The Author

PKI Consultant (Retired)


Introduction

This section's purpose is to describe a little of my former professional self and some of the work I once did.  I've published a few items which inform you about an IT security capability in which I supposedly exhibited expertise - Public Key Infrastructure (PKI).


Most of the content in this section was taken from the web-site (www.wozny.org) I used to evidence my professional background / skills while I was seeking consulting work.  Following my retirement I decided to keep it to look back upon rather than chuck it away.


Career
I've put together a
page which shows certificates / awards I have gained, newspaper and magazine articles written by / about me, follow this link to view it.  You'll see that the page is organised into the following categories:

  • Past
  • Present
  • Future - I'm most excited about this category!


Companies I Previously Worked For / At
In a trip down nostalgia lane, I put together a list of most of the companies I worked for / at during my career, it can be viewed by following this 
link.  Some engagements were as short as one day, while the most effort-days expended was with the Metropolitan Police Service for about five years.  The longest elapsed period was with Lancashire Constabulary, where in 2019 I completed the replacement of some systems I'd previously assisted in deploying in 2010.


Videos
During my career I gave presentations to audiences and delivered videos of technical solutions for use by customers, many of them can be viewed by following this
link.

Documents
White Papers
I wrote 
white papers for nCipher (formerly Thales e-Security) and thirdspace.net (formerly Oxford Computer Group).  The nCipher document is related to best practices for offline CAs, whereas the thirdspace.net document is a general backgrounder on PKI.

Solution Documentation
Almost every engagement I worked on resulted in my authoring 
solution documents incorporating high and low level designs, operational guides, key signing ceremonies or integration guides.  The sample documents I've provided have been vastly redacted and anonymised.

Legacy Documentation
After reminiscing on my IT career, I uploaded some
random documents I'd authored during the early stages.  Some were from the days of DOS (pre-Windows), and before networking reached its TCP/IP nadir.  The documents are a hotchpotch which I haven't attempted to put any formal structure around.


IT Security Skills
Rather than publish a curriculum vitae / resume describing my IT security skills, following this
link gives a summary of what I considered to be the highlights.


_________________________________________________________________________________________________


Previous Home Page Content on  www.wozny.org

Is PKI Relevant in the 'Mobile Device \ Cloud' Era of the Internet?
Robert Hannigan, who was the director of GCHQ until 2017, once shared his thoughts about PKI on GCHQ.gov.uk, I extracted the following from the statement he made: “Almost every aspect of life online relies on PKI.”  Powerful stuff indeed!

​My Quote :-) 

Without PKI, there'd be no HTTPS.  Without HTTPS, there'd be no closed padlock in your browser address bar.  Without a padlock, there'd be no online banking or secure login to email... or whatever!​​​​