Aspiring CISO. Cyber Entertainer, Writer, and Presenter. Humanity, not machinery. An observer of how we use and abuse technology. Empathetic and altruistic.
Image for post
Image for post
Remind yourself to stop, breathe, and relax

While many of my readers assert I can make the most complex or obscure technologies understandable through my writing, I’ve always struggled to do the same with myself. Instead of sharing every nuance of the long-winding road that is my life, I’ll simply share a selection of points and invite further discussion. I think we’ll get along very well, so thank you for dropping by!


Image for post
Image for post
Photo by Jason Leung on Unsplash

This past year, I made some money writing and publishing stories on Medium, and I couldn’t be happier with the results. I made money, and so can you if you’re willing to persist.

While this article might get lost in the noise of others telling you “how to get rich” writing, this is not one of those stories. Instead, this is my journey with the platform over the past year.

For years, I wrote posts and articles on LinkedIn and while some of them generated many comments and reactions, not a cent was made aside from a bit more exposure to current and prospective clients of my employer. …


Image for post
Image for post
Photo by Sora Shimazaki from Pexels

Part 2: Australia vs Canada

I spend a lot of time focusing on our cybersecurity strategies and controls here in Australia and what other sovereign nations worldwide are doing to safeguard their data and systems. Regardless of whether other countries are part of the commonwealth or not, many similarities assure us we’re on the right path and differences we can learn from and adopt.

This article will review the Government of Canada Communication Security Establishment (CSE) Canadian Centre for Cyber Security (CCCS) Top 10 IT Security Actions. …


Image for post
Image for post
Photo by Philipp Katzenberger on Unsplash

Part 1: Australia vs. New Zealand

I spend a lot of time focusing on our cybersecurity strategies and controls here in Australia and what other sovereign nations around the world are doing to safeguard their data and systems. Regardless of whether other countries are part of the commonwealth or not, many similarities assure us we’re on the right path and the differences show us what we can learn from and adopt.

In brief, I have been reviewing the Computer Emergency Response Team New Zealand (CERT NZ) Ten Critical Controls for organisations and how similar they are to our own Australian Cyber Security Centre’s (ACSC) Essential Eight Strategies to Mitigate Cybersecurity Incidents. …


Image for post
Image for post
Photo by Standsome Worklifestyle on Unsplash

Working from home may be a new way for some, but how do you deal with distractions? For me, WFH life is status quo, and I’ve developed a tolerance, nay, an immunity to distractions. How many of you have these? How do you handle them?

Distraction 1: Traffic

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store