Cyber

Army joiner

by Mark Rowe

Former Army major Gethin Thomas has joined the cyber and information security company C3IA Solutions after more than 30 years’ service with the Royal Corps of Signals. As a Principal Consultant he will work across the Poole-based company’s public and private sector clients.

Gethin joined the Army at 16 and rose through the ranks and after a late entry commission for his last 11 years was an officer. With the introduction of Cyber Essentials and GDPR and the increasing understanding that cyber security is essential for business, Gethin’s skills are in high demand, according to C3IA.

Matt Horan, security director of the company, pictured left welcoming Gethin, said: “Myself and fellow founder Keith Parsons were both in the Royal Signals so we know what Gethin brings. C3IA is also a member of the Armed Forces Covenant, which means we actively support ex-forces personnel. Gethin adds great knowledge and experience to C3IA’s threat and risk management capability.”

Gethin, who has done tours of Iraq and Afghanistan, said: “After 33 years in the army the time was right to make the step across. My wife and I have moved 17 times in 26 years of marriage and so it will be nice to stay in one place. I was fortunate in securing this role and I’m very much looking forward to working for clients in the commercial sector, which will be a change. My skills are completely transferable and the same principles exist in any sector.

“In the Army I majored in information assurance, which is not just the technical side of things but encompasses everything about keeping information safe. And information can mean anything; whatever is valuable to clients – from records and data to software that needs protecting. I already know many of the staff here and am really looking forward to my new career.”

Visit www.c3ia.co.uk.

Related News

  • Cyber

    Board experience findings

    by Mark Rowe

    Every sector, although not every company, identifies cyber as a principal risk. If you company has not, why not? asks an audit…

  • Cyber

    Disruption survey

    by Mark Rowe

    A majority of internet disruptions occur outside a company’s network, and a lack of visibility beyond company ‘walls’ has made it difficult…

  • Cyber

    Infection methods

    by Mark Rowe

    Cybercriminals have started using sophisticated infection methods and techniques borrowed from targeted attacks to install mining software on attacked PCs within organisations,…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing