Publications
Digital Signatures: Security & Controls - Fred Piper, Simon Blake-Wilson and John Mitchell
In the electronic communication environment it is essential to be able to establish that the signatory of a message is indeed its originator. This detailed publication on the security and control issues of digital signatures addresses all of the vital components which are relevant to the IT audit and control community. Written by experts in cryptography to explain what digital signatures are, how they work, and unresolved issues in their use. Includes audit programs.
Articles
John has written scores of articles for prestigious magazines. Here are a couple of examples
Computer Forensics Assurance Has Value
Editorials
John is a previous editor of The Journal, an award winning publication of the British Computer Society’s (BCS)
Information Risk Management & Assurance (IRMA) specialist group.
You can find his editorials below.
2002 March June September December
2003 March June September December
2004 March June September December
2005 March June September December
2006 March June September December
2007 March June September December
Past IRMA Journals
Published quarterly, between 1990 and 2008, the Journal was IRMA's main communication arm with its members before the World Wide Web
made it easier to directly keep current with IRMA matters. For research
purposes, these valuable historical documents can be found Here
For many years, John was a regular contributor to IT Now, the major publication of the British Computer Society.
You can find his opinions below.
Information Security Now 1.pdf Information Security Now 2.pdf Information Security Now 3.pdf Information Security Now 4.pdf Information Security Now 5.pdf
Information Security Now 6.pdf Information Security Now 7.pdf Information Security Now 8.pdf Information Security Now 9.pdf Information Security Now 10.pdf
Information Security Now 11.pdf Information Security Now 12.pdf Information Security Now 13.pdf Information Security Now 14.pdf Information Security Now 15.pdf
Information Security Now 16.pdf Information Security Now 17.pdf Information Security Now 18.pdf Information Security Now 19.pdf Information Security Now 20.pdf
Information Security Now 21.pdf Information Security Now 22.pdf Information Security Now 23.pdf Information Security Now 24.pdf Information Security Now 25.pdf
Information Security Now 26.pdf Information Security Now 27.pdf Information Security Now 28.pdf Information Security Now 29.pdf Information Security Now 30.pdf
Information Security Now 31.pdf Information Security Now 32.pdf Information Security Now 33.pdf Information Security Now 34.pdf Information Security Now 35.pdf
Information Security Now 36.pdf Information Security Now 37.pdf Information Security Now 38.pdf Information Security Now 39.pdf Information Security Now 40.pdf
John has appeared on radio and television throughout the world and his views are often sought on the control implication of emerging technologies.
Presentations
John holds ISACA’s prestigious John Kuyers’ award for best conference contributor.
An example of one of his presentations can be found here.