A Sharing of Knowledge & Experiences

Whether you’re seeking to further your Cyber Security, Information Security, Risk Management or Operational Resilience knowledge or you are part of your business’ C-Suite or Leadership teams investigating how to reduce the risks to your organization, IS Centurion’s Director (Jim Seaman) continues to produce some useful insights through this websites blogs and through the growing library of reading materials that he contributes to.

PCI DSS:
An Integrated Data
& Security Standard Guide

Grow your knowledge of the Payment Card Industry Data Security Standard (PCI DSS), in relation to the continual safeguarding of any cardholder data assets and the supporting operations.

​Understand how the standard has been forged from strong and robust concepts, which can be seen across various security industry standards and military operations.

Develop your understanding of what good payment card security looks like, through the experiences, skills and knowledge from more than 32 years working within the security industry.

PCI DSS:
An Integrated Data Security Standard Guide

Grow your knowledge of the Payment Card Industry Data Security Standard (PCI DSS), in relation to the continual safeguarding of any cardholder data assets and the supporting operations.

​Understand how the standard has been forged from strong and robust concepts, which can be seen across various security industry standards and military operations.

​Develop your understanding of what good payment card security looks like, through the experiences, skills and knowledge from more than 32 years working within the security industry.

buy

Protective Security: Creating Military Grade Defenses for Your Digital Business

A long career in the Royal Air Force Police has provided many specialist areas to grow an exceptional level of skill, experience and knowledge, which are directly transferable to assist you to enhance the protection of your digital business.

​Check out what benefits you can glean from a Protective Security career encompassing:

​Policing.
Special Weapons protection.
Airfield protection (aka Dog Handling).
Security Shift Command.
Air Transport Security operations.
Counter Intelligence operations.
Counter-Terrorism operations.

buy

Challenges in the IoT and Smart Environments:
A Practitioners’ Guide to Security, Ethics and Criminal Threats

In this ever-changing and challenging technological world understanding the Security, Ethics and Criminals Threats has never been more important.
​For example, what importance does Digital Leadership, Strategy and Governance play in helping to ensure that your business can safely embrace new and emerging technologies?

buy

Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

This was my 1st contribution to a published book, as well as the Technical Editor I also provided contributions to two of the chapters on a subject that we teach to children (e.g., The Wolf In Red Riding Hood, The witch in Snow White, etc.) but which businesses often neglect with their adult employees.

How has COVID19 and the move to increased remote working impacted the Social Engineering threats?

buy

Payment Card Industry Data Security Standard (PCI DSS) v4.0: Helping you to navigate a safe passage through the labyrinth of payment card data security controls

At the end of March 2022, the Payment Card Industry Security Standards Council (PCI SSC) carried out a fundamental overhaul of the PCI DSS framework. This overhaul has been implemented to increase the effectiveness of the security controls that have been designed to meet the ever-changing threat landscapes and dynamic business operations.

buy

Artificial Intelligence and National Security

This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible.

buy

Digital Transformation in Policing: The Promise, Perils and Solutions (Advanced Sciences and Technologies for Security Applications)

This book shares essential insights into how the social sciences and technology could foster new advances in managing the complexity inherent to the criminal and digital policing landscape. Said landscape is both dynamic and intricate, emanating as it does from crimes that are both persistent and transnational. Globalization, human and drug trafficking, cybercrime, terrorism, and other forms of transnational crime can have significant impacts on societies around the world. This necessitates a reassessment of what crime, national security and policing mean. Recent global events such as human and drug trafficking, the COVID-19 pandemic, violent protests, cyber threats and terrorist activities underscore the vulnerabilities of our current security and digital policing posture.

buy

Challenges in the IoT and Smart Environments: A Practitioners’ Guide to Security, Ethics and Criminal Threats (Advanced Sciences and Technologies for Security Applications)

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients’ lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics.

buy

Security Risk Management – The Driving Force for Operational Resilience: The Firefighting Paradox (Internal Audit and IT Audit)

The importance of businesses being Operationally Resilient is becoming increasingly more important and a driving force behind whether an organization can ensure that their valuable business operations can ‘Bounce Back’ from, or manage to evade, impactful occurrences is the Security Risk Management Capabilities.

In this book, we change the perspective on an organization’s operational resilience capabilities so that it changes from being a reactive (tick box) approach to being proactive. The perspectives of every chapter in this book are with a focus on risk profiles and how your business can reduce these profiles using effective mitigation measures.

buy