Jon Pertwee

Consultant and Author

IT Security – Risk Management – Disaster Recovery – Governance

 About Me

I’m Jon Pertwee, a senior IT management consultant with extensive experience in IT security, risk management, disaster recovery, and IT governance. Over the past two decades, I’ve led complex IT initiatives for organisations across public, private, and international sectors — including delivering disaster recovery and cybersecurity solutions for global institutions.

My work focuses on helping organisations build secure, resilient, and compliant IT environments. I specialise in making complex systems manageable, and in turning regulatory and operational requirements into practical, effective strategies.

Whether the goal is designing a disaster recovery plan, implementing a cybersecurity programme, or embedding a culture of risk awareness, I bring structure, insight, and real-world experience to every engagement.


Areas of Expertise

  • Disaster Recovery & Business Continuity Planning
    Creating clear, layered recovery strategies that reflect real infrastructure dependencies and business risk appetite.

  • Cybersecurity & IT Risk Management
    Helping organisations identify and mitigate risks, improve visibility, and build mature, business-aligned security practices.

  • IT Governance & Compliance
    Implementing control frameworks and compliance models aligned with ISO 27001, NIST, GDPR, and other standards.

  • Infrastructure & Systems Knowledge
    Deep technical foundation in Microsoft Exchange, Citrix, Cisco, Checkpoint, and Watchguard technologies, with extensive hands-on implementation experience.


Professional Credentials

  • MSc in IT Security Management (Distinction) 

  • Certifications:

    • CISSP (Certified Information Systems Security Professional)

    • CASP+ (CompTIA Advanced Security Practitioner)

    • CRISC (Certified in Risk and Information Systems Control)

    • CIPP/E (Certified Information Privacy Professional – Europe)

    • PMP (Project Management Professional)


Publications

📘 An IT Manager’s Guide to Disaster Recovery – A Layered Approach

A practical, structured methodology to help IT professionals develop effective, risk-aligned disaster recovery plans.
👉 View on Amazon

📘 Securing the Cyber Realm – A Comprehensive Guide to Cybersecurity Strategies and Practices

A field guide to modern cybersecurity, risk management, and system resilience.
👉 View on Amazon


Work With Me

I work directly with organisations that want to improve their security posture, develop actionable disaster recovery strategies, or build risk-aware IT operations. My approach is practical, business-aligned, and shaped by real experience.

📩 If you’re exploring how to improve your organisation’s IT resilience, get in touch or view my testimonials page on LinkedIn, to see what others have said.


Certified Information Systems Security Professional

Certified in Risk and Information Systems Control

Project Management Professional

Certified Information Privacy Practitioner -Europe

CompTIA
Advanced Security Practitioner

ITIL Foundation Certificate

Securing the Cyber Realm

A Comprehensive Guide to Cybersecurity Strategies and Practices

📖 Available now on Amazon:
👉 https://www.amazon.co.uk/gp/product/B0C7T3GKJF


Securing the Cyber Realm is a comprehensive and practical guide for IT professionals, business leaders, and security practitioners navigating today’s fast-moving and increasingly complex threat landscape.

In the digital age, cybersecurity is no longer just a technical challenge — it is a strategic necessity. As organisations depend more heavily on digital infrastructure, the risks to sensitive data, operational continuity, and stakeholder trust continue to escalate.

This book provides a thorough and actionable examination of the key pillars of modern cybersecurity. It lays a strong foundation in risk identification, assessment, mitigation, and reporting, all supported by practical tools, ready-to-use templates, and real-world case examples.

📘 Inside the book:

  • Vulnerability and Threat Management
    Strategies for continuous improvement and proactive risk handling.

  • Cybersecurity Strategy Development
    Insight into the role of leadership, change management, compliance, and incident response planning.

  • Technical Controls
    Coverage of third-party risk management, cloud and IoT security, and their practical limitations.

  • Data Lifecycle Management
    Best practices for secure data storage, transmission, privacy, compliance, and disaster recovery.

  • Identity and Access Management (IAM)
    A step-by-step breakdown of identification, administration, and IAM best practices.

  • Incident Response
    A full lifecycle approach — from preparation through containment, response, and lessons learned.


In addition to technical concepts, the book explores the human dimension of cybersecurity, offering guidance on education, training, and building high-performing security teams. It concludes with an exploration of emerging trends including artificial intelligence, quantum computing, Zero Trust, DevSecOps, mobile security, blockchain, and the evolving impact of social media.

Complete with templates, checklists, and an extensive reference list, Securing the Cyber Realm is an indispensable resource for anyone looking to build and maintain effective, real-world cybersecurity programmes.

 

An IT Manager’s Guide to Disaster Recovery

A Layered Approach

📖 Now available on Amazon: https://www.amazon.co.uk/dp/B0F42N99L5


Resilience of IT infrastructure is not longer a luxury, it’s a necessity. While many organisations focus on prevention and protection, far fewer are adequately prepared for what happens after something goes wrong. That’s where disaster recovery comes in, and where this book aims to make a real difference.

“An IT Manager’s Guide to Disaster Recovery – A Layered Approach” introduces a practical, structured methodology designed to support IT managers in developing comprehensive disaster recovery plans that actually work. Unlike existing resources, which often provide abstract guidance or focus narrowly on compliance, this book is grounded in real-world experience and delivers a system-oriented model that’s easy to apply, regardless of technical depth or organisational size.

The book presents a multilayered framework for disaster recovery, breaking down infrastructure into nine interdependent layers — from governance and physical infrastructure, through servers, applications, and data, all the way to testing and response strategies. Each layer is explored in detail, with practical advice on how to identify dependencies, assess risk, and ensure that recovery efforts align with business objectives and risk appetite.

Written for IT professionals, managers, and anyone responsible for business continuity planning, this guide:

  • Helps simplify complex infrastructure into manageable components

  • Supports clearer risk assessments through visual dependency mapping

  • Enables more realistic and testable disaster recovery plans

  • Aligns recovery strategies with real business priorities, not just audit checklists

Whether your environment is on-premise, hybrid, or entirely cloud-based, this book provides the structure and insight needed to build a resilient, recovery-ready IT organisation.

If you’ve ever struggled with where to start your DR planning, how to identify gaps in coverage, or how to communicate technical recovery concepts to business stakeholders, this is the guide for you.

👉 Get your copy now: https://www.amazon.co.uk/dp/B0F42N99L5