SCAN. Associates Berhad.
|
|
|
- Amice Patrick
- 10 years ago
- Views:
Transcription
1 Associates Berhad.
2 Talking points 1. Genesis 2. Products & services 3. Support 4. Strengthsth 5. Lessons 2
3 Genesis 1. Originated from University s R&D group on Infosec Government funded d 3. Very niche network security & applications of cryptography 3
4 .../Chronology 4. Only half the students passed 5. Found out they were very active hackers members of world underground 6. Worked mostly at night 4
5 /Chronology was booming IT time 8. Many organizations had very poor security 9. Many servers were defaced 5
6 /Chronology 10. Did everything FOC, useful learning process 11. The favorite reference on restoring servers and guarding networks time to get dispersed d OR stick together 6
7 /Chronology 13. Handicapped on corporate issues 14.Seemed very popular in public sector rhad. N Associates Ber 7
8 /Chronology 13. Incorporated in International Listed 2006 market capitalization ~200Million (Ringgit) 8
9 Products and services 1. Craft client needs, heavy customization 2. Initially i very much a Security boutique 3. Diversified although remaining niche in the area 9
10 Certification Focus on Quality and Capabilities Development to remain a world class company MSC Status Company ISO/IEC Certified ISO 9001 Certified CMMI Level 3, Software Engineering Institute, Carnegie-Mellon USA Awarded various recognitions 1 Track Records and Credentials 5
11 Associates Berhad.
12 Support & partners 1. Government 2. Financial 3. International partners a) Individualsid b) organizations 4. Universities/Research institutes 12
13 Strength & branding 1. Vendor independent 2. Emphasizes indigenousness (initially) i i 3. Professional certifications & continuous learning. 4. Continuous R&D 13
14 /Strength g & branding 5. Take pride in our specialty 6. Emphasizes TRUST 7. Recognized internationally rhad. N Associates Ber 14
15 Professional Certification No Professional Certification No GIAC Certified Incident Handler (SANS) 2 Redhat Certified Engineer (Redhat) 6 GIAC Security Essentials Certification (SANS) 1 Certified Ethical Hacker CEH (EC Council) 10 SAN SEC508 SECURITY 508 : System 2 Open Source Wireless Professional OSWiP 1 Forensics, Investigation & Response (SANS) (ThinkSecure) BS7799 2:2002 Lead Auditor (BSI) 2 Sensecurity Institute Security Practioner SISP (Sensecurity Institute) 3 BS7799 2:2002 Lead Implementor (BSI) 4 Microsoft Certified System Engineer MCSE 1 ISMS Provisioned Auditor (IRCA) 2 Microsoft Certified Professional MCP 1 ISTQB Certified Tester 1 Microsoft Certified System Administrator MCSA 1 QMS Lead Auditor 3 Business Continuity Planner 3 CISSP (ISC2) 14 PRINCE 2 Certified Practitioner 1 CISA (ISACA) 2 ITIL Certified Practitioner 2 CISM (ISACA) 3 Project Management Professional (PMI) 2 Opensource Professional SecurtyTester 1 Payment Card Industry Qualified Security 2 (ISECOM) Assessor (PCI QSA)
16 Associates Berhad.
17 Associates Berhad.
18 Associates Berhad.
19 Major Track Records MALAYSIA Bank Negara Malaysia Developed epki solution for Bank Negara Malaysia and ALL the banks in Malaysia epki used to secure ALL Electronic Funds Transactions (RENTAS) and Cheque Clearing System Protecting billions of ringgit i per day! SCAN Security Operations Centre (SOC) EPF, Great Eastern, UiTM, CGC (Selected List) Currently, developing Internal SOC for Celcom Security Consultancy Most of the Government Agencies, Banks and major Telco s Most of the technical staff vetted under Tapisan Halus or Kasar for sensitive government projects 1 Track Records and Credentials 10
20 Major Track Records MALAYSIA PRISMA (Pemantauan Rangkaian ICT Sector Awam Malysia) Developed and operates Malaysia Government Security Operation Centre (SOC) named PRISMA with MAMPU since X 7 X 365 Operations 50 Dedicated staff operates the center until now 177 Agencies under PRISMA Monitoring 4.5 Billions Events processed since 2004 Developed the solution using Open Source and COTS product. 7 1 Track Records and Credentials
21 Major Track Records INDONESIA Operates 3 SOCs in Indonesia Major Banks (CIMB Niaga, Danamon) Internal SOC Indosat Mandiri Bank ID SIRTII (Indonesia Security Incident Response Team on Internet Infrastructure) Developed Internet Security Monitoring Centre and Forensic Labs Major Government Agencies POLRI, BNPB Major Telcos 1 Track Records and Credentials 11
22 Major Track Records Middle East Saudi Arabia SCAN MEA. JVCO (49%) Operates 1 SOC for major bank Communications and IT Commission (CITC) Developed National Computer Emergency Response Team for Saudi Arabia Forensic Labs Security Consultancy Saudi Arabia (Jeddah and Riyadh) UAE (Dubai and Abu Dhabi) Sudan, Syria Qatar (Al Jazeera)
23 Development of Standards and Guidelines Government of Malaysia Malaysian Public Sector Management of Information & Communications Technology Security Handbook (MyMIS) Malaysian Public Sector ICT Risk Assessment Methodology (MyRAM) ICT Security Handbook for Saudi Arabia International Standard Organisation (ISO) ISO/IEC JTC 1/SC27 WG1 Working members for ISO/IEC NP Information Technology Deployment and operation of Intrusion Detection System Working members for ISO/IEC NP Guidelines for Information and communication technology disaster recovery services
24 Speaker and trainer for various conference Speaker of Blackhat Security Conference Asia (Singapore) Speaker of RuxCon Security Conference 2004 (Australia) Speaker of XCon Security Conference 2004 (Beijing, China) Speaker of HITB Security Conference 2004 (Malaysia) Speaker of SyScAN 2004 (Singapore) Microsoft Security Conference 2005 (Malaysia) Bellua Cyber Security Asia 2005 E-Secure Conference 2005 (Malaysia) Committee for SyScan 06 CFP Committee for VNSec 07 CFP Trainer at Blackhat Europe and USA Trainer at Hack in the Box Malaysia
25 Awards and Recognition Distinguished Senior IT Security Professional Award for Asia- Pacific from ISC2 USA Frost and Sullivan: Managed Security Service Provider for 2006 and 2007 Cyber Security Malaysia: 2009 Information Security Service Provider of the Year Prof Dato Dr Norbik Innovative Entrepreneur of the Year from Malaysian Malay Chamber of Commerce Ernst & Young final nominees ICT Enterpreneur Track Records and Credentials 6
26 Clients Associates Berhad.
27 Current position 1. HQ in Malaysia, ~200 staff, ~65 certified professionals 2. Offices/partnerships in: a) ASEAN b) Middle east c) Korea 27
28 Lessons 1. Technopreneurs and start ups lack corporate knowledge 2. Innovation is critical ii in all business components. 3. Must learn fast and emulate. 4. Quality is critical 5. Continuous improvement is survival 28
29 THANK YOU 29 Associates Berhad.
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
Field of Study Area of Expertise Certification Vendor Course
Field of Study Area of Expertise Certification Vendor Course Advanced Security Certified Information Systems Security Professional (CISSP) ISC2 CISSP Advanced Security CompTIA Advanced Security Practitioner
ASCENDSYS SDN BHD. Company Profile
ASCENDSYS SDN BHD Company Profile Ascendsys Sdn Bhd Company Information Ascendsys Company Profile Ascendsys is information technology services organization that provides niche information technology solutions,
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages
Course and Service Portfolio Specialized IT courses for IT professional and organizations willing to take benefit from the competitive advantages provided by international certifications Cyber & IT Governance
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com
Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)
MANAGEMENT DEVELOPMENT COURSES
(FULL VIEW) MANAGEMENT DEVELOPMENT COURSES MANAGEMENT DEVELOPMENT COURSES LEADERSHIP DEVELOPMENT Developing Leadership Competencies 4 4 days 230,000 1-4 13-16 26-29 6-9 Critical Thinking: Tools for Problem
ISO/IEC 20000: 2011 IT Service Management. Tying together all your IT processes Product Guide
ISO/IEC 20000: 2011 IT Service Management Tying together all your IT processes Product Guide What is ISO/IEC 20000 IT Service Management? ISO/IEC 20000 is the first internationally recognized standard
Information Security Certifications
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Information Security Certifications Persons / Organizations ENISA
BMS Consulting Cyber Security and IT Technology Team
BMS Consulting Cyber Security and IT Technology Team Cyber Security and IT Technology Team Who we are High professional team from Ukraine which specializes on InfoSec and complex IT projects around the
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
Security Consulting. Services Overview
Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in
Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES
G Cloud IV Framework Lot 4 DIGITAL FORENSICS AND CYBER INCIDENT RESPONSE SERVICES Service Description - ANSEC IA Limited CONTENTS 1 Company Profile. 2 The ANSEC Effect 3 Qualifications 4 Service Description..
Corporate Presentation
Corporate Presentation XcellHost Cloud Services India Dubai Singapore Experience High Touch Support Reliable Secure Speed Scalable Manageable Value XcellHost About Us Founded in 1999. Global Reach Personal
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
Global Knowledge Cybersecurity Training
Cybersecurity Training Your Solution for a Skilled Cyber Workforce Whether it s general cybersecurity awareness, secure network design and implementation, continuous monitoring, network forensics and analysis,
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor
IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there
Project Management Managing successful PCI DSS project
Project Management Managing successful PCI DSS project INTRODUCTION PCI-DSS is Payment Card Industry Data Security Standard, one of the fastest growing compliance currently affecting banks, payment service
Technology Approved Certifications
Date Approved Designation Certificate Name Points Microsoft Systems Engineering 04/16/2002 MCSE Microsoft Certified Systems Engineer 280 06/14/2007 MCSE: WIN 2003 Microsoft Certified Systems Engineer:
Executive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
Career Analysis into Cyber Security: New & Evolving Occupations
Alderbridge Specialists in Info Security Specialist Recruitment Knowledge for e-skills UK s Cyber Security Learning Pathways Programme Career Analysis into Cyber Security: New & Evolving Occupations e-skills
Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE
2016 Boost elearning IT Training INSTRUCTIONAL DESIGN, LEARNING PATHS, AND COURSE CATALOGUE Instructional Design Boost elearning Interactive IT Training Boost elearning's Interactive IT Training provides
Paul Vlissidis Group Technical Director NCC Group plc [email protected]
Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc [email protected] Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud
SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards
SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards Dr. A.April ETS University Table of Contents Objectives Audience Current clash An ITIL overview ISO
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
InfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Presented by Frederick J. Santarsiere
http://cinoltd.com/ Presented by Frederick J. Santarsiere CHFI, CISSP, CISM, CISA, CEH, CEI, CAP, SSCP Sec+, Net+, A+, MCSA, MCSE, MCITP, MCT CCENT, CCNA, CCNA Wireless, CCNA Voice CISCO SMBEN, SMBAM,
Digi Device Cloud: Security You Can Trust
Digi Device Cloud: Security You Can Trust Abstract Historically, security has oftentimes been an afterthought or a bolt-on to any engineering product. In today s markets, however, security is taking a
Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations
Date: 27/05/2013 Guideline to Determine Information Security Professionals Requirements for the CNII Agencies / Organisations 1 Contact Information For further clarification, please contact CyberSecurity
Christopher Findlay University of Adelaide. Hussain G. Rammal University of South Australia
Australia-EU trade in Services: the case of Australian architecture firms Christopher Findlay University of Adelaide Hussain G. Rammal University of South Australia The study is funded as part of the research
The International School Consultancy
The International School Consultancy Independent, unrivalled market intelligence on the world s international schools p2 The International School Consultancy ISC is the leading provider of data and market
of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744
6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal
Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system.
Need a system to deliver consistent, efficient and reliable IT services? Use an ISO/IEC 20000 compliant management system. ISO/IEC 20000 your first choice for IT service management. BSI is the business
The following chart indicates the Career Academy courses eligible for transfer credit by challenge exam.
American Business & Technology University currently provides for transfer credit from Career Academy courses completed within the last three years by challenge exam. A student may not transfer more than
Database Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
ANNEX TABLES Table 1. Revenue by ICT Type Revenue * Share to Total Revenues Growth Rate ICT Type 2004 2005 2004 2005 (in percent)
ANNEX TABLES Table 1. Revenue by Revenue * Share to Revenues 2004 2005 2004 2005 Contact Centers 32,904.1 54,295.1 44.4 49.4 65.0 Medical Transcription 236.7 466.2 0.3 0.4 97.0 Animation 694.2 939.1 0.9
ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013
ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will
ISO 27001:2005 & ISO 9001:2008
ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the
Don t let your SIeM become your Nightmare!
Don t let your SIeM become your Nightmare! Herwig Köck, Thomas Bleier What is SIEM? Combining Security Components Intrusion Detection Endpoint Security Service Logs Asset Management Packets Protocols IP-Adresses
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course
Achieving Governance, Risk and Compliance Requirements with HISP Certification Course in corporation with A unique information security and regulatory compliance certification course that provides IT security
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs)
CompTIA CASP Pre-approved Training for CompTIA CASP Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
HP Cyber Security Control Cyber Insight & Defence
HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
JOINT EVENT WITH IIBA-LA. Trends & Best Practices in. Cybersecurity for networks, cloud computing and mobile
JOINT EVENT WITH IIBA-LA Trends & Best Practices in Cybersecurity for networks, cloud computing and mobile April 23 rd, 2015 Hands-on Experts Share Current Strategies to Manage Cybersecurity Today s enterprise
Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...
July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae
Security Testing. Claire L. Lohr, CSQE, CSDP, CTAL [email protected]. F. Scot Anderson, CISSP [email protected]. April 7, 2009 V 1.
Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL [email protected] F. Scot Anderson, CISSP [email protected] 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING. forebrook
INFORMATION SECURITY & GOVERNANCE SYSTEMS AND IT INFRASTRUCTURE INFOSEC & TECHNOLOGY TRAINING forebrook Forebrook offers a range of information security, governance, IT systems and infrastructure related
How White Hat Hackers Operate. Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschland Unternehmensberatung GmbH
How White Hat Hackers Operate Andreas Falkenberg, Senior Security Consultant, SEC Consult Deutschl Unternehmensberatung GmbH About me Andreas Falkenberg, M.Sc. [email protected] Security Consultant
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Training Catalogue. Ace Service Training Catalogue Ver 7.0. Ace Services
Catalogue 1 Ace Services TRAINING CATALOGUE Contents Introduction... 3 areas... 3 About the Trainer... 4 Integrated Risk Management... 5 Information Risk Management... 6 Business Continuity Management...
foresightconsulting.com.au
Mr. James Kavanagh National Security Officer Microsoft Australia Level 4, 6 National Circuit, Barton, ACT 2600 02 March 2015 Microsoft Office 365 IRAP Assessment Letter of Compliance Dear Mr. Kavanagh,
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
Curriculum Vitae. Personal information. VASILEIADIS Nikolaos. Work experience. Surname / First name
Curriculum Vitae Personal information Surname / First name Addresses VASILEIADIS Nikolaos Home: Koumoundourou 32, 15341,, Greece Work: Yakinthou 3C, 15343,, Greece Telephones Home: +30 210 6084531 Work:
CURRICULUM VITAE. Kodzo Gadzekpo ADOMEY
CURRICULUM VITAE Kodzo Gadzekpo ADOMEY University of Ghana Computing Systems University of Ghana, Legon +233-203574626 +233-243574626 [email protected] [email protected] OBJECTIVE To secure the post
Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP
Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant
Flexible Cloud Services to Compete
white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of
PAS 99 Integrated Management. Make your management systems work in harmony Product Guide
PAS 99 Integrated Management. Make your management systems work in harmony Product Guide What is PAS 99? PAS 99 is a Publicly Available Specifi cation of common for management systems, which can be used
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
Tom VAN DEN EYNDE CISSP, CISA, CISM
Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: [email protected] Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May
ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR
Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
Public Training Calendar
06 PHILLIPS LEARNING ACADEMY Public Training Calendar Our Programme Categories at a Glance MANAGEMENT DEVELOPMENT Course Title LEADERSHIP DEVELOPMENT Developing Leadership Competencies Critical Thinking:
How To Protect Your It Infrastructure
Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
DoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: January 2014 National Account Manager 678-714-5712 Director 703-968-0103 What is DoDD 8570? Department of Defense Directive 8570 provides guidance
IRAP Policy and Procedures up to date as of 16 September 2014.
Australian Signals Directorate Cyber and Information Security Division Information Security Registered Assessors Program Policy and Procedures 09/2014 IRAP Policy and Procedures 09/2014 1 IRAP Policy and
To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia
Executive Bachelor of Business (General Management) To Be A Leader and A Premier Educational Hub in the Promotion of Afforable and Quality E-Learning in Asia THE 1 UNIVERSITY 1 st ASIAN 31 COUNTRIES MULTINATIONAL
