Gilbert Verdian

London, England, United Kingdom Contact Info
12K followers 500+ connections

Join to view profile

About

Security leader creating new technology and companies Ex-CISO/CIO/CTO from Gov & FS with…

Experience & Education

  • Quant

View Gilbert’s full experience

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

  • CISA Graphic

    CISA

    ISACA

    Issued Expires
  • CISSP

    International Information Systems Security Certification Consortium (ISC2)

    Issued Expires

Volunteer Experience

  • Digital Pound Foundation Graphic

    Member Board Of Directors

    Digital Pound Foundation

    - 1 year 6 months

  • Federal Reserve System Graphic

    FedPayments Improvement Community

    Federal Reserve System

    - 1 year 1 month

  • Bank of England Graphic

    CMORG-Cyber

    Bank of England

    - 2 years 1 month

  • Federal Reserve System Graphic

    Secure Payments Taskforce

    Federal Reserve System

    - 1 year 2 months

    The objectives of the Secure Payments Task Force include:

    - Provide advice on payment security matters
    - Coordinate with the Faster Payments Task Force to identify solutions for any new or modified payments infrastructure so that it is both fast and secure
    - Determine areas of focus and priorities for future action to advance payment system safety, security and resiliency

  • ISO - International Organization for Standardization Graphic

    Founder Blockchain ISO Standard TC307. Convenor WG7 - Interoperability

    ISO - International Organization for Standardization

    - Present 8 years 5 months

  • BSI Graphic

    Chair of DLT/1 and UK Standardisation Delegation at ISO TC 307 (Blockchain and DLT)

    BSI

    - 4 years 6 months

  • European Commission Graphic

    EU Blockchain Observatory & Forum Member - Blockchain Policy and Framework Conditions Working Group

    European Commission

    - 3 years 1 month

  • Chair - NSW Government Security Council

    NSW Department of Finance, Services and Innovation

    - 2 years 7 months

    Chairing the Government's Security Council responsible for the security and safety of 167 departments and agencies

  • INATBA - International Association for Trusted Blockchain Applications Graphic

    Co-chair - Standardisation and Interoperability

    INATBA - International Association for Trusted Blockchain Applications

    - Present 5 years 6 months

Publications

  • The Trusted

    Pantera Press

    I was the technical advisor to the author John Green.

    How far would you go to save the planet? ...Would you destroy it?

    Imagine a global depression caused, not by greed or stupidity, but by a secret band of brilliant and radical environmentalists, 9S, using cyber-terror to slash the world’s population and smash its resource-hungry economy. Members of 9S have spent ten years secretly infiltrating industry and government, working themselves into the most trusted jobs in the…

    I was the technical advisor to the author John Green.

    How far would you go to save the planet? ...Would you destroy it?

    Imagine a global depression caused, not by greed or stupidity, but by a secret band of brilliant and radical environmentalists, 9S, using cyber-terror to slash the world’s population and smash its resource-hungry economy. Members of 9S have spent ten years secretly infiltrating industry and government, working themselves into the most trusted jobs in the world...sleepers ready to act.

    When the first global catastrophe erupts, the finger points at Australian-born Dr Tori Swyft, a former 9S member recently forced out of the CIA. Can the dark 9S conspiracy be stopped before it’s too late?

    They are the most trusted… until they betray their trust.

    Other authors
    • John M Green
    See publication
  • Aggressive Network Self-Defense

    Syngress

    Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical…

    Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker.

    See publication

Honors & Awards

  • Financial Services Team of the Year 2018

    Cybersecurity Awards

    http://cybersecurityawards.com/2018-winners

  • CISO of the year 2017

    Cybersecurity Awards

    https://cybersecurityawards.com/2017-winners

Recommendations received

View Gilbert’s full profile

  • See who you know in common
  • Get introduced
  • Contact Gilbert directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses