Works, Writings and Publications
- Development of policies, procedures and architecture.
- Development and implementation of information technology security methodologies, protocols and technologies (encryption, firewall, technical policies and configurations).
- Analysis of applicable regulation and standards such various ISO (e.g. 17799) and NIST (e.g. FIPS and SPs)
Compare to guidance, regulation, standards and policies.
Create appopriate policies and/or requirements statements.
Analyze existing requirements for appropriateness, parentage, and allocation.
Occasional expert reference source for publications such as Information Security Magazine, SearchSecurity.com, and Certification Magazine. Occasionally quoted by such on industry issues.
0 Comments:
Post a Comment
<< Home