Date


Output Type

Download Available

85 results

Vulnerability analysis.

Presentation / Conference
Buchanan, W. J. (2015, May)
Vulnerability analysis. Presented at Advanced Threat Protection, Glazier's Hall, London
The current generation of threats against enterprise networks are more targeted, more persistent and more sophisticated than ever. Sony, eBay and JP Morgan are among the bigge...

Identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J. (2015, April)
Identifying areas of vulnerability. Presented at Scot-secure 2015, Dynamic Earth, Edinburgh
Using penetration testing to highlight areas of weakness with practical steps for improving the security of your organisation.

Promoting passion in an innovation and enterprise culture.

Presentation / Conference
Buchanan, W. J. (2015, April)
Promoting passion in an innovation and enterprise culture. Presented at Exploring 21st Century Organisational Culture: inclusivity, agility and innovation, Edinburgh
This presentation will show how organisations can encourage a culture of innovation and enterprise, including showcasing examples of good practice and how management styles ca...

New forensic investigation and training methods in a virtual environment (cloud) (D-FET project).

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, April)
New forensic investigation and training methods in a virtual environment (cloud) (D-FET project). Paper presented at Cybercrime and Cyberterrorism - the EU Research roadmap, Montpellier, France
DFET creates new training methods/techniques to support judicial authorities, law enforcement agencies and associated stakeholders in the fight against cybercrime through the ...

Creating efficiency by managing innovation.

Presentation / Conference
Buchanan, W. J. (2015, March)
Creating efficiency by managing innovation. Paper presented at Efficiency Through Technology: Public Sector 2.0, Hollyrood, Edinburgh
Creating efficiency by managing innovation • Driving innovation within the public sector • Creating an organisational structure that rewards efficiency • Identify the issues s...

It's all hackable.

Presentation / Conference
Buchanan, W. J. (2015, February)
It's all hackable. Paper presented at SBRC Insider Threat Conference 2015, RBS, Gogarburn

Cyber security in practice: identifying areas of vulnerability.

Presentation / Conference
Buchanan, W. J., & Smales, A. (2015, February)
Cyber security in practice: identifying areas of vulnerability. Paper presented at Scot-Secure 2015, Holyrood, Edinburgh
Areas covered include: - Using penetration testing to highlight areas of weakness - Practical steps for improving the security of your organisation.

An Analysis of N5 and Higher Computing.

Presentation / Conference
Buchanan, W. J. (2015, January)
An Analysis of N5 and Higher Computing. Paper presented at Computing at School, University of Dundee, Scotland
This presentation outlined an analysis of N5 and Higher Computing in Scotland.

Review of e-Frailty evaluation frameworks.

Presentation / Conference
Smales, A., Buchanan, W. J., & Thuemmler, C. (2015, January)
Review of e-Frailty evaluation frameworks. Paper presented at HIS 2015, Edinburgh
This paper outlines some of the key methods used to evaluate frailty and provide important metrics for the implementation of an e-Frailty framework. Frailty is an emergent pro...

Advanced persistent threat and Insiders.

Presentation / Conference
Buchanan, W. J. (2015, January)
Advanced persistent threat and Insiders. Paper presented at Advanced Persistent Threat, London
With an increase in the range and mobility of devices which connect to the network, there are now so many opportunities for intruders to compromise systems. Leading with the r...