SIMSON Security Incident Management System
|
|
|
- Jeffry Carr
- 9 years ago
- Views:
Transcription
1 It s a dangerous business going out your front door. J.R.R. Tolkien ( ) SIMSON Security Incident Management System Purpose: Method: Participants: Location: Language: A web based platform to record, manage, analyse and share security incidents & information internally and among other NGOs. Web based platform to be used inside your organisation with the possibility to share with other organisations. NGOs Worldwide English Costs: Account per month: 25,- (excl. 21% VAT). Want to join? For more information about Simson, please contact Ebe Brons: , [email protected]) Benefits: Easy & time saving; fill in the incident reporting form and the right persons will automatically be informed. Creates a database and institutional memory; even with high staff turnover, you will know what happened even if this was years ago. Monitoring your organisational security; Simson enables you to store and share your security documents and monitor globally if your security documents are updated on time. Stay informed; Simson allows you to see what happens almost in real-time. This gives you more grip on security in a rapidly changing environment. Automated alerts keep you updated of recent security incidents. Sharing; You can connect with other Simson users and start sharing information, this gives you more information to analyse and enables better decision-making.
2 Easy & time saving Simson saves you time. It is quick and easy. Just fill in the reporting form and let Simson take care of the rest. You can use the saved time to manage the incident. Database & institutional memory By collecting your incidents electronically, an institutional memory is created. This limits the knowledge drain that rises from (possible) staff turnover. A new security focal point can easily check the database to know what happened in the past. Monitoring your organisational security Simson enables you to carry out basic analysis of security incidents and trends. Using the filters to examine different incident categories, contacts, timeframe and the locations of incidents on the map. You can also use Simson to monitor if your security documents (crisis plans, security protocols etc.) are regularly updated. The system keeps track of outdated documents via alerts. 2
3 Stay informed Sharing incidents internally and between other NGOs increases your knowledge. This increased knowledge makes effective security management possible within all the participating NGOs. By adding this knowledge to the understanding of the local context, the quality of security decisions will improve. alerts keep you informed of recent incidents. You can use Simson to filter the alerts. That way you only receive the alerts you want to receive. Do I have to share everything? You control your own information. There are three levels of sharing: Do not share; the information is only visible in your account. Basic sharing; the information you share with other NGOs consists only of basic information and no details. Full sharing; the whole incident form including details is shared. How can I use Simson as an internal system? Simson enables you to share security information within your organisation. HQ, field offices and local NGO partners can be involved. Every office receives an account. With this account the office can report their security incidents and other security information. The accounts can connect to each other and start sharing their information automatically. The offices can also share security documents. These documents have to be updated after a certain period of time. Simson keeps track of this deadline and alerts you when the document is outdated. The Simson incident reporting system is a great way to share incident information with my NGO colleagues. It s easy to use and the map feature is a great way to visualize the data. It s also helpful to view the incidents that my NGO colleagues have reported. Michael O'Neill Director Global Safety & Security, Save the Children International 3
4 What are the principles of Simson? Trust and security Trust between Simson users is the basis to share sensitive information. Internet security is based on secure server databases and (https) data encryption to safety wire the information over the internet. HQ Security SIMSON Security Manager NGO B Incident form is filled in by the security manager. Simson informs other security managers and staff using the website and . Reciprocity Simson makes sure people share information and not only use the system to get information. You can only receive information from another user if you also share your information with this user. Security Manager NGO A Security Manager NGO B The Security Manager of NGO A shares his/her incidents with NGO B. The sharing works two ways, never one way. 4
5 Control You can choose to share your security incidents with a contact in two ways, full and basic. Basic information is the minimal amount of information a contact needs in order to use it. Full contacts get access to all the details of the incident report. You choose with what level of information you would like to share. HQ Security Field NGO shares full incidents with this contact and vice versa. Incident form is filled in by. Manager NGO B Field NGO shares basic incidents with this contact and vice versa. Let see some how to movies about Simson How to report an incident How to use the filters Want to join Simson? You can join Simson by contacting Ebe Brons ([email protected], phone: ). He will inform you about the possibilities. About Centre for Safety and Development CSD is a non-profit foundation specialised in safety and security for humanitarian organisations worldwide. We believe that sharing security knowledge and skills enables other humanitarian organisations to work in unsafe areas in order to reduce human suffering and bring about a better world. Read more about CSD on: 5
Duty of Care - are your employees safe?
Duty of Care - are your employees safe? Are your employees safe when working? Do you have lone workers or employees working remotely? Are you monitoring employee welfare? Have you had an increase in employee
Success Factors in APM Adoption
Auto Club Group Success Factors in APM Adoption By: Larry Dragich Director, Enterprise Application Services February 2013 Vision Enterprise Systems Management: Provide proactive system monitoring, maximizing
International HR Conference 2009 Talent Management
Integrated Talent Management Sydney R Robertson Slide 1 Integrated Talent Management People In Aid Conference London 6 February 2009 Sydney R. Robertson Executive Vice President ORC Worldwide Slide 2 Agenda
IFDD and Middle East Department s Position within the IRW Structure. The International Fundraising Development Division (IFDD) Structure
Islamic Relief Worldwide Public Relation Officer BASE LOCATION: REPORTING TO: Birmingham, International Office Middle East Department Manager LINE MANAGEMENT RESPONSIBILITIES: None DEPARTMENT PURPOSE:
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK
CLOUD MANAGED SERVICES FRAMEWORK E-BOOK TABLE OF CONTENTS 1 Introduction 2 2 Operational Insight 3 3 Cloud Management Process Control 4 4 Infrastructure, Application & Data Security 5 5 Continuous Improvement
Targeted Marketing Effectiveness with the Sage 200 Suite
Targeted Marketing Effectiveness with the Sage 200 Suite Gaining a deeper understanding of your customers and their buying behaviour is critical in today s competitive marketplace. The Sage 200 Suite provides
VACANCY ANNOUNCEMENT Website and Database Associate Based at East Jerusalem, OCHA opt
U N I T E D N A T I O N S N A T I O N S U N I E S United Nations Office for the Coordination of Humanitarian Affairs (OCHA) VACANCY ANNOUNCEMENT Website and Database Associate Based at East Jerusalem,
Security Policy for ActionAid International Approved version
Security Policy for ActionAid International Approved version Introduction This document sets out the overall principles for managing security within ActionAid International (AAI), as set by the Board.
Keep managers better informed on their areas of responsibility and highlight the issues that require their attention with dashboards!
Meet Your Targets! Effective Performance Management certainly requires more than just the technology to support it. Expertise in KPI development, target setting, framework modeling, dashboard development
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE [email protected] Adding an information-centric view Infrastructure Information
HIGHLY SOPHISTICATED MONITORING
PERFECTLY PROTECTED HIGHLY SOPHISTICATED MONITORING Yachts are masterpieces of design and technology with thousands of functions providing the highest level of comfort. Besecke s automation and circuitry
Typical System Architecture YOU CAN T MANAGE WHAT YOU CAN T MEASURE
HEALTHCARE Typical System Architecture Why RFID.. Bar Code Requires Line of - Site Requires correct orientation Easily obscured by dirt Easily scratched or damaged Contents cannot be modified Can only
Why Should You Use Sahana Eden?
Open Source Disaster Management Software Platform Why Should You Use Sahana Eden? Sahana Eden is an open source software platform which has been built specifically to help in Disaster Management. It is
THE IMPORTANCE OF FINANCIAL MANAGEMENT FOR ECOMMERCE. www.sage.co.uk
THE IMPORTANCE OF FINANCIAL MANAGEMENT FOR ECOMMERCE www.sage.co.uk Improve your cash flow with Sage X3 Introduction The ecommerce market is still growing with the B2B commerce market predicted to be twice
ITIL A guide to event management
ITIL A guide to event management Event management process information Why have event management? An event can be defined as any detectable or discernable occurrence that has significance for the management
Managing Attendance with Points Reduce Absenteeism, Control Labor Costs and Improve Workforce Management
Managing Attendance with Points Reduce Absenteeism, Control Labor Costs and Improve Workforce Management Executive Summary Organizations that face employee absenteeism and attendance issues can find their
10 steps to the Cloud for SMBs Introduction to Cloud computing. www.fasthosts.co.uk. Ask the Experts. Making Business Work Better Online
10 steps to the Cloud for SMBs Introduction to Cloud computing This paper is designed to explain, in plain English, the real reasons behind how your business can benefit from Cloud computing, and help
Case Management. itouch Vision. This document gives an overview of Case management and discusses the different features and functionality.
itouch Vision Case Management This document gives an overview of Case management and discusses the different features and functionality. For further information about implementation and pricing please
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
Canada ACN Home Security
Canada ACN Home Security Vivint 12.15.15 2 Security Statistics 1 home in 5 will suffer a burglary or fire incident in the next 6 years 1 home in 3 will have a medical emergency this year A burglary occurs
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
Top Five Ways Any Business Can Benefit from Box
Top Five Ways Any Business Can Benefit from Box Every business, no matter what size, has documents and information that are the foundation of the company. Team members need to access and collaborate on
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
CenterMind G+ Smart and Proactive Environment Monitoring
CenterMind G+ Smart and Proactive Environment Monitoring Smart and Proactive Environment Monitoring real-time visibility into the state of your computer room or data center environment, 24/7 RiT CenterMind
CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS
CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS Expected Outcomes Able to analyse a computer network requirements Able to analyse business goals and constraint Able to understand and apply the Top-Down
CRM for Business Intelligence
CRM for Business Intelligence Real-time visibility into your business Strategise effectively and make informed business decisions with timely, accurate insight into your organisation. Maximizer CRM 2015
1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS
1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS $32.8B 100,000 Cyber Criminals State-Sponsored Spies Hactivists We live in a POST-PREVENTION Amount enterprises are
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
What s New in Help Desk Authority 8.2?
in Help Desk Authority 8.2? Help Desk Authority is an industry leading help desk software solution for managing incidents and shortening the lifecycle of help desk issues. This easy-to-install solution
E-Guide. Sponsored By:
Security and WAN optimization: Getting the best of both worlds E-Guide As the number of people working outside primary office locations increases, the challenges surrounding security and optimization are
Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup
Improving Business for SMEs with Online Backup www.cloudsecure.co.uk/cloudsecure 1 Accountants and Solicitors Firms Professional organisations such as accountancy and solicitors firms have an ever increasing
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Security Management Training Course Notes
Security Management Training Course Notes SECURITY MANAGEMENT Security Management Framework Context Analysis Who are we? Mission Values People Political stance Where are we? Historical background Political
BS 7 SIS Safety Information System Green Light for Your Production
BS 7 SIS Safety Information System Green Light for Your Production SIS - GreCon Safety Information System The Challenge The Solution In big industrial plants, such as wood based panel productions, there
Can you afford another day without Managed File Transfer (MFT)?
IPSWITCH FILE TRANSFER WHITE PAPER Can you afford another day without Managed File Transfer (MFT)? www.ipswitchft.com Introduction It s easy to understand why many organizations are confused about the
How IT Can Help Companies Make Better, Faster Decisions
How IT Can Help Companies Make Better, Faster Decisions How It Can Help Companies Make Better Faster Decisions Of the many different groups that make up a business organization sales, finance, human resources
NVIRON SUPPORT SERVICES OVERVIEW
NVIRON SUPPORT SERVICES OVERVIEW NVIRON SUPPORT SERVICES OVERVIEW SERVICES TO MEET EVERY REQUIREMENT Nviron support services are designed to minimise the cost of running your IT infrastructure and help
ZATAR ENTERPRISE CLOUD PRINT Zatar Enterprise Cloud Print is a service that connects your Zebra printer to the web.
1 ZATAR ENTERPRISE CLOUD PRINT Zatar Enterprise Cloud Print is a service that connects your Zebra printer to the web. 4 CLOUD PRINTING APPLICATION Zatar is an Internet of Things platform that enables machine
ITIL A guide to Event Management
ITIL A guide to Event Management An event can be defined as any detectable or discernable occurrence that has significance for the management of the IT Infrastructure of the delivery of IT service and
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
SPOK HEALTHCARE CONSOLE. Improving the Way Your Hospital Contact Centre Manages Critical Communications
SM SPOK HEALTHCARE CONSOLE Improving the Way Your Hospital Contact Centre Manages Critical Communications YOUR CRUCIAL ROLE IN PATIENT CARE If nurses need to contact clinicians about their patients conditions,
VACANCY ANNOUNCEMENT # 2014-007 Website Assistant (National Position)
United Nations Office for the Coordination of Humanitarian Affairs (OCHA) VACANCY ANNOUNCEMENT # 2014-007 Website Assistant (National Position) Contract: SC Contract, SB3/Peg3 Duty Station: Jerusalem Duration:
How To Recruit On Jobsinrootics.Com
MEDIA KIT 2016 Maximize Your Recruitment Efforts Today Leo Baryudin 1-508-663-1500 x235 [email protected] JobsInRobotics.com ABOUT US JobsInRobotics.com is the premier site for employers seeking top-rated
BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE
BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE 1 1EDI Source: BEYOND THE INITIAL CONNECTION WHAT THE CHANGING B2B EXCHANGE ENVIRONMENT MEANS TO YOU. For anyone in charge of automating
Identifying people with learning disabilities
Identifying people with learning disabilities Risk of Admission Patient Alerts (RAPA) - How this flagging/alert system works for people with a LD at Derriford Hospital, Plymouth Saoirse Read LD Liaison
Managing a Critical Outsourcing Partnership
Partnersmith A Partnersmith Case Study The Challenge: Managing and maintaining a collaborative relationship to realize the full value of a complex outsourcing arrangement The Solution: Partnersmith Outsourcing
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
HEALTH INFORMATION MANAGEMENT
Module 5 HEALTH INFORMATION MANAGEMENT INTER-REGIONAL TRAINING COURSE ON PUBLIC HEALTH AND EMERGENCY MANAGEMENT IN ASIA AND THE PACIFIC PHEMAP 08 Learning Objectives By the end of this session, the participant
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance
Compliance and Unified Communication
Compliance and Unified Communication January 2015 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how
How To Read Memory Chips From A Cell Phone Or Memory Chip
Recovering data from mobile phones An easy, cost-effective service based on the NFI Memory Toolkit by the Netherlands Forensic Institute Mobile phones a rich source of valuable information Mobile phones
reflected and translated into policy orientations and priorities as well strategy documents and a management plan.
ECHO s main mission is to fund the co-ordinated delivery of Community humanitarian assistance and protection through partner humanitarian organisations in order to save and preserve life, reduce or prevent
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Voice and data recording Red Box makes it easier than you imagine
Voice and data recording Red Box makes it easier than you imagine SIMPLER SMARTER VOICE If you re reading this, there s a good chance your organization has to record phone calls, radio conversations or
Track accurately. Deliver with precision.
Shipping & Mailing Management & Tracking SendSuite TM Tracking Internal tracking and delivery management system Track accurately. Deliver with precision. Accurately track anything you can barcode, or has
Dynacom presents its Office Furniture Sales Management Solution
Dynacom presents its Office Furniture Sales Management Solution Dynacom understands that office furniture dealers have unique management challenges When it comes to helping office furniture dealers to
SuperNav for Heavy Equipment
SuperNav for Heavy Equipment Supervised Navigation System for Heavy Equipment Supervised Navigation (SuperNav) is an option for Raveon Technology s RavTrack GPS tracking system. RavTrack SuperNav is a
USE. Toyota: How to navigate the recall storm with social media monitoring. www.talkwalker.com
USE Toyota: How to navigate the recall storm with social media monitoring www.talkwalker.com Suddenly, Toyota was trending on Google and Twitter on a daily basis, but for all the wrong reasons... In April
Secunia Vulnerability Intelligence Manager (VIM) 4.0
Secunia Vulnerability Intelligence Manager (VIM) 4.0 In depth Real-time vulnerability intelligence brought to you on time, every time, by Secunia s renowned research team Introduction Secunia is the world-leading
Zoho Projects. Social collaborative project management platform
Zoho Projects is a feature- rich and easy- to- use cloud- based collaborative project management platform for small to medium- sized businesses as well as teams and departments in larger companies. Its
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Group Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
Streamlining HR to Improve the Bottom Line. An Executive Guide to ROI
Streamlining HR to Improve the Bottom Line An Executive Guide to ROI Managing talent effectively is a priority for business leaders so is doing it faster, better, more efficiently and more affordably.
DELTA Dashboards Visualise, Analyse and Monitor kdb+ Datasets with Delta Dashboards
Delta Dashboards is a powerful, real-time presentation layer for the market-leading kdb+ database technology. They provide rich visualisation of both real-time streaming data and highly optimised polled
How To Use Intacct
Intacct Financial Management and Accounting System Intacct is the award winning cloud financial management and accounting system specifically designed to help small and midsized enterprises improve company
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY
UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify
For more information on vacancy sites see our Resource Sheets on Volunteering and Career Development Opportunities.
Updated May 2007 Resource Sheet Recruitment for International Staff This resource sheet highlights a selection of the wide range of useful places to advertise international vacancies for those responsible
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Taking the first step to agile digital services
Taking the first step to agile digital services Digital Delivered. Now for Tomorrow. 0207 602 6000 [email protected] @CACI_Cloud 2 1. Background & Summary The Government s Digital by Default agenda has
MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING
MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE Chris C. Gaskins Vice President of Product Development RF Code, Inc. AUGUST 2010 Shawn Griggs Director of Product Management
Don t let your SIeM become your Nightmare!
Don t let your SIeM become your Nightmare! Herwig Köck, Thomas Bleier What is SIEM? Combining Security Components Intrusion Detection Endpoint Security Service Logs Asset Management Packets Protocols IP-Adresses
Annex 1: Assesing risk: threats, vulnerabilities and capacities
Annex 1: Assesing risk: threats, vulnerabilities and capacities There is no widely accepted definition of risk, but we can say that risk refers to possible events, however uncertain, that result in harm.
Agio Remote Monitoring and Management
Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays
QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance
Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance Bikram Bakshi President & CEO 1 Objectives The problem Key causes for data breaches Comparing these causes with CMS findings on
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
-Vacancy - Head of Communications (m/f) Fulltime & based in Berlin
-Vacancy - Head of Communications (m/f) Fulltime & based in Berlin I. MSF Germany: Médecins Sans Frontières Ärzte ohne Grenzen e.v. (MSF Germany) is the German section of the international medical humanitarian
Candidate Brief. Database Marketing Officer
Candidate Brief Database Marketing Officer September 2015 Dear Candidate, I am delighted you are interested in the role of Database Marketing Officer at CARE International UK (CIUK). I joined CARE just
