Tony, is a Principal Lecturer, Consultant and Information Security Researcher at the University of Wolverhampton. He has thirty years’ experience in the IT Industry covering varied sectors and roles with large organisations. For the past 10 years he has specialised in the field of Cyber Security. He is responsible for the development of Cyber Security information sharing in the Midlands region and beyond in the U.K. He is closely engaged with the Cyber Security community and has managed funded projects at the University of Wolverhampton and both advised and worked with other Universities in the field. His current management responsibility within the Faculty is Head of the Student Experience.
Cyber Security Management
Information Security Awareness
Security Information Sharing
Cyber Risk Analysis
System Vulnerability Information Sharing
British Computer Society (BCS) - Chartered IT Professional
Higher Education Academy (HEA) – Senior Fellow
International Information Systems Security Certification Consortium (ISC2) – Certified Information Systems Security Professional (CISSP)
Institute of Information Security Professionals (IISP) - Associate
Information Assurance Advisory Council (IAAC) Academic Panel Member
(Refereed, Full Papers)
Proctor, T. 2012. “The Development of Cyber Security Warning, Advice and Reporting Points”. In: A. Josang, B. Carlsson, eds. 2012. Secure IT Systems.Proceedings: 17th Nordic Conference, NordSec 2012, 31 October- 2 November, 2012, Karlskrona – Sweden, Springer Berlin / Heidelberg, pp. 67-72.
Proctor, T. 2011. “The Development of Warning, Advice, and Reporting Points (WARPs) in UK National Infrastructure”. Proceedings: 6rd International Conference on Critical Information Infrastructure Security, 8-9 September 2011, Lucerne – Switzerland.
Chibelushi C., Proctor, T. (2009) “System Management Problems: An Advantage to Malware Developers”. Proceedings: 3rd International Conference on Cybercrime Forensics Education and Training, 1-2 September 2009, Canterbury – UK.
Proctor, T. “Data Security Threats and SME’s”. Proceedings: 1st Conference on Advances in Computer Security and Forensics, 13-14 July2006, Liverpool - UK pp. 98 - 104
Proctor, T. (2005) Data Security Threats in the Home Environment. Proceedings: IFIP WG 9.3Home Oriented Informatics & Telematics Conference, 13-15 April 2005, York – UK. Springer, pp.133-144.
OTHER SELECTED PUBLICATIONS
Proctor, T. . “Identity on the Internet”. ITNOW Autumn 2015, pp. 36-37
Available from http://www.bcs.org/content/conWebDoc/55544
Proctor, T. (2011). “WARPS – A Framework for Timely Information”. Digital Forensics Magazine issue 6, pp. 47-50
Proctor, T. . “Closing the e-Crime Business”. ISNOW Winter 2010, pp. 6-7
Available from http://www.bcs.org/upload/pdf/ISNOW-Winter2010.pdf
Proctor, T. (2009) “Sharing Safety Information”. Government Computing Volume 8.12, pp. 9, available from http://www.governmenttechnology.co.uk/content/view/1739/1/
Proctor, T. British Computer Society, “WARP Speed Ahead”, April 2008, http://www.bcs.org/server.php?show=ConWebDoc.18595
Homer G.R. DR, Proctor, T. Public Service Review, Trade and Industry Issue 10,Thursday, August 17, 2006, “Leading Edge Technology” pp. 77, available from http://www.publicservice.co.uk/feature_story.asp?id=6023&topic=e-government