IT Security Strategy
- IT Security Strategy
- Aligning IT security strategy to business goals
- CISO role
- Acting as a CISO for a company
- Training a newly appointed CISO
IT Security Policies & Procedures
- Defining IT Security Policies & Procedures using international standards such as ISO 27002 or ITIL to set force the IT operations of the company
- Certified Information Security Manager (CISM) by ISACA
- Over 7 years of experience as a CISO in international companies
- Certified Information Security Manager (CISM) by ISACA
- Certified ITIL (IT Service Management)
IT Security Awareness & Training
- Defining IT Security Awareness strategy, content and format for all employees of a company (from executives to temp)
- Defining IT Security Training material for employees
- Setting up phishing campaigns
Vulnerability Management
- Identifying vulnerabilities of internal and Internet-facing systems
- Implementing solutions of vulnerability management with scanners
- Defining the procedures for managing security vulnerabilities
- Training IT staff on vulnerability management
- Penetration Testing
- Certified Information Security Manager (CISM) by ISACA
- QualysGuard Certified Specialist
Cryptography
- Assessing cryptographic solutions for strong authentication, eSignature or encryption
- Designing Public Key Infrastructure (PKI)
- Implementing PKI
- Defining Certification Policy (CP) & Certification Practice Statement (CPS)
- Key ceremony
Artificial Intelligence Management System Implementation
- Scope of AIMS
- AI policy
- Awareness
- Implementation of AI controls
- Certified in Applied Cryptography (Master degree)
- Certified ISO/IEC 42001: 2023 Implementor