Travelling, Driving, Photography, Communicating
Insightful Manager with experience directing and improving operations through effective employee motivational strategies and strong policy enforcement. Proficient in best practices, threat landscape trends and regulatory requirements of industry operations. Strong leader and problem-solver dedicated to streamlining operations to decrease costs and promote organizational efficiency. Uses independent decision-making skills and sound judgment to positively impact company success.
Information Security Manager
• Plan, implement and review IT Governance, Risk, Compliance program, ensuring compliance within organization.
• Drive regulatory and industry guidelines into existing policies and standards.
• Review new services and initiatives from IT security and risk perspective and provide recommendations/mitigation measures.
• Oversee and perform Internal and External Audits capabilities like SOC2, ISO27001.
• Manage Enterprise Risk Management and IT Risk Register to report compliance review activity, tracking all actions and risks arising from review.
• Manage Information Security Steering Committee and Change Advisory Board, Incident Response Team, and Information Security & Privacy awareness training.
• Develop Third-Party Risk Management Program, incorporating most recent guidance and conduct on-site and off-site audits of vendor control environments.
• Drive threat and vulnerability management program to include data loss prevention, penetration testing, vulnerability scanning and threat assessment.
• Drive organization wide risk awareness training programs and security initiatives in cyber defense strategy.
• Oversee of Information/Cyber Security development and trends and work with industry to evaluate potential security offerings, including product evaluations, proof of concept and pilots.
Data Privacy as Data Protection Officer (DPO)
• Fulfill tasks of designated role of DPO to CISO.
• Inform and advise organization of their obligations.
• Implement DPO Center's established processes and practices.
• Create and implement strategies to ensure compliance with data protections laws.
• Perform DPIAs, PIAs and LI assessments and build/maintain client's Records of Processing Activities (RoPA).
• Draft and manage data protection policies, guidelines and processes.
• Maintain record of processing activities and impact assessments.
• Manage processes for breach response, complaints, claims and notifications.
• Advise on identifying, assessing and mitigating risks.
• Prepare recommendation reports and corresponding Master Service Agreements (MSA) and Schedule of Works (SoW).
• Devise, facilitate and deliver training and awareness workshops.
• Support client in responding to individuals' rights requests.
• Consistently inform and advise client on governance, accountability, and risks.
• Keep up to date with changes in data protection law and regulations.
• Ensuring organization gets attested to Global regulatory compliance frameworks like: GDPR/DPDPA/CCPA/GLBA/HIPAA.
• Conduct periodic compliance applicability audits.
• Actively contribute to building overall knowledge base within centralized team.
GDPR/DPDB/SOC2/ISO27001/CCPA
undefinedISO27001 Lead Implementation
Travelling, Driving, Photography, Communicating
Data Protection Officer and Certified Information Security Management Professional (CISM) from EXIN
HIPAA Compliance Complete Course from Udemy.
Digital Forensic Investigator from Alison, UK.
GDPR from Alison, UK
CompTIA Security+ from Alison, UK.
Implementing Privacy, Risk and Assurance Program from LinkedIn Learning
Certified Network Security Specialist - ICSI (International Cybersecurity Institute), UK
ISO27001 Lead Implementation
Microsoft Certified Technology Specialist: Windows Server 2008 Active Directory Configuration - Microsoft
Microsoft Certified Professional (MCP) - Microsoft