About
Through 27 years of progressive technology experience, 23 of those in senior security…
Articles by Jamie
Activity
-
Reflecting on my four years at Canadian Tire Corporation, I’m deeply grateful for the incredible people I worked with and the experiences that shaped…
Reflecting on my four years at Canadian Tire Corporation, I’m deeply grateful for the incredible people I worked with and the experiences that shaped…
Liked by Jamie Rees
-
Who are we? At Cyber Business Review, we bring together crowdsourced cyber insights, real-world experiences, and bold perspectives that challenge…
Who are we? At Cyber Business Review, we bring together crowdsourced cyber insights, real-world experiences, and bold perspectives that challenge…
Liked by Jamie Rees
-
Decisions for an ISO27001 implementation - 1. Are you going to “go it alone” or get outside help? When implementing ISO27001 into an organisation…
Decisions for an ISO27001 implementation - 1. Are you going to “go it alone” or get outside help? When implementing ISO27001 into an organisation…
Liked by Jamie Rees
Experience
Education
-
-
The National Association of Corporate Directors (NACD) in partnership with and the CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University deliver a robust program that demonstrates the certification holder's advanced understanding of the role of the board and executive management in cyber-risk oversight.
-
Licenses & Certifications
-
-
Archer GRC Professional
RSA/Archer
Issued -
-
-
HISP - Holistic Information Security Practitioner
HISP Institute
Issued -
-
SCNA - Solaris 8 Certified Network Adminstrator
SUN
Issued -
GSNA Gold - GIAC Certified Systems & Network Auditor
SANS
Issued ExpiresCredential ID 266 -
GCIH Gold - GIAC Certified Incident Handler
SANS
Issued ExpiresCredential ID 387 -
GCUX Gold - GIAC Certified Unix Security Administrator
SANS
Issued ExpiresCredential ID 111
Volunteer Experience
-
Member of the Editorial Board
Cyber Security: A Peer-Reviewed Journal - Henry Stewart Publications
- Present 8 years 3 months
Education
Guide the journal's content and peer-review articles submitted for publication to ensure they are practical, authoritative and relevant.
Cyber Security is the major new peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It will showcase the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government…Guide the journal's content and peer-review articles submitted for publication to ensure they are practical, authoritative and relevant.
Cyber Security is the major new peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It will showcase the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors -
Volunteer Organizer
BSides Fredericton
- 5 years 1 month
Education
Organizing the first iteration of BSides Fredericton, a information/cybersecurity conference that brings people of all skill levels together to share ideas and learn.
-
Industry member - Technology Advisory Commitee
New Brunswick Department of Education and Early Childhood Development
- 4 years 5 months
Education
Member of Deputy Minister's advisory committee on technology based educational programs.
-
Industry Lead - Curriculum Advisory Council
New Brunswick Department of Education and Early Childhood Development
- 1 year 1 month
Education
Providing Cybersecurity industry insight and recommendations for new curriculum development in the New Brunswick school system.
-
Judge / Panelist
SC Magazine Awards 2016-2018
- Present 9 years 5 months
Science and Technology
Members of this panel primarily are from end-user organizations. They are invited and chosen to participate as judging panelists for the Trust Awards categories based on their industry expertise and background. Typically, they lead information security divisions, play roles in implementing information security policies and plans for their organizations, and/or have in-depth knowledge or experience with testing, deploying or managing IT security products/services.
-
National Council Member - Maritime Provinces Coordinator
Canadian Cybersecurity Alliance (CCA) / Alliance canadienne sur la cybersécurité (ACC)
- Present 9 years 4 months
Science and Technology
The CCA/ACC formed to contribute to an increased understanding of the current state of cybersecurity in Canada, and coordinate the identification of future directions for research, education, dialogue and professionalization of the domain.
-
Member of the Advisory Board
CSO Digital
- 1 year 4 months
Science and Technology
CSO Digital is IT World Canada's quarterly security focused digital publication - a one-stop resource for timely, relevant, security news and insights you can rely on.
The Advisory Board is an insightful and esteemed group of security professionals from across Canada with real-life experience safeguarding data and ensuring trust.
http://digital.itwc.ca/cso-digital-may-2016/
http://digital.itwc.ca/f/cso-digital -
Subject Matter Expert - Reviewer Cybersecurity Certification Practice Analysis Task Force (PATF).
ISACA
- Present 10 years 10 months
Education
ISACA's new cybersecurity certification job practice
Perform an electronic independent review of the draft certification job practice and participation on a remote focus panel. Refining the list of task and knowledge statements that have been developed by the Cybersecurity Certification Practice Analysis Task Force (PATF). These statements represent the tasks performed by a 3 – 5 year cybersecurity practitioner and the knowledge necessary to conduct these tasks. -
Subject Matter Expert - Beta Exam Development
CompTIA
- Present 24 years
Education
Reviewed beta exam content and provided remarks to strengthen the original Security+ exam before its production release.
-
Research proposal evaluator
Natural Sciences and Engineering Research Council of Canada
- 2 months
Education
Review NSERC Collaborative Research and Development or Industrial Research Chair proposals for cybersecurity research and provide funding recommendations.
Publications
-
Changing the Information Security Story
Self
A short story I use to illustrate some of my thoughts on how to bridge the communications gap between Security and Business.
Honors & Awards
-
Lifetime Achievement Award
CISO Forum Canada
This award recognizes an individual who has made a great impact in the cybersecurity world, and within their communities as well.
-
CyberSmart2017 Award
CyberNB
Recognition for community involvement via work with ICTC to create and foster the CyberTitan program in Canada thereby demonstrating to kids the value and importance of developing these unique skills they can carry through life
-
CSO50 Award
CSO Online - IDG Enterprises
"The CSO50 Awards recognizes organizations for security projects and initiatives that demonstrate outstanding business value. The CSO50 Awards are scored according to a uniform set of criteria by a panel of judges that includes security leaders, industry experts and academics."
http://www.idgenterprise.com/press/cso-announces-the-2015-cso50-award-honorees-recognizing-innovative-use-of-security-in-driving-business-value -
Ingenious Award
TechNation formally Information Technology Association of Canada
Winner of the 2014 Ingenious Award in the Small to Med Public Sector category for our Security Event Management Centre. "Ingenious Awards recognize excellence in the use of technology to improve the performance of large and small businesses, government operations and not-for- profit organizations. The Ingenious Awards Program aims to build awareness of how enlightened Canadians are building more competitive enterprises, more effective organizations and a stronger Canadian economy through the…
Winner of the 2014 Ingenious Award in the Small to Med Public Sector category for our Security Event Management Centre. "Ingenious Awards recognize excellence in the use of technology to improve the performance of large and small businesses, government operations and not-for- profit organizations. The Ingenious Awards Program aims to build awareness of how enlightened Canadians are building more competitive enterprises, more effective organizations and a stronger Canadian economy through the innovative use of technology." https://ingeniousawards.ca/about/
-
North America Project of the Year Award Finalist
Tech Exec Network Information Security Executive Program
Finalist in the Academic/Public Sector Category "The Information Security Project of the Year Award focuses on information security projects completed in the past 12-18 months. These projects and their teams are recognized for having a significant impact to an organization's risk management or information security posture. This award brings to light the team behind the work. The project submissions are evaluated on their scope, goals, execution, and results."…
Finalist in the Academic/Public Sector Category "The Information Security Project of the Year Award focuses on information security projects completed in the past 12-18 months. These projects and their teams are recognized for having a significant impact to an organization's risk management or information security posture. This award brings to light the team behind the work. The project submissions are evaluated on their scope, goals, execution, and results." http://www.ten-inc.com/ise/default.asp
-
Americas Information Security Leadership Awards Finalist
(ISC)2
Finalist in the Senior Information Security Professional Category. "Americas ISLA aims to recognize the achievements of outstanding information security professionals who have led an industry workforce improvement initiative, program or project. The program recognizes professionals who are leading initiatives that result in a more proficient, resilient information security workforce in Central, North, and South America." https://www.isc2.org/PressReleaseDetails.aspx?id=12514
Recommendations received
4 people have recommended Jamie
Join now to viewMore activity by Jamie
-
ISO27001 Myths: 36: “You must do all the non conformities before the next certification audit. Not true. I do come across certification bodies and…
ISO27001 Myths: 36: “You must do all the non conformities before the next certification audit. Not true. I do come across certification bodies and…
Liked by Jamie Rees
-
ISO27001 suggested change 8. The word “appropriate” should be removed from ISO27001. The term “appropriate” usually implies some level of judgement…
ISO27001 suggested change 8. The word “appropriate” should be removed from ISO27001. The term “appropriate” usually implies some level of judgement…
Liked by Jamie Rees
-
1. ISO27001 Myths: 34: You must do a “proper” implementation of ISO27001 Not true. Although to be fair it really depends on what you mean when…
1. ISO27001 Myths: 34: You must do a “proper” implementation of ISO27001 Not true. Although to be fair it really depends on what you mean when…
Liked by Jamie Rees
-
ISO27001 Myths: 33: “The risk assessment must be repeatable to get the same results”. Not true. But read on…. ISO27001 actually says that you must…
ISO27001 Myths: 33: “The risk assessment must be repeatable to get the same results”. Not true. But read on…. ISO27001 actually says that you must…
Liked by Jamie Rees
-
ISO27001 Myths: 31: “Your ISMS must meet all the requirements of all the interested parties”. Not true. As a silly example, you may have interested…
ISO27001 Myths: 31: “Your ISMS must meet all the requirements of all the interested parties”. Not true. As a silly example, you may have interested…
Liked by Jamie Rees
-
ISO27001 Myths: 30: “There are some implicit requirements in ISO27001” Not true. There are no implicit requirements in ISO27001. It is what it is…
ISO27001 Myths: 30: “There are some implicit requirements in ISO27001” Not true. There are no implicit requirements in ISO27001. It is what it is…
Liked by Jamie Rees
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Jamie Rees in Canada
-
Jamie Rees
Director of Group Strategy
-
Jamie Rees
Marina Management Professional
-
Jamie Rees
Web Designer
-
Jamie Rees
--
10 others named Jamie Rees in Canada are on LinkedIn
See others named Jamie Rees