Security Professional | CISA | CRISC
Certified Information System Auditor - CISA qualified
Certified in Risk and Information System Control - CRISC qualified
ISO/IEC ISMS - Information Security Risk Management implementation and coordination with cross functional for their status.
Governance, Risk and Compliances tracking.
Conducting Internal audit of applicable controls.
Periodically reviewing effective controls and vulnerabilities.
Implementation of ISMS. Third party risk management.
Talks about #security, #leadership, #securityaudits, #securitymanagement, and #businesscontinuityplanning
Shared 3 months ago
127 views
Shared 4 months ago
68 views
Shared 6 months ago
257 views
Shared 6 months ago
94 views
Shared 6 months ago
235 views
IT Governance vs IT Management π₯ Roles and Responsibilities of both | Explained @security_for_you
Shared 6 months ago
100 views
Shared 6 months ago
116 views
Shared 6 months ago
102 views
Shared 6 months ago
130 views
Shared 6 months ago
90 views
Shared 6 months ago
277 views
Shared 6 months ago
74 views
Dictionary Attacks - How these are different from Brute Force attacks? How to protect yourself? π₯
Shared 7 months ago
30 views
Shared 7 months ago
130 views
Shared 7 months ago
52 views
Shared 7 months ago
153 views
Shared 7 months ago
109 views
Shared 7 months ago
243 views
Shared 7 months ago
211 views
Shared 7 months ago
117 views
Shared 7 months ago
240 views
Shared 7 months ago
61 views
Shared 7 months ago
19 views
Shared 7 months ago
28 views
Shared 7 months ago
155 views
Shared 7 months ago
87 views
Shared 7 months ago
140 views
Shared 7 months ago
88 views
Shared 7 months ago
281 views
Shared 7 months ago
137 views
Shared 8 months ago
148 views
Shared 8 months ago
270 views
Shared 8 months ago
162 views
Shared 8 months ago
94 views
Shared 8 months ago
209 views
Shared 8 months ago
1.9K views
Shared 8 months ago
1.3K views
Shared 8 months ago
4.8K views
Shared 8 months ago
201 views
Shared 8 months ago
90 views
Shared 8 months ago
70 views
Shared 8 months ago
470 views
What is Geofence? How does it work? How Geofencing Revolutionizes Marketing using Virtual Boundaries
Shared 8 months ago
109 views
Shared 8 months ago
88 views
What is Jailbreaking, Rooting & Cracking? What are the Security Risks involved? Everything discussed
Shared 8 months ago
107 views
Shared 8 months ago
771 views
Shared 8 months ago
62 views
Shared 9 months ago
381 views
Shared 9 months ago
167 views
Shared 9 months ago
1.5K views
Shared 9 months ago
586 views
Shared 9 months ago
76 views
Shared 9 months ago
3.8K views
Shared 9 months ago
84 views
Shared 9 months ago
1.3K views
Cyber Espionage - What you need to know? How the attack happens? Where the attack comes from? βοΈ
Shared 9 months ago
1K views