Implements information security policy.
Monitors and takes action against intrusion, fraud and security breaches or leaks.
Ensures that security risks are analysed and managed with respect to enterprise data and information.
Reviews security incidents, makes recommendations for security policy and strategy to ensure continuous improvement of security provision.
The organisation’s security management policy and its implications for engagement with customers, suppliers and subcontractors
The best practices and standards in information security management
The critical risks for information security management
The ICT internal audit approach
Security detection techniques, including mobile and digital
Cyber attack techniques and counter measures for avoidance
Document the information security management policy, linking it to business strategy
Analyse the company critical assets and identify weaknesses and vulnerability to intrusion or attack
Establish a risk management plan to feed and produce preventative action plans
Perform security audits
Apply monitoring and testing techniques
Establish the recovery plan
Implement the recovery plan in case of crisis
Functies met E.8. Information Security Management competentie
ICT Security Specialist
ICT Operation Manager
ICT Security Manager