silver bullet etc..
What is John T.'s email address?
John T.'s email address is jt****@****ect.com
What is John T.'s direct phone number?
John T.'s direct phone number is 20 7936*****
What schools did John T. attend?
John T. attended Kemnal Manor.
What are some of John T.'s interests?
John T. has interest in Children.
What skills is John T. known for?
John T. has skills like Information Security Management, Information Security, Iso 27001, Security, Governance, Business Continuity, Risk Management, Risk Assessment, Information Technology, Pci Dss, Network Security, Vulnerability Assessment.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial