About
Articles by Greg
-
Why good data science is the key to great cyber security
Why good data science is the key to great cyber security
By Greg Day
-
Five Key Takeaways to Secure Your Cloud-Based World
Five Key Takeaways to Secure Your Cloud-Based World
By Greg Day
-
When are you actually starting your Zero Trust approach?
When are you actually starting your Zero Trust approach?
By Greg Day
Activity
-
Being early is great, time to prepare yourself and allow for common failures (late trains!) However, a week early for a conference has to be my all…
Being early is great, time to prepare yourself and allow for common failures (late trains!) However, a week early for a conference has to be my all…
Liked by Greg Day
-
Inauguration du bureau Nomios Group à Bordeaux, Cybereason présent à côté de son partenaire dans ses moments importants, de belles rencontres, des…
Inauguration du bureau Nomios Group à Bordeaux, Cybereason présent à côté de son partenaire dans ses moments importants, de belles rencontres, des…
Liked by Greg Day
-
Well done South African Cybereason Team! 💪🏻🤩 #edr #endpointsecurity #xdr #sdr Brandon Rochat Kristin Jacobsz Junaid M. Nicole Gerber
Well done South African Cybereason Team! 💪🏻🤩 #edr #endpointsecurity #xdr #sdr Brandon Rochat Kristin Jacobsz Junaid M. Nicole Gerber
Liked by Greg Day
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Hackers and Threats program committee member
RSA Conference
Science and Technology
Been very privileged in 2017, 2018, 2019, 2020 to help identify speakers & review their submissions from the wealth of amazing submissions to speak at the conference.
-
CohortMentor
CyLon
- Present 5 years 3 months
Science and Technology
Mentor new technology startup companies.
https://cylonlab.com
Patents
-
Identifying malware infected reply messages
Issued US US 7,900,254 B1
A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a…
A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a temporary log of the email message sent, including the sender, the recipient, and the time of sending. The log is used to identify replies and determine whether or not those replies have been received in less than the reply time threshold.
Organizations
-
I-4
vice Chair of Members Advisory Committee (MAC)
- PresentSince its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
Europol
Internet Security Advisory Group member
- PresentEstablished by the Head of EC3 and reporting to him, dedicated advisory groups have been created in order to foster closer cooperation with its leading non-law enforcement partners. They help to strengthen practical cooperation between law enforcement and key domains, such as internet security, telecommunications and financial services.
-
UK NCCU Industry Strategic Cyber Industry Group (SCIG)
Member
-the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups
-
World Economic Forum - Centre for CyberSecurity
Member
-The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a…
The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a Global Rapid-Reaction Cybersecurity Task Force comprised of experts from our partner community to help mitigate the negative impact of severe global cyberattacks.
-
I-4
Chair of Members Advisory commitee (MAC)
-Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
I-4
Vice Chair of the Members Advisory Committee (MAC)
-Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.
-
CISP (Cyber Information Sharing Parntership) - Now part of the NCSC
Original working groups to define requirements
-The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.
-
Council of Europe Cybercrime convention commitee
Member
-The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Committee (T-CY) and the technical cooperation programmes on cybercrime.
-
Intellect/TechUK
Vice chair of the Cyber Security group
-The Cyber security group has been formed to provide a coherent voice for industry working in "high threat" areas - including defence, national security and resilience, the protection of critical national infrastructure, intelligence and organised crime. The group provides a channel for government, industry and the wider stakeholder community to discuss policy, strategy and implementation issues.
Recommendations received
21 people have recommended Greg
Join now to viewMore activity by Greg
-
We surveyed 1,008 enterprise IT professionals to learn from those who had been breached from a ransomware attack, how they are preparing for future…
We surveyed 1,008 enterprise IT professionals to learn from those who had been breached from a ransomware attack, how they are preparing for future…
Shared by Greg Day
-
The beginning is the most important part of the work - Plato The start of a new month and week, for most it’s a fresh start, being July we are…
The beginning is the most important part of the work - Plato The start of a new month and week, for most it’s a fresh start, being July we are…
Liked by Greg Day
-
A year and some change at Cybereason, and what an exceptional year it has been, marked by transformative achievements and forward momentum…
A year and some change at Cybereason, and what an exceptional year it has been, marked by transformative achievements and forward momentum…
Liked by Greg Day
-
The class of I-4 Forum 105 at the beautiful Prague Castle. This week has focussed on improving cyber resilience as well as hearing truly insightful…
The class of I-4 Forum 105 at the beautiful Prague Castle. This week has focussed on improving cyber resilience as well as hearing truly insightful…
Liked by Greg Day
-
Great breakfast this morning with Greg Day, Pierre Buijsman and Loïc Castel. We delved into the latest trends and innovations in cybersecurity and…
Great breakfast this morning with Greg Day, Pierre Buijsman and Loïc Castel. We delved into the latest trends and innovations in cybersecurity and…
Liked by Greg Day
-
As ransomware continues to evolve, businesses must adapt to stay protected. @Cybereason’s latest ransomware report puts a spotlight into critical…
As ransomware continues to evolve, businesses must adapt to stay protected. @Cybereason’s latest ransomware report puts a spotlight into critical…
Shared by Greg Day
-
It’s been amazing day yesterday at RISK Conference 2024 👏🏻 Many good meetings with fantastic professionals, interesting discussions and high…
It’s been amazing day yesterday at RISK Conference 2024 👏🏻 Many good meetings with fantastic professionals, interesting discussions and high…
Liked by Greg Day
-
It's always rewarding to give back to the industry that has shaped your career. I'm excited to announce two upcoming events where I'll be sharing…
It's always rewarding to give back to the industry that has shaped your career. I'm excited to announce two upcoming events where I'll be sharing…
Shared by Greg Day
-
#Infosec2024, it’s been a while since we last connected but you certainly didn’t disappoint! Fantastic second day discussing our new & improved…
#Infosec2024, it’s been a while since we last connected but you certainly didn’t disappoint! Fantastic second day discussing our new & improved…
Liked by Greg Day
-
As Infosecurity 2024 wraps up, don’t miss out on the fun at booth D110! 🎉 Join us for exciting demos, 1:1 meetings with our CISO and leadership…
As Infosecurity 2024 wraps up, don’t miss out on the fun at booth D110! 🎉 Join us for exciting demos, 1:1 meetings with our CISO and leadership…
Liked by Greg Day
-
🏆 We're thrilled to announce that we've been honoured with the prestigious title of Technology Vendor of the Year at Infosec SEE 2024! This…
🏆 We're thrilled to announce that we've been honoured with the prestigious title of Technology Vendor of the Year at Infosec SEE 2024! This…
Liked by Greg Day
-
Join us at Infosecurity Europe for Day 1! We're at Stand D110, ready to meet you. 🎉 Swing by for a chance to win some fantastic goodies, and let's…
Join us at Infosecurity Europe for Day 1! We're at Stand D110, ready to meet you. 🎉 Swing by for a chance to win some fantastic goodies, and let's…
Liked by Greg Day
-
Tom H. & I had an insightful afternoon listening to #cybereason’s MSSP guru, Mark Wilson yesterday. Cybereason’s Defend 360 enables MSP/MSSP…
Tom H. & I had an insightful afternoon listening to #cybereason’s MSSP guru, Mark Wilson yesterday. Cybereason’s Defend 360 enables MSP/MSSP…
Liked by Greg Day
-
Infosec run down! 🤫 the quiet room 🤫 Apparently located on lower S7, I couldn’t find it and neither could three excel staff members… really…
Infosec run down! 🤫 the quiet room 🤫 Apparently located on lower S7, I couldn’t find it and neither could three excel staff members… really…
Liked by Greg Day
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Greg Day in United Kingdom
-
Greg Day
Financial Investigator
-
Greg Day
Director at Clout Communications Ltd
-
Greg Day
Transport & Operations
-
Greg Day
Western Union Media Network Lead, Europe
26 others named Greg Day in United Kingdom are on LinkedIn
See others named Greg DayAdd new skills with these courses
-
3h 40m
Certified Information Security Manager (CISM) Cert Prep (2022): 2 Information Security Risk Management
-
4h 5m
CISSP Cert Prep (2021): 4 Communication and Network Security
-
45m
Microsoft Cybersecurity Architect Expert (SC-100) Cert Prep: 4 Design Strategy for Data and Applications