The Occasional Orator Part 3
Proper preparation can make all the difference when it comes to speaking at conferences
Education? Academic background in modern languages, social sciences, and computer science.
Highlights of your career? I was a late starter (1986) as an IT professional, beginning at the Royal Free Hospital, then with the Human Genome Project (1989), then at Imperial Cancer Research Fund (1991-2001), where I wrote/co-wrote/edited a number of Internet FAQs and my first articles on programming and security. I presented my first conference papers in 1997 (at Virus Bulletin and SANS). In 2001 Osborne published Viruses Revealed (co-written with Robert Slade and Urs Gattiker): VR and the later AVIEN Malware Defense Guide (Syngress) – to which Andrew Lee also contributed – are probably the best known of my books. When I rejoined the UK’s National Health Service in 2001, I ran the Threat Assessment Centre and was the go-to person nationally for malware issues. I left to work as a freelance author and consultant in 2006, which is also when I began to work with ESET.
Position and history at ESET? Senior Research Fellow at ESET N. America. Primarily, I’m an author and blogger, editor, conference speaker, and commentator on a wide range of security issues. Like the rest of the industry, they put up with me because I’ve been around so long.
What malware do you hate the most? Malware is just code. It’s malicious people I detest. While I’ve no love of scammers, I can see that it’s easier to be honest in a relatively prosperous environment – if there is such a thing anymore – and that cybercrime can be driven by an economic imperative. But I have nothing but contempt for those sociopaths who cause harm to others for no reason except that they can.
Favorite activities? The guitar (I still gig and record when time allows), other people’s music. I love opera but don’t attempt to sing it. Photography, art, poetry, country walking – well, ambling is about as much as I can manage at my age – good food and wine, good television when I can find it...
What is your golden rule for cyberspace? Scepticism is a survival trait: don’t assume that anything you read online is gospel truth, even this adage.
When did you get your first computer and what kind was it? Amstrad PCW (primarily a word-processor) in 1986. What else would you expect a not-very-rich author to buy in 1986? :)
Favorite computer game/activity? Extra-curricular writing (blogging, verse and lyrics, articles). Digital photography and miscellaneous artwork.
Proper preparation can make all the difference when it comes to speaking at conferences
David HarleyAs another confusing message spreads, we look at Facebook privacy, cloning, and hacking
David HarleyPublic speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message
David HarleySpeaking at conferences can be daunting for presenters but often it is about striking the right balance between content and delivery
David HarleyThe security implications of devices connecting and sharing data
David HarleyThe importance of providing the best possible after-sales service to customers
David HarleyWeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career.
David Harley and EditorTracing the evolution and subsequent revolution of ransomware
David HarleyIt's easier to have scruples about how you earn your living when you're not one of millions of people chasing just a few thousand jobs.
David HarleyBusinesses are often sent fake invoices and waybills which install ransomware. Teach staff to avoid these. If questionable, ask your IT dept to look at it. E-cards have been a target in the past and may be used again in holiday-themed attacked.
David HarleyIn our previous blog entries we covered Simple Steps to Online Safety, Cybersecurity in the Workplace and Today’s Predictions for Tomorrow’s Internet. In our final blog in the series we will be talking about the opportunities that await you if you were interested in a career in cybersecurity.
David HarleyIn our previous blog entries we covered Simple Steps to Online Safety and Cybersecurity in the Workplace. In the blog today we will be talking about some of today's predictions when it comes to the internet of tomorrow.
David HarleyIn the first two parts of our series we have looked at the role an everyday internet user has in making the internet a safer place, and ID theft. This time around we focus on the role everyone has when it comes to cybersecurity best practices in the workplace.
David HarleyIn the first part of our series we addressed issues such as the role an everyday internet user has in making the internet a safer place, and ID theft. The second part of the Twitter chat continues with the theme of Simple Steps to Online Safety.
David HarleyWe've gathered our own thoughts on the topics chosen each week for this short series of blogs that will be published twice a week.
David HarleyMalware simulators are not an appropriate basis for testing product detection capabilities.
David HarleyTo some extent, the security software industry relies on the idea that there is always a technological answer to a tech problem but 'always' is a big word.
David HarleyThe Virus Bulletin 2017 Conference has announced some of its Small Talk and reserve papers that will be on the agenda of this year's event.
David HarleySocial engineering may play a vital part in persuading a victim to open a malicious executable or website, says ESET's David Harley on social engineering and ransomware.
David HarleyRecently I've been seeing lightly-revised versions of a longstanding hoax, says David Harley. Read more on supermarkets and fish perfumes.
David Harley