This is Sean Pollonais's Typepad Profile.
Join Typepad and start following Sean Pollonais's activity
Join Now!
Already a member? Sign In
Sean Pollonais
Luton, England
Information Security Management Consultant
Interests: information security history, securing open perimeters, consumerism, ISMS, bundled security, InfoSec for the Cloud
Recent Activity
Image
It can feel like an uphill struggle when you try to instil new habits. There always seems to be resistance regardless of the reward. Change is difficult especially when the new direction is not clear. This makes it difficult to... Continue reading
Posted Mar 22, 2014 at BD&F Information Security
Image
The BDF 4Tier is cyclical. As you go up through the tiers they build on each other and then return again. Here’s another attempt to clarify the focus of each tier and how they relate to each other. Tasks are... Continue reading
Posted Aug 23, 2013 at BD&F Information Security
Image
“I can’t stand to wake up to a dirty kitchen!” If you hear that often enough in your formative years, guess what you end up saying as an adult. It is a ritual in our house to tidy the kitchen... Continue reading
Posted Aug 5, 2013 at BD&F Information Security
Image
Hans Monderman designed the traffic system in Drachten, in north Holland where there are practically no road markings, traffic signs or lights. He did this because he believed that if humans were trusted to interact with one another, compromises will... Continue reading
Posted Jul 29, 2013 at BD&F Information Security
Image
My son is a year old and is starting to walk. We knew we had to make some changes as the stairs are quite steep and from previous experience, it is easy for a baby to have a tumble while... Continue reading
Posted Jul 24, 2013 at BD&F Information Security
Image
I did a couple of webinars over the last month where I talked about my Four Tier approach to information security. Below I’ve added more of my ideas which led to the Four Tier approach. Problem - Information Security is... Continue reading
Posted Jun 24, 2013 at BD&F Information Security
My slides for an upcoming webinar, http://itsecuritypro.co.uk/webinars/ - <iframe src="https://skydrive.live.com/embed?cid=DE5E250FC08CEC24&resid=DE5E250FC08CEC24%21400&authkey=AEcbKpqNKYjHxiA&em=2" width="402" height="327" frameborder="0" scrolling="no"></iframe> Continue reading
Posted May 28, 2013 at BD&F Information Security
Image
I recently read Don't Talk to Strangers to my son. In the story Christopher Robin leaves the 100 Acre Wood to go visit his grandmother all by himself. Piglet finds this a worry and asks him if he is scared.... Continue reading
Posted May 27, 2013 at BD&F Information Security
Image
All the family went to Berkhamsted Castle last Sunday. It was a sunny day and lots of people were camped out on the grass where an entire community once lived under siege for two weeks. The area looks small today... Continue reading
Posted May 20, 2013 at BD&F Information Security
Image
My primary background is fashion design. For close to fifteen years I coloured lengths of cloth, took them to garment factories to be made mostly into shirts and also women’s two piece outfits. My main market was direct customers that... Continue reading
Posted Apr 28, 2013 at BD&F Information Security
Image
In motor racing, they say you could go as fast as you can afford and that the best drivers win races as slow as they can. This apparent paradox has its parallels in the approach to securing information. While the... Continue reading
Posted Apr 21, 2013 at BD&F Information Security
Image
Last few weeks have been hectic. We moved to a new house, just about a mile away from the old one where we have been for the last eight years. For those who have never done this, multiply all your... Continue reading
Posted Apr 1, 2013 at BD&F Information Security
Image
Recently I gave a presentation at the InfoSec Exec Summit UK. This was the third time I have been invited to the conference, held at the wonderful Richmond Hill Hotel and organised by Tech:Touchstone. They were recently acquired by the... Continue reading
Posted Mar 11, 2013 at BD&F Information Security
Image
My daughter is at the drawing age. At pre-school she does these pieces of art and brings them home for us to adore and if they are truly adorable, they are hung up for display. She can now compare her... Continue reading
Posted Feb 23, 2013 at BD&F Information Security
Image
In the 70s Trinidad expanded its road infrastructure by building motorways between the three main towns of Port of Spain, San Fernando and Arima. Arima was 20 miles from the capitol, Port of Spain, and a morning commute was usually... Continue reading
Posted Feb 12, 2013 at BD&F Information Security
Image
When offices were entirely paper based there was a process of copying documents in triplicate. You had two sheets of carbon paper placed equally between three A4s. These were placed in a typewriter to record the information. The A4 at... Continue reading
Posted Feb 5, 2013 at BD&F Information Security
Image
I ran my textile design business from my home for over 15yrs. The house was a modern ruin. It was built in the late 60s with fundamental flaws which plagued its life. By the 90s it was back to bare... Continue reading
Posted Jan 27, 2013 at BD&F Information Security
Image
Returned to Gatwick on Sunday morning greeted by genuine winter weather. The deicers were preparing a plane for taxiing, the jetty for our flight was stuck and the old skool steps were iced over. A cold punctual train took us... Continue reading
Posted Jan 22, 2013 at BD&F Information Security
Image
In Standard 3, Mr Howard and I had a deal. He’d delivery 6 lashes to my palm and I will forsake all homework. That worked out happily for me as I got the freedom on afternoons to play until the... Continue reading
Posted Jan 13, 2013 at BD&F Information Security
Image
Time flies like an arrow. This is the first part of two statements that illustrate the challenge to get computers to grasp context. If decision systems are to be fully automated, programs will have to grasp the meaning of words... Continue reading
Posted Jan 6, 2013 at BD&F Information Security
Image
Information Security Governance is a pig to get right. The size and age of the organisation does not matter. A startup faces onerous challenges just as large mature businesses. It is tempting to expect that the problems scale proportionately. At... Continue reading
Posted Dec 30, 2012 at BD&F Information Security
Image
Imagine 10 Downing being sign posted with “There are no Firearms at these Premises.“ That is a bold statement for anyone to advertise. If an elected official is a very important person, we can apply that perception to ourselves also... Continue reading
Posted Dec 23, 2012 at BD&F Information Security
Image
I am tall enough to have difficulty finding the right size clothes. With the success from this year’s weight training I now have to update my wardrobe and that led to a long search for a shop that will supply... Continue reading
Posted Dec 16, 2012 at BD&F Information Security
Image
Computers have instilled habits into staff at every business processing digital data. There are few systems that never require an initial log on. Web based accounts use a username and password for access. A truly global habit. Application developers have... Continue reading
Posted Dec 9, 2012 at BD&F Information Security
Image
My first job after O’Levels was at National Housing Authority. My mother worked in the computer room taping punch cards. I was part of a new team updating incorrect customer records in preparation for a planned project. The training period... Continue reading
Posted Dec 1, 2012 at BD&F Information Security