advanced-menu-icon

Dawn Illing

Dawn Illing has over 25 years of product management experience in the banking, insurance and cyber security industries. With a passion to follow industry changes, standards and regulations, Dawn has released many successful products and services to market, ahead of competitors. By working internationally across EMEA, this has inspired her interest in cross-border digital identity and cyber security, including the interoperable requirements that necessitate successful delivery of digital product and market solutions.

Air Traffic Management And The Critical Role of Public Key Infrastructure (PKI)

Aviation is dependent on several components, including guidance and navigation tools, onboard systems, software updates, network components, access points, and log file analytics. Functioning both on the ground and in the air, aviation is classed as a critical infrastructure.

Read the blog

The Importance of Cyber Threat Intelligence Sharing Across the Aviation Sector

The aviation sector plays a critical role in allowing people to travel domestically and globally. Millions of people rely on the safety, security and resilience of airlines, airports and the systems that support them.

Read the blog

Cybersecurity in ATM - The Importance of CSIRT Visibility within an Organization

When there is a limited visibility to a CSIRT team within a company, there is a restricted understanding of risk. This then has a major impact on trust, confidence, collaboration, and ultimately, budget and resource security.

Read the blog

Cybersecurity in ATM: A Workflow & The Visibility Stack

This articles describes how to tailor threat intelligence for information systems requires a dual approach. CSIRTs must prioritize internal data collection while keeping a watchful eye on external sources. The article shows how automation through the right tools augments insights, emphasizing the critical role of tool selection for effective attack mitigation.

Read the blog

Cybersecurity in ATM: The Incident Detection & Response Process - Ongoing Improvement Towards Effective Incident Response

In an organization’s cyber security environment, problems change from week to week. Consequently, a constant strive to learn within the team is of utmost importance as new and exciting challenges need to be faced each week. Within this ever-evolving environment, it’s critical that a team should constantly be changing, evolving and learning in order to adopt the practice of continuous improvement towards improving the company’s security posture (Kaizen).

Read the blog

Cybersecurity: Building a Cyber Security Incident Response Team

For organizations of all sizes, cyber attacks are not a matter of if, but when. Given that an organization is going to experience security incidents, attacks and even breaches, a cyber incident response team and plan is critical. 

Read the blog

Cybersecurity: Profile, Roles & Competencies for the CSIRT Team Leader

As the cyber-threat landscape evolves and data breaches become more common, incident response becomes more critical than ever for any company. A CSIRT (Computer Security Incident Response Team) is a body of people assigned with the responsibility of responding to and minimizing the impact of any incidents that affect the organization. This team requires a strong and versatile leader.

Read the blog

Cybersecurity: Setting up an Incident Response Team And Selecting the Team Leader

When it comes to incident response, the quicker a business deals with the threat, the better. It’s not just about being able to respond in a timely manner, it’s also about having the right persons and plan in place to deal with the event effectively.

Read the blog

Introducing The ‘Cyber Security For Airworthiness (CSA) Regulation’ For Military Air Systems

To combat the threats of cyber attacks on military air systems, the British Ministry of Defence has introduced a new regulation to assess and mitigate possible impacts on air safety. This regulation can prove to be a valuable guideline for the assessment and improvement of cyber-resilience of military air-systems, extending its significance not only within the UK but also across international borders.

Read the blog