James Johnson-Miller, CISM
Hove, England, United Kingdom
612 followers
500+ connections
View mutual connections with James
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with James
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View James’ full profile
Other similar profiles
-
Kulvir Gakhal
BarkingConnect -
Gary Crane
Deputy Global DPO @ WPP. CIPP/E. Global Privacy.
LondonConnect -
Linda French
LondonConnect -
Alan Cooke
Founder and Consultant at Privacy Partners Limited, CIPP/E, CIPM
BraintreeConnect -
RONNIE BAGDONAVICIUS
Data Protection Officer at 2plan wealth management Ltd
BradfordConnect -
Ayoade Gboyega
LondonConnect -
Andrew Seaton
Greater LondonConnect -
Peter Blenkinsopp LL.B(Hons), LL.M, CIPM, CIPP-E
HarrogateConnect -
Agata D.
Data Protection Officer for Group Functions at Dentsu Aegis Network, CIPP/E, CIPT
United KingdomConnect -
Garreth Cameron
Data Protection Officer, Global & EMEA at dentsu
Greater ManchesterConnect -
Russell Edwards
Quality & Information Security Manager at Return on Investment Ltd
ShavingtonConnect -
Amanda Chandler
Data Protection Officer UK and Ireland at Dentsu Aegis Network
ReadingConnect -
Robert Courtney
United KingdomConnect -
Kerry Stark
Founder & Director of Stark Global Events
LondonConnect -
Jawad Ahmad
Director Centaurus IT. FEHA, MSc. PGCE, NCSP, OCP, MCSP, GCIH
SloughConnect -
Jo Wild
Communications & Engagement Leader I Strategic Thinker I Skilled Creator I Gets Stuff Done
Greater Bristol Area, United KingdomConnect -
John Morton CENG FBCS CiTP FIoD
Greater Reading AreaConnect -
Madhur Hemnani
Kingston Upon ThamesConnect -
Caroline Watson
Marketing and Communications Leader
AldershotConnect -
Emma Woodlands
Nanny UHNW Family
LondonConnect
Explore more posts
-
idash Solutions
⚠️ Windows 10 End of Life: Act Now ⚠️ Microsoft will no longer support Windows 10 after October 14, 2025. The NHS cyber attack underscored the dangers of using outdated software. Don't let your business be the next victim. Upgrade to Windows 11 with idash. As a Microsoft partner, we ensure a smooth transition, keeping your business secure and efficient. Contact us today to discuss your upgrade strategy! #Windows10EOL #Windows11Upgrade #CyberSecurity #MicrosoftPartner #idash
2 -
IT Governance Europe Ltd
Data protection meets Cloud security in this two day course 👇 Become a Certified ISO 27018 Cloud Privacy Specialist with our training course where you'll be able to learn how to protect Personally Identifiable Information in the Cloud. Save 25% on training in Cloud security this autumn https://ow.ly/PWu750TZpCj #CloudSecurity #DataProtection #ISO27018 #CloudPrivacy #CyberSecurityTraining #CloudComputing
7 -
IT Governance Europe Ltd
Data protection meets Cloud security in this two day course 👇 Become a Certified ISO 27018 Cloud Privacy Specialist with our training course where you'll be able to learn how to protect Personally Identifiable Information in the Cloud. Save 25% on training in Cloud security this autumn https://ow.ly/gpFN50TOw2K #CloudSecurity #DataProtection #ISO27018 #CloudPrivacy #CyberSecurityTraining #CloudComputing
4 -
Mobius Consulting United Kingdom
Are you prepared for the unexpected? Mobius Consulting UK's Incident Response Simulation Services can help you test your organisation's processes and identify any response gaps before a real attack occurs. Join us in improving awareness about Cyber Security and protecting your organisation: https://lnkd.in/dMMVnvPV For more information reach out to the Mobius Consulting United Kingdom team. #MobiusConsultingUK #SecuringDigitalTrust #Training #CyberSecurity #IncidentResponseSimulations #RiskManagement #CyberSecurity #KnowDevelopSecure
14 -
IT Governance Ltd
Data protection meets Cloud security in this two day course 👇 Become a Certified ISO 27018 Cloud Privacy Specialist with our training course where you'll be able to learn how to protect Personally Identifiable Information in the Cloud. Save 25% on training in Cloud security this autumn https://ow.ly/xLtJ50TOwef #CloudSecurity #DataProtection #ISO27018 #CloudPrivacy #CyberSecurityTraining #CloudComputing
5 -
Gislen Software
Your .Net Framework 4.8 applications could be vulnerable to security threats, incompatible with modern hardware, and missing out on the latest performance optimisations. Don't let your business become a casualty of outdated technology. Our .NET 8 migration services will breathe new life into your applications. Upgrade today and enjoy the benefits * Enhanced security * Improved performance * Seamless integration with modern technologies * Future-proofing your business Are you ready to upgrade? Learn more on our website: https://lnkd.in/gqGEefcP #DotNet #DotNet8 #ApplicationMigration #LegacyModernisation
11 -
IT Governance Publishing
Find out more about our book of the month ‘Combatting Cyber Terrorism – A guide to understanding the cyber threat landscape and incident response planning’ 📺 by Richard Bingley. Receive 15% off this month using code: RB15 Purchase your copy today 👇 https://ow.ly/coun50S9uyn #CyberTerrorism #CyberThreat #booktube #Showcase
10 -
Enterprise Tech Now
UK law firms are increasingly prioritizing business continuity due to mounting pressure, even as cybersecurity remains a critical concern. The shift reflects a growing need to balance operational resilience with robust security measures. Firms are adapting their strategies to ensure they can maintain services while safeguarding sensitive data. This trend highlights the evolving challenges in the legal sector’s approach to security and continuity. https://lnkd.in/gxUP9Kye #BusinessContinuity #Cybersecurity #LawFirms #DataProtection #UKLaw #SecurityStrategy #ITSecurity #OperationalResilience #LegalTech #DataSecurity #UnderstandingEnterpriseTech #EnterpriseTechnologyNow #EnterpriseTechnologyToday
-
Cyber Trust
🌟 Cyber Trust : Supporting Charities with IASME Cyber Essentials 🌟 IASME is working closely with the National Cyber Security Centre to educate about the cyber threats they face and inform them about the benefits of Cyber Essentials. Throughout October, IASME will be partnering with selected Certification Bodies across the UK, including Cyber Trust. We are offering free support and guidance to help charities prepare for IASME Cyber Essentials, plus a discount on certification costs (registered charities only). At Cyber Trust, we are proud to be part of this initiative, helping charities enhance their cyber security and resilience. Contact us today or visit https://lnkd.in/g9cmK_MK for details. 📢 If you know any charities that could benefit from this initiative, please share this post or comment below with their details. #CyberEssentials #CyberSecurity #CharitySupport #UKCharities #NonProfitSecurity #CharityAwareness #CyberTrust
12 -
Shervin Nahid
The announcement from the #ICO this morning indicating a fine for a #ransomware attack could follow is an important one. There have not been many enforcement notices published in relation to #cyberattacks, relative to the high volume of #breach notifications the ICO receives. So where these are published, they should be considered carefully. The press release highlights the sensitivity of the data involved and talks about the importance of #security measures. From this statement alone, it is worth noting that multi-factor authentication (#MFA) is mentioned 4 times! Clearly a significant factor that the ICO is signalling. Our team tracks security #TOMs referenced in enforcement decisions across the world and this aligns with what other regulators are flagging. The other measures mentioned, which also align with our TOMs tracker are the following: - regularly checking for #vulnerabilities, and - keeping systems up to date with the latest security #patches
322 Comments -
Offshore Backup
Unlock the potential of your business with Managed IT Support! 🚀 Here are some key benefits: 1. **Expertise on Demand**: Access a team of IT professionals without the overhead costs. 2. **24/7 Monitoring**: Ensure your systems are always up and running, minimizing downtime. 3. **Enhanced Security**: Protect your data with advanced security measures and protocols. 4. **Scalability**: Easily adapt your IT infrastructure as your business grows. 5. **Focus on Core Business**: Let us handle the tech so you can concentrate on what you do best! Invest in your peace of mind and operational efficiency today! 💼💻 https://freshmango.co.uk/ #ManagedITSupport #BusinessGrowth #CyberSecurity #ITServices #TechSupport #Efficiency
-
Fresh Mango Technologies (UK)
Unlock the potential of your business with Managed IT Support! 🚀 Here are some key benefits: 1. **Expertise on Demand**: Access a team of IT professionals without the overhead costs. 2. **24/7 Monitoring**: Ensure your systems are always up and running, minimizing downtime. 3. **Enhanced Security**: Protect your data with advanced security measures and protocols. 4. **Scalability**: Easily adapt your IT infrastructure as your business grows. 5. **Focus on Core Business**: Let us handle the tech so you can concentrate on what you do best! Invest in your peace of mind and operational efficiency today! 💼💻 https://freshmango.co.uk/ #ManagedITSupport #BusinessGrowth #CyberSecurity #ITServices #TechSupport #Efficiency
-
Steve Groom
The number one comment I still hear from businesses that cover their own IT systems is that they have to delay important projects and they feel they lag behind on transformational change. Your staff's IP is about how IT can innovate your business and shouldn't be swamped with BAU type activities. Having external partnerships aligned to your goals doesn't need to be expensive or mean loss of control - so give Vissensa | Forward Thinking IT a call today 02382357800 and ask for Chontelle.
8 -
UnixGuy
Senior cyber security leaders world-wide are recognising the value of GRC Mastery as it offers an accelerated pathway to learn Cyber Security GRC from a practical point of view (without any fluff). In this instance, a senior CISO in the US is using GRC Mastery to onboard new cyber security professionals and train them up 🙏🏻 check out it at 👉🏻 https://grcmastery.com
584 Comments -
Oxspring Network Solutions Limited
Worryingly, 79% of UK businesses do not currently undertake both internal and external cybersecurity audits. Regular cybersecurity audits, both internal and external, are crucial for organisations to identify vulnerabilities, assess security posture, and ensure compliance with industry standards and regulations. Neglecting these audits can lead to several problems: ❌ Increased risk of data breaches and cyber attacks ❌ Undetected vulnerabilities that can be exploited by threat actors ❌ Non-compliance with data protection regulations ❌ Lack of awareness of your security weaknesses For businesses that don't have the internal resources or expertise to conduct comprehensive cybersecurity audits, MDR services can provide an affordable and effective solution. Through Oxspring’s MDR services, you can improve your network readiness with: ✅ Continuous monitoring and threat detection ✅ Access to a team of cybersecurity experts ✅ Scalable and cost-effective, tailorable solutions ✅ Assistance with meeting compliance requirements ✅ Freeing up internal IT resources to focus on core business objectives Protect your data with 24/7 monitoring, threat intelligence, and incident response from our MDR services. Book a free consultation with our founder Ian Wroe - link in comments. #ZeroTrust #MSP #Cybersecurity #CiscoPartner
51 Comment -
Burness Paull LLP
Ransomware attacks remain the most serious cyber threat to UK organisations, with global incidents rising by 84% last year, according to NCC Group. Ransomware attacks involve a threat actor blocking access to your systems or stealing data from you and then demanding a ransom in exchange for returning access or your data. Many organisations are asking: should we pay the ransom? The ICO and National Cyber Security Centre (NCSC) consistently advise against it. Our insightful blog by Rebecca Roberts explains why paying ransom is discouraged and explores strategies to minimise the disruption to your business in the event of a ransomware attack. Read our blog here: https://bit.ly/3R0CYJK #ransomware #cyberbreach
24 -
Babble
Labour's Cyber Security and Resilience Bill announced earlier this year seeks to fortify the UK's critical infrastructure in an age of ever-evolving and escalating cyber threats. Our recent blog post, "New Cyber Security Bill to Fortify UK’s Critical Infrastructurenpieces together the key objectives, and implications, of the proposed legislation: https://lnkd.in/evJGbHeF... Here are the highlights: 🔐 The Bill seeks to facilitate a more effective and coordinated response to cyber threats by fortifying communications and collaboration between government, industry, and law enforcement. 🔐SMBs will face increased regulatory requirements, including enhanced incident reporting and increased compliance burden. This could lead to potential cost increases through investment in additional security measures. 🔐 The new Bill emphasises the need for the adoption of a proactive approach to cyber security, especially for SMBs. This includes conducting regular risk assessments, investing in training, and implementing strong security measures. #WeAreBabble #Babble #CyberSecurity #UK #Legislation #CyberThreats #DataProtection #SMBs #BusinessSecurity #Technology #RiskManagement #CyberResilience
13 -
The Puchi Herald
🔒 Secure Your Microsoft 365 Environment with Proofpoint 🔒 As businesses increasingly rely on Microsoft 365 for collaboration and productivity, ensuring its security is paramount. Proofpoint offers robust solutions to protect your Microsoft 365 environment from advanced threats, data loss, and compliance risks. Discover how Proofpoint can help you safeguard your critical data and maintain compliance while empowering your team to work securely and efficiently. Learn more: bit.ly/416wZsF #CyberSecurity #Microsoft365 #Proofpoint #DataProtection #Compliance #DigitalSafety
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More