Holistic Risk Management digital safety and security, strategy development, implementation of action plans, organization, governance. Tools, methods, management, monitoring, quality of the level of security: BSC, ISMS, dashboards, of governance. Risk management related to a process approach, Intelligence. Management techniques and cross hierarchical methodology and experience of complex projects, organizations, cross-sectional and functional relationships, sometimes with a strong international dimension, live, teams of 4 to 80 + people. Assistance with CSO Seminars and training to the security of information systems. Construction of technical proposals, outsourcing, missions, pre-sales consultant, webmarketing.
The operating rules of a large group is very special and this experience helped me to understand the subtleties.
Manager IT Services
Establishment of an organization's security management information system
Detailed Description
Reorganization of the department, production and installation services outsourcing, industrial, CFAO, Security
Continuity plan data center SCHNEIDER France (tested after a real social movement. Needs analysis by the method MARION. Identification and selection of suppliers. Development of the recovery plan "technical" and "user" process analysis "job", periodic testing, backup policy. International project to develop an architecture group security functional components and technical development of standards (2 years) Comparison tools ACCESS-MASTER (BULL) TIVOLI (IBM), HP, SUN Study of architectural elements: LDAP, PKI, smart cards, SSL, encryption, management of identities and rights in a heterogeneous environment. Arranging and conducting a seminar for the presentation of results. Organization for Security on MVS mainframe with RACF then with TOP-SECRET, design and implementation of management tools Continuity plan data center SCHNEIDER France (tested after a real social movement. Needs analysis by the method MARION. Identification and selection of suppliers. Development of the recovery plan "technical" and "user" process analysis "job", periodic testing, backup policy. International project to develop an architecture group security functional components and technical development of standards (2 years) Comparison tools ACCESS-MASTER (BULL) TIVOLI (IBM), HP, SUN Study of architectural elements: LDAP, PKI, smart cards, SSL, encryption, management of identities and rights in a heterogeneous environment. Arranging and conducting a seminar for the presentation of results. Organization for Security on MVS mainframe with RACF then with TOP-SECRET, design and implementation of management tools