About

From administering domains to writing code, from penetration testing to managing information, from identifying ways to breach a network to implementing controls to ensure that the risk is managed, from identifying and articulating risk to looking in the eye of the SIRO indicating they may have a problem, I have been lucky enough in my career to date to continue to develop a hollistic passion for information security.