Tom VAN DEN EYNDE CISSP, CISA, CISM



Similar documents
CYBERSECURITY: ISSUES AND ISACA S RESPONSE

KEY TRENDS AND DRIVERS OF SECURITY

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

State of South Carolina InfoSec and Privacy Career Path Model

Information Security Principles and Practices

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Information Security Specialist Training on the Basis of ISO/IEC 27002

locuz.com Professional Services Security Audit Services

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

NETWORK PENETRATION TESTING

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Security Transcends Technology

Certification and Training

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Network Segmentation

Curriculum Vitae. Name : Eerdekens. Steven. First name : Leuven, 26 th of April Place and date of birth : Marital status :

IT Security. Securing Your Business Investments

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

PCI DSS READINESS AND RESPONSE

Network Consulting Engineer

Motorola Enterprise Mobility Services. Maximize the value of your mobility solutions

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

Domain 1 The Process of Auditing Information Systems

About PROXC Consulting. PROXC Services Domains

Symantec Consulting Services

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

BMS Consulting Cyber Security and IT Technology Team

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

How To Make Money On Security For A Large Organization

McAfee Security Architectures for the Public Sector

Forensic Certifications

The Information Security Specialists

InfoSec Academy Application & Secure Code Track

EMC CONSULTING SECURITY STANDARDS AND COMPLIANCE SERVICES

Information & Asset Protection with SIEM and DLP

Designing & Building an Information Security Program. To protect our critical assets

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

The Evolution of Application Monitoring

Certified Information Security Manager (CISM)

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

I.T. Security Specialists. Cyber Security Solutions and Services. Caretower Corporate Brochure

Penetration testing & Ethical Hacking. Security Week 2014

Building a Security Operations Center (SOC)

Procuring Penetration Testing Services

Penetration Testing. Request for Proposal

The Next Generation of Security Leaders

InfoSec Academy Pen Testing & Hacking Track

Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

INFORMATION TECHNOLOGY ENGINEER V

Appendix A-2 Generic Job Titles for respective categories

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Put into test the security of an environment and qualify its resistance to a certain level of attack.

The Protection Mission a constant endeavor

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

HP Security Solutions for Microsoft

Security Information & Event Management (SIEM)

Project, Program & Portfolio Management Help Leading Firms Deliver Value

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Alcatel-Lucent Services

VMware vcloud Air Security TECHNICAL WHITE PAPER

Enterprise Cybersecurity: Building an Effective Defense

Payment Card Industry Data Security Standard

The National Skills Academy for IT. Cyber Security

Terms of Reference for an IT Audit of

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

MANAGED SECURITY SERVICES

How To Become A Security Professional

Security Consulting. Services Overview

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

Response to Questions CML Managed Information Security

INFORMATION SECURITY STRATEGIC PLAN

An enterprise grade information security & forensic technical team

Table of Contents EXECUTIVE SUMMARY ACKNOWLEDGEMENT AND DISCLAIMERS ENGAGEMENT SCOPE AND OBJECTIVES EXECUTIVE SUMMARY OF ASSESSMENT RESULTS

Transcription:

Tom VAN DEN EYNDE CISSP, CISA, CISM Personal information First Name Tom Last Name Van den Eynde E-mail: tom@vandeneynde.net Phone: +32 - (0)495 91 20 62 Address: Meerminnenstraat 34, 2800 Birthday: May 26 th 1980, Duffel, Belgium Nationality: Belgian Summary Tom VAN DEN EYNDE is currently Client Security Principal at HP. Before joining HP, Tom was Associate Partner Security at IBM and before that, Tom was leading the global Threat Management security consulting practice within the Global Consulting & Integration Services department at Verizon Enterprise Solutions. The practice is providing IT security solutions and giving trusted security advice to Verizon's customers Prior, he was a Manager in Verizon's Professional Security Services Organization where Tom combined his deep understanding of IT security, operational IT experience and insight into business drivers to give real valueadded security advice to customers and lead a team of consultants responsible for delivering professional security services. Tom joined Verizon in 2009 as a Principal Information Security Consultant. Before joining Verizon Business, Tom worked for C-CURE as Assistant Technical Manager and Senior Security Consultant. In this position, he heavily specialized in information security and IT networking. He was responsible for the security management of a number of customers, designed and implemented security solutions, provided trusted pre-sales advice for C-CURE s customers on all aspects of information security and assisted in improving C-CURE's technical team as a manager and team leader. Tom has experience with a variety of IT security products and technologies, performed security architecture reviews, penetration tests, business requirements analysis and technical solution designs. He has experience as a lead consultant in complex projects, has good knowledge and experience in incident handling and is up-tospeed with general accepted information security best practices. Tom has proven leadership qualities and experience in managing, coaching and developing teams and business on a local and international level. Professional Experience Client Security Principal Hewlett Packard Enterprise Diegem, Belgium June 2015 - Present Vital to the successful growth of the HP ESS business and directly responsible for connecting key functional areas within HP ESS to establish HP s market reputation. Provide an end to end service to HP clients, from shaping their vision, proposing a Security solution, winning the deal and delivering the early phase of that solution around Advise and Transform to Run/Manage. Accountable for end-to-end prospecting, lead generation with Sales and presales, opportunity management to win, and execution. Build long term client and CSO relationships based on referenceable solution delivery which enables a growing portfolio of client business. Acts as key stakeholder in the sales process focused on creating value propositions that enables desired business outcomes for the client that create and build pipeline opportunities. Provide consulting and advisory support for the delivery of services on the account Act as a seasoned practitioner with deep industry knowledge Responsible for a single large account or collection of small to medium accounts Drive transformation expertise, innovation and thought leadership into account, portfolio, delivery and the external market. Professional Profile Tom VAN DEN EYNDE 1 7

Associate Partner in IT security Evere, Belgium IBM June 2014 May 2015 Responsible for end-to-end execution of the IT security consulting domain, from sales, through solution design, to delivery, and organization of the practice. At the core of the role is the leadership, management, and improvements of the practice focused on working with clients needs. Demonstrate strong communication skills, consultative, presence and leadership, and team leadership as well as domain knowledge Leadership (perform and mentor) on consulting engagement pursuits, oversight of consulting engagement delivery, direction to teams of technically focused architects and service management consultants, practice leadership and capability growth, and administrative and operational required activities. Participating in client opportunity identification and qualification, understanding client needs and objectives, work with teams to articulate and formulate solutions design for proposals and statements of work that align to the client needs while managing delivery risk and working with the sales team through deal progression and signing Client-facing, assigned to the development of new opportunities and services proposals Develop and implement new strategies and approaches. Head Threat Management EMEA & Global Security Integration Diegem, Belgium Verizon Enterprise Solutions August 2012 May 2014 Running the Professional Services Threat Management & Security Integration Organization for Verizon Business in Europe, Middle East and Africa. Responsible for global delivery capabilities, consistency and standards for how integration services are delivered reliably and consistently worldwide. Managing a team of 70 first class security professionals comprising Practice Leads, Team Managers, Delivery Managers and Consultants across EMEA and US. Accountable for profit and loss and maximizing utilization, margin and revenue Strategically driving practice direction in line with current industry trends and company strategy Providing thought leadership to the organization and for strategic customers Solution Development, Product Management and Service Line definition Maintain Sales, Customer and Partner relationships Management metrics and reporting Head count planning, growth strategy and hiring/firing responsibility Ensuring high quality delivery of services Providing specialist pre-sales support and leading sales efforts Professional Services Manager Leuven- Diegem, Belgium Verizon Business Security Solutions July 2010 July 2012 Manager of a team of consultants across EMEA responsible for delivering security consulting services for (prospective) customers and be a direct report to the Manager Professional Services Network & Infrastructure Serve as a Principal Security Consultant. Contribute to the creation of the next generation services and approaches Coordinate & follow up customer projects delivered by our team Coordinate the efforts of direct reports to reach or exceed agreed / defined performance targets Determine personal career / improvement plans for direct reports where required. Provide mentoring to direct reports Provide management reports in a timely manner where required Creation, review and approval of proposals (scope, level of effort estimates, and schedules) and Statements of Work prior to presentation to customer Board Member: Communications & Membership Officer Belgium ISSA-BE March 2009 March 2013 Responsible for Member communications and assisting in organizing Information Security related events for the Belgian community of ISSA. Writing newsletters which are distributed to the community Keeping track of membership evolution and trying to attract more Information Security Professionals as members to ISSA Assisting in organizing events. Attending board meetings to help decide the direction which ISSA-BE will take Professional Profile Tom VAN DEN EYNDE 2 7

Principal Information Security Consultant Leuven, Belgium Verizon Business Security Solutions March 2009 - June 2010 Delivering a wide range of Information Security services such as Audits, Assessments, Incident Response, Network Security Architecture/Design, implementation and deployment. Lead Consultant and Architect for Security projects Project Management and follow up of Security engagements Performing Security Architecture reviews, Network Penetration tests and providing trusted advice to customers Pre-Sales: defining customer requirements, matching business needs with technical solutions, estimating project scopes, writing tailored proposals based on customer input. Creating new service offerings to match the evolving information security market and customer needs. Assessing capabilities of new technologies and the impact on the information security market Assistant Technical Manager / Senior Security Consultant C-CURE June 2008 February 2009 Working as a Senior Security Consultant and assisting in managing the Technical Operations (people, processes and technology) of C-CURE People management of C-CURE s technical team Performance Reviews of team members Interview potential new hires Plan education and career paths of team members Planning of the team to ensure continuity and utilization targets are met Coaching and Mentoring of team members Development and selection of new products, technologies and services. Creating budget and strategic plan for C-CURE s Internal IT infrastructure Lead Pre-Sales Consultant: accompanying account managers at customer visits to help sell C-CURE s portfolio of services and products, matching business requirements of customers to technical solutions Security Consultant / Senior Security Consultant C-CURE August 2006 May 2008 Lead Pre-Sales consultant Remote/onsite installation of security solutions Provide presales or trusted security advice Provide training to customers / colleagues Mentoring / Coaching colleagues Writing of documentation/procedures/offers Writing monthly security reports, hold monthly meetings and following up and respond on incidents for managed security customers. Design and planning of security solutions Staying up-to-date with the latest vulnerabilities, best practices, products Security Engineer C-CURE April 2004 July 2006 Provide high level technical support and incident analysis for C-CURE s customers Assisting Security Consultants in security projects and independent in small projects. Staying up-to-date with the latest vulnerabilities, best practices, products Professional Profile Tom VAN DEN EYNDE 3 7

Product Manager Motherboards CLOETENS October 2003 March 2004 Techno-commercial function supporting and selling PC hardware at distributor level Internship + thesis TECHWIN Software August 2002 August 2003 Development of a knowledge database and support application as part of Master Thesis Student Job as Network engineer, optimizing network with firewall, VPN and solving various IT issues. Software Developer [Student Job] TELENET August 2001 Developed software and database for Digital TV project follow up Internet Helpdesk Agent [Student Job] TELENET August 2000 1 st line helpdesk solving Internet problems of residential customers. Professional Profile Tom VAN DEN EYNDE 4 7

Education Middle Management Program Belgium Vlerick Leuven-Gent Management School 2012-2013 Master in Industrial Sciences: Electronics ICT Industrieel Ingenieur Sint-Kat.-Waver, Belgium Lessius Campus De Nayer 1998-2003 Cum laude Mathematics Science O.-L.-V.-Waver, Belgium Sint-Ursula-Instituut 1992-1998 Professional Training/Conferences August 2013 BlackHat & DefCon Security Conferences December 2011 ECSA Security Conference September 2011 Presentation Advantage FranklinCovey December 2010 Leadership at all levels: coaching, basic finance management November 2010 ISO 270001 Lead Implementer Course October 2010 The Seven Habits of Highly Effective People August 2010 Leadership course April 2010 English Business Writing Workshop March 2009 Penetration Testing Methodology March 2008 EuroCACS ISACA conference October 2007 HACK.LU conference August 2007 Sourcefire 3D June 2007 ISS SiteProtector December 2006 Radware LinkProof November 2006 SANS 504: Hacker Techniques, Exploits and Incident Handling May 2006 InfoBlox DNS-1 March 2006 BlueCoat BCCP August 2005 RSA SecurID 6.1 April 2005 BlueCoat Advanced Proxy Solutions January 2005 Trend Micro IWSS Level III April 2004 Check Point Certified Security Administrator Training Professional Certificates CISM Certified Information Security Manager ISO27001 Lead Implementer CISA Certified Information Systems Auditor CISSP Certified Information Systems Security Professional SANS GCIH GIAC Certified Incident Handler [expired December 2010] CCSA, CheckPoint Certified Security Administrator for NGX and NG Trend Micro Level III IWSS for Unix Trend Micro Level II IMSS for Unix Trend Micro Level II IMSS for Windows Trend Micro Level II IMSS for Unix RSA certified system engineer for SecurID 6.1 Professional Profile Tom VAN DEN EYNDE 5 7

Selected overview of past projects performed as consultant Client principal responsible for strategy, business development and overseeing service delivery at a multinational electronics company Lead Consultant responsible for managing the transition of an in-sourced SOC to an outsourced SOC at a multinational financial institution Lead Consultant responsible for the overall Transition and Transformation from a legacy network security solution to a consolidated security solution spread across three global security gateways for a fortune 500 company specialized in distribution Review of the information security related technology in the core production network of a large international IT service provider for the financial industry. The goal was to review the technology and processes in scope to verify if they are used in a correct, optimal and cost efficient manner in order to accomplish the required security level. The results were prioritized recommendations, which were made both on a security and efficiency level. The findings were benchmarked to results of similar assessments in other companies active in the same industry of the customer. Security review of a service provider for an application development company, which included an internal, and external network vulnerability assessment and a review of the technical business continuity procedures. Lead Consultant responsible for Architecture, Design and Transition planning in Managed Security Take-Over project for a financial asset management company Security Architecture Review and Network Vulnerability Assessment for the EMEA group of a large international industrial manufacturing company. Security Review for an Electronic R&D company which included an architecture review, internal & external vulnerability scans, web application vulnerability scans and a limited ISO27002 benchmark External penetration test including a wireless penetration test for a manufacturer of medical supplies Internal penetration test for a financial institution specialized in private banking Forensics assignment at a Belgian bank Business requirements analysis and solution design of a secure remote access solution for an international industrial manufacturer and solutions provider. External and Internal Penetration Test for a large biscuits manufacturer Web Application Vulnerability Reviews for a large company in the food and beverages sector Internal and external penetration test for a Belgian financial institution Professional Profile Tom VAN DEN EYNDE 6 7

Brief overview of expertise Non Technical Consulting Professional Services Enterprise Pre-Sales Solution Selling Team Management Strong Leadership qualities International Experience Strong Communication skills Service Delivery Engagement / Project / Program management Profit & Loss management Strategic Planning Change Management Operational Management New Service / Solution Development Business Development Complex integration deals Information Security: Experience with a variety of security products and technologies including firewalls, proxies, mail relays, load balancers, endpoint security technology, intrusion detection systems, remote access solutions, authentication systems, internet access technology, SIEM solutions and anti-malware technology Experience with architecture reviews, penetration tests, business requirements analysis and technical solution designs. Experienced security incident handler forensics experience. Up-to-date knowledge of new techniques and practices in IT security IT: Familiar with a wide range of Operating Systems and software both closed and open source. Routers/switches, network protocols and network traffic analysis. Development and scripting skills Database structure & query language skills Up-to-date knowledge of trends and new developments in IT. Additional Information Member in good standing of ISACA, (ISC) 2 and ISSA Frequent attendee of OWASP, ISSA and ISACA local chapter meetings ISSA-BE board member Standby teacher for the "Mentor" and "SANS @Home" for the 504 track of " Hacker Techniques, Exploits and Incident Handling" SANS advisory board member NATO Security Clearance: Secret Language Capabilities: Dutch: Mother tongue English: Fluent (+22 years) French: Good (+24 years) German: Understanding Drivers License: Belgian drivers license type B Personal Interests: Reading infosec related blogs, publications and books, non-fiction books about economic, business and historical topics. Science & Technology Squash recreational level Running recreational level Photography Professional Profile Tom VAN DEN EYNDE 7 7