Sign in to view Dan’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Dan’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Greater London, England, United Kingdom
Sign in to view Dan’s full profile
Dan can introduce you to 10+ people at TrendAI
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
2K followers
500+ connections
Sign in to view Dan’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dan
Dan can introduce you to 10+ people at TrendAI
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Dan
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Dan’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
About
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Activity
2K followers
-
Dan Goodfellow shared thisSome great conversations at CyberUK this morning. UK public sector, defence and regulated organisations face rising geopolitical risk, complex sovereignty demands and skills shortages. Want to see how that looks in practice or fancy catching up over a coffee? Visit booth E15 at #CYBERUK2026. #TrendAI #Atos #CyberResilience
-
Dan Goodfellow shared thisModernising securely and preserving sovereignty shouldn’t be a trade‑off. “Organisations need to modernise securely without compromising sovereignty… Our work with TrendAI™ brings together sovereign infrastructure, security operations expertise and a modern, unified, AI powered cybersecurity platform.” - Terry Bebbington, Head of Cyber, Atos UK&I Join Atos and TrendAI at booth E15 at #CYBERUK2026. #CyberSecurity #SovereignCloud
-
Dan Goodfellow shared thisAtos and TrendAI™ are teaming up at #CYBERUK2026 to put sovereign cyber resilience in the spotlight. “Sovereignty and security are now inseparable for many UK organisations… The aim is simple: faster detection, stronger protection without losing control of sensitive data or operations.” - Jonathan Lee, Director of Cyber Strategy, TrendAI Meet us on the show floor at booth E15 to see how Atos + TrendAI can help. #TrendAI #Atos #PublicSector #DataSovereignty
-
Dan Goodfellow shared thisIn the race to keep up with an evolving threat landscape, the modern #SOC is drowning in a sea of 🔊 noise.🔊 Transitioning to agentic SOC operations allows #AI to actively ingest, detect, investigate, hunt, and respond alongside your team. ➡️ Register now for this #DemoSession: https://spr.ly/6043B62BBS
-
Dan Goodfellow shared this📢 A new era for UK Government Cyber Defence 📢 Today marks the launch of TrendAI! We're proud to bring this next chapter to the UK's public sector. The threat landscape facing Central Government is evolving at pace. Sophisticated nation-state actors, ransomware, and AI-enabled attacks demand a new level of defence. TrendAI delivers: ▪️ AI-native security - purpose built to detect and respond at machine speed ▪️ Smarter threat intelligence - powered by decades of global research ▪️ Built for the demands of Government - resilient, scalable, and aligned to UK cyber frameworks ▪️ UK Data Centre - your data stays on UK soil, meeting the sovereign security and data residency requirements We didn't just model the future of cyber defence... we built it! As the UK Government advances its Cyber Security and Resilience Bill, now is the moment to move beyond legacy tools and embrace an autonomous, intelligence-led security platform. Welcome to the era of TrendAI! Jenny Hamm Chloe Potts Alexander Longos Sam Cox Nicola Foster #TrendAI #UKGovCyber #Cybersecurity #AIFearlessly #CyberResilience #NationalSecurity #UKCentralGovernment #LaunchDay
-
Dan Goodfellow shared thisIf you're in Central Government and any part of your job involves keeping critical services running and secure, I'd genuinely recommend setting aside an hour for our upcoming CNI Threat intel Session. Join Jonathan Lee, Director of Cyber Strategy, and Numaan H. Senior Threat Researcher from TrendAI’s Forward Threat Research team, to explore how the UK's CNI threat landscape is shifting, and where to shift focus next. We'll also reveal the latest intelligence on high‑impact exposure areas TrendAI™ is actively tracking across exposed AI in data centres and exposed healthcare systems. Find out: ✅ Simplify your operations and reducing risk ✅ Gain clearer visibility of high‑impact risks ✅ Strengthen your resilience in line with UK data and digital sovereignty requirements Everyone has a view on CNI preparedness. This session cuts through it with intelligence that's grounded in what's happening now, not what happened two years ago. Worth an hour. 👉 https://lnkd.in/eVEMTUWp #CNI #CyberResilience #UKGovernment #DataSovereignty #AISecurity
-
Dan Goodfellow reposted thisDan Goodfellow reposted thisCongrats to TrendAI colleagues for their assistance in another Law Enforcement action, not long after the disruption of Tycoon 2FA. This time assisting INTERPOL with "Operation Synergia III ". This resulted in 45,000 malicious IP addresses taken down, and 94 arrests. These sites where associated with phishing and fraud in particular https://lnkd.in/euZVPU4c Helping make the world safer for the exchange of digital information, one step at a time :)45,000 malicious IP addresses taken down in international cyber operation45,000 malicious IP addresses taken down in international cyber operation
-
Dan Goodfellow reposted thisDan Goodfellow reposted thisBrilliant day at the AWS office in Holborn yesterday, with the entire TrendAI sales and partner teams. AWS has been a strategic alliance for us for many years and always great to update and reenergise the teams. Lots of discussion and next actions around marketplace flexibility, Co-Sell with our partners and of course it wouldn’t be a session without covering generative AI 😉 A huge thanks to the legends @Farran, Antoine and @Balana Paemen, Luna for hosting us and making it a great afternoon. Antoine Farran Luna Balañá Paemen David Burke Gurmail Singh Christina Decker Camilla Currin Matthew Peacock Ilona Kosicka Robyn Burnham Mark Power Bobbi K. Jenny Hamm
-
Dan Goodfellow shared thisProud to be part of a company that helped dismantle Tycoon2FA, a phishing-as-a-service platform targeting Microsoft 365 and Google across 300+ domains with 2,000+ criminal subscribers. Government agencies can't defend against threats they can't see. Only through public-private threat intelligence partnerships can we expose criminal infrastructure and feed actionable intelligence to law enforcement. TrendAI doesn't just detect and block. We actively hunt, attribute, and dismantle the infrastructure behind cybercrime. For UK government: This is active threat intelligence partnership in action. 🔗 Read more below. https://lnkd.in/e8g-Uqyn #Cybersecurity #UKGovernment #ThreatIntelligence #TrendAIEuropol, Microsoft, TrendAI™, and Collaborators Halt Tycoon 2FA OperationsEuropol, Microsoft, TrendAI™, and Collaborators Halt Tycoon 2FA Operations
-
Dan Goodfellow liked thisDan Goodfellow liked thisDay 1 at #CYBERUK2026 and the NCSC's message is clear: A cyber perfect storm. Nation-state threats, AI-accelerated attacks, and under-resourced SMEs. The government's £90m investment is a step forward, but as our Director of Cyber Strategy Jonathan Lee told Infosecurity Magazine at the event today, incentives need to match ambition. Read his take 👉 https://lnkd.in/e2kPgFhf It's why TrendAI and Atos are here. Sovereign infrastructure + AI-powered unified security = stronger defence, less complexity. Find us at stand E15 - including our honorary member of the team, Sparky! 🐕🦺 Nicola Foster Phil James Jenny Hamm Carl Burman Dan Goodfellow Cameron Prescott-Young Ian Cook Chris M. #TrendAI #Atos #CYBERUK2026 #CyberResilience #DataSovereignty
-
Dan Goodfellow liked thisDan Goodfellow liked thisWe’re live at Cyber UK today! TrendAI is proud to be joining Atos on stand E15, where we’re engaging with industry leaders on one of the most pressing topics of our time—the opportunities and challenges facing nation states in an increasingly complex, fast-evolving geopolitical AI landscape. From strategic advantage to emerging risks, the conversation around AI is shifting rapidly. If you’re attending, come by and share your perspective—we’d love to connect. #CyberUK #AI #Geopolitics #CyberSecurity #Innovation #TrendAI
-
Dan Goodfellow liked thisDan Goodfellow liked thisHow confident are you in your organisation’s AI adoption and security decisions right now? Whether you're setting the AI direction or making it work on the ground, this is your event. TrendAI™ Spark is coming to London on 27th May. It's built around the conversations that actually matter in security right now - how organisations are making AI work at scale, where the risks are, and what good looks like. Check the agenda. You might be surprised how many topics hit close to home. https://spr.ly/6044BBBuWu #TrendAISpark #AI #Cybersecurity
-
Dan Goodfellow liked thisDan Goodfellow liked thisIt finally happened... I've been a victim of a hack. I like to think I follow the best practice that I preach daily, and even though we've gone through years of almost weekly "We've lost your data" emails, I've always managed to avoid the dreaded impact... until now. MFA enabled, individual passwords, secure vault and passkeys, where applicable. All rendered useless in the face of the most basic hack, shoulder surfing, by my four-year-old 🫠 . Parental controls were enabled, meaning she couldn't spend money or use in-app purchases without approval. Nice and secure, or at least I thought. Turns out she watched me enter my 5-digit code to access the parent profile and quickly realised she could request the transaction on her profile, log in to mine and approve it. £14.99 later (and now the proud owner of Zootropolis 2), the 5-digit code is now a very long, complex password. Every process and control has a weak point, which is why prevention is only half the battle. In my case, it didn't even occur to me that she'd do that, and as a result, she managed to essentially circumnavigate a 3-point approval process. Users (and threat actors) will always look for the most efficient way to execute a task... seamingly at any age!
-
Dan Goodfellow liked thisDan Goodfellow liked thisIt's nearly time for #CYBERUK26 to begin in Glasgow! ⏰ Director GCHQ Anne Keast-Butler will join Cyber and Specialist Operations Command (CSOC) Commander General Sir Rob Magowan for a fireside discussion on Wednesday morning, shortly after National Cyber Security Centre CEO Richard Horne opens the conference. Are you going to be there? 🎥 Tune in via CYBERUK26 on YouTube https://lnkd.in/eyYt3ig
-
Dan Goodfellow liked thisDan Goodfellow liked thisAI is already embedded inside your organisation. The real question is whether you actually know where. TrendAI's Global AI Study shows many organisations believe they have AI under control and yet struggle to see what systems are running, what data they touch, and what decisions they influence. Visibility is a real problem. Fear of missing out is pushing organisations to move faster than governance can keep up with. AI isn’t set‑and‑forget. It adapts and without continuous oversight, risk builds quickly. That’s why AI risk should be owned and managed at board level. It's not just a technology issue. The full findings can be found here 👇 👉 https://lnkd.in/eZxpS__W #AI #AIGovernance #OrganisationalRisk #Leadership #CyberRisk #TrendAI
-
Dan Goodfellow liked thisDan Goodfellow liked thisUK & Ireland’s Critical National Infrastructure is entering a period of rapid change. Systems are becoming more interconnected, AI is being embedded across essential services, and the security landscape continues to move forward. If you’re responsible for keeping critical national infrastructure operations resilient as systems scale and AI becomes more deeply embedded, this is a session you won’t want to miss. Join us to explore how the UK's CNI threat landscape is shifting, and where to focus on next. We'll also reveal the latest intelligence on high‑impact exposure areas TrendAI™ is actively tracking across including AI in data centres and healthcare systems. We'll conclude with some practical takeaways to: ✅ Strengthen resilience in line with UK data and digital sovereignty requirements ✅ Simplify operations and reduce risk ✅ Gain clearer visibility of high‑impact risks 👉 Register here https://spr.ly/6046BBBuDC #CNI #CyberResilience #AIsecurity #UKI #DataSovereignty
-
Dan Goodfellow liked thisDan Goodfellow liked thisLooking forward to attending my first #CyberUK event in Glasgow. Looking forward to catching up with Saviynt and our #Trustmarque & #Ultima customers. Massive thanks Michelle Trimble Harte our wonderful CAM.
Experience & Education
-
TrendAI
****** ******** * ******* **********
-
******
****** ********** ******* ********* * ****** ******
-
********
******** ******* ******* * ****** ******
-
******* **********
******* undefined undefined
-
View Dan’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View Dan’s full profile
-
See who you know in common
-
Get introduced
-
Contact Dan directly
Explore more posts
-
Vimesh Avlani
Graftronics. • 5K followers
MDR sharpens visibility. Because resilient businesses need a clearer lens. In today’s cyber landscape, what you don’t see often matters more than what you do. Modern security teams face an overload of alerts. MDR steps in to give clarity where it matters most: - Filters noise so only real threats demand attention - Adds context to alerts for faster understanding - Guides action with expert-driven recommendations - Accelerates decisions when time is critical - Strengthens resilience by spotting what tools alone may miss MDR makes your defenses sharper, faster and more reliable. Graftronics is a Sophos MDR partner, transforming IT teams across organizations in multiple industries. Reach out to us for assessing MDR for your setup. - Vimesh Avlani Managed Detection & Response | Cyber Resilience | Trusted by Mid-Market CXOs
20
4 Comments -
Russell Beale-Burchell
Zscaler • 5K followers
The UK National Cyber Security Centre (NCSC) has reported a doubling in the number of "nationally significant" cyber incidents between September 2024 and May 2025 compared to the same period the previous year. NCSC CEO Richard Horne revealed this during his keynote at the CYBERUK conference in Manchester, stating that the agency has handled more than 200 incidents overall since September 2024. Link in comments #cybersecurity #ncsc #cyberuk #management #technology #threats
11
1 Comment -
David Howorth
Rapid7 • 5K followers
It's been a busy few months Rapid7. We've launched Intelligence Hub to provide curated, high-fidelity data to enable organisations to focus on threats relevant to their sector or geo. We 've introduced new features within Remediation Hub, giving security teams a unified view of assets to prioritise and optimise risk mitigation. Additionally our AI teams has been busy leveraging agent AI and automation to scale detection and response, active remediation for MDR and extending AI alert triage for SIEM customers! If you interested to learn more, then dive in by clicking on this link or subscribe to the R7 blog at https://lnkd.in/etdj9-ck https://lnkd.in/etcnQypx
144
-
Martin Tyley
KPMG • 4K followers
Fun writing this, bringing it back to the North West but the implications do stretch beyond the region. We consistently over-focus on the likelihood of cyber incidents happening in comparison to understanding the impact of them when they do. Some thoughts here on what that means and what we can do differently.
13
-
Chara Vassiliadou
QUALCO • 2K followers
Cyber security strategy is about aligning business objectives, local and international legal & regulatory frameworks and adapting new technologies following a cyber resilience plan. Adam Hawthorne talked about the practical challenges of cyber security and ways to address them. Great work! #cybersecuritystrategy #resilienceengineering #cybersecurity
16
-
Ivan Ristić
Red Sift • 3K followers
After years of work, we have decent security standards, but we'll continue to struggle until we adopt security by default. Take the relationship between TLS 1.2 and 1.3, for example. Both protocols can provide reasonable security, but TLS 1.2 supports a kitchen sink of options, and you need to know what you're doing to configure it correctly. TLS 1.3, on the other hand, just works, no further work needed. This is just one example; there are dozens of standards and situations for everyone to consider when it comes to their network infrastructure. Until we get security by default, the only way to stay ahead is to have comprehensive configuration monitoring to catch problems and drift. I created Hardenize to solve exactly this problem. Our free test is still available at hardenize.com, and the commercial product has been rolled into Red Sift's. Now that Mail Check and Web Check are being retired, I am very happy that there is still a way for Hardenize to continue to serve.
13
1 Comment -
CovertSwarm
6K followers
CovertSwarm is accredited by CREST to deliver CBEST TLPT assessments, the UK’s financial-sector standard for threat intelligence-led security testing. Our red team uses an intelligence led approach to emulate advanced persistent threat actors across all attack vectors to assess cyber resilience under realistic conditions. Learn more about capabilities for financial services: https://hubs.li/Q03lM26Q0
29
-
Thomas Knecht
Fortinet • 2K followers
Our panel with New Statesman brought together voices from government, research and industry, and the conversation kept circling back to the same idea…the UK cannot treat #cybersecurity as something that sits in the background. It needs to be part of everyday decision making. 💡 Here are a few of the priorities that came through strongly: > See cyber as a strategic risk, not a technical item > Make collaboration between public and private sectors real and consistent > Invest in prevention and not just crisis response > Build stronger awareness and skills at every level There is a real opportunity for the UK to raise its resilience if everyone works together. Read the full article: https://ftnt.net/60467S7iE #Fortinet #CyberResilience #DefendAsOne
2
-
Dan Quirke
3K followers
There’s something quietly powerful about revisiting the places that shaped you. I did this MSc part-time in 2006; back when it was one of the first programmes of its kind. And, like all good education, its value only really compounds in hindsight. If you’re an alumnus, it’s worth a couple of minutes. Not because surveys change the world… but occasionally, they nudge it in a better direction. Long may it continue to evolve.
5
-
Hayley Ross
Netskope • 2K followers
Good morning Scotland 🏴 Excited to be at Public Sector Cyber Security Scotland today. #DynamicEarth, Holyrood, Edinburgh is welcoming leaders from across the public sector today to hear and learn about #cybersecurity for the UK. John Saunders speaking on is Over-connected, over-exposed? With the acceleration of AI adoption, and top-down directives to “just connect AI” to drive efficiency, growth and cost savings, it is critical to know WHAT we are just connecting AI to… ➡️ Know where it can reach ➡️ Know what matters ➡️ Know who can touch what ➡️ Prove it continuously If you get these right… AI becomes an innovation layer If you skip them… AI becomes an exposure risk Let’s be able to say “Yes” to connected AI everywhere. Just not at the expense of our sensitive data. Netskope #DataSecurity #DSPM #AIsecurity #HolyroodConnect #PublicSector
66
-
Pierre-Paul McSween
Radware • 3K followers
Dan Schnour’s new blog on the UK Cyber Security and Resilience Bill lays out why the CSRB is a major shift in how the UK expects organizations to operate and defend essential services. Stronger governance, tougher supply chain rules, and real resilience requirements are coming fast. Read the blog here. https://lnkd.in/e5ZHx8sK
2
-
Dean Charlton
Risk Cognizance - GRC Software • 22K followers
🚨 The Headline: Amaranth Dragon Enters the Fray Security researchers at Check Point have confirmed that Amaranth Dragon, a group closely linked to the prolific APT41, is now weaponising the WinRAR vulnerability (CVE-2025-8088). They aren't just testing the waters; they are actively targeting government and law enforcement organisations across Southeast Asia (Singapore, Thailand, Indonesia, and more) using a sophisticated mix of legitimate tools and custom loaders to bypass traditional security. 🔍 How the Exploit Works (The "ADS" Trick) The vulnerability is a Path Traversal flaw, but it has a nasty twist. It leverages Alternate Data Streams (ADS)—a feature of the Windows NTFS file system that allows data to be hidden "behind" a normal file. 🔻The Lure: You receive a RAR archive containing what looks like a harmless PDF or document. 🔻The Hidden Payload: Hidden within that file’s ADS is the actual malware. 🔻The Escape: Because of the flaw in WinRAR (versions 7.12 and older), the software fails to sanitise the file path. When you extract the "PDF," the malware silently "escapes" the extraction folder and writes itself directly into your Windows Startup folder. 🔻The Persistence: The next time you log in, the malware executes automatically. 💡 Additional Facts You Need to Know 🔻The Timeline: While news is peaking now, Google’s Threat Intelligence Group (GTIG) actually spotted the first signs of abuse as early as mid-July 2025. Amaranth Dragon was on it by mid-August, showing just how fast state-sponsored groups weaponise public exploits. 🔻The Global Reach: This isn't just a regional issue. Before Amaranth Dragon, the Russian-aligned group RomCom used this exact bug to deploy NESTPACKER against Ukrainian targets. Other actors like APT44 and Turla have also been spotted in the wild. 🔻The "Shadow" Infrastructure: Amaranth Dragon is notably using Cloudflare infrastructure to hide their command-and-control (C2) servers, making it even harder for network defenders to block their traffic. 🔻The Fix is Simple: This vulnerability was officially patched in WinRAR version 7.13. If your version starts with a "6" or is 7.12 or lower, you are a sitting duck. 🛠️ What should you do? ✅ Update Immediately: Ensure you are running WinRAR 7.13 or later. ✅Audit Startup Folders: Check %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup for any unexpected .exe, .lnk, or .dll files. ✅Treat Archives with Suspicion: Even if a RAR file looks like it only contains a single PDF, the underlying metadata could be malicious. #CyberSecurity #WinRAR #Infosec #APT41 #AmaranthDragon #MalwareAlert #ThreatIntelligence
10
1 Comment -
Fionnuala Zinnecker
Palo Alto Networks • 850 followers
NHS breaches have highlighted a critical lesson for NHS suppliers: the "castle and moat" defence fails against lateral movement. An attacker, once inside, can move freely, turning an intrusion into a catastrophe. We've got to stop that, together. Zero Trust is the expert, proactive strategy to meet the NHS Cyber Security Charter's highest mandates. It eliminates implicit trust with a "never trust, always verify" principle. This prevents escalation, keeping the impact contained, even if an intrusion occurs. How do you implement Zero Trust reliably? Platformisation is the ultimate answer. See how our platform approach directly addresses the recent NHS Cyber Security Charter principles and fortifies your operations. ➡️ Download the report: https://bit.ly/43T9aVO
2
-
Ronan Lavelle
Validato • 13K followers
NIS2+ coming to the UK shortly, in the form of the Cyber Security & Resilience Act. there are big implications for critical industries and their requirements to test and demonstrate resistance to cyber threats and to implement robust cyber risk monitoring of key suppliers. https://lnkd.in/e3F2bauB
7
1 Comment -
Dennis Weyel
@fire - International… • 2K followers
🏫 “Precautionary shutdown” is becoming a familiar phrase in cyber incidents. After a cyber attack disrupted IT systems, a secondary school in Warwickshire remains closed while investigations and system restoration continue — with students pushed to external resources for learning. What stands out: this wasn’t about stolen data headlines. It was about loss of operational capability. Many education and public-sector organizations don’t fail because of sophisticated exploits — they fail because basic attacker paths weren’t tested before someone abused them. When was the last time your organization validated how far an attacker could actually get? #CyberAttack #SchoolIT #CyberOperations
6
-
Tracy Fox
Foresite Cybersecurity &… • 12K followers
The Bill’s purpose is to close critical gaps in national cyber defenses, impose new obligations on a broader array of digital infrastructure to protect the wider UK economy, and establish the UK as a global leader in cyber regulation: https://lnkd.in/euHdBxRA
1
-
Tim McAllister
DigiCert • 16K followers
Huge win for the #UK #education and #research sector! 🎓 The procurement framework piece is critical here - removing procurement friction means institutions can focus on implementation rather than bureaucratic hurdles. For universities and research organizations dealing with sensitive data, distributed networks, and increasing cyber threats, having streamlined access to enterprise-grade PKI and certificate lifecycle management is essential. Educational institutions often operate with complex certificate environments (student access, research networks, #IoT devices, federated authentication) but limited security resources. Automated lifecycle management at scale prevents the certificate expiration issues that can bring down critical systems. This kind of foundational trust infrastructure enables secure collaboration across the research ecosystem. Well done DigiCert and Jisc! 🔐 #PKI #DigitalTrust #HigherEducation #CyberSecurity #Research #TLS #CertificateManagement #InfoSec #UKEducation
3
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More