Tom VAN DEN EYNDE CISSP, CISA, CISM

Size: px
Start display at page:

Download "Tom VAN DEN EYNDE CISSP, CISA, CISM"

Transcription

1 Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde Phone: (0) Address: Meerminnenstraat 34, 2800 Birthday: May 26 th 1980, Duffel, Belgium Nationality: Belgian Summary Tom VAN DEN EYNDE is currently Client Security Principal at HP. Before joining HP, Tom was Associate Partner Security at IBM and before that, Tom was leading the global Threat Management security consulting practice within the Global Consulting & Integration Services department at Verizon Enterprise Solutions. The practice is providing IT security solutions and giving trusted security advice to Verizon's customers Prior, he was a Manager in Verizon's Professional Security Services Organization where Tom combined his deep understanding of IT security, operational IT experience and insight into business drivers to give real valueadded security advice to customers and lead a team of consultants responsible for delivering professional security services. Tom joined Verizon in 2009 as a Principal Information Security Consultant. Before joining Verizon Business, Tom worked for C-CURE as Assistant Technical Manager and Senior Security Consultant. In this position, he heavily specialized in information security and IT networking. He was responsible for the security management of a number of customers, designed and implemented security solutions, provided trusted pre-sales advice for C-CURE s customers on all aspects of information security and assisted in improving C-CURE's technical team as a manager and team leader. Tom has experience with a variety of IT security products and technologies, performed security architecture reviews, penetration tests, business requirements analysis and technical solution designs. He has experience as a lead consultant in complex projects, has good knowledge and experience in incident handling and is up-tospeed with general accepted information security best practices. Tom has proven leadership qualities and experience in managing, coaching and developing teams and business on a local and international level. Professional Experience Client Security Principal Hewlett Packard Enterprise Diegem, Belgium June Present Vital to the successful growth of the HP ESS business and directly responsible for connecting key functional areas within HP ESS to establish HP s market reputation. Provide an end to end service to HP clients, from shaping their vision, proposing a Security solution, winning the deal and delivering the early phase of that solution around Advise and Transform to Run/Manage. Accountable for end-to-end prospecting, lead generation with Sales and presales, opportunity management to win, and execution. Build long term client and CSO relationships based on referenceable solution delivery which enables a growing portfolio of client business. Acts as key stakeholder in the sales process focused on creating value propositions that enables desired business outcomes for the client that create and build pipeline opportunities. Provide consulting and advisory support for the delivery of services on the account Act as a seasoned practitioner with deep industry knowledge Responsible for a single large account or collection of small to medium accounts Drive transformation expertise, innovation and thought leadership into account, portfolio, delivery and the external market. Professional Profile Tom VAN DEN EYNDE 1 7

2 Associate Partner in IT security Evere, Belgium IBM June 2014 May 2015 Responsible for end-to-end execution of the IT security consulting domain, from sales, through solution design, to delivery, and organization of the practice. At the core of the role is the leadership, management, and improvements of the practice focused on working with clients needs. Demonstrate strong communication skills, consultative, presence and leadership, and team leadership as well as domain knowledge Leadership (perform and mentor) on consulting engagement pursuits, oversight of consulting engagement delivery, direction to teams of technically focused architects and service management consultants, practice leadership and capability growth, and administrative and operational required activities. Participating in client opportunity identification and qualification, understanding client needs and objectives, work with teams to articulate and formulate solutions design for proposals and statements of work that align to the client needs while managing delivery risk and working with the sales team through deal progression and signing Client-facing, assigned to the development of new opportunities and services proposals Develop and implement new strategies and approaches. Head Threat Management EMEA & Global Security Integration Diegem, Belgium Verizon Enterprise Solutions August 2012 May 2014 Running the Professional Services Threat Management & Security Integration Organization for Verizon Business in Europe, Middle East and Africa. Responsible for global delivery capabilities, consistency and standards for how integration services are delivered reliably and consistently worldwide. Managing a team of 70 first class security professionals comprising Practice Leads, Team Managers, Delivery Managers and Consultants across EMEA and US. Accountable for profit and loss and maximizing utilization, margin and revenue Strategically driving practice direction in line with current industry trends and company strategy Providing thought leadership to the organization and for strategic customers Solution Development, Product Management and Service Line definition Maintain Sales, Customer and Partner relationships Management metrics and reporting Head count planning, growth strategy and hiring/firing responsibility Ensuring high quality delivery of services Providing specialist pre-sales support and leading sales efforts Professional Services Manager Leuven- Diegem, Belgium Verizon Business Security Solutions July 2010 July 2012 Manager of a team of consultants across EMEA responsible for delivering security consulting services for (prospective) customers and be a direct report to the Manager Professional Services Network & Infrastructure Serve as a Principal Security Consultant. Contribute to the creation of the next generation services and approaches Coordinate & follow up customer projects delivered by our team Coordinate the efforts of direct reports to reach or exceed agreed / defined performance targets Determine personal career / improvement plans for direct reports where required. Provide mentoring to direct reports Provide management reports in a timely manner where required Creation, review and approval of proposals (scope, level of effort estimates, and schedules) and Statements of Work prior to presentation to customer Board Member: Communications & Membership Officer Belgium ISSA-BE March 2009 March 2013 Responsible for Member communications and assisting in organizing Information Security related events for the Belgian community of ISSA. Writing newsletters which are distributed to the community Keeping track of membership evolution and trying to attract more Information Security Professionals as members to ISSA Assisting in organizing events. Attending board meetings to help decide the direction which ISSA-BE will take Professional Profile Tom VAN DEN EYNDE 2 7

3 Principal Information Security Consultant Leuven, Belgium Verizon Business Security Solutions March June 2010 Delivering a wide range of Information Security services such as Audits, Assessments, Incident Response, Network Security Architecture/Design, implementation and deployment. Lead Consultant and Architect for Security projects Project Management and follow up of Security engagements Performing Security Architecture reviews, Network Penetration tests and providing trusted advice to customers Pre-Sales: defining customer requirements, matching business needs with technical solutions, estimating project scopes, writing tailored proposals based on customer input. Creating new service offerings to match the evolving information security market and customer needs. Assessing capabilities of new technologies and the impact on the information security market Assistant Technical Manager / Senior Security Consultant C-CURE June 2008 February 2009 Working as a Senior Security Consultant and assisting in managing the Technical Operations (people, processes and technology) of C-CURE People management of C-CURE s technical team Performance Reviews of team members Interview potential new hires Plan education and career paths of team members Planning of the team to ensure continuity and utilization targets are met Coaching and Mentoring of team members Development and selection of new products, technologies and services. Creating budget and strategic plan for C-CURE s Internal IT infrastructure Lead Pre-Sales Consultant: accompanying account managers at customer visits to help sell C-CURE s portfolio of services and products, matching business requirements of customers to technical solutions Security Consultant / Senior Security Consultant C-CURE August 2006 May 2008 Lead Pre-Sales consultant Remote/onsite installation of security solutions Provide presales or trusted security advice Provide training to customers / colleagues Mentoring / Coaching colleagues Writing of documentation/procedures/offers Writing monthly security reports, hold monthly meetings and following up and respond on incidents for managed security customers. Design and planning of security solutions Staying up-to-date with the latest vulnerabilities, best practices, products Security Engineer C-CURE April 2004 July 2006 Provide high level technical support and incident analysis for C-CURE s customers Assisting Security Consultants in security projects and independent in small projects. Staying up-to-date with the latest vulnerabilities, best practices, products Professional Profile Tom VAN DEN EYNDE 3 7

4 Product Manager Motherboards CLOETENS October 2003 March 2004 Techno-commercial function supporting and selling PC hardware at distributor level Internship + thesis TECHWIN Software August 2002 August 2003 Development of a knowledge database and support application as part of Master Thesis Student Job as Network engineer, optimizing network with firewall, VPN and solving various IT issues. Software Developer [Student Job] TELENET August 2001 Developed software and database for Digital TV project follow up Internet Helpdesk Agent [Student Job] TELENET August st line helpdesk solving Internet problems of residential customers. Professional Profile Tom VAN DEN EYNDE 4 7

5 Education Middle Management Program Belgium Vlerick Leuven-Gent Management School Master in Industrial Sciences: Electronics ICT Industrieel Ingenieur Sint-Kat.-Waver, Belgium Lessius Campus De Nayer Cum laude Mathematics Science O.-L.-V.-Waver, Belgium Sint-Ursula-Instituut Professional Training/Conferences August 2013 BlackHat & DefCon Security Conferences December 2011 ECSA Security Conference September 2011 Presentation Advantage FranklinCovey December 2010 Leadership at all levels: coaching, basic finance management November 2010 ISO Lead Implementer Course October 2010 The Seven Habits of Highly Effective People August 2010 Leadership course April 2010 English Business Writing Workshop March 2009 Penetration Testing Methodology March 2008 EuroCACS ISACA conference October 2007 HACK.LU conference August 2007 Sourcefire 3D June 2007 ISS SiteProtector December 2006 Radware LinkProof November 2006 SANS 504: Hacker Techniques, Exploits and Incident Handling May 2006 InfoBlox DNS-1 March 2006 BlueCoat BCCP August 2005 RSA SecurID 6.1 April 2005 BlueCoat Advanced Proxy Solutions January 2005 Trend Micro IWSS Level III April 2004 Check Point Certified Security Administrator Training Professional Certificates CISM Certified Information Security Manager ISO27001 Lead Implementer CISA Certified Information Systems Auditor CISSP Certified Information Systems Security Professional SANS GCIH GIAC Certified Incident Handler [expired December 2010] CCSA, CheckPoint Certified Security Administrator for NGX and NG Trend Micro Level III IWSS for Unix Trend Micro Level II IMSS for Unix Trend Micro Level II IMSS for Windows Trend Micro Level II IMSS for Unix RSA certified system engineer for SecurID 6.1 Professional Profile Tom VAN DEN EYNDE 5 7

6 Selected overview of past projects performed as consultant Client principal responsible for strategy, business development and overseeing service delivery at a multinational electronics company Lead Consultant responsible for managing the transition of an in-sourced SOC to an outsourced SOC at a multinational financial institution Lead Consultant responsible for the overall Transition and Transformation from a legacy network security solution to a consolidated security solution spread across three global security gateways for a fortune 500 company specialized in distribution Review of the information security related technology in the core production network of a large international IT service provider for the financial industry. The goal was to review the technology and processes in scope to verify if they are used in a correct, optimal and cost efficient manner in order to accomplish the required security level. The results were prioritized recommendations, which were made both on a security and efficiency level. The findings were benchmarked to results of similar assessments in other companies active in the same industry of the customer. Security review of a service provider for an application development company, which included an internal, and external network vulnerability assessment and a review of the technical business continuity procedures. Lead Consultant responsible for Architecture, Design and Transition planning in Managed Security Take-Over project for a financial asset management company Security Architecture Review and Network Vulnerability Assessment for the EMEA group of a large international industrial manufacturing company. Security Review for an Electronic R&D company which included an architecture review, internal & external vulnerability scans, web application vulnerability scans and a limited ISO27002 benchmark External penetration test including a wireless penetration test for a manufacturer of medical supplies Internal penetration test for a financial institution specialized in private banking Forensics assignment at a Belgian bank Business requirements analysis and solution design of a secure remote access solution for an international industrial manufacturer and solutions provider. External and Internal Penetration Test for a large biscuits manufacturer Web Application Vulnerability Reviews for a large company in the food and beverages sector Internal and external penetration test for a Belgian financial institution Professional Profile Tom VAN DEN EYNDE 6 7

7 Brief overview of expertise Non Technical Consulting Professional Services Enterprise Pre-Sales Solution Selling Team Management Strong Leadership qualities International Experience Strong Communication skills Service Delivery Engagement / Project / Program management Profit & Loss management Strategic Planning Change Management Operational Management New Service / Solution Development Business Development Complex integration deals Information Security: Experience with a variety of security products and technologies including firewalls, proxies, mail relays, load balancers, endpoint security technology, intrusion detection systems, remote access solutions, authentication systems, internet access technology, SIEM solutions and anti-malware technology Experience with architecture reviews, penetration tests, business requirements analysis and technical solution designs. Experienced security incident handler forensics experience. Up-to-date knowledge of new techniques and practices in IT security IT: Familiar with a wide range of Operating Systems and software both closed and open source. Routers/switches, network protocols and network traffic analysis. Development and scripting skills Database structure & query language skills Up-to-date knowledge of trends and new developments in IT. Additional Information Member in good standing of ISACA, (ISC) 2 and ISSA Frequent attendee of OWASP, ISSA and ISACA local chapter meetings ISSA-BE board member Standby teacher for the "Mentor" and for the 504 track of " Hacker Techniques, Exploits and Incident Handling" SANS advisory board member NATO Security Clearance: Secret Language Capabilities: Dutch: Mother tongue English: Fluent (+22 years) French: Good (+24 years) German: Understanding Drivers License: Belgian drivers license type B Personal Interests: Reading infosec related blogs, publications and books, non-fiction books about economic, business and historical topics. Science & Technology Squash recreational level Running recreational level Photography Professional Profile Tom VAN DEN EYNDE 7 7

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

State of South Carolina InfoSec and Privacy Career Path Model

State of South Carolina InfoSec and Privacy Career Path Model State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available

More information

Information Security Principles and Practices

Information Security Principles and Practices Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

Information Security Specialist Training on the Basis of ISO/IEC 27002

Information Security Specialist Training on the Basis of ISO/IEC 27002 Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu

More information

locuz.com Professional Services Security Audit Services

locuz.com Professional Services Security Audit Services locuz.com Professional Services Security Audit Services Today s Security Landscape Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System layer.

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup. Corporate Overview MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA 22153 Office: 703.636.2033 Fax: 866.761.7457 www.mindpointgroup.com IS&P Practice Areas Core Competencies Clients & Services

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]

More information

Certification and Training

Certification and Training Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

Network Segmentation

Network Segmentation Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or

More information

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April 1974. Place and date of birth : Marital status :

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April 1974. Place and date of birth : Marital status : Curriculum Vitae Name : First name : Place and date of birth : Marital status : Address : Eerdekens Steven Leuven, 26 th of April 1974 Married, 2 sons of 9 and 11 years Oudebaan 41 B-3360 Korbeek-Lo Mobile

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

PCI DSS READINESS AND RESPONSE

PCI DSS READINESS AND RESPONSE PCI DSS READINESS AND RESPONSE EMC Consulting Services offers a lifecycle approach to holistic, proactive PCI program management ESSENTIALS Partner with EMC Consulting for your PCI program management and

More information

Network Consulting Engineer

Network Consulting Engineer Brochure Network Consulting Engineer February, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 7 The Cisco Support Center in Krakow To understand

More information

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions Motorola Enterprise Mobility Services Maximize the value of your mobility solutions Motorola Enterprise Mobility Services: Service with a difference for maximum success and maximum business advantage

More information

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications Thomas K. Lee, Executive Director/CIO Human Resources Department (518) 447-2906 Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) The New York State

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

About PROXC Consulting. PROXC Services Domains

About PROXC Consulting. PROXC Services Domains COMPANY PROFILE About PROXC Consulting Introduction PROXC is a key regional player in business consulting and advisory services field within the Europe, Middle East & Africa regions; bridging gaps between

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

BMS Consulting Cyber Security and IT Technology Team

BMS Consulting Cyber Security and IT Technology Team BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

How To Make Money On Security For A Large Organization

How To Make Money On Security For A Large Organization SecureOps Cost-optimized Operational Information Security for Large Organizations Operational Information Security SecureOps is a pure-play security outsourcer that near-shores operational information

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Forensic Certifications

Forensic Certifications Forensic Certifications Mayuri Shakamuri CS 489-02 Digital Forensics October 31, 2006 New Mexico Tech Executive Summary Digital Forensics is rapidly growing and evolving to become a scientific practice

More information

The Information Security Specialists

The Information Security Specialists The Information Security Specialists The IPSec information shield safeguarding business success. IPSec are specialists in information asset security; technology experts who know how to mitigate risk to

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES Aligning information with business and operational objectives ESSENTIALS Leverage EMC Consulting as your trusted advisor to move your and compliance

More information

Information & Asset Protection with SIEM and DLP

Information & Asset Protection with SIEM and DLP Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the

More information

Designing & Building an Information Security Program. To protect our critical assets

Designing & Building an Information Security Program. To protect our critical assets Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and

More information

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda

More information

The Evolution of Application Monitoring

The Evolution of Application Monitoring The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments

More information

Certified Information Security Manager (CISM)

Certified Information Security Manager (CISM) Certified Information Security Manager (CISM) Course Introduction Course Introduction Domain 01 - Information Security Governance Lesson 1: Information Security Governance Overview Information Security

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure 2015 1 I.T. Security Specialists Cyber Security Solutions and Services Caretower Corporate Brochure 2015 1 about us As an independent IT security specialist, with over 17 years experience, we provide tailored

More information

Penetration testing & Ethical Hacking. Security Week 2014

Penetration testing & Ethical Hacking. Security Week 2014 Penetration testing & Ethical Hacking Security Week 2014 Agenda Penetration Testing Vulnerability Scanning Social engineering Security Services offered by Endava 2 3 Who I am Catanoi Maxim Information

More information

Building a Security Operations Center (SOC)

Building a Security Operations Center (SOC) Building a Security Operations Center (SOC) Ben Rothke, CISSP CISM Wyndham Worldwide Corp. Session ID: TECH-203 Session Classification: Advanced About me Ben Rothke, CISSP, CISM, CISA Manager - Information

More information

Procuring Penetration Testing Services

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat

More information

Penetration Testing. Request for Proposal

Penetration Testing. Request for Proposal Penetration Testing Request for Proposal Head Office: 24 - The Mall, Peshawar Cantt, 25000 Khyber Pakhtunkhwa, Islamic Republic of Pakistan UAN: +92-91-111-265-265, Fax: +92-91-5278146 Website: www.bok.com.pk

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

InfoSec Academy Pen Testing & Hacking Track

InfoSec Academy Pen Testing & Hacking Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International

More information

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Appendix A-2 Generic Job Titles for respective categories

Appendix A-2 Generic Job Titles for respective categories Appendix A-2 for respective categories A2.1 Job Category Software Engineering/Software Development Competency Level Master 1. Participate in the strategic management of software development. 2. Provide

More information

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help

More information

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Put into test the security of an environment and qualify its resistance to a certain level of attack. Penetration Testing: Comprehensively Assessing Risk What is a penetration test? Penetration testing is a time-constrained and authorized attempt to breach the architecture of a system using attacker techniques.

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management

More information

HP Security Solutions for Microsoft

HP Security Solutions for Microsoft HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting

More information

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Project, Program & Portfolio Management Help Leading Firms Deliver Value in collaboration with Project, Program & Portfolio Help Leading Firms Deliver Value Managing Effectively & Efficiently Through an Enterprise PMO Program & Portfolio : Aligning IT Capabilities with Business

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

VMware vcloud Air Security TECHNICAL WHITE PAPER

VMware vcloud Air Security TECHNICAL WHITE PAPER TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects

More information

Enterprise Cybersecurity: Building an Effective Defense

Enterprise Cybersecurity: Building an Effective Defense : Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

The National Skills Academy for IT. Cyber Security

The National Skills Academy for IT. Cyber Security The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING

More information

Terms of Reference for an IT Audit of

Terms of Reference for an IT Audit of National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

MANAGED SECURITY SERVICES

MANAGED SECURITY SERVICES MANAGED SECURITY SERVICES Security first Safety first! Security is becoming increasingly important for companies, especially for the extension of networking to mission-critical environments, with new intranet

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Director, IT Security District Office Kern Community College District JOB DESCRIPTION Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,

More information

Response to Questions CML 15-018 Managed Information Security

Response to Questions CML 15-018 Managed Information Security Response to Questions CML 15-018 Managed Information Security 1. What are the most critical aspects that need to be provided for this RFP, in light of the comment that multiple awards might be provided?

More information

INFORMATION SECURITY STRATEGIC PLAN

INFORMATION SECURITY STRATEGIC PLAN INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information

More information

An enterprise grade information security & forensic technical team

An enterprise grade information security & forensic technical team An enterprise grade information security & forensic technical team 1-647-892-3363 About Us Pyramid Cyber Security & Forensic (P) Limited is an ISO 9001-2008 and ISO 27001-2005 certified boutique Digital

More information

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS Jefferson Wells has prepared this report for Corporate Creations.

More information