Greg Day

United Kingdom Contact Info
11K followers 500+ connections

Join to view profile

About

Greg Day helps organisations in the private and public sector develop comprehensive…

Articles by Greg

See all articles

Activity

Join now to see all activity

Experience & Education

  • Cybereason

View Greg’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • RSA Conference Graphic

    Hackers and Threats program committee member

    RSA Conference

    Science and Technology

    Been very privileged in 2017, 2018, 2019, 2020 to help identify speakers & review their submissions from the wealth of amazing submissions to speak at the conference.

  • CyLon Graphic

    CohortMentor

    CyLon

    - Present 5 years 3 months

    Science and Technology

    Mentor new technology startup companies.
    https://cylonlab.com

Patents

  • Identifying malware infected reply messages

    Issued US US 7,900,254 B1

    A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a…

    A technique for identifying reply mailer computer program viruses detects whether a reply message is generated in less than a threshold reply time and whether or not the reply message includes an attachment. The generation of a reply message in less than a threshold reply time and including an attachment is deemed indicative of an infected reply message and accordingly that message will be quarantined, deleted, disinfect ted or the like. The mail server using the present technique maintains a temporary log of the email message sent, including the sender, the recipient, and the time of sending. The log is used to identify replies and determine whether or not those replies have been received in less than the reply time threshold.

Organizations

  • I-4

    vice Chair of Members Advisory Committee (MAC)

    - Present

    Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.

  • Europol

    Internet Security Advisory Group member

    - Present

    Established by the Head of EC3 and reporting to him, dedicated advisory groups have been created in order to foster closer cooperation with its leading non-law enforcement partners. They help to strengthen practical cooperation between law enforcement and key domains, such as internet security, telecommunications and financial services.

  • UK NCCU Industry Strategic Cyber Industry Group (SCIG)

    Member

    -

    the National Cyber Crime Unit (NCCU) of the NCA and private sector organisations work in partnership to: coordinate joint activity against cyber crime, identify intelligence gaps and improve intelligence sharing, understand the capabilities available in law enforcement and industry, and steer the activities of Virtual Task Forces and ad hoc working groups

  • World Economic Forum - Centre for CyberSecurity

    Member

    -

    The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a…

    The World Economic Forum Centre for Cybersecurity will: Establish, activate and coordinate global public-private partnerships to encourage intelligence sharing and the development of cyber norms Collectively develop, test and implement cutting-edge knowledge and tools to foresee and protect against cyberattacks, current and future Implement global capacity-building and training programmes to produce the next generation of cybersecurity professionals Establish, coordinate and facilitate a Global Rapid-Reaction Cybersecurity Task Force comprised of experts from our partner community to help mitigate the negative impact of severe global cyberattacks.

  • I-4

    Chair of Members Advisory commitee (MAC)

    -

    Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.

  • I-4

    Vice Chair of the Members Advisory Committee (MAC)

    -

    Since its launch in 1986, i-4 has consistently strived to be the world’s leading forum for senior information security professionals. Many members hold senior roles within large, global organizations across a diverse range of industries, with a common dependence upon IT along with sophisticated risk management and security operations.

  • CISP (Cyber Information Sharing Parntership) - Now part of the NCSC

    Original working groups to define requirements

    -

    The Cyber Security Information Sharing Partnership (CiSP) is a joint industry and government initiative set up to exchange cyber threat information in real time, in a secure, confidential and dynamic environment, increasing situational awareness and reducing the impact on UK business.

  • Council of Europe Cybercrime convention commitee

    Member

    -

    The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime and its Protocol on Xenophobia and Racism, the Cybercrime Convention Committee (T-CY) and the technical cooperation programmes on cybercrime.

  • Intellect/TechUK

    Vice chair of the Cyber Security group

    -

    The Cyber security group has been formed to provide a coherent voice for industry working in "high threat" areas - including defence, national security and resilience, the protection of critical national infrastructure, intelligence and organised crime. The group provides a channel for government, industry and the wider stakeholder community to discuss policy, strategy and implementation issues.

Recommendations received

More activity by Greg

View Greg’s full profile

  • See who you know in common
  • Get introduced
  • Contact Greg directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Greg Day in United Kingdom

Add new skills with these courses