A Sharing of Knowledge & Experiences

Whether you’re seeking to further your Cyber Security, Information Security, Risk Management or Operational Resilience knowledge or you are part of your business’ C-Suite or Leadership teams investigating how to reduce the risks to your organization, IS Centurion’s Director (Jim Seaman) continues to produce some useful insights through this websites blogs and through the growing library of reading materials that he contributes to.

PCI DSS:
An Integrated Data
& Security Standard Guide

Grow your knowledge of the Payment Card Industry Data Security Standard (PCI DSS), in relation to the continual safeguarding of any cardholder data assets and the supporting operations.

​Understand how the standard has been forged from strong and robust concepts, which can be seen across various security industry standards and military operations.

Develop your understanding of what good payment card security looks like, through the experiences, skills and knowledge from more than 32 years working within the security industry.

PCI DSS:
An Integrated Data Security Standard Guide

Grow your knowledge of the Payment Card Industry Data Security Standard (PCI DSS), in relation to the continual safeguarding of any cardholder data assets and the supporting operations.

​Understand how the standard has been forged from strong and robust concepts, which can be seen across various security industry standards and military operations.

​Develop your understanding of what good payment card security looks like, through the experiences, skills and knowledge from more than 32 years working within the security industry.

buy

Protective Security: Creating Military Grade Defenses for Your Digital Business

A long career in the Royal Air Force Police has provided many specialist areas to grow an exceptional level of skill, experience and knowledge, which are directly transferable to assist you to enhance the protection of your digital business.

​Check out what benefits you can glean from a Protective Security career encompassing:

​Policing.
Special Weapons protection.
Airfield protection (aka Dog Handling).
Security Shift Command.
Air Transport Security operations.
Counter Intelligence operations.
Counter-Terrorism operations.

buy

Challenges in the IoT and Smart Environments:
A Practitioners’ Guide to Security, Ethics and Criminal Threats

In this ever-changing and challenging technological world understanding the Security, Ethics and Criminals Threats has never been more important.
​For example, what importance does Digital Leadership, Strategy and Governance play in helping to ensure that your business can safely embrace new and emerging technologies?

buy

Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

This was my 1st contribution to a published book, as well as the Technical Editor I also provided contributions to two of the chapters on a subject that we teach to children (e.g., The Wolf In Red Riding Hood, The witch in Snow White, etc.) but which businesses often neglect with their adult employees.

How has COVID19 and the move to increased remote working impacted the Social Engineering threats?

buy