Personal Information
Organization / Workplace
Calgary, Canada Area, Quebec Canada
Occupation
Trusted Security Advisor
Industry
Consulting / Advisory
Website
www.tcpcom.net
About
Marc cumulates twenty (20) years in Cybersecurity, Compliance and Information Technology.
As a leader of several critical projects, his skills and experience benefits to several industries.
Field of Expertise:
● Security Gorvernance & Risk Management
● Cyber Advanced Persistent Threat (APT) & Exploitation Data Analytics
● Audit of Internal Control
● Cyber Security Operations
● Malicious Logic & Forensics
● Active Computer Network Defense (CND)
● Cyber defense/Threat Intelligence
● Security Architecture & Critical Cyber Assets Protection
Tags
security
encryption
change management
compliance
dm-crypt
luks: disk encryption
luksopen
cryptsetup
ubuntu
linux
disk
container
infosec
business
strategy
policy
governance
itgovernance
nist
isc2
isaca
itgi
bcp management
protecting information resources
enterprise security
identity and access control management
vulnerability management
threat & incident management
security governance
information system management
it risk management
physical security
public key
private key
statefull
ssl
javascript
ajax
ldap
idp
firewall
threat
cookie
spoofing
saml
online
protection
ids
threats management
sensor
monitoring
ips
arp
networks
frame
gouvernance
risques
sécurité
conformité
contrôles
modèle
gestion
normalisation
contrôle
securité
forensic
investigation
cycle
maturity
cmmi
management
process
See more
Presentations
(8)Documents
(2)Personal Information
Organization / Workplace
Calgary, Canada Area, Quebec Canada
Occupation
Trusted Security Advisor
Industry
Consulting / Advisory
Website
www.tcpcom.net
About
Marc cumulates twenty (20) years in Cybersecurity, Compliance and Information Technology.
As a leader of several critical projects, his skills and experience benefits to several industries.
Field of Expertise:
● Security Gorvernance & Risk Management
● Cyber Advanced Persistent Threat (APT) & Exploitation Data Analytics
● Audit of Internal Control
● Cyber Security Operations
● Malicious Logic & Forensics
● Active Computer Network Defense (CND)
● Cyber defense/Threat Intelligence
● Security Architecture & Critical Cyber Assets Protection
Tags
security
encryption
change management
compliance
dm-crypt
luks: disk encryption
luksopen
cryptsetup
ubuntu
linux
disk
container
infosec
business
strategy
policy
governance
itgovernance
nist
isc2
isaca
itgi
bcp management
protecting information resources
enterprise security
identity and access control management
vulnerability management
threat & incident management
security governance
information system management
it risk management
physical security
public key
private key
statefull
ssl
javascript
ajax
ldap
idp
firewall
threat
cookie
spoofing
saml
online
protection
ids
threats management
sensor
monitoring
ips
arp
networks
frame
gouvernance
risques
sécurité
conformité
contrôles
modèle
gestion
normalisation
contrôle
securité
forensic
investigation
cycle
maturity
cmmi
management
process
See more