Ian joined Gemserv in November 2018 as a security consultant. Ian has over 29 years’ worth of experience in the cyber and security field gained through a combination of both military and Consultant employment. Experience includes ISO compliance and security evaluation, CESG systems accreditation, risk assessment and management and Cyber Essentials certification. Significant experience of operating in security governance and assurance settings.
Share this page
Latest Thoughts By Ian Hirst
Read more
Blog
Threat Actors Target Organisations
Read more
Blog
Cyber Threat Round Up
Read more
Case Study
Cyber Threat Intelligence for Energy Theft Prevention
Read more
Blog
Magnet Goblin's Exploitation of N-day Vulnerabilities
Read more
Blog
The Morris II Worm: An AI driven cyber threat
Read more
Blog, Insight, News
Gemserv's cyber threat roundup - February
Manage Cookie Consent
This website uses cookies. Please choose which categories of cookies you would like to enable.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.