Jon Cosson

With over three decades of experience in the heart of London’s financial sector, I have dedicated my career to the pursuit of robust cybersecurity practices and IT leadership. As a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Chief Information Security Officer (C|CISO), Certified Ethical Hacker (CEH), and Computer Hacking Forensic Investigator (CHFI), I bring a wealth of knowledge and expertise to the table.

My journey in the field of cybersecurity has not only been about personal growth but also about sharing my insights with others. As an international speaker, I have had the privilege of addressing audiences worldwide, discussing the importance of cybersecurity in today’s digital age. My passion for knowledge sharing extends to my work as an author and blogger, where I delve into the complexities of cybersecurity, offering practical advice and thought leadership.

In my role as a CISO and Head of IT, I have overseen the development and implementation of comprehensive information security and IT strategies. My focus has always been on creating resilient systems capable of withstanding the evolving landscape of cyber threats.

My Master’s degree in Cybersecurity has provided a solid academic foundation, which, when combined with my practical experience, allows me to approach cybersecurity from a holistic perspective.

I am always open to connecting with other professionals in the field, sharing knowledge, and exploring new opportunities. Let’s secure the digital world together.
Beware of FedEx Scam Emails: How to Spot and Protect Yourself from Phishing Attacks
|

Beware of FedEx Scam Emails: How to Spot and Protect Yourself from Phishing Attacks

With the rise of online shopping and delivery services, scams impersonating trusted companies like FedEx have become increasingly prevalent. Cybercriminals are cunning, and their phishing attempts can be both sophisticated…

Who is Responsible for Bank Frauds? Investigating the Perpetrators and Processes
|

Who is Responsible for Bank Frauds? Investigating the Perpetrators and Processes

Bank fraud, a pervasive issue that affects millions globally, is a complex and ever-evolving problem. As technology advances, fraudsters devise more sophisticated schemes, leaving individuals and financial institutions vulnerable. But…

Protect Yourself From Tailgating Attacks: What is Tailgating in Cyber Security?
|

Protect Yourself From Tailgating Attacks: What is Tailgating in Cyber Security?

Imagine a scenario where an unauthorised person effortlessly slips into your organisation’s restricted areas, gaining access to sensitive information and putting your company premises entire infrastructure at risk. That’s precisely…