logo
#

Latest news with #JohnPritchard

New scheme to boost employment for people with disabilities
New scheme to boost employment for people with disabilities

Leader Live

time22-07-2025

  • Business
  • Leader Live

New scheme to boost employment for people with disabilities

The Supported Employment Service is designed to help people with learning disabilities secure paid, meaningful work. Currently, just 4.8 per cent of people with learning disabilities are in paid employment, despite many wanting to work. It is a joint project led by Wrexham and Flintshire County Councils alongside specialist agencies like HfT Flintshire. John Pritchard, lead member for adult social care at Wrexham Council, said: "We're here to support employers every step of the way, and we take time to understand their unique business needs so we can help them find the best job matches. "Employing someone with a learning disability can be hugely rewarding – there are lots of business benefits, and you can also make a world of difference to that person's life." The service offers tailored support to employers, including help with recruitment, induction, training, and advice on reasonable adjustments in the workplace. It also provides ongoing support to both businesses and employees for as long as it is needed. Christine Jones, Flintshire County Council's cabinet member for social services and wellbeing, said: "Very few people with learning disabilities are in paid employment, and we want their potential and talent to be recognised and celebrated. "To do this we need the support of local businesses. "The Supported Employment Service is here to help employers find reliable, hardworking people while fostering an inclusive workplace." The scheme is part of a wider project involving all six North Wales councils and Betsi Cadwaladr University Health Board, funded through the North Wales Health and Social Care Regional Integration Fund. The service also helps businesses access funding through the Access to Work programme. The Oaks Care Home in Shotton is one of the businesses already working with HfT and currently employs Jake Vernon. READ MORE: Dog rescued by Flintshire animal centre after 'awful start to life' looking for home Tributes paid to kind 'chess king' who spent a lifetime impressing his opponent Manager Sinead Fox said: "We appreciate Jake so much for what he brings to our company – fun, positivity, a willingness to go the extra mile, and a wonderful work ethic which shines through. "Working with a supported employment provider like HfT has been a rewarding and easy process, and they've supported the employee and us as a company from the very start. "Since we've employed Jake our options have changed, and we did have fears that it would be costly if any adjustments were needed, but we needn't have worried – it has been no extra expense and with the specialist support from the job coach it has been a smooth journey. "They have supported us and Jake with all mandatory company training and more." Employers based in Wrexham or Flintshire who are interested in getting involved are encouraged to contact the Supported Employment Service for more information.

Multiplayer AI: The New Operating Model For Identity Security
Multiplayer AI: The New Operating Model For Identity Security

Forbes

time18-06-2025

  • Business
  • Forbes

Multiplayer AI: The New Operating Model For Identity Security

Dr. John Pritchard is the Chief Product Officer at Radiant Logic, responsible for the company's global product vision. AI-powered deepfakes and credential attacks are rewriting the rules of cyber risk, with identity-related breaches now costing organizations an average of $4.45 million per incident and accounting for over 70% of successful attacks on enterprise infrastructure and supply chains. Despite record investments in detection and response, breaches keep making headlines. Why? I call this the identity security paradox: More technology doesn't equal protection, especially if tools—and the people and AI agents using them—don't work together. Identity is the primary attack surface in the enterprise. Most organizations built their identity security stack on a traditional combination of IAM, IGA and PAM, but the rapid proliferation of cloud apps, machine identities and AI agents outpace these traditional controls. The result? Siloed data, unmanaged privileged accounts and hidden nonhuman identities—each a potential attack vector. Gartner finds that 65% of organizations still lack IAM maturity, weighed down by technical debt and fragmented architectures. Point solutions deployed to 'fix' audit findings or compliance gaps create more complexity, not less. Attackers exploit these seams, moving laterally between systems and identities that aren't monitored holistically. CISA's Silentshield Red Team Assessment demonstrated that decentralized teams and poor communication allowed adversaries to persist undetected, even when individual groups spotted anomalies. The lesson is clear: Solo efforts—whether a lone expert, an isolated AI agent or a disconnected tool—cannot keep pace with adversaries who are increasingly agile, automated and collaborative. To close these gaps, interoperability must become the standard for tools and the people and AI agents using them. Interoperability means more than connecting dashboards or sharing alerts. It's about ensuring that identity security posture management (ISPM) and identity threat detection and response (ITDR) systems share data, context and workflows in real time, across both human and machine identities. Gartner recommends a 'system of systems' approach, built on identity fabric principles, to support zero trust and intelligent automation. This means breaking down technical and organizational silos so prevention and detection teams operate from a unified, continuously updated single source of truth for identity data—a concept Gartner identifies as foundational for modern identity security. This trusted, authoritative data layer enables faster, more accurate decisions and ensures that every team acts on the same intelligence. When ISPM and ITDR interoperate, and when human and AI teammates collaborate based on shared reference points, blind spots shrink and attackers have fewer seams to exploit. I call the next evolution in identity security: multiplayer AI—intelligent systems designed to amplify human capabilities through enhanced teamwork. Gartner predicts by 2027, 90% of successful AI implementations in cybersecurity will focus on tactical task automation and process augmentation, not full autonomy or staff replacement. Multiplayer AI enables human and AI collaboration, breaking down silos and bridging gaps between prevention and detection. AI excels at analyzing vast datasets, detecting patterns humans miss and automating repetitive processes. Critical decisions, like determining whether anomalies are a threat or false positives, still require human judgment and contextual understanding. Studies show organizations using collaborative AI models—human decisions based on AI recommendations—see faster response times, fewer security incidents and improved resilience. The key is not just technology, but teamwork: AI handles the heavy lift of data processing and pattern recognition, while humans provide creativity, ethical oversight and business context. Thankfully, the industry is moving quickly. With the meteoric rise of agentic AI, open standards like Model Context Protocol (MCP) and Agent2Agent (A2A) are enabling AI agents from different vendors, clouds and frameworks to communicate, share context and coordinate tasks securely. Technology partners including OpenAI, Microsoft and Google are already adopting these protocols, breaking down silos that limit automation's impact. For business leaders, agentic AI means specialized agents for threat detection, access management, compliance and user behavior analytics can now form ad hoc teams-automating complex workflows and adapt to new threats. By 2028, Gartner forecasts multiagent AI will account for 70% of threat detection and response implementations, primarily to augment—not replace—staff. Early adopters will see measurable results: Leveraging agent-to-agent collaboration is predicted to cut attacker dwell time in compromised environments by up to 50%, while accelerating response and reducing operational risk. When humans and AI work together, identity security becomes faster, smarter and more resilient. 1. Establish an interoperability baseline. Audit ISPM and ITDR tools for data sharing and workflow integration across human and machine identities. Ensure architectures support agent-to-agent interoperability using open standards like MCP and A2A, so specialized agents can collaborate and automate cross-vendor workflows. Set quarterly targets to reduce IAM tool integration gaps. 2. Pilot tactical AI augmentation. Start with a focused, data-driven use case, such as automated privilege review or anomaly detection. Track improvement in response time and risk reduction. 3. Build AI literacy and human oversight. Train teams on both the benefits and limits of AI, including where human verification is required in critical workflows. 4. Continuously review identity hygiene. Use AI-driven discovery to identify unused or risky accounts, but require human validation before making changes. Aim to reduce privileged account sprawl and remediate orphaned accounts as they are detected. 5. Measure what matters. Track outcome-driven metrics such as percentage reduction in excessive permissions, improvement in MFA deployment rates and decreased incident response times. For example, reducing excessive permissions by 20% and increasing MFA coverage to 95% of privileged accounts within one year. The next breach won't be stopped by just another dashboard or a new AI agent. Organizations that have achieved true interoperability across tools, teams and AI will be able to respond more accurately to security issues. Multiplayer AI and agent-to-agent collaboration will lead the blueprints for resilience in the age of AI turbulence. Start by assessing your current environment for interoperability gaps, unify your tools and teams and empower your people with AI that amplifies—not replaces—their expertise. In the high-stakes game of identity security, victory belongs to those who play as a team. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Radiant Logic Wins 2025 Fortress Cybersecurity Award for Authentication & Identity Innovation
Radiant Logic Wins 2025 Fortress Cybersecurity Award for Authentication & Identity Innovation

Yahoo

time03-06-2025

  • Business
  • Yahoo

Radiant Logic Wins 2025 Fortress Cybersecurity Award for Authentication & Identity Innovation

SAN RAFAEL, Calif., June 03, 2025--(BUSINESS WIRE)--Radiant Logic, the leader in Identity Security Posture Management (ISPM), today announced it has been named a winner in the 2025 Fortress Cybersecurity Awards, presented by the Business Intelligence Group. Radiant Logic was recognized in the Authentication & Identity category for its groundbreaking work in unifying identity data and delivering real-time visibility to speed IAM operations and reduce identity risk across complex enterprise environments. The Fortress Cybersecurity Awards honor the industry's top organizations and individuals who are advancing the state of security through measurable innovation and a commitment to best practices. This recognition follows a series of major product enhancements from Radiant Logic, including the announcement of Identity Observability in the RadiantOne platform, equipping security teams with continuous monitoring, dynamic risk scoring, and real-time remediation across distributed identity infrastructures. "The volume and complexity of threats facing organizations today is growing by the minute," said Russ Fordyce, CEO of the Business Intelligence Group. "The winners of this year's Fortress Cybersecurity Awards are not only keeping up—they're setting the pace. We're proud to honor Radiant Logic for developing identity-centric solutions that are essential to the future of secure access and Zero Trust." Radiant Logic's win highlights the impact of its AI-powered identity observability engine and graph-based data unification model, which together help enterprises detect misconfigurations, eliminate orphaned accounts, and improve compliance through a unified view of identity across Active Directory, cloud services, SaaS applications, and more. "We're honored to be recognized by the Business Intelligence Group," said Dr. John Pritchard, CEO, Radiant Logic. "As identity becomes the dominant threat vector in today's cybersecurity landscape, our mission is to give organizations the visibility and intelligence they need to secure access at scale. This award is a testament to our team's innovation and relentless focus on helping customers ensure a more resilient identity infrastructure." To learn more about Radiant Logic's award-winning platform and ISPM approach, visit To learn more about the Fortress Cybersecurity Awards, visit: About Radiant Logic Radiant Logic, the leader in Identity Security Posture Management (ISPM), empowers complex enterprises to ensure a more resilient identity ecosystem and prevent security breaches. RadiantOne is the only centralized platform that unifies 100% of identity data—including legacy systems, cloud platforms, and non-human identities—into a single source of truth that serves as the foundation of your IAM program. Delivering 360° visibility, observability, and context in real time, the platform is fueled by AI-driven analytics to automatically identify and remediate risks. Trusted by the world's largest commercial and government organizations, we help accelerate identity-first security strategies by reducing the attack surface, ensuring continuous compliance, and driving digital transformation. Learn more at About Business Intelligence Group The Business Intelligence Group was founded with the mission of recognizing true talent and superior performance in the business world. Unlike other industry award programs, these programs are judged by business executives with real-world experience. The organization's proprietary scoring system measures performance across multiple business domains and rewards companies whose achievements are significant and measurable. View source version on Contacts Media Contact Sydney DraytonSdraytonc@ Eliana StarbirdChief Nominations OfficerBusiness Intelligence Group+1 909-529-2737contact@

Radiant Logic launches AI tool for identity visibility
Radiant Logic launches AI tool for identity visibility

Techday NZ

time29-05-2025

  • Business
  • Techday NZ

Radiant Logic launches AI tool for identity visibility

Radiant Logic has launched the full suite of its Identity Observability feature for the RadiantOne platform, offering real-time monitoring and risk management capabilities for identity and access management ecosystems. The latest release from Radiant Logic aims to provide organisations with enhanced visibility into their identity management systems and processes, which can help identify, prioritise, and address security risks before they are exploited. The RadiantOne platform now incorporates features such as continuous real-time discovery and observability across identity systems, a unified graph-based model of identity data from sources including Active Directory, LDAP, on-premise applications, Entra Identity, and SaaS platforms, and dynamic risk scoring using heuristics and pattern recognition. The platform also includes an AI Data Assistant (AIDA) that analyses intricate identity relationships, recommends corrective measures, and facilitates collaboration between line managers and resource owners to resolve identity issues. Additional features include dashboards that provide real-time monitoring of identity hygiene, comprehensive reporting, and maturity assessments designed to support policy enforcement and compliance requirements. According to Radiant Logic, the platform is designed to fit into existing enterprise environments as a SaaS or self-managed solution, supporting security initiatives such as Identity and Access Management (IAM), Identity Governance and Administration (IGA), and Zero Trust models. Dr. John Pritchard, Chief Executive Officer at Radiant Logic, commented on the release, "Identity sprawl, hybrid complexity and unmanaged access create blind spots that leave organisations vulnerable to cyber threats. With the RadiantOne platform, we're illuminating every human and non-human identity across the environment—giving security and IAM teams complete visibility into who has access to what, whether it's legitimate and how to mitigate risks, before attackers find the gaps." The platform's enhancements are aligned with guidance from research and advisory firms' recommendations, such as those from Gartner. In its 2025 Guidance for Comprehensive IAM Architecture Strategy, Gartner recommends that organisations "Invest in a centralised identity and access data platform that integrates discovery tools across all IAM layers to aggregate, correlate and reconcile identity and access data. Implement emerging artificial intelligence (AI)-driven identity and access intelligence solutions to enhance observability and automation to quickly remedy vulnerabilities or facilitate a response to identity threats." Industry stakeholders outside Radiant Logic have also commented on the significance of providing robust visibility across identity data. John Horn, Head of the Cybersecurity Practice at Datos Insights, said, "Security defences at many firms operate with incomplete views of identity data and risk across their organisation. A robust identity fabric, centred upon rich, AI-enabled identity visibility for every aspect of the business, is the new operational foundation." "Radiant Logic's Identity Observability is an exciting capability that enables enterprise-wide views of identity data and risk, combined with automated resolutions to many common security problems. As we enter the age of Agentic AI and greater cyber risk, powerful identity observability and remediation will become central capabilities for the business." Early adopters of RadiantOne's new features have reported benefits in managing identity vulnerabilities and improving oversight. A Head of IAM in the insurance sector stated, "It's truly one of the few solutions that delivers so many valuable features right out of the box. This product's real-time data visibility and intuitive interface make it an outstanding tool for monitoring identity vulnerabilities and quickly understanding the health of our company's access management." A Head of Cybersecurity in the transportation industry shared a similar sentiment, saying, "With real-time data visibility and centralised reporting, this tool makes monitoring identity and access management effortless huge improvement over our previous solutions." The RadiantOne platform's combination of real-time monitoring, unified visualisation, and AI-driven remediation is designed to support organisations in addressing the increasing complexities and threats related to identity and access management across hybrid and multi-cloud environments.

Swimming pool application for Great Campston mansion
Swimming pool application for Great Campston mansion

South Wales Argus

time29-04-2025

  • Sport
  • South Wales Argus

Swimming pool application for Great Campston mansion

The Welsh prince suffered a defeat in his battle against the English crown and its forces in the Battle of Campstone Hill in August 1404. The Great Campston estate has medieval origins and was one of17 monastic granges belonging to the Cistercian Abbey of Abbey Dore. Following the dissolution of the monasteries, in 1536, it was granted to John Cokke of London before it was acquired, in 1600, by John Pritchard, a notable figure in the history of Grosmont, near Abergavenny. More than 200 years after the last native prince of Wales was defeated at the site the house, which is now at the end of a 450 metre private drive, was visited by King Charles I in 1645 on his way to Raglan after the Battle of Naseby. The house, which was granted grade II listed status in 1952, has remained in continuous occupation and current owner Andrew Blowers has applied to Monmouthshire County Council for planning permission for a gym and swimming pool complex, for private use, in its grounds. The timber frame, with some stone facing, swimming pool and gym building will include a plant room and patio area and would be around 50 metres south east of Great Campston House. There is also a grade II listed barn, which was awarded the status in 2002, in the grounds. This is where the gym and swimming pool at Great Campston House is proposed to be built. While the house dates back to the 17th century it has been remodelled and enlarged notably in 2002 and there is still a working farm on site. The proposed u-shaped pool and gym would be built on a flat, grassed area of made-up ground near to a modern shed and greenhouse. There would also be car ports. The listed Great Campston Barn A heritage statement has been submitted with the application and a planning statement said that 'concluded that the proposed building on this site would have no impact on the listed house or its setting and would result in a very minor change to the setting of the listed barn. There is no adverse impact on the specific ground on which the new building is proposed as this is the site of former buildings and the site has been artificially levelled'. According to the application consideration was given to using the grade II-listed barn for the swimming pool, gym and car ports as it is 'under-utilised' and has sufficient space but it was agreed redevelopment 'would cause significant adverse impact on the listed building'. As a result it was decided a new building would have 'the least heritage impact' and the plans are being considered by council planners.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store