My name is Martin Overton, I’ve worked in computer security for over 30 years…as a deep techie, you have been warned! I work in malware/anti-malware research as well ethical hacking, computer forensics, training, lecturing, presenting and consulting.
My interest and involvement in viruses/anti-virus and computer security started in 1988. My work in this area included the virus protection/strategy for a large UK Insurer for which I proposed a multi-layered and multi-level strategy for combating viruses. I also setup and maintained their Intranet virus/hoax site and was the recognised expert for the UK, Europe, Middle East and Africa for them.
The next role I had was as an ethical hacker (white-hat) and then I also got involved with digital forensics and built and ran a forensics team and service across EMEA often dealing with customers that had been hacked, infected or had their systems defaced, held to ransom or DDoSed (knocked over by a constant flood of rogue network traffic), as well as keeping an eye of the Dark Net.
Alongside the above roles, I created my own anti-malware tools which used behavioural analysis and decoy techniques (many years before the main-stream anti-malware tools added this). I also developed a honey-pot that caught huge numbers of band new share crawling worms (before the anti-malware firms could even detect them; I shared my samples and findings with them, usually within an hour). I also created signature/rules for detecting these new malware and also mass-mailing (email borne) malware; this used SNORT as the detection tool (once the new samples were analysed and rules/signatures for them were created).
My final role before I started working as a freelance security specialist (and running this site) was for a major international insurance company as a Cyber Risk Subject Matter Expert. This means that I covered not only malicious software and mitigating tools and methodologies but also related security threats such as phishing, scams, hoaxes, spyware and so on both from a prevention/detection side, but also from a risk perspective. This included lots of conference presentations, round-tables, panel sessions, papers and also creating and delivering training (for both technical staff and underwriters/brokers). Part of this role was business development, including finding new vendors (to be business partners), I also assisted marketing and claims.
Furthermore, I run a number of early warning systems; IDS, honeypots, lures and other traps for malware, spyware, spam, phishing and other types of prevalent scams. Details on some of these can be found in a number of my published papers and articles in the ‘Publications’ section of this site.
I am a regular speaker at the Virus Bulletin International Conferences [since 1996], the EICAR International Conferences [since 2004] and I also presented at CompSec in 1999. I have also given presentations for the CIB (Chartered Institute of Banking), ISACA, etc. Since 1999 I’ve also become a (regular-ish) contributor to the Virus Bulletin periodical. I am also a WildList Reporter and a Charter Member of AVIEN. I regularly present at conferences and events, covering areas such as IoT, IT, OT, Risks, Threatscape, Manufacturing, Best Practise, Social Engineering, Hacking, Forensics, Prevention, Social Networks, Privacy, Patching, Passwords and Identity Management, Dark Net, Malware, Phishing, Scams, Cloud, etc.
Twice a year I also lecture on computer security threats at one of the major UK Universities (University of Warwick). I also lecture at other UK universities from time to time, including, Loughborough, Lancaster, Cambridge, UCL, etc.
Why OMG Cyber Security as your company name?
Two reasons: one, OMG are my initials (according to Microsoft Word, when using last name and then forename initials) and two, it is something I hear all the time from customers, e.g.
- “OMG that was the best presentation/lecture/training”
- “OMG we’ve been hacked, can you help, please?”
- “OMG how did you manage to get access to that server/data, etc.” (whilst doing a penetration/application test)!
- “OMG how did you manage to find out not only how they got in, but what they accessed and who they are?” (as part of a forensic analysis of a hacked/compromised system/server/network).
- “OMG how did you manage to find and counter that new/unknown malware in our systems, no one else could!
and so on…. I also thought it a bit of fun, and it trips of the tongue well.
My Other Sites and Blogs
- VSUB Blog [My blog which details new malware samples that I’ve found]