Tim D Williams

Tim D Williams

Greater Reading Area
4K followers 500+ connections

About

Versatile, personable, analytical, senior Business, IT & Security consultant…

Articles by Tim D

See all articles

Contributions

Activity

Join now to see all activity

Experience

  • ERS Consultancy Graphic

    ERS Consultancy

    London, England, United Kingdom

  • -

    London, United Kingdom

  • -

    Edinburgh, United Kingdom

  • -

  • -

  • -

    London, United Kingdom

  • -

    Westminster

  • -

    Nottingham, United Kingdom

  • -

    Ringmer, East Sussex, United Kingdom

  • -

  • -

    Saudi Arabia

  • -

  • -

    Albuquerque, New Mexico Area

  • -

    London, United Kingdom

  • -

    London, United Kingdom

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

    Atlanta, GA

  • -

    Wilmslow, Cheshire, United Kingdom

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

  • (ISC)2 Graphic

    Examination board member

    (ISC)2

    - Present 12 years 11 months

    Science and Technology

    Examination board member for the CISSP, ISSAP (Security Architecture), ISSEP (Security Engineering), ISSMP (Security Management), HCISPP (Healthcare Information Security & Privacy) and CCSP (Cloud Security) certifications. By virtue of being involved in examination setting, excluded from involvement in training related to these certifications.

  • Working Group Member

    CLAS Policy & Tools Working Group

    - 4 years 8 months

    Science and Technology

    Contributor to continuous review and improvement of UK government information security policies.

  • Events Coordinator

    (ISC)² Thames Valley Chapter

    - 4 years 7 months

    Science and Technology

    The Thames Valley Chapter of (ISC)2 promotes information security understanding throughout Oxfordshire, Berkshire, Buckinghamshire, Surrey & North Hampshire. Anyone interested in learning about information security or supporting others is welcome to join as a member or simply attend our free sponsored public events. As the Chapter's Events Coordinator & Webmaster (http://isc2chapter-thamesvalley.co.uk/pages/events.html) I collaborate with others to put on 4 public events per year. Please…

    The Thames Valley Chapter of (ISC)2 promotes information security understanding throughout Oxfordshire, Berkshire, Buckinghamshire, Surrey & North Hampshire. Anyone interested in learning about information security or supporting others is welcome to join as a member or simply attend our free sponsored public events. As the Chapter's Events Coordinator & Webmaster (http://isc2chapter-thamesvalley.co.uk/pages/events.html) I collaborate with others to put on 4 public events per year. Please contact me with event content ideas, recommendations, speaker recommendations, speaker self-nominations and offers of support/sponsorship.

    http://isc2chapter-thamesvalley.co.uk/pages/officers.html
    http://isc2chapter-thamesvalley.co.uk/pages/events.html

  • BCS, The Chartered Institute for IT Graphic

    Information Security Specialists Group (ISSG) Committee Member

    BCS, The Chartered Institute for IT

    - Present 8 years 11 months

    Science and Technology

    Supporting the important work that BCS-ISSG does in promoting information security knowledge, professionalism and awareness.

  • Secretary

    (ISC)2 Thames Valley Chapter

    - 2 years 5 months

    Science and Technology

    Initially elected by fellow members of the Chapter leadership team to act as Interim Secretary to ensure that this role was covered in the lead up to the election of new Officers at the Annual General Meeting (AGM) in October 2016. Subsequently elected as Secretary by the Chapter's members who attended and voted at the AGM.

    http://isc2chapter-thamesvalley.co.uk/pages/officers.html

  • The University of Manchester Graphic

    Manchester Gold Mentor

    The University of Manchester

    - Present 8 years

    Education

    Providing personal coaching and advice to undergraduate and postgraduate students through a small number of individual introductions facilitated by the Manchester Gold programme.

  • Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG) Graphic

    Cyber Security 2017 Programme Committee Member and joint Industry Chair

    Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG)

    - 10 months

    Education

    Member of Programme Committee and Industry Chair for the Cyber Security 2017 Conference held in the Connaught Rooms, London, UK on June 19-20, 2017.

    http://c-mric.org/index.php/cs-committee

  • Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG) Graphic

    Cyber Security 2018 Programme Committee Member and joint Industry Chair

    Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC.ORG)

    - Present 7 years 2 months

    Education

    Member of Programme Committee and Industry Chair for the Cyber Security 2018 Conference to be held on June 11-12, 2018 in Glasgow, Scotland, UK

    http://c-mric.org/index.php/cs-committee-2018

Publications

  • Making Cybersecurity Sustainable

    Whitehall Media

    This presentation made the case for the importance of sustainability in cybersecurity planning, asking far-reaching questions including:
    • How balanced is cybersecurity growth?
    • Are we satisfying genuine human needs?
    • Do we have the right balance between ”radical inventions” and “conservative inventions” ?
    • Are we supporting the right technology transfers?
    • Do we adapt the technology style to emerging opportunities?
    • Have we built up too much momentum in particular…

    This presentation made the case for the importance of sustainability in cybersecurity planning, asking far-reaching questions including:
    • How balanced is cybersecurity growth?
    • Are we satisfying genuine human needs?
    • Do we have the right balance between ”radical inventions” and “conservative inventions” ?
    • Are we supporting the right technology transfers?
    • Do we adapt the technology style to emerging opportunities?
    • Have we built up too much momentum in particular technologies, constraining agility and resilience?

    This presentation was influenced by the 1987 paper by Thomas P. Hughes titled "The evolution of large technological systems. The social construction of technological systems: New directions in the sociology and history of technology.

    See publication
  • The Value of Threat Modelling

    Royal Holloway, University of London (RHUL)

    Original text of summary article explaining the value of threat modelling which is due to be published by Computer Weekly and which was derived from MSc thesis on "The Value of Threat Models in Enterprise Security Testing of Database Systems & Services".

    Other authors
    See publication
  • The Value of Threat Models in Enterprise Security Testing of Database Systems & Services

    Royal Holloway, University of London (RHUL)

    Thesis submitted as part of the requirements for the award of the MSc in Information Security at
    Royal Holloway, University of London which explores the value of threat models in organisation-wide security testing of database systems and services.

    Other authors
    See publication
  • Consumer-Technologien im Gesundheitssektor: Wo liegen die Herausforderungen für die IT-Sicherheit?

    All-About-Security.de

    German professional translation of "Consumer technologies in healthcare - what are the security challenges?" originally published by Computer World UK.

    See publication
  • Consumer technologies in healthcare - what are the security challenges?

    Computer World UK - (ISC)2's Infosecurity Voice blog / IDG Inc.

    Consumer-oriented technologies and services have already established a foothold in healthcare. Consumer technologies can improve patient care, reduce costs and allow healthcare organisations to offer new services. However use of consumer technologies presents healthcare with three main challenges:
    1. Clinical safety;
    2. Privacy and personal data protection;
    3. Information security and privacy education.

    See publication
  • IT-Sicherheit und Datenschutz im Gesundheitswesen

    All-About-Security.de

    German professional translation of English original document making the business case for wider adoption of (ISC)2's new Healthcare Information Security and Privacy Professional (HCISPP) certification as an international baseline personnel standard qualification for Healthcare sector workers whose job roles include Security and Privacy responsibilities.

    See publication
  • Healthy scepticism

    SC Magazine

    Informative 3 page online article written by Tony Morbin, SC Magazine's Editor-in-Chief containing quotes from a number of commentators on the NHS Care.data project including: Dr Tony Calland of the BMA, John Taylor of NHS Wales, Phil Robins, Brendan Rizzo, Sarb Sembhi, Steve Armstrong, Chris Philips and Graeme Orsborn.

    On page 2 of 3, I am quoted by Tony Morbin on security, privacy and public trust issues related to the NHS Care.data project.

    Other authors
    • tony morbin
    See publication
  • IT Security and Privacy in Healthcare

    Health Management (ISSN 1377-7629) Volume 14 Issue 2/MindBYTE Communications Ltd

    Foundational credentials for healthcare IT professionals are being introduced which aim to improve care, safety and workflows and reduce risks of institutional liabilities.

    http://www.imagegently.org/Portals/6/GlobalResources/Health%20Management%202014%20Article.pdf

    See publication
  • Why healthcare urgently needs certified security professionals

    Computer World UK - (ISC)2's Infosecurity Voice blog / IDG Inc.

    Information security risks in healthcare are growing as ever greater use is made of information technology to improve care outcomes. While there are undoubtedly medical benefits to increased sharing of medical information, given the number and diversity of healthcare organisations, it is becoming increasingly difficult to sustain trust. There is a strong business case for assigning Information Governance duties to people who have proven through their knowledge, experience and personal…

    Information security risks in healthcare are growing as ever greater use is made of information technology to improve care outcomes. While there are undoubtedly medical benefits to increased sharing of medical information, given the number and diversity of healthcare organisations, it is becoming increasingly difficult to sustain trust. There is a strong business case for assigning Information Governance duties to people who have proven through their knowledge, experience and personal commitment to relevant learning that they have the necessary competence.

    See publication

Honors & Awards

  • ISACA London Chapter 2014 Roll of Honour

    ISACA London Chapter

    Awarded by ISACA London Chapter for Top 3 score in certification examination.

  • Search Security MSc Thesis Award

    Search Security and Royal Holloway University of London (RHUL) Information Security Group (ISG)

    Search Security and RHUL ISG jointly award this honour each year to a number of RHUL MSc graduates, if it is considered that the graduate's MSc thesis is of outstanding quality and of potential wider interest to businesses.

    https://www.royalholloway.ac.uk/isg/informationforcurrentstudents/mscproject/thesisprizes.aspx

  • First British Citizen to obtain the ISSEP certification

    (ISC)2

    The prestigious Information Systems Security Engineering (ISSEP) certification (https://www.isc2.org/issep.aspx) can only be obtained by existing holders of the Certified Information Systems Security Professional (CISSP) certification. The ISSEP was launched in 2003 and was developed with support and expertise from the NSA (https://www.acsac.org/2003/case/thu-c-1530-Oren.pdf). Out of over 100,000 holders of the CISSP globally, less than 1,500 have obtained the ISSEP certification, mostly in the…

    The prestigious Information Systems Security Engineering (ISSEP) certification (https://www.isc2.org/issep.aspx) can only be obtained by existing holders of the Certified Information Systems Security Professional (CISSP) certification. The ISSEP was launched in 2003 and was developed with support and expertise from the NSA (https://www.acsac.org/2003/case/thu-c-1530-Oren.pdf). Out of over 100,000 holders of the CISSP globally, less than 1,500 have obtained the ISSEP certification, mostly in the USA. The number of holders of each (ISC)2 certification can be viewed online (https://www.isc2.org/member-counts.aspx) as can confirmation of the (ISC)2 certifications held by Tim D Williams (https://webportal.isc2.org/Custom/CertificationVerificationResults.aspx?FN=&LN=Williams&CN=378776).

Organizations

  • Association of Enterprise Architects (AEA)

    Member

    - Present
  • Association for Computing Machinery (http://www.ACM.org)

    -

    - Present
  • UK Shorinji Kempo Federation (http://www.ukskf.org)

    剣士

    - Present
  • International Information Systems Security Certification Consortium, Inc (http://www.ISC2.org)

    -

    - Present
  • British Computer Society (http://www.bcs.org)

    Member of the British Computer Society (MBCS)

    - Present
  • Institute of Information Security Professionals (http://www.IISP.org)

    -

    - Present
  • Information Systems Audit & Control Association (http://www.ISACA.org)

    -

    - Present

    The organisation behind COBIT and the certifications CISA, CISM, CGEIT & CRISC

  • Professional Risk Managers International Association (http://www.PRMIA.org)

    -

    - Present

Recommendations received

20 people have recommended Tim D

Join now to view

More activity by Tim D

View Tim D’s full profile

  • See who you know in common
  • Get introduced
  • Contact Tim D directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Tim D Williams

Add new skills with these courses