Personal Information
Entreprise/Lieu de travail
Brussels Area, Belgium Belgium
Profession
Interim CISO, Cyber Security Portfolio Manager
Secteur d’activité
Consulting / Advisory
À propos
Over 35 years of experience in Managing ICT Risk, including ICT Governance & CyberRisk Management, in Europe. Helping clients maintain trust & compliance, assure availability & continuity, protect information and manage ICT Investments.
Past:
Provided added value in the ICT Governance arena to the Client in seven European countries, using four European Languages (Dutch, French, German, English).
Specialties: Focus:
- Cyber Security Capability Improvement
- Information risk management
- ICT Governance & risk management
- Regulatory compliance
- IT audit & control
- ICT riskmanagement solutions
- CMM + organisational & behavioural change management
Mots-clés
object type specific controls
cyber security quality control
cyber security risk
cyber security framework
cyber security patterns
cyber security architecture
cyber security management
grc
metrics isk management
Tout plus
Présentations
(7)Personal Information
Entreprise/Lieu de travail
Brussels Area, Belgium Belgium
Profession
Interim CISO, Cyber Security Portfolio Manager
Secteur d’activité
Consulting / Advisory
À propos
Over 35 years of experience in Managing ICT Risk, including ICT Governance & CyberRisk Management, in Europe. Helping clients maintain trust & compliance, assure availability & continuity, protect information and manage ICT Investments.
Past:
Provided added value in the ICT Governance arena to the Client in seven European countries, using four European Languages (Dutch, French, German, English).
Specialties: Focus:
- Cyber Security Capability Improvement
- Information risk management
- ICT Governance & risk management
- Regulatory compliance
- IT audit & control
- ICT riskmanagement solutions
- CMM + organisational & behavioural change management
Mots-clés
object type specific controls
cyber security quality control
cyber security risk
cyber security framework
cyber security patterns
cyber security architecture
cyber security management
grc
metrics isk management
Tout plus