Cal Brown (they/them/theirs)

Cal is a child of the 70s, lured into tech in the 80s by the battle cry of ‘more women in engineering!’ and has survived as the unique one in most meetings ever since. They came out as non-binary in 2021, and are increasingly active in raising awareness of trans and non-binary issues in what is still a very male environment. They are equally passionate about their day job – ensuring BT has a coherent story on the hardest security challenges, which means not just spinning a tale but sponsoring and driving the initiatives that make it robust.

 

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Enterprise Security
Incognito Mode Won’t Protect Your Enterprise Security
Many enterprises have set a precedent that online browsing within IT departments or other company-based computers should be performed under incognito windows, such as those offered by Google Chrome browsers and other providers. While online search and work activity may feel secure with your identity and preferences set to a private mode, according to research...
Defence Against Ransomware: Where Businesses Should Be Standing
Not a week goes by when the business world does not see fresh attacks of newer instances of ransomware in every sector. As far as cybersecurity, it is one of the longest and most persistent hurdles to stay updated on, with newer and more sophisticated attacks many steps ahead of the required defences. Ransomware has...
Enhancing Cyber Hygiene with Business-Focused Vulnerability Management
Blog By: Cyberproof In the digital age, where cyber threats loom large and businesses navigate increasingly complex landscapes, ensuring robust cybersecurity practices is paramount. A critical component of this defense is effective vulnerability management. The blog post “How Business-Focused Vulnerability Management Can Improve Cyber Hygiene” from CyberProof delves into the importance of aligning vulnerability management...