Henry Dalziel

Henry Dalziel

Hong Kong, Hong Kong SAR
15K followers 500+ connections

About

🚀 I'm all about SEO. Read more here 👉 henrySEO.com

Services

Articles by Henry

  • 452 Cybersecurity Companies That are Hiring in 2021

    452 Cybersecurity Companies That are Hiring in 2021

    The job market is tough. You don't need me to tell you that, nor do you need me to list you a bunch of depressing stats…

    26 Comments
  • Cybersecurity Conferences 2021

    Cybersecurity Conferences 2021

    We've been listing Cybersecurity Conferences since 2012! In fact, we are the original InfoSec Conferences directory. In…

  • PayGilant | See How They Prevent Fraud

    PayGilant | See How They Prevent Fraud

    Big thank you to Asa Zaidman from PayGilant, a pioneering company that has a fascinating approach to preventing (and…

  • Anitian: Cloud Security And Compliance

    Anitian: Cloud Security And Compliance

    We were delighted to have John Vecchi on Hacker Hotshots, our web show where we let Cybersecurity Professionals discuss…

  • Ransomware: Keeping Up With Extortion Tactics

    Ransomware: Keeping Up With Extortion Tactics

    I had the pleasure of having Christopher Elisan from Flashpoint Intel on Hacker Hotshots, our web show at…

  • Horrendous Interviews

    Horrendous Interviews

    We've all had a horrendous interview, maybe? Interviews are for the most part stressful but they needn't be. TL;DR:…

Activity

Join now to see all activity

Experience

  • Publicis Media Graphic

    Publicis Media

    Hong Kong, Hong Kong SAR

  • -

    Hong Kong, Hong Kong SAR

  • -

    Hong Kong

  • -

    Hong Kong, Hong Kong SAR

  • -

    Hong Kong

  • -

    New York, United States

  • -

    Hong Kong

  • -

    Hong Kong SAR

  • -

    London + Hong Kong

  • -

    London UK and Tokyo Japan

  • -

    London, United Kingdom

  • -

    New York, Manhattan

Education

  • Aston Business School Graphic

    Aston Business School

    -

    Activities and Societies: Aston Marketing Society Aston Computer Science Society [originally Aston IT Coders]

    My MSc in Strategic Marketing Management was designed to meet the needs of graduates who had not previously specialised in marketing. Whilst featuring specialist marketing modules, an understanding and appreciation of other business functions within organisations was taught.

    I developed a knowledge and understanding of marketing processes and procedures, including marketing research, marketing planning and strategy, marketing communications and brand portfolio building.

  • -

    Activities and Societies: Computer Games Society (Gamesoc) Filipino Society Edinburgh Global Partnerships (travelled to the Philippines in a student exchange program)

    Studying Ancient History at Edinburgh University I decided to transfer to Aston University Business School (Post Graduate) to study Marketing Management.

    I acheived an MA General Degree from Edinburhg University. In Scotland, students who choose to do a "General" degree complete their third year at a lower level of specialisation, and receive a an MA without Honours.

Licenses & Certifications

Publications

  • Automated Security Analysis of Android and iOS Applications with Mobile Security Framework, 1st Edition

    Reed Elsevier

    Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

    Other authors
    • Ajin Abraham
    See publication
  • Cyber Security Awareness for Corporate Directors and Board Members

    Reed Elsevier

    Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

    Other authors
    • David Wilson
    See publication
  • Deploying Secure Containers for Training and Development, 1st Edition

    Reed Elsevier

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.

    See publication
  • Infosec Management Fundamentals, 1st Edition

    Reed Elsevier

    - Teaches ISO/IEC 27000 best practices on information security management
    - Discusses risks and controls within the context of an overall information security management system (ISMS)
    - Provides foundational information for experienced professionals as well as those new to the industry.

    Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those…

    - Teaches ISO/IEC 27000 best practices on information security management
    - Discusses risks and controls within the context of an overall information security management system (ISMS)
    - Provides foundational information for experienced professionals as well as those new to the industry.

    Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

    See publication
  • Next Generation Red Teaming, 1st Edition

    Reed Elsevier

    Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.

    See publication
  • How to Defeat Advanced Malware

    Reed Elsevier

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500…

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

    This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.

    How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

    See publication
  • How to Define and Build an Effective Cyber Threat Intelligence Capability, 1st Edition

    Reed Elsevier

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And…

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental.

    Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

    Other authors
    • Eric Olson & James Carnall
    See publication
  • Introduction to US Cybersecurity Careers

    Reed Elsevier

    An Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and…

    An Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field.

    This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

    See publication

Projects

  • Cyber Security Training Books

    -

    Other creators
    • Max Dalziel

Languages

  • English

    -

  • Italian

    -

  • French

    -

Recommendations received

More activity by Henry

View Henry’s full profile

  • See who you know in common
  • Get introduced
  • Contact Henry directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses