Chief Information Security Officer
Leads cybersecurity teams and works within an organization, establishes vision and direction for its cybersecurity and the related strategies, resources and activities, and advises the leadership on the effective management of the organization’s cyber risks
internal risk management policycomputer forensicsinformation security strategyICT quality policyICT security standardsattack vectorsinternet governanceICT project managementICT problem management techniqueslegal requirements of ICT productsICT system user requirementsInternet of Thingsmanage IT security compliancesestablish an ICT security prevention plandevelop information security strategydefine security policiesmanage disaster recovery plansimplement ICT risk managementsolve ICT system problemsmaintain ICT identity managementlead disaster recovery exercisescyber securitydelegate responsibilitiesmanage stafftranslate strategy into operation
implement cloud security and compliancesystems development life-cyclecloud security and complianceICT network security risksdecision support systemscyber attack counter-measuresOutsourcing modelhybrid modelaudit techniquestools for ICT test automationICT security legislationorganisational resilienceservice-oriented modellinglevels of software testingcloud monitoring and reportingweb application security threatsinformation confidentialityOpen source modelinvestment analysisICT recovery techniquesmobile device managementICT encryptionSaaS (service-oriented modelling)ICT process quality modelsprovide technical documentationuse an application-specific interfaceimplement ICT safety policiesdefine technology strategyuse ICT ticketing systemdevelop with cloud servicesexecute ICT auditsuse back-up and recovery toolsremove computer virus or malware from a computerimplement a virtual private networkimplement anti-virus softwareimplement spam protectiondesign for organisational complexityimplement a firewallmanage keys for data protectionidentify ICT security risks