tag:blogger.com,1999:blog-19268928310510700712024-03-21T09:16:00.849-07:00Computer Security UKUnknownnoreply@blogger.comBlogger7125tag:blogger.com,1999:blog-1926892831051070071.post-23786303357925072972020-10-15T05:22:00.003-07:002023-09-27T11:47:59.849-07:00Privacy Management, Compliance and Information Security Management<p></p><p class="MsoNormal"></p><p class="MsoNormal"></p><p class="MsoNormal"><o:p><span style="color: #cccccc; font-size: medium;"> </span></o:p></p>
<table border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: none; mso-border-alt: solid windowtext .5pt; mso-border-insideh: .5pt solid windowtext; mso-border-insidev: .5pt solid windowtext; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-yfti-tbllook: 480;">
<tbody><tr style="mso-yfti-firstrow: yes; mso-yfti-irow: 0; mso-yfti-lastrow: yes;">
<td style="border: 1pt solid windowtext; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt; width: 426.1pt;" valign="top" width="710">
<p class="MsoNormal"><span><span style="color: #cccccc; font-size: medium;">As previously certified as <a href="https://www.ncsc.gov.uk/information/about-certified-professional-scheme" target="_blank">CCP</a>, and currently certified <a href="https://iapp.org/certify/cipm/" target="_blank">CIPM</a> and <a href="https://iapp.org/certify/cippe/" target="_blank">CIPP/E</a> and ex CLAS
consultant I have been dealing with compliance as well as technical security
and information assurance for some 20 years. <o:p></o:p></span></span></p>
<p class="MsoNormal"><span><span style="color: #cccccc; font-size: medium;">As I have privacy
management as well as Information Security experience I present both aspects of
Information Assurance (ie Ethical Hack Testing, Risk assessment remediation architecture with Privacy management together on this site</span></span></p>
</td>
</tr>
</tbody></table>
<p class="MsoNormal"><o:p><span style="color: #cccccc; font-size: medium;"> </span></o:p></p>
<table align="left" border="1" cellpadding="0" cellspacing="0" class="MsoTableGrid" style="border-collapse: collapse; border: none; margin-left: 7.2pt; margin-right: 7.2pt; mso-border-alt: solid windowtext .5pt; mso-border-insideh: .5pt solid windowtext; mso-border-insidev: .5pt solid windowtext; mso-padding-alt: 0cm 5.4pt 0cm 5.4pt; mso-table-anchor-horizontal: margin; mso-table-anchor-vertical: margin; mso-table-left: left; mso-table-lspace: 9.0pt; mso-table-rspace: 9.0pt; mso-table-top: 45.6pt; mso-yfti-tbllook: 480;">
<tbody><tr style="mso-yfti-firstrow: yes; mso-yfti-irow: 0; mso-yfti-lastrow: yes;">
<td style="border: 1pt solid windowtext; mso-border-alt: solid windowtext .5pt; padding: 0cm 5.4pt; width: 213.05pt;" valign="top" width="355">
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><b><u>Privacy Management</u></b></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://www.computerprivacyuk.com/p/data-protection-officer-and-privacy.html" target="_blank">Data Protection Officer and Privacy Consultancy</a></span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><span style="mso-spacerun: yes;"> </span>I have
experience and qualifications in assessing the legal requirements for
personal data protection, in privacy program management and the
jurisdictional requirements for cross border personal data flow. <o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>In simple terms this is what privacy
management provides:-</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;">1) An assurance of compliance against privacy
litigation</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>2) Correct
management of personal information</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>3) Strategies for the management of privacy
processes to reduce the reputational damage from a breach</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>4) Strategies for the management of and
damage limitation from a breach in the unfortunate circumstances of it
actually happening ..</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>I can do this in two ways</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>1) be your <a href="https://www.computerprivacyuk.com/p/data-protection-officer-dpo.html" target="_blank">Data Protection Officer</a></span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>2) be your <a href="https://www.computerprivacyuk.com/p/data-protection-manager.html" target="_blank">Privacy Manager</a></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>In 2017-2018 I worked with the Cabinet Office
Government Digital Service (<a href="https://www.gov.uk/government/organisations/government-digital-service" target="_blank">GDS</a>) privacy manager to ensure that all my
projects were GDPR compliant </span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>I have studied with the <a href="https://iapp.org/" target="_blank">International Association of Privacy Professionals </a>and hold their Certified Information
Privacy Professional/ <st1:place w:st="on">Europe</st1:place> (<a href="https://iapp.org/certify/cippe/" target="_blank">CIPP/E</a>) and
the Certified Information Privacy Manager (<a href="https://iapp.org/certify/cipm/" target="_blank">CIPM</a>) certifications verifiable
from <a href="https://www.cloudsecurityuk.com/p/cv.html" target="_blank">this </a>page</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>I am expert in European and British privacy
law having been examined on <a href="http://www.computerprivacyuk.com/p/cippe-body-of-knowledge_8.html" target="_blank">this body of knowledge</a> and in privacy program
management on <a href="http://www.computerprivacyuk.com/p/cippe-body-of-knowledge.html" target="_blank">this body of knowledge</a></span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>I am also expert in <a href="https://computerprivacyukpolicy.blogspot.com/p/privacy-engineering.html" target="_blank">Privacy Engineering</a>, a
super-set of the <a href="https://www.cloudsecurityuk.com/p/hmg-information-assurance-cesgcyber.html" target="_blank">Information Security controls</a> with which I have worked for
some 20 years and hold the NCSC <a href="https://www.cloudsecurityuk.com/p/hmg-information-assurance-cesgcyber.html" target="_blank">CCP</a>, and ISC2 <a href="https://www.isc2.org/Certifications/CISSP" target="_blank">CISSP</a> and <a href="https://www.isc2.org/Certifications/CCSP" target="_blank">CCSP</a>
certifications.</span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><o:p><span style="color: #cccccc; font-size: medium;"> </span></o:p></p>
</td>
<td style="border-left: none; border: 1pt solid windowtext; mso-border-alt: solid windowtext .5pt; mso-border-left-alt: solid windowtext .5pt; padding: 0cm 5.4pt; width: 213.05pt;" valign="top" width="355">
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><b><u>Information Assurance Management</u></b></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p><a href="https://www.cloudsecurityuk.com/p/hmg-information-assurance-cesgcyber.html" target="_blank">HMG Information Assurance </a>: CESG/Cyber
Certified Professional <a href="https://www.ncsc.gov.uk/information/about-certified-professional-scheme" target="_blank">CCP </a>NCSC Certification</span></p><p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>I have had the pleasure of having my skills
and experience in Information Security of the last 20 years endorsed by the
National Cyber Security Centre through an assessment of examples of my work
over the last 8 years with the award of Certified Cyber Professional (CESG
Certified Professional) as at 31st August 2020.</span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p><a href="https://drive.google.com/file/d/1KJ5mw-iIY2NSg3P4ZIiOSTdbcgDcws9z/view?usp=sharing" target="_blank">Here is a link </a>to a full CV summarizing 27
years in Information Security,</span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><o:p> </o:p>These are the areas in which I work and have been certified :-</span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a1-security-governance.html" target="_blank">A1 </a>- Information Security Governance<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a2-policy-standards-ccp-certified-skill.html" target="_blank">A2</a> - Policy & Standards<span style="mso-spacerun: yes;"> </span><o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a3-information-security-strategy-gds.html" target="_blank">A3 </a>- Information Security Strategy<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a4-innovation-business-improvement-ccp.html" target="_blank">A4 </a>- Innovation & Business Improvement<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a5-information-security-awareness-and.html" target="_blank">A5 </a>- Information Security Awareness and
Training<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a6-legal-regulatory-environment-ccp.html" target="_blank">A6 </a>- Legal & Regulatory Environment<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/a7-third-party-management-ccp-certified.html" target="_blank">A7 </a>- Third Party Management<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/b1-risk-assessment-ccp-certified-skill.html" target="_blank">B1 </a>- Risk Assessment<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/b2-risk-management-ccp-certified-skill.html" target="_blank">B2 </a>- Risk Management<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/c1-security-architecture-ccp-certified.html" target="_blank">C1 </a>- Security Architecture<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/c2-secure-development-ccp-certified.html" target="_blank">C2 </a>- Secure Development<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/d1-information-assurance-methodologies.html" target="_blank">D1 </a>- Information Assurance Methodologies<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/d2-security-testing-ccp-certified-skill.html" target="_blank">D2 </a>- Security Testing<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/e1-secure-operations-management-ccp.html" target="_blank">E1 </a>- Secure Operations Management<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/e2-secure-operations-service-delivery.html" target="_blank">E2 </a>- Secure Operations & Service Delivery<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/e3-vulnerability-assessment-ccp.html" target="_blank">E3 </a>- Vulnerability Assessment<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/f1-incident-management-ccp-certified.html" target="_blank">F1</a>- Incident Management<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/p/f2-investigation-ccp-certified-skill.html" target="_blank">F2 </a>- Investigation<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/2020/10/f3-forensics-ccp-certified-skill.html" target="_blank">F3 </a>- Forensics<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/2020/10/g1-audit-review-ccp-certified-skill.html" target="_blank">G1</a>- Audit & Review<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/2020/10/h1-business-continuity-planning-ccp.html" target="_blank">H1&2</a> – Business Continuity Management<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><span style="color: #cccccc; font-size: medium;"><a href="https://computersecurityuk1.blogspot.com/2020/10/i1-research-ccp-certified-skill.html" target="_blank">I1 </a>- Research</span></p>
<p class="MsoNormal" style="mso-element-anchor-horizontal: margin; mso-element-frame-hspace: 9.0pt; mso-element-top: 45.6pt; mso-element-wrap: around; mso-element: frame; mso-height-rule: exactly;"><o:p><span style="color: #cccccc; font-size: medium;"> </span></o:p></p>
</td>
</tr>
</tbody></table>
<p class="MsoNormal"><o:p><span style="color: #cccccc; font-size: medium;"> </span></o:p></p><br /><p></p><p></p><p></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-33834048775257398172020-10-08T05:17:00.002-07:002020-10-08T05:17:59.649-07:00<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: large;"><a href="http://www.computersecurityuk.com/index1.html">Old site is here </a></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><a href="https://www.cloudsecurityuk.com/p/hmg-information-assurance-cesgcyber.html" target="_blank">CCP Skills</a></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><span style="text-align: left;"><span style="font-size: large;">I have had the pleasure of having my skills and experience in Information Security of the last 20 years endorsed by the National Cyber Security Centre through an assessment of examples of my work over the last 8 years with the award of Certified Cyber Professional (CESG Certified Professional) as at 31st August 2020.</span></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><p style="text-align: left;"><a href="https://computersecurityuk1.blogspot.com/p/a1-security-governance.html" target="_blank"><span style="font-size: large;">A1 - Information Security Governance</span></a></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a2-policy-standards-ccp-certified-skill.html" target="_blank">A2 - Policy & Standards</a> </span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a3-information-security-strategy-gds.html" target="_blank">A3 - Information Security Strategy</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a4-innovation-business-improvement-ccp.html" target="_blank">A4 - Innovation & Business Improvement</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a5-information-security-awareness-and.html" target="_blank">A5 - Information Security Awareness and Training</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a6-legal-regulatory-environment-ccp.html" target="_blank">A6 - Legal & Regulatory Environment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a7-third-party-management-ccp-certified.html" target="_blank">A7 - Third Party Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/b1-risk-assessment-ccp-certified-skill.html" target="_blank">B1 - Risk Assessment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/b2-risk-management-ccp-certified-skill.html" target="_blank">B2 - Risk Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/c1-security-architecture-ccp-certified.html" target="_blank">C1 - Security Architecture</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/c2-secure-development-ccp-certified.html" target="_blank">C2 - Secure Development</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/d1-information-assurance-methodologies.html" target="_blank">D1 - Information Assurance Methodologies</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/d2-security-testing-ccp-certified-skill.html" target="_blank">D2 - Security Testing</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e1-secure-operations-management-ccp.html" target="_blank">E1 - Secure Operations Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e2-secure-operations-service-delivery.html" target="_blank">E2 - Secure Operations & Service Delivery</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e3-vulnerability-assessment-ccp.html" target="_blank">E3 - Vulnerability Assessment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/f1-incident-management-ccp-certified.html" target="_blank">F1- Incident Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/f2-investigation-ccp-certified-skill.html" target="_blank">F2 - Investigation</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/f3-forensics-ccp-certified-skill.html" target="_blank">F3 - Forensics</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/g1-audit-review-ccp-certified-skill.html" target="_blank">G1- Audit & Review</a></span></p><p class="MsoNormal" style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/h1-business-continuity-planning-ccp.html" target="_blank">H1&2 – Business Continuity Management</a><o:p></o:p></span></p><p style="text-align: left;"><span style="font-size: large;"></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/i1-research-ccp-certified-skill.html" target="_blank">I1 - Research</a></span></p></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br />
<span><a href="https://a1computerprivacy.blogspot.com/" target="_blank"><i><b>Data Privacy Management Breach Management GDPR Data Protection Officer</b></i></a></span><br />
<br />
<span><a href="https://www.isc2.org/ccsp/default.aspx"><i><b>CCSP Certified Cloud Security Professional</b></i></a></span><br />
<span><br /></span>
<span>Backed by the two leading not-for-profits focussed on information and cloud security, (ISC)² and the Cloud Security Alliance (CSA), the CCSP is the only vendor-neutral credential that confirms demonstrated competence and experience in securing cloud computing environments.</span><br />
<br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-optimisation.html">CLOUD SECURITY OPTIMISATION </a>: Secure and optimize your organization’s use of cloud computing infrastructure and services with a qualified professional who has demonstrated his cloud security competence</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/architectural-concepts-design.html">1. Architectural Concepts & Design Requirements</a></span><br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/2-cloud-data-security.html">2. Cloud Data Security</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-mitigation-strategies.html">CLOUD SECURITY RISK MITIGATION STRATEGIES</a> Ensure your work teams stay current on evolving cloud technologies, threats and mitigation strategies by use of a CCSP ( Certified Cloud Security Professional</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/3-cloud-platform-infrastructure-security.html">3. Cloud Platform & Infrastructure Security</a></span><br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/4-cloud-application-security.html">4. Cloud Application Security</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-business-operations-and.html">CLOUD SECURITY BUSINESS OPERATIONS AND ORGANISATIONAL INTEGRITY </a>: Ensure your organization is applying the proper cloud security controls not only internally but also with third parties by reinforcing risk and legal requirements through cloud contract and SLAs with cloud service providers and in the eyes of clients and other stakeholders</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/5-operations.html">5. Operations</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-best-practice.html">CLOUD SECURITY BEST PRACTICE </a>: using the two leading stewards of information and cloud security knowledge – (ISC)² and CSA , your organization can be confident it reflects the most current required best practices.</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/6legal-and-compliance.html">6. Legal & Compliance</a></span></span></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-19967046698165738442020-10-08T05:14:00.004-07:002020-10-08T05:14:34.853-07:00I1 – Research CCP Certified Skill <p><b><span style="font-size: large;"> <a name="_Toc49865903">DCLG Jul 2005
to October 2007 CENTRAL GOVERNMENT DEPARTMENT ( ODPM / DCLG ) Security
Technical Design Authority & Accreditor</a></span></b></p><p class="MsoNormal" style="text-align: justify;"><a name="I1ResearchDCLG"><b style="mso-bidi-font-weight: normal;"><span style="font-size: large;">I1 –
Research CCP Certified Skill <o:p></o:p></span></b></a></p>
<span style="font-size: large;"><span style="mso-bookmark: I1ResearchDCLG;"></span>
</span><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Security Assuring of optical
fibre links</span></p>
<p class="MsoNormal"><span style="font-size: large;">Result : The new network and desktop solution was accredited
and residual risk accepted by the SIRO as within appetite and tolerance for the
data being stored and processed on the systems. </span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Post Script: Describing this
approach to seniors at a government agency contract security interview obtained
a 4 year assignment to assist in another area where optical network security
had become critical ( 2007-2010 ) see below :-</span></p>
<p class="MsoNormal" style="text-align: justify;"><b><span style="font-size: large;">HMG Agency I1 – Research CCP Certified Skill</span></b></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Situation : I was the IA consultant and proxy accreditor for a large network enterprise ( 2007 to 2100 )</span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Task : I assisted the development of large scale monitoring of network devices on the networks.</span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Activity : The enterprise to which I was attached was in the habit of using mirror ports to understand the nature of the traffic on the network. </span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">A more secure method would have been to have a separate passive connection into each network but this had proved to be very expensive and not so effective as the use of the mirror port. </span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">The data flows were meant to remain confidential to the businesses concerned and not be made available to communication providers and other parties.</span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">I undertook considerable research into the methods whereby this problem could be solved and the ideal solutions were prohibitively expensive. My research and discussions with various manufacturers led to only one solution.</span></p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Result : After thought and discussion on the technical possibilities for solving this problem I set out means whereby detailed confidential logging of connections could take place to understand if unauthorised connections had taken place and to arrange confidential reporting of these events.</span></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-66983180155759308452020-10-08T05:09:00.005-07:002020-10-08T05:09:52.445-07:00H1 - Business Continuity Planning CCP Certified Skill<p><span style="font-size: large;"> </span></p><h1><span style="font-size: large;"><a name="_Toc49865890"><span style="font-family: "Times New Roman";">ECINS November
2013 to August 2014<span style="mso-spacerun: yes;">
</span>http://www.empowering-communities.org/<span style="mso-spacerun: yes;">
</span>www.ecins.org</span></a><span style="font-family: "Times New Roman";"><span style="mso-spacerun: yes;"> </span><o:p></o:p></span></span></h1>
<p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><o:p> </o:p><a name="H1BusinessContinuityPlanningECINS" style="text-align: left;"><b>H1 - Business Continuity Planning CCP
Certified Skill</b></a></span></p>
<span style="font-size: large;"><span style="mso-bookmark: H1BusinessContinuityPlanningECINS;"></span>
</span><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Delivery of Business Continuity
Planning for ECINS</span></p>
<p class="MsoNormal"><span style="font-size: large;">Result : Embedding BCM in the organization's culture : In
the accreditation document it was agreed that this would be kept in review so
that the BCP plan was kept within the tolerance of the customers as the
business expanded. This delivered a compliance with ISO 22301 namely </span></p>
<p class="MsoNormal"><span style="font-size: large;">1) Securing management support, </span></p>
<p class="MsoNormal"><span style="font-size: large;">2) Risk assessment; </span></p>
<p class="MsoNormal"><span style="font-size: large;">3)<span style="mso-spacerun: yes;"> </span>Business impact
analysis (BIA); and </span></p>
<p class="MsoNormal"><span style="font-size: large;">4) delivered the business continuity plan.</span></p><h1><span style="font-size: large;"><a name="_Toc49865885">GDS June
2017-July 2018 Cabinet Office Government Digital Service (GDS) Information
Security Manager</a><o:p></o:p></span></h1>
<p class="MsoNormal"></p><p class="MsoNormal"><a name="H1BusinessContinuityPlanningGDS"><b style="mso-bidi-font-weight: normal;"><span style="font-size: large;">H1 - Business Continuity Planning CCP Certified Skill<o:p></o:p></span></b></a></p>
<span style="font-size: large;"><span style="mso-bookmark: H1BusinessContinuityPlanningGDS;"></span>
</span><p class="MsoNormal"><span style="font-size: large;">The derivation of the BCP for GOV.UK</span></p>
<p class="MsoNormal"><span style="font-size: large;">Developing and implementing a BCM response exercising the
response : So this was the plan for the future but I was not present for the
development of the exercising of the response or in fact its implementation.</span></p>
<p class="MsoNormal"><span style="font-size: large;">Result : Maintaining, reviewing and embedding BCM in the
organization's culture :<span style="mso-spacerun: yes;"> </span>this would have
happened because of the modus operandi of the GDS culture . Any changes to the
business requirement of the BCP would be captured by the annual review of risk
management as carried out in all GDS projects. </span></p>
<p class="MsoNormal"><span style="font-size: large;"><br /></span></p><br /><p></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-9213661085404779492020-10-08T05:06:00.003-07:002020-10-08T05:06:47.045-07:00G1- Audit & Review CCP Certified Skill<p><b><span style="font-size: large;"> <a name="_Toc49865887">Borders July
2015 to April 2016 Home Office </a><st1:place w:st="on"><st1:country-region w:st="on">UK</st1:country-region></st1:place> Borders
Application Development Information Security</span></b></p><p class="MsoNormal"><b style="mso-bidi-font-weight: normal;"><span style="font-size: large;">G1- Audit & Revie<a name="G1AuditReviewdsab"></a>w CCP Certified Skill<o:p></o:p></span></b></p>
<p class="MsoNormal"><span style="font-size: large;">I was accountable to the Home Office Accreditor for the Risk
Management of various projects in the program.</span></p>
<p class="MsoNormal"><span style="font-size: large;">The use of the GDS Risk Management process as described in
the CCP statement <a href="https://crjccp.blogspot.com/2020/09/gds-d1-information-assurance.html">here</a><span style="mso-spacerun: yes;"> </span>, when applied annually provided the audit
process undertaken at GDS and would be the case for annual review of the use of
this survey project.</span></p>
<p class="MsoNormal"><span style="font-size: large;">Result :The project was maintained in a state of annual
audit in order to maintain accreditation. </span></p><h1><span style="font-size: large;"><a name="_Toc49865885">GDS June
2017-July 2018 Cabinet Office Government Digital Service (GDS) Information
Security Manager</a><o:p></o:p></span></h1><p class="MsoNormal"></p><p class="MsoNormal"><span style="font-size: large;"><a name="gdsaudit"><b style="mso-bidi-font-weight: normal;">G1-
Audit & R</b></a><a name="g1gdsaudit"></a><span style="mso-bookmark: gdsaudit;"><b style="mso-bidi-font-weight: normal;">eview CCP Certified Skill<o:p></o:p></b></span></span></p>
<span style="font-size: large;"><span style="mso-bookmark: gdsaudit;"></span>
</span><p class="MsoNormal"><span style="font-size: large;">The DDAT (Digital and Data workforce) <span style="mso-spacerun: yes;"> </span>survey project and its use of a SAAS analysis
tool was put through the GDS Risk Management process as documented elsewhere in
this document</span></p>
<p class="MsoNormal"><span style="font-size: large;">The use of the GDS Risk Management process as described in
the CCP statement <a href="https://crjccp.blogspot.com/2020/09/gds-d1-information-assurance.html">here</a><span style="mso-spacerun: yes;"> </span>when applied annually provided the audit
process undertaken at GDS and would be the case for annual review of the use of
this survey project.</span></p>
<p class="MsoNormal"><span style="font-size: large;">Result :The DDAT survey project was to be kept under annual
review </span></p><p></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-84558337109211915932020-10-08T05:02:00.006-07:002020-10-08T05:36:48.697-07:00F3 – Forensics CCP Certified Skill<p><span style="font-size: large;"> <b><a name="_Toc49865896">ECINS March
2012 – to April 2012 Not-for-Profit Social </a><st1:place w:st="on"><st1:city w:st="on">Enterprise</st1:city></st1:place> CLAS Consultancy</b></span></p><p></p><p class="MsoNormal" style="text-align: justify;"><b style="mso-bidi-font-weight: normal;"><span style="font-size: large;">F3 – Forensics<a name="F3ForensicsECINS"></a>
CCP Certified Skill<o:p></o:p></span></b></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">ECINS was to have a forensics
readiness capability alongside their GPG13 compliance</span></p>
<p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Result : A paper was submitted
and this was accepted by the board. </span></p><h1><span style="font-size: large;"><a name="_Toc49865893">Office of Fair
Trading : 1st October 2012 to 26th February 2013 IT Security Officer and
Security Consultant</a><o:p></o:p></span></h1><p class="MsoNormal" style="text-align: justify;"><b><span style="font-size: large;">F3 – Forensics<a name="F3ForensicsOFT"></a>
CCP Certified Skill<o:p></o:p></span></b></p><p></p><p class="MsoNormal"><span style="font-size: large;">The department were charged with undertaking monitoring of
their business network together with delivering “forensics readiness”</span></p><p class="MsoNormal" style="text-align: justify;">
</p><p class="MsoNormal" style="text-align: justify;"><span style="font-size: large;">Result : A paper regarding GPG13
compliance monitoring (SIEM) and forensics was submitted and duly accepted by
the department for deployment. <o:p></o:p></span></p><p>
</p><p class="MsoNormal" style="text-align: justify;"><o:p><span style="font-size: large;"> </span></o:p></p><br /><p></p>Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1926892831051070071.post-18084510551927126802017-03-14T11:28:00.004-07:002020-10-08T05:15:59.638-07:00<div class="MsoNormal" style="text-align: justify;">
<span style="font-size: large;"><a href="http://www.computersecurityuk.com/index1.html">Old site is here </a></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><a href="https://www.cloudsecurityuk.com/p/hmg-information-assurance-cesgcyber.html" target="_blank">CCP Skills</a></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><span style="text-align: left;"><span style="font-size: large;">I have had the pleasure of having my skills and experience in Information Security of the last 20 years endorsed by the National Cyber Security Centre through an assessment of examples of my work over the last 8 years with the award of Certified Cyber Professional (CESG Certified Professional) as at 31st August 2020.</span></span></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br /></span></div><div class="MsoNormal" style="text-align: justify;"><p style="text-align: left;"><a href="https://computersecurityuk1.blogspot.com/p/a1-security-governance.html" target="_blank"><span style="font-size: large;">A1 - Information Security Governance</span></a></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a2-policy-standards-ccp-certified-skill.html" target="_blank">A2 - Policy & Standards</a> </span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a3-information-security-strategy-gds.html" target="_blank">A3 - Information Security Strategy</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a4-innovation-business-improvement-ccp.html" target="_blank">A4 - Innovation & Business Improvement</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a5-information-security-awareness-and.html" target="_blank">A5 - Information Security Awareness and Training</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a6-legal-regulatory-environment-ccp.html" target="_blank">A6 - Legal & Regulatory Environment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/a7-third-party-management-ccp-certified.html" target="_blank">A7 - Third Party Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/b1-risk-assessment-ccp-certified-skill.html" target="_blank">B1 - Risk Assessment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/b2-risk-management-ccp-certified-skill.html" target="_blank">B2 - Risk Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/c1-security-architecture-ccp-certified.html" target="_blank">C1 - Security Architecture</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/c2-secure-development-ccp-certified.html" target="_blank">C2 - Secure Development</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/d1-information-assurance-methodologies.html" target="_blank">D1 - Information Assurance Methodologies</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/d2-security-testing-ccp-certified-skill.html" target="_blank">D2 - Security Testing</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e1-secure-operations-management-ccp.html" target="_blank">E1 - Secure Operations Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e2-secure-operations-service-delivery.html" target="_blank">E2 - Secure Operations & Service Delivery</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/e3-vulnerability-assessment-ccp.html" target="_blank">E3 - Vulnerability Assessment</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/f1-incident-management-ccp-certified.html" target="_blank">F1- Incident Management</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/p/f2-investigation-ccp-certified-skill.html" target="_blank">F2 - Investigation</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/f3-forensics-ccp-certified-skill.html" target="_blank">F3 - Forensics</a></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/g1-audit-review-ccp-certified-skill.html" target="_blank">G1- Audit & Review</a></span></p><p class="MsoNormal" style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/h1-business-continuity-planning-ccp.html" target="_blank">H1&2 – Business Continuity Management</a><o:p></o:p></span></p><p style="text-align: left;"><span style="font-size: large;"></span></p><p style="text-align: left;"><span style="font-size: large;"><a href="https://computersecurityuk1.blogspot.com/2020/10/i1-research-ccp-certified-skill.html" target="_blank">I1 - Research</a></span></p></div><div class="MsoNormal" style="text-align: justify;"><span style="font-size: large;"><br />
<span><a href="https://a1computerprivacy.blogspot.com/" target="_blank"><i><b>Data Privacy Management Breach Management GDPR Data Protection Officer</b></i></a></span><br />
<br />
<span><a href="https://www.isc2.org/ccsp/default.aspx"><i><b>CCSP Certified Cloud Security Professional</b></i></a></span><br />
<span><br /></span>
<span>Backed by the two leading not-for-profits focussed on information and cloud security, (ISC)² and the Cloud Security Alliance (CSA), the CCSP is the only vendor-neutral credential that confirms demonstrated competence and experience in securing cloud computing environments.</span><br />
<br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-optimisation.html">CLOUD SECURITY OPTIMISATION </a>: Secure and optimize your organization’s use of cloud computing infrastructure and services with a qualified professional who has demonstrated his cloud security competence</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/architectural-concepts-design.html">1. Architectural Concepts & Design Requirements</a></span><br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/2-cloud-data-security.html">2. Cloud Data Security</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-mitigation-strategies.html">CLOUD SECURITY RISK MITIGATION STRATEGIES</a> Ensure your work teams stay current on evolving cloud technologies, threats and mitigation strategies by use of a CCSP ( Certified Cloud Security Professional</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/3-cloud-platform-infrastructure-security.html">3. Cloud Platform & Infrastructure Security</a></span><br />
<span><a href="http://computersecurityuk.blogspot.co.uk/p/4-cloud-application-security.html">4. Cloud Application Security</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-business-operations-and.html">CLOUD SECURITY BUSINESS OPERATIONS AND ORGANISATIONAL INTEGRITY </a>: Ensure your organization is applying the proper cloud security controls not only internally but also with third parties by reinforcing risk and legal requirements through cloud contract and SLAs with cloud service providers and in the eyes of clients and other stakeholders</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/5-operations.html">5. Operations</a></span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/cloud-security-best-practice.html">CLOUD SECURITY BEST PRACTICE </a>: using the two leading stewards of information and cloud security knowledge – (ISC)² and CSA , your organization can be confident it reflects the most current required best practices.</span><br />
<span><br /></span>
<span><a href="http://computersecurityuk.blogspot.co.uk/p/6legal-and-compliance.html">6. Legal & Compliance</a></span></span></div>
Unknownnoreply@blogger.com