Tom VAN DEN EYNDE CISSP, CISA, CISM

Size: px
Start display at page:

Download "Tom VAN DEN EYNDE CISSP, CISA, CISM"

Transcription

1 Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde Phone: (0) Address: Meerminnenstraat 34, 2800 Birthday: May 26 th 1980, Duffel, Belgium Nationality: Belgian Summary Tom VAN DEN EYNDE is currently Client Security Principal at HP. Before joining HP, Tom was Associate Partner Security at IBM and before that, Tom was leading the global Threat Management security consulting practice within the Global Consulting & Integration Services department at Verizon Enterprise Solutions. The practice is providing IT security solutions and giving trusted security advice to Verizon's customers Prior, he was a Manager in Verizon's Professional Security Services Organization where Tom combined his deep understanding of IT security, operational IT experience and insight into business drivers to give real valueadded security advice to customers and lead a team of consultants responsible for delivering professional security services. Tom joined Verizon in 2009 as a Principal Information Security Consultant. Before joining Verizon Business, Tom worked for C-CURE as Assistant Technical Manager and Senior Security Consultant. In this position, he heavily specialized in information security and IT networking. He was responsible for the security management of a number of customers, designed and implemented security solutions, provided trusted pre-sales advice for C-CURE s customers on all aspects of information security and assisted in improving C-CURE's technical team as a manager and team leader. Tom has experience with a variety of IT security products and technologies, performed security architecture reviews, penetration tests, business requirements analysis and technical solution designs. He has experience as a lead consultant in complex projects, has good knowledge and experience in incident handling and is up-tospeed with general accepted information security best practices. Tom has proven leadership qualities and experience in managing, coaching and developing teams and business on a local and international level. Professional Experience Client Security Principal Hewlett Packard Enterprise Diegem, Belgium June Present Vital to the successful growth of the HP ESS business and directly responsible for connecting key functional areas within HP ESS to establish HP s market reputation. Provide an end to end service to HP clients, from shaping their vision, proposing a Security solution, winning the deal and delivering the early phase of that solution around Advise and Transform to Run/Manage. Accountable for end-to-end prospecting, lead generation with Sales and presales, opportunity management to win, and execution. Build long term client and CSO relationships based on referenceable solution delivery which enables a growing portfolio of client business. Acts as key stakeholder in the sales process focused on creating value propositions that enables desired business outcomes for the client that create and build pipeline opportunities. Provide consulting and advisory support for the delivery of services on the account Act as a seasoned practitioner with deep industry knowledge Responsible for a single large account or collection of small to medium accounts Drive transformation expertise, innovation and thought leadership into account, portfolio, delivery and the external market. Professional Profile Tom VAN DEN EYNDE 1 7

2 Associate Partner in IT security Evere, Belgium IBM June 2014 May 2015 Responsible for end-to-end execution of the IT security consulting domain, from sales, through solution design, to delivery, and organization of the practice. At the core of the role is the leadership, management, and improvements of the practice focused on working with clients needs. Demonstrate strong communication skills, consultative, presence and leadership, and team leadership as well as domain knowledge Leadership (perform and mentor) on consulting engagement pursuits, oversight of consulting engagement delivery, direction to teams of technically focused architects and service management consultants, practice leadership and capability growth, and administrative and operational required activities. Participating in client opportunity identification and qualification, understanding client needs and objectives, work with teams to articulate and formulate solutions design for proposals and statements of work that align to the client needs while managing delivery risk and working with the sales team through deal progression and signing Client-facing, assigned to the development of new opportunities and services proposals Develop and implement new strategies and approaches. Head Threat Management EMEA & Global Security Integration Diegem, Belgium Verizon Enterprise Solutions August 2012 May 2014 Running the Professional Services Threat Management & Security Integration Organization for Verizon Business in Europe, Middle East and Africa. Responsible for global delivery capabilities, consistency and standards for how integration services are delivered reliably and consistently worldwide. Managing a team of 70 first class security professionals comprising Practice Leads, Team Managers, Delivery Managers and Consultants across EMEA and US. Accountable for profit and loss and maximizing utilization, margin and revenue Strategically driving practice direction in line with current industry trends and company strategy Providing thought leadership to the organization and for strategic customers Solution Development, Product Management and Service Line definition Maintain Sales, Customer and Partner relationships Management metrics and reporting Head count planning, growth strategy and hiring/firing responsibility Ensuring high quality delivery of services Providing specialist pre-sales support and leading sales efforts Professional Services Manager Leuven- Diegem, Belgium Verizon Business Security Solutions July 2010 July 2012 Manager of a team of consultants across EMEA responsible for delivering security consulting services for (prospective) customers and be a direct report to the Manager Professional Services Network & Infrastructure Serve as a Principal Security Consultant. Contribute to the creation of the next generation services and approaches Coordinate & follow up customer projects delivered by our team Coordinate the efforts of direct reports to reach or exceed agreed / defined performance targets Determine personal career / improvement plans for direct reports where required. Provide mentoring to direct reports Provide management reports in a timely manner where required Creation, review and approval of proposals (scope, level of effort estimates, and schedules) and Statements of Work prior to presentation to customer Board Member: Communications & Membership Officer Belgium ISSA-BE March 2009 March 2013 Responsible for Member communications and assisting in organizing Information Security related events for the Belgian community of ISSA. Writing newsletters which are distributed to the community Keeping track of membership evolution and trying to attract more Information Security Professionals as members to ISSA Assisting in organizing events. Attending board meetings to help decide the direction which ISSA-BE will take Professional Profile Tom VAN DEN EYNDE 2 7

3 Principal Information Security Consultant Leuven, Belgium Verizon Business Security Solutions March June 2010 Delivering a wide range of Information Security services such as Audits, Assessments, Incident Response, Network Security Architecture/Design, implementation and deployment. Lead Consultant and Architect for Security projects Project Management and follow up of Security engagements Performing Security Architecture reviews, Network Penetration tests and providing trusted advice to customers Pre-Sales: defining customer requirements, matching business needs with technical solutions, estimating project scopes, writing tailored proposals based on customer input. Creating new service offerings to match the evolving information security market and customer needs. Assessing capabilities of new technologies and the impact on the information security market Assistant Technical Manager / Senior Security Consultant C-CURE June 2008 February 2009 Working as a Senior Security Consultant and assisting in managing the Technical Operations (people, processes and technology) of C-CURE People management of C-CURE s technical team Performance Reviews of team members Interview potential new hires Plan education and career paths of team members Planning of the team to ensure continuity and utilization targets are met Coaching and Mentoring of team members Development and selection of new products, technologies and services. Creating budget and strategic plan for C-CURE s Internal IT infrastructure Lead Pre-Sales Consultant: accompanying account managers at customer visits to help sell C-CURE s portfolio of services and products, matching business requirements of customers to technical solutions Security Consultant / Senior Security Consultant C-CURE August 2006 May 2008 Lead Pre-Sales consultant Remote/onsite installation of security solutions Provide presales or trusted security advice Provide training to customers / colleagues Mentoring / Coaching colleagues Writing of documentation/procedures/offers Writing monthly security reports, hold monthly meetings and following up and respond on incidents for managed security customers. Design and planning of security solutions Staying up-to-date with the latest vulnerabilities, best practices, products Security Engineer C-CURE April 2004 July 2006 Provide high level technical support and incident analysis for C-CURE s customers Assisting Security Consultants in security projects and independent in small projects. Staying up-to-date with the latest vulnerabilities, best practices, products Professional Profile Tom VAN DEN EYNDE 3 7

4 Product Manager Motherboards CLOETENS October 2003 March 2004 Techno-commercial function supporting and selling PC hardware at distributor level Internship + thesis TECHWIN Software August 2002 August 2003 Development of a knowledge database and support application as part of Master Thesis Student Job as Network engineer, optimizing network with firewall, VPN and solving various IT issues. Software Developer [Student Job] TELENET August 2001 Developed software and database for Digital TV project follow up Internet Helpdesk Agent [Student Job] TELENET August st line helpdesk solving Internet problems of residential customers. Professional Profile Tom VAN DEN EYNDE 4 7

5 Education Middle Management Program Belgium Vlerick Leuven-Gent Management School Master in Industrial Sciences: Electronics ICT Industrieel Ingenieur Sint-Kat.-Waver, Belgium Lessius Campus De Nayer Cum laude Mathematics Science O.-L.-V.-Waver, Belgium Sint-Ursula-Instituut Professional Training/Conferences August 2013 BlackHat & DefCon Security Conferences December 2011 ECSA Security Conference September 2011 Presentation Advantage FranklinCovey December 2010 Leadership at all levels: coaching, basic finance management November 2010 ISO Lead Implementer Course October 2010 The Seven Habits of Highly Effective People August 2010 Leadership course April 2010 English Business Writing Workshop March 2009 Penetration Testing Methodology March 2008 EuroCACS ISACA conference October 2007 HACK.LU conference August 2007 Sourcefire 3D June 2007 ISS SiteProtector December 2006 Radware LinkProof November 2006 SANS 504: Hacker Techniques, Exploits and Incident Handling May 2006 InfoBlox DNS-1 March 2006 BlueCoat BCCP August 2005 RSA SecurID 6.1 April 2005 BlueCoat Advanced Proxy Solutions January 2005 Trend Micro IWSS Level III April 2004 Check Point Certified Security Administrator Training Professional Certificates CISM Certified Information Security Manager ISO27001 Lead Implementer CISA Certified Information Systems Auditor CISSP Certified Information Systems Security Professional SANS GCIH GIAC Certified Incident Handler [expired December 2010] CCSA, CheckPoint Certified Security Administrator for NGX and NG Trend Micro Level III IWSS for Unix Trend Micro Level II IMSS for Unix Trend Micro Level II IMSS for Windows Trend Micro Level II IMSS for Unix RSA certified system engineer for SecurID 6.1 Professional Profile Tom VAN DEN EYNDE 5 7

6 Selected overview of past projects performed as consultant Client principal responsible for strategy, business development and overseeing service delivery at a multinational electronics company Lead Consultant responsible for managing the transition of an in-sourced SOC to an outsourced SOC at a multinational financial institution Lead Consultant responsible for the overall Transition and Transformation from a legacy network security solution to a consolidated security solution spread across three global security gateways for a fortune 500 company specialized in distribution Review of the information security related technology in the core production network of a large international IT service provider for the financial industry. The goal was to review the technology and processes in scope to verify if they are used in a correct, optimal and cost efficient manner in order to accomplish the required security level. The results were prioritized recommendations, which were made both on a security and efficiency level. The findings were benchmarked to results of similar assessments in other companies active in the same industry of the customer. Security review of a service provider for an application development company, which included an internal, and external network vulnerability assessment and a review of the technical business continuity procedures. Lead Consultant responsible for Architecture, Design and Transition planning in Managed Security Take-Over project for a financial asset management company Security Architecture Review and Network Vulnerability Assessment for the EMEA group of a large international industrial manufacturing company. Security Review for an Electronic R&D company which included an architecture review, internal & external vulnerability scans, web application vulnerability scans and a limited ISO27002 benchmark External penetration test including a wireless penetration test for a manufacturer of medical supplies Internal penetration test for a financial institution specialized in private banking Forensics assignment at a Belgian bank Business requirements analysis and solution design of a secure remote access solution for an international industrial manufacturer and solutions provider. External and Internal Penetration Test for a large biscuits manufacturer Web Application Vulnerability Reviews for a large company in the food and beverages sector Internal and external penetration test for a Belgian financial institution Professional Profile Tom VAN DEN EYNDE 6 7

7 Brief overview of expertise Non Technical Consulting Professional Services Enterprise Pre-Sales Solution Selling Team Management Strong Leadership qualities International Experience Strong Communication skills Service Delivery Engagement / Project / Program management Profit & Loss management Strategic Planning Change Management Operational Management New Service / Solution Development Business Development Complex integration deals Information Security: Experience with a variety of security products and technologies including firewalls, proxies, mail relays, load balancers, endpoint security technology, intrusion detection systems, remote access solutions, authentication systems, internet access technology, SIEM solutions and anti-malware technology Experience with architecture reviews, penetration tests, business requirements analysis and technical solution designs. Experienced security incident handler forensics experience. Up-to-date knowledge of new techniques and practices in IT security IT: Familiar with a wide range of Operating Systems and software both closed and open source. Routers/switches, network protocols and network traffic analysis. Development and scripting skills Database structure & query language skills Up-to-date knowledge of trends and new developments in IT. Additional Information Member in good standing of ISACA, (ISC) 2 and ISSA Frequent attendee of OWASP, ISSA and ISACA local chapter meetings ISSA-BE board member Standby teacher for the "Mentor" and for the 504 track of " Hacker Techniques, Exploits and Incident Handling" SANS advisory board member NATO Security Clearance: Secret Language Capabilities: Dutch: Mother tongue English: Fluent (+22 years) French: Good (+24 years) German: Understanding Drivers License: Belgian drivers license type B Personal Interests: Reading infosec related blogs, publications and books, non-fiction books about economic, business and historical topics. Science & Technology Squash recreational level Running recreational level Photography Professional Profile Tom VAN DEN EYNDE 7 7

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

locuz.com Professional Services Security Audit Services

locuz.com Professional Services Security Audit Services locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 Twest@timwestconsulting.com OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

Security Assessment and Compliance Services

Security Assessment and Compliance Services Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

About PROXC Consulting. PROXC Services Domains

About PROXC Consulting. PROXC Services Domains COMPANY PROFILE About PROXC Consulting Introduction PROXC is a key regional player in business consulting and advisory services field within the Europe, Middle East & Africa regions; bridging gaps between

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State

More information

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions Motorola Enterprise Mobility Services Maximize the value of your mobility solutions Motorola Enterprise Mobility Services: Service with a difference for maximum success and maximum business advantage

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

Network Consulting Engineer

Network Consulting Engineer Brochure Network Consulting Engineer February, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 The Cisco Support Center in Krakow To understand

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

COMPANY PROFILE REV 4.0

COMPANY PROFILE REV 4.0 COMPANY PROFILE REV 4.0 Company Background and Core Values Secor is a highly innovative company based in Lebanon and Dubai, focusing on the exploding market of the information security in the Middle East

More information

PCI DSS READINESS AND RESPONSE

PCI DSS READINESS AND RESPONSE PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April 1974. Place and date of birth : Marital status :

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April 1974. Place and date of birth : Marital status : Curriculum Vitae Name : First name : Place and date of birth : Marital status : Address : Eerdekens Steven Leuven, 26 th of April 1974 Married, 2 sons of 9 and 11 years Oudebaan 41 B-3360 Korbeek-Lo Mobile

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated

More information

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Project, Program & Portfolio Management Help Leading Firms Deliver Value in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

Simply deliver IT to increase Revenue improve Productivity and cut Cost

Simply deliver IT to increase Revenue improve Productivity and cut Cost Established by a group of IT Professionals and experts in multi industries, Rakati Systems (PT Rakati Sistem Indonesia) is run to provide excellent IT Services. Rakati deliver Information Technology Solutions

More information

Designing & Building an Information Security Program. To protect our critical assets

Designing & Building an Information Security Program. To protect our critical assets Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

Network Segmentation

Network Segmentation Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Network, Administrator and IT Security Courses. Improve your knowledge, skills and gain certification in Networking and IT security

Network, Administrator and IT Security Courses. Improve your knowledge, skills and gain certification in Networking and IT security AN FORAS RIARACHÁIN INSTITUTE OF PUBLIC ADMINISTRATION Network, Administrator and IT Security Courses Autumn 2016 Improve your knowledge, skills and gain certification in Networking and IT security Institute

More information

Leveraging SANS Top 20 to develop a Security Engineering roadmap. Glen G. Walker 23 August 2014

Leveraging SANS Top 20 to develop a Security Engineering roadmap. Glen G. Walker 23 August 2014 Leveraging SANS Top 20 to develop a Security Engineering roadmap Glen G. Walker 23 August 2014 DISCLAIMER My personal experience, opinions and guidance Not endorsed by, approved by, or the opinion of Dignity

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor VENDOR PROFILE SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor Juan Sacchi IDC OPINION SecureData is a growing managed security services provider headquartered in the U.K. with

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

Profile. Absolute ICT

Profile. Absolute ICT Profile Absolute ICT Introduction At BATEC we bring it all together for our customers, from revolutionary Technologies to next-generation Mobility Enhanced Networks and sophisticated solutions for Small,

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

Full-Speed Ahead: The Demand for Security Certification by James R. Wade

Full-Speed Ahead: The Demand for Security Certification by James R. Wade Full-Speed Ahead: The Demand for Security Certification by James R. Wade It s no secret that technology is creating a more connected world every day. But as new technologies are released and adopted, the

More information

SecureOps. Cost-optimized Operational Information Security for Large Organizations. Operational Information Security. Top Ranked Security Outsourcer

SecureOps. Cost-optimized Operational Information Security for Large Organizations. Operational Information Security. Top Ranked Security Outsourcer SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

GIAC Certification. Enterprise Solution

GIAC Certification. Enterprise Solution E- Business & Web Solutions IT Solutions (Hardware, Software, Services) Business Process & Technology Outsourcing Enterprise Solution Professionals on Information and Network Global Information Assurance

More information

Presentation Goals. Challenges facing Project Management Practitioners. Benefits that organisations gain from Project Management

Presentation Goals. Challenges facing Project Management Practitioners. Benefits that organisations gain from Project Management Presentation Goals Challenges Facing Today s Project Managers Introducing IPMA Certification & Standards International Excellence Awards Publications Professional Development Events Future of IPMA Challenges

More information

Enterprise Service Desk Specialist-1408333 Description Hewlett-Packard is a leading global technology services provider delivering business solutions

Enterprise Service Desk Specialist-1408333 Description Hewlett-Packard is a leading global technology services provider delivering business solutions Enterprise Service Desk Specialist-1408333 Description Hewlett-Packard is a leading global technology services provider delivering business solutions to its clients. The HP Enterprise Services delivers

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction

More information

HP Security Solutions for the Microsoft. Environment. Achieving a secure adaptive enterprise

HP Security Solutions for the Microsoft. Environment. Achieving a secure adaptive enterprise HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88

Career Survey. 1. In which country are you based? 2. What is your job title? 3. Travel budget. 1 of 28. Response Count. answered question 88 Career Survey 1. In which country are you based? 88 answered question 88 skipped question 0 2. What is your job title? 88 answered question 88 skipped question 0 3. Travel budget not at all 21.0% 17 somewhat

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

The National Skills Academy for IT. Cyber Security

The National Skills Academy for IT. Cyber Security The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

CYBER SECURITY SERVICES PWNED

CYBER SECURITY SERVICES PWNED CYBER SECURITY SERVICES PWNED Jens Thonke Capital Market Day 16 Sept 2015 1 AGENDA Cyber Security Services in brief Market overview and key trends Offering and channels Competition Enabling growth Performance

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

Information security governance has become an essential

Information security governance has become an essential Copyright 2007 ISACA. All rights reserved. www.isaca.org. Developing for Effective John P. Pironti, CISA, CISM, CISSP, ISSAP, ISSMP Information security governance has become an essential element of overall

More information

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business

More information

SecureData grows through managed security services

SecureData grows through managed security services SecureData grows through managed security services How has SecureData grown its managed services business? SecureData has invested heavily in training and recruiting skilled security professionals to provide

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

DIANNA SADLOUSKOS BACKGROUNDER www.sadlouskos.com EXPERIENCE

DIANNA SADLOUSKOS BACKGROUNDER www.sadlouskos.com EXPERIENCE EXPERIENCE SADLOUSKOS CONSULTING SERVICES March 2006 to present FOUNDER, PRINCIPAL CONSULTANT Dianna Sadlouskos is a management consultant with twenty years experience supporting higher education institutions

More information

The Information Security Specialists

The Information Security Specialists The Information Security Specialists The IPSec information shield safeguarding business success. IPSec are specialists in information asset security; technology experts who know how to mitigate risk to

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Your customers protected against cybercrime. New commercial opportunities for you

Your customers protected against cybercrime. New commercial opportunities for you Your customers protected against cybercrime New commercial opportunities for you The vulnerability management solution for SMEs Through ThreadScan ThreadStone offers SMEs optimal security control of systems

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Market Leadership Award Vulnerability Management Global, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year of business with

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Put into test the security of an environment and qualify its resistance to a certain level of attack. Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.

More information

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages

Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Facing Information Security Challenges

Facing Information Security Challenges AKTINA Event Information Security & Cloud Challenges March 17, 2016 Facing Information Security Challenges ISACA Cyprus Chapter Paschalis Pissarides CRISC, CISM, CISA Immediate Past President (2010-2014)

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Building a Security Operations Center (SOC)

Building a Security Operations Center (SOC) Building a Security Operations Center (SOC) Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Session ID: TECH-203 Session Classification: Advanced About me Ben Rothke, CISSP, CISM, CISA Manager - Information

More information

Dell Connected Learning for Schools. Transforming Education for the Digital Age

Dell Connected Learning for Schools. Transforming Education for the Digital Age Dell Connected Learning for Schools Transforming Education for the Digital Age This document was created to provide Dell s point of view for primary and secondary schools and contains the following sections:

More information

Managed Services. Business Intelligence Solutions

Managed Services. Business Intelligence Solutions Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services

More information

Cyber Defense Operation Center (CDOC) Ensuring that Experts are allways watching

Cyber Defense Operation Center (CDOC) Ensuring that Experts are allways watching (CDOC) Ensuring that Experts are allways watching Data Sheet Introduction CyberHat CDOC is an intelligent security operation center; which combines cutting edge technologies and innovative processes ensuring

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

The Internet Security And Intrusion Detection Market

The Internet Security And Intrusion Detection Market The Internet Security And Intrusion Detection Market Serge-Paul Carrasco December 1998 asiliconvalleyinsider.com Contents 1) The Internet Security Market 2) The Intrusion Detection and Response Market

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information