Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity Polyhedron

23 views

Published on

Mark is regarded as a Cybersecurity thought Leader. In 2002 Mark founded the Atlantic Canada High Technology Crime Investigation Association. In 2015 Mark published the first NIST Cybersecurity Framework Foundation course. Mark was trained by IBM on IBM’s AS400 and worked with IBM Global Services on a Red Team conducting penetration testing against off shore financial institutions.Mark has led the design and implementation of information security programs for many US and Canadian organisations using ISO. Mark led Central 1 Credit Union to become the first Canadian Bank to earn ISO/IEC 27001 Certification. During Mark’s work with BC Government 2008 he also led the Ministry of Finance Division Corporate Account Services to become the first Canadian Government entity to earn ISO 27001 Registration /Certification.

Published in: Business
  • Be the first to comment

  • Be the first to like this

Cybersecurity Polyhedron

  1. 1. Cybersecurity Polyhedron Clause 4 Clause 5 Clause 6 Clause 7 Clause 8 Clause 9 Clause 10 Clause A5 Clause A6 Clause A7 Clause A8 Clause A9 Clause A10 Clause A11 Clause A12 Clause A13 Clause A14 Clause A15 Clause A16 Clause A17 Clause A18 Clause 9 Clause 10 Clause 5.1 Clause 6.1.1 Clause 4.1 Clause 4.2 Clause 4.3 Clause 4.4 Clause 5.2 Clause 5.3 Clause 6.1.2 Clause 6.1.3 Clause 6.2 Clause 7.1 Clause 7.2 Clause 7.3 Clause 7.4 Clause 8.1 Clause 7.5.2 Clause 7.5.3 Clause 8.2 Clause 8.3 Clause 9.1 Clause 9.2 Clause 9.3 Clause 10.1 Clause 10.2 Clause 5.1.1 Clause 5.1.2 Clause 6.1.5 Clause 6.1.7 Clause 6.1.4 Clause 6.1.3 Clause 6.1.2 Clause 6.1.1 The information security model was created with 261 risk mitigating controls. The combination of Management System and IMIT /ICT controls work cohesively together to protect each and every information asset identified within the scope of the Enterprise Security Program. *** THIS DOCUMENT HAS BEEN CLASSIFIED FOR PUBLIC DISTRIBUTION BY SECURE KNOWLEDGE MANAGEMENT INC. *** Mark E.S. Bernard, Cybersecurity Thought Leader, Author of NIST Cybersecurity Courses, Cybersecurity Advisory, Professional Certifications; CISSP, CISM, CISA, CRISC, CGEIT, CNA, ITIL, COBIT, DOJ Security Worker Licensed. Company; Secure Knowledge Management Inc. Web; www.securekm.com; Head of Security for: Fortune 50 Banking Account, Government Alternative Service Delivery, Payments, Pharmaceutical, General Insurance HRIS, Food Manufacturer Advisor to: Wealth Management, Health Authority, Nano Technology, Pharmaceutical Companies, Legal Firms, Transit Commission, Telecommunications Companies, Stock Exchange, Financial Services, Cloud Computing, Technology Companies, Reference Model Control Matrix Cybersecurity Polyhedron Information Asset

×