Jon Pertwee

IT Security Management Consultant

IT Risk Management Consultant

IT Governance Consultant

Jon Pertwee is a highly accomplished IT professional with a wealth of experience in IT service provision, specializing in IT security management and IT risk management. He has held multiple leadership positions throughout his career, overseeing the implementation of IT security and risk management practices for a variety of organizations across different sectors.

In his current role as an independent consultant, Jon provides expert advice and guidance on all aspects of IT security and risk management, helping his clients to identify and mitigate potential threats to their IT systems and data. He is known for his ability to develop and implement effective strategies that align with business objectives and meet compliance requirements.

In addition to his extensive experience, Jon is also highly qualified. He is currently studying for a Master’s degree (MSc.) in IT Security Management, which will further enhance his already impressive skills and knowledge. He has also obtained several industry certifications in information security, IT risk management, privacy, and project management, including CISSP, CASP+, CRISC, CIPP/E, and PMP. These certifications demonstrate his expertise in the field and his commitment to staying up-to-date with the latest developments in IT security and risk management.

Throughout his career, Jon has honed his technical skills in a variety of areas, including Microsoft Exchange Server, database administration, firewall configuration and administration, and Citrix Server administration. He has also worked with a range of IT security tools and technologies, such as Watchguard, Checkpoint, and Cisco, and has a deep understanding of how to configure and manage them effectively.

Overall, Jon is a highly respected IT security and risk management expert who is widely recognized for his knowledge, experience, and professionalism. His expertise is highly sought after by organizations looking to enhance their IT security and risk management practices and he is committed to helping his clients achieve their goals in a rapidly evolving IT landscape. If you’re looking for a seasoned IT professional to help your organization improve its IT security and risk management practices, Jon Pertwee is an excellent choice.

If you’re still unsure about working with me, please check my testimonials page.

Certified Information Systems Security Professional

Certified in Risk and Information Systems Control

Project Management Professional

Certified Information Privacy Practitioner -Europe

CompTIA
Advanced Security Practitioner

ITIL Foundation Certificate

Jon has recently released his first book. “Securing the Cyber Realm – A comprehensive Guide to Cybersecurity Strategies and Practices.” Currently available on Amazon

https://www.amazon.co.uk/gp/product/B0C7T3GKJF/ref=ox_sc_act_title_1

In an increasingly interconnected world, the importance of cybersecurity cannot be overstated. As organisations and individuals rely heavily on digital technologies, they face many threats that can compromise sensitive information, disrupt operations, and undermine trust.

“Securing the Cyber Realm – A Comprehensive Guide to Cybersecurity Strategies and Practices” offers an in-depth exploration of various facets of cybersecurity. Beginning with a historical overview of cybersecurity, the book transitions into a focused discussion on risk management, providing readers with a solid understanding of risk identification, assessment, mitigation, and reporting, along with an assortment of effective tools and templates.

The following chapters delve into vulnerability and threat management, emphasising the importance of continuous improvement and adaptation. Further elaboration on constructing an effective cybersecurity strategy unfolds, addressing key aspects such as management’s role, risk management, change management, incident response planning, compliance, and fostering a culture of accountability.

Readers will gain a good knowledge of technology management, with a comprehensive dissection of technical controls, third-party risk management, cloud security, IoT security, and the limitations of these controls. An entire chapter is dedicated to data lifecycle management, emphasising secure data storage, transmission, privacy, compliance, and disaster recovery strategies.

The book continues with a deep dive into Identity and Access Management (IAM), detailing each step from identification to administration and best practices. An insightful chapter on Incident Response lays out a roadmap from preparation to lessons learned.

“Securing the Cyber Realm” acknowledges the importance of education and training in building a robust cybersecurity team and developing comprehensive training programs. It concludes by focusing on emergent cybersecurity trends such as AI, Quantum Computing, Zero Trust, DevSecOps, Mobile Security, and Blockchain, and the implications of social media. This book serves as an essential resource, complete with useful templates and a comprehensive reference list, for anyone looking to understand and implement best practices in cybersecurity.