John Ellis, Principal Consultant at Andgiet Security

John Ellis

Principal Consultant at Andgiet Security

 

John is co-founder & principal consultant for Andgiet Security, a boutique cyber security consulting firm based in Singapore serving the Asia Pacific region. 

Before establishing Andgiet, John was Chief Strategist, Cyber Security (Asia Pacific & Japan) for Akamai Technologies. A Fortune 1000 company and global leader in the cloud security and content delivery market. 

John is an experienced thought leader with over twenty-three years of international experience in Information Security and Technology Risk Management.

Throughout his career, John has architected, deployed and operated a variety of cyber security and technology risk management projects, that span the entire solution lifecycle, providing him with an in-depth understanding of higher level management aspects and issues where cyber security, strategy, risk and business interact.

John is a recognised expert on cyber security, presenting original work at conferences, and actively participating in special interest and industry groups around the Asia-Pacific region to promote the profession and mentor junior professionals. 

Prior responsibilities:

  • Global eCommerce and security design authority, Standard Chartered Bank
  • Head of Ecommerce and Web Services (Asia Pacific), Barclays Capital
  • Lead Architect – IT Security, Telstra

John’s career commenced in the New Zealand Army, where he served his indentured apprenticeship as an Electronics, Instrument and Radar Technician. 

John is currently studying for his Masters of Cyber Security, Strategy and Diplomacy through the University of New South Wales at the Australian Defence Force Academy (UNSW Canberra).


Speaking Sessions

2:40 PM Session 4 | Establishing a Fit for Purpose Security Operations Center (SOC)

Get an implementation guide for building a SOC that is cost effective and efficient to address your most critical needs.

04:35 PM Panel Discussion 2 | Challenges and Pitfalls of Data Breach Investigations and Reporting

Why is an effective response plan critical to limit the impact of a data breach incident? How can we implement a practical and legally sound approach to data breach investigations and reporting?