Graham Welch
Graham Welch was for more than ten years Sourcefire's EMEA Managing Director and the company’s first International employee. Following the acquisition of Sourcefire by Cisco in 2013, he now heads up a worldwide team at Cisco tasked with solving the cybersecurity challenges of Cisco's biggest global customers.

Previously Graham was Area Vice President for UK, Ireland, France and Benelux at RSA Security, where he was responsible for nearly 50% of RSA’s EMEA revenues. While at RSA Security, he built the UK business from $5 million per annum to more than $25 million in just 5 years. Prior to joining RSA, Welch also held major account sales and channel positions at technology manufacturer Tektronix Inc. and UK distributor Golden Gate.

Entries by Graham Welch

100 Mr Big's Control Cybercrime

(0) Comments | Posted 20 October 2014 | (10:06)

Many people will have seen the surprising announcement from Europol's Cybercrime Centre the other week that there are only "around 100" cybercriminal kingpins behind global cybercrime.

While I wouldn't want to speculate on if this number is correct or not, I do agree that such is the industrialisation...

Read Post

Sunscreen, Passport, Swimwear... Tablet

(0) Comments | Posted 27 June 2014 | (14:14)

As we head into July and the holiday season gets into full swing, the thoughts of many of us will turn towards our summer holidays and what we will do to rest and relax for our well earned breaks.

But of course for most of us we won't have...

Read Post

Don't Score an Own Goal With Security

(0) Comments | Posted 16 June 2014 | (13:58)

A certain major sporting event gets underway this month with the eyes of the world glued to their televisions, smartphones, tablets and laptops looking for the latest news coming out of Brazil and the fate of their national sides and favourite players.

The cybercriminal gangs know this as well, and...

Read Post

Is Trust the New Business Currency?

(0) Comments | Posted 6 June 2014 | (15:17)

Trust has become one of the world's most important commodities. Just ask the former CEO of a major American retailer, who resigned after a particularly large cyber attack or any other major organisation that has been hacked and customer data apparently lost.

It was interesting that when eBay reported that...

Read Post

Is Anti-Virus Really Dead?

(0) Comments | Posted 13 May 2014 | (15:03)

The statement by one of the world's largest security companies that 'anti-virus is dead' might have created some consternation and surprise in many quarters, but it is simply a reflection of the reality in cybersecurity which we have been observing for sometime.

The suggestion from Symantec that 55%...

Read Post

Is the War of Cybercrime Really Lost?

(0) Comments | Posted 6 May 2014 | (08:59)

Dramatic headlines last week from the latest Verizon Data Breach Investigation Report would seem to suggest the battle against cybercrime might be being lost.

Verizon said, having analysed 10 years' worth of data covering 100,000 security incidents, that 92 percent of attacks could be traced back to...

Read Post

Energy Firm Cyber-defence Too Weak

(0) Comments | Posted 4 March 2014 | (07:47)

Underwriters at Lloyd's of London reportedly told the BBC last week that power companies are being refused insurance cover for cyber attacks as their defences are considered too weak.

The insurance is designed to help them rebuild their networks if they were damaged in a cyber attack.


Read Post

Security for the Internet of Things

(0) Comments | Posted 25 February 2014 | (09:08)

The great and the good of the cybersecurity industry meet this week for the annual RSA Conference in San Francisco and, as usual, you will expect to see vendors touting their latest and greatest technologies designed to stop bad guys from compromising the businesses we all rely on...

Read Post

What Is the Hardest Conversation You Have Had to Say?

(0) Comments | Posted 24 January 2014 | (13:33)

No one likes to have to have a difficult conversation with a friend, family member or colleague. In the context of the home, there is nothing worse than having to tell your son or daughter their cherished hamster has died for example.

However this pales into insignificance compared to the...

Read Post

iPhones Change the Business Landscape

(0) Comments | Posted 14 January 2014 | (07:22)

Seven years ago last week Steve Jobs stood up at Macworld, San Francisco, and announced the first iPhone in San Francisco and in doing so launched a revolution that is still having a monumental impact on the business and social world today.

Up to that time a mobile phone was........

Read Post

'Tis the Season for Predictions...

(0) Comments | Posted 12 December 2013 | (13:57)

Each year, about the time the mince pies and festive bunting appear, we begin to see a raft of predictions from companies, analysts and other opinion leaders on what the newest trend businesses and consumers will face in the coming year.

While these certainly grab the attention of the...

Read Post

The Weakest Link in Cyber Security - Staff

(0) Comments | Posted 19 November 2013 | (07:43)

Newspaper headlines that the international space station might have been compromised by a computer virus might be sensational and grab much attention, but seem far removed from everyday organsations and businesses most of us work for and with.

But the reality is that while this sort of high...

Read Post

Testing Times for UK Banks

(0) Comments | Posted 12 November 2013 | (07:46)

Back in June I wrote here in the Huffington Post about the US Quantum Dawn 2 programme when the US authorities were testing major Wall Street institutions as to their preparedness to face the cybercrime threat.

Organized by a number of US Federal Departments including the Department of...

Read Post

The PC Is Dead; Long Live the Tablet

(0) Comments | Posted 4 November 2013 | (08:13)

The latest figures from Gartner report an 8.6% fall in PC sales in the last three months compared to a year ago as people continue to move away from laptops and PCs, towards tablets and smartphones.

Of course the PC is not going to be replaced completely in...

Read Post

Context in Security Is Everything

(0) Comments | Posted 23 September 2013 | (08:57)

Context and data was one of the most common themes at the Gartner 2013 EMEA Security & Risk Management Summit in London. After all, if you don't know the context of a security event, and don't have the data available to analyse that event, how can you know...

Read Post

Rise of the droid

(0) Comments | Posted 12 September 2013 | (10:35)

It seemed all the world's newswires went into meltdown this week at the exciting news of a pair of new Apple iPhones soon becoming available. But while Apple continues to command a huge share of the growing smart phone market, it is use of Android phones that continues...

Read Post

Follow the Money

(0) Comments | Posted 9 August 2013 | (14:38)

Often friends and family ask why it is that we hear so many stories in the media these days about companies being hacked and information being leaked and stolen.

The answer is simply that more and more of what we do in work and play takes place online.


Read Post

Going Retro in the World of Digital

(0) Comments | Posted 18 July 2013 | (15:07)

A couple of weeks ago I wrote a post wondering why we value the physical world over the digital world so much.

So it amused me no end to read another Huffington Post article describing how a Russian Security Agency is apparently using electric typewriters...

Read Post

Please Switch Off Your Electronic Devices.....

(0) Comments | Posted 3 July 2013 | (15:52)

It was interesting to read that British Airways is loosening the rules about the use of mobile phones on aircrafts - at least once you are on the ground and heading to the stand.

It always strikes me as funny how you can flip open your copy of...

Read Post

Time to Test Defences

(3) Comments | Posted 25 June 2013 | (16:32)

Thursday 18th July could be an interesting day for some 40 Wall Street firms, including banks, exchanges, and brokerages, as they experience Quantum Dawn 2, a simulated cyber attack that will hit them to test their preparedness for cyber defence.

Organized by a number of US Federal...

Read Post