Personal Information
Entreprise/Lieu de travail
Calgary, Canada Area, Quebec Canada
Profession
Trusted Security Advisor
Secteur d’activité
Consulting / Advisory
Site Web
www.tcpcom.net
À propos
Marc cumulates twenty (20) years in Cybersecurity, Compliance and Information Technology.
As a leader of several critical projects, his skills and experience benefits to several industries.
Field of Expertise:
● Security Gorvernance & Risk Management
● Cyber Advanced Persistent Threat (APT) & Exploitation Data Analytics
● Audit of Internal Control
● Cyber Security Operations
● Malicious Logic & Forensics
● Active Computer Network Defense (CND)
● Cyber defense/Threat Intelligence
● Security Architecture & Critical Cyber Assets Protection
Mots-clés
security
encryption
change management
compliance
dm-crypt
luks: disk encryption
luksopen
cryptsetup
ubuntu
linux
disk
container
infosec
business
strategy
policy
governance
itgovernance
nist
isc2
isaca
itgi
bcp management
protecting information resources
enterprise security
identity and access control management
vulnerability management
threat & incident management
security governance
information system management
it risk management
physical security
public key
private key
statefull
ssl
javascript
ajax
ldap
idp
firewall
threat
cookie
spoofing
saml
online
protection
ids
threats management
sensor
monitoring
ips
arp
networks
frame
gouvernance
risques
sécurité
conformité
contrôles
modèle
gestion
normalisation
contrôle
securité
forensic
investigation
cycle
maturity
cmmi
management
process
Tout plus
Présentations
(8)Documents
(2)Personal Information
Entreprise/Lieu de travail
Calgary, Canada Area, Quebec Canada
Profession
Trusted Security Advisor
Secteur d’activité
Consulting / Advisory
Site Web
www.tcpcom.net
À propos
Marc cumulates twenty (20) years in Cybersecurity, Compliance and Information Technology.
As a leader of several critical projects, his skills and experience benefits to several industries.
Field of Expertise:
● Security Gorvernance & Risk Management
● Cyber Advanced Persistent Threat (APT) & Exploitation Data Analytics
● Audit of Internal Control
● Cyber Security Operations
● Malicious Logic & Forensics
● Active Computer Network Defense (CND)
● Cyber defense/Threat Intelligence
● Security Architecture & Critical Cyber Assets Protection
Mots-clés
security
encryption
change management
compliance
dm-crypt
luks: disk encryption
luksopen
cryptsetup
ubuntu
linux
disk
container
infosec
business
strategy
policy
governance
itgovernance
nist
isc2
isaca
itgi
bcp management
protecting information resources
enterprise security
identity and access control management
vulnerability management
threat & incident management
security governance
information system management
it risk management
physical security
public key
private key
statefull
ssl
javascript
ajax
ldap
idp
firewall
threat
cookie
spoofing
saml
online
protection
ids
threats management
sensor
monitoring
ips
arp
networks
frame
gouvernance
risques
sécurité
conformité
contrôles
modèle
gestion
normalisation
contrôle
securité
forensic
investigation
cycle
maturity
cmmi
management
process
Tout plus