Publications

Digital Signatures: Security & Controls - Fred Piper, Simon Blake-Wilson and John Mitchell

In the electronic communication environment it is essential to be able to establish that the signatory of a message is indeed its originator. This detailed publication on the security and control issues of digital signatures addresses all of the vital components which are relevant to the IT audit and control community. Written by experts in cryptography to explain what digital signatures are, how they work, and unresolved issues in their use. Includes audit programs.

Articles

 John has written scores of articles for prestigious magazines. Here are a couple of examples

 Computer Forensics   Assurance Has Value

 

Editorials

 John is a previous editor of The Journal, an award winning publication of the British Computer Society’s (BCS)

Information Risk Management & Assurance (IRMA) specialist group.

 You can find his editorials below.

 2002                March                          June                 September                   December

2003                March                          June                 September                   December

2004                March                          June                 September                   December

2005                March                          June                 September                   December

2006                March                          June                 September                   December

2007                March                          June                 September                   December

2008                March                          June

                                                                                                                           Past IRMA Journals

            Published quarterly, between 1990 and 2008, the Journal was IRMA's main communication arm with its members before the World Wide Web

            made it easier to directly keep current with IRMA matters.  For research purposes, these valuable historical documents can be found Here

                                                                                                                                                            Opinions

                                         For many years, John was a regular contributor to IT Now, the major publication of the British Computer Society.

                                                  You can find his opinions below.

                                     Information Security Now 1.pdf        Information Security Now 2.pdf        Information Security Now 3.pdf    Information Security Now 4.pdf        Information Security Now 5.pdf

                                    Information Security Now 6.pdf        Information Security Now 7.pdf        Information Security Now 8.pdf    Information Security Now 9.pdf        Information Security Now 10.pdf

                                    Information Security Now 11.pdf      Information Security Now 12.pdf      Information Security Now 13.pdf  Information Security Now 14.pdf      Information Security Now 15.pdf

                                    Information Security Now 16.pdf      Information Security Now 17.pdf      Information Security Now 18.pdf  Information Security Now 19.pdf      Information Security Now 20.pdf

                                    Information Security Now 21.pdf      Information Security Now 22.pdf      Information Security Now 23.pdf  Information Security Now 24.pdf      Information Security Now 25.pdf

                                    Information Security Now 26.pdf      Information Security Now 27.pdf      Information Security Now 28.pdf  Information Security Now 29.pdf      Information Security Now 30.pdf

                                    Information Security Now 31.pdf      Information Security Now 32.pdf      Information Security Now 33.pdf  Information Security Now 34.pdf      Information Security Now 35.pdf

                                    Information Security Now 36.pdf      Information Security Now 37.pdf      Information Security Now 38.pdf  Information Security Now 39.pdf       Information Security Now 40.pdf
                             
                                   
Information Security Now 41.pdf      Information Security Now 42.pdf      Information Security Now 43.pdf    Information Security Now 44.pdf     Information Security Now 45.pdf

                                     Information Security Now 46.pdf      Information Security Now 47.pdf    Information Security Now 48.pdf     Information Security Now 49.pdf    Information Security Now 50.pdf

 

John has appeared on radio and television throughout the world and his views are often sought on the control implication of emerging technologies.

An example can be found here.

 

Presentations

 John holds ISACA’s prestigious John Kuyers’ award for best conference contributor.

An example of one of his presentations can be found here.