Information Security Analyst- Infosec trainInfosecTrain
The information has more exceptional value in today's highly competitive world. It helps organizations in many ways. From making accurate decisions to set up strategies to achieve their business goals, organizations rely extensively on the information system.
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
Interested to sell more security training?
What's covered in the slide deck:
- IT Security Trends
- Overview of CISSP, CISM and CRISC
- Market Potential
- Positioning Security Frameworks
- Relation of CISSP, CISM and CRISC to ISO 27001
- The Need for IT Security Training
What are the latest trends in Information Security training landscape? How to position these well-known certifications of ISC2’s CISSP, ISACA’s CISM and CRISC successfully? How do they relate to the established information security governance standard of ISO 27001.
Information Security Analyst- Infosec trainInfosecTrain
The information has more exceptional value in today's highly competitive world. It helps organizations in many ways. From making accurate decisions to set up strategies to achieve their business goals, organizations rely extensively on the information system.
How Training and Consulting Companies Can Position CISSP, CISM and CRISCITpreneurs
Interested to sell more security training?
What's covered in the slide deck:
- IT Security Trends
- Overview of CISSP, CISM and CRISC
- Market Potential
- Positioning Security Frameworks
- Relation of CISSP, CISM and CRISC to ISO 27001
- The Need for IT Security Training
What are the latest trends in Information Security training landscape? How to position these well-known certifications of ISC2’s CISSP, ISACA’s CISM and CRISC successfully? How do they relate to the established information security governance standard of ISO 27001.
Compliance Vigil solution provides a platform for risk and compliance (R&C) management where in the framework, management, automation and monitoring of the R&C is bundled into one single platform and delivered from the cloud (private or public). The platform allows to capture all matters of compliance and related data on a single system in order to assist enterprises to keep time and effort up with ever increasing regulatory requirements.
Find out more at - http://www.happiestminds.com/ComplianceVigil/
Cyber Security Infotech Pvt Ltd Founded in 2012, the organization aims towards providing Information Security Services and Process Improving Consulting services. Members of CSI have attained excellence in providing end-to-end consulting services across sectors including but not limited to Banks, Airports, Finance, IT, Retails etc. With the core team comprising of domain experts with over a decade of experience, we at CSI help organizations to reduce risks and enhance their competitive advantage over others.
Enterprise Security Architecture: From access to auditBob Rhubart
Paul Andres' presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Does Anyone Remember Enterprise Security Architecture?rbrockway
The concept of Enterprise Security Architecture (ESA) is not new (Gartner 2006), yet the numbers from the past several years’ worth of breach data indicates that most organizations continue to approach security on a project by project basis or from a compliance perspective. This talk will refresh the ESA concept and communicate tangible and realistic steps any organization can take to align their security processes, architecture and management to their business strategies, reduce business risks and significantly improve their overarching security posture.
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
Ana Kukec, Lead Enterprise Security Consultant, Enterprise Architects, Australia
The Open Group Architecture Forum and Security Forum agree that the coverage of security in TOGAF should be updated and improved. The understanding and focus of security architecture has moved from a threat-driven approach of addressing non-normative flaws through systems and applications to a risk-driven and business outcome-focused methodology of enabling a business strategy.
Following this trend, we defined fundamental characteristics of effective security architecture. 1) Capabilities are primary assets at risk, while information systems and technology components are secondary assets at risk supporting the primary assets. 2) Security requirements include the business aspects and not only the technology aspects of confidentiality, integrity and availability. 3) IT risk management is business-opportunity-driven. It requires understanding of risk appetite across business, information systems and technology architecture to manage security risks of vulnerabilities and compliance issues, which may arise at any layer of enterprise architecture in a business-outcome-focused way. 4) Security services are aligned to business drivers, goals and objectives, and managed in a risk-driven way.
Yet, there is no single security architecture development methodology to deliver these characteristics. We believe that existing information security standards and frameworks in a combination with the TOGAF are sufficient to meet the aforementioned fundamental characteristics of effective security architecture. However the challenge is in their integration. Our Enterprise Security Architecture Framework integrates key industry standards and best practices for information security and risk management, such as COBIT 5 for Information Security, ITILv3 Security Service Management, ISO/IEC 27000 and ISO/IEC 31000 families of standards, using the TOGAF Architecture Development Method and Content Meta-model as the key integrators. It is a pragmatic security architecture framework which establishes a common language between IT, security, risk and business organisations within an enterprise and ensures effective and efficient support of long-term security needs of both business and IT, with a risk-driven enterprise as a final outcome.
We will present a case study of the implementation of the aforementioned business-outcome-focused and risk-driven Enterprise Security Architecture Framework at the University of New South Wales.
Key takeaways:
-- Overview of a risk-driven and business-outcome-focused security architecture methodology seamlessly integrated with the TOGAF
-> Security strategic planning
-> Enterprise-wide compliance, internal (policies and standards) and external (laws and regulations
-> Business-opportunity driven management of security risk of threats, vulnerabilities and compliance issues across business, information systems and technology architecture
How to minimize threats in your information system using network segregation? PECB
We will discuss the importance of network infrastructure and how we can minimize risks of attacks in our IT by segregating and segmenting our network infrastructure.
Main points that have been covered are:
• Why it’s always a primary target for attacks?
• What are the segmented networks?
• How can it be used?
Presenter:
Our presenter for this webinar is Mohamed Tawfik, who is a qualified Technocrat, and a seasoned IT/Telecom Professional having over 20 years of solid experience with multi-national corporate organizations planning, deployment, governance, audit and enforcing policy on Information Security Practice, while having in-depth knowledge of IT/Telecom Infrastructure and with a proven record of customer satisfaction.
Link of the recorded session published on YouTube:https://youtu.be/sKhihzgElH8
Compliance Vigil solution provides a platform for risk and compliance (R&C) management where in the framework, management, automation and monitoring of the R&C is bundled into one single platform and delivered from the cloud (private or public). The platform allows to capture all matters of compliance and related data on a single system in order to assist enterprises to keep time and effort up with ever increasing regulatory requirements.
Find out more at - http://www.happiestminds.com/ComplianceVigil/
Cyber Security Infotech Pvt Ltd Founded in 2012, the organization aims towards providing Information Security Services and Process Improving Consulting services. Members of CSI have attained excellence in providing end-to-end consulting services across sectors including but not limited to Banks, Airports, Finance, IT, Retails etc. With the core team comprising of domain experts with over a decade of experience, we at CSI help organizations to reduce risks and enhance their competitive advantage over others.
Enterprise Security Architecture: From access to auditBob Rhubart
Paul Andres' presentation from OTN Architect Day in Pasadena, July 9, 2009.
Find an OTN Architect Day event near you: http://www.oracle.com/technology/architect/archday.html
Interact with Architect Day presenters and participants on Oracle Mix: https://mix.oracle.com/groups/15511
Does Anyone Remember Enterprise Security Architecture?rbrockway
The concept of Enterprise Security Architecture (ESA) is not new (Gartner 2006), yet the numbers from the past several years’ worth of breach data indicates that most organizations continue to approach security on a project by project basis or from a compliance perspective. This talk will refresh the ESA concept and communicate tangible and realistic steps any organization can take to align their security processes, architecture and management to their business strategies, reduce business risks and significantly improve their overarching security posture.
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
Ana Kukec, Lead Enterprise Security Consultant, Enterprise Architects, Australia
The Open Group Architecture Forum and Security Forum agree that the coverage of security in TOGAF should be updated and improved. The understanding and focus of security architecture has moved from a threat-driven approach of addressing non-normative flaws through systems and applications to a risk-driven and business outcome-focused methodology of enabling a business strategy.
Following this trend, we defined fundamental characteristics of effective security architecture. 1) Capabilities are primary assets at risk, while information systems and technology components are secondary assets at risk supporting the primary assets. 2) Security requirements include the business aspects and not only the technology aspects of confidentiality, integrity and availability. 3) IT risk management is business-opportunity-driven. It requires understanding of risk appetite across business, information systems and technology architecture to manage security risks of vulnerabilities and compliance issues, which may arise at any layer of enterprise architecture in a business-outcome-focused way. 4) Security services are aligned to business drivers, goals and objectives, and managed in a risk-driven way.
Yet, there is no single security architecture development methodology to deliver these characteristics. We believe that existing information security standards and frameworks in a combination with the TOGAF are sufficient to meet the aforementioned fundamental characteristics of effective security architecture. However the challenge is in their integration. Our Enterprise Security Architecture Framework integrates key industry standards and best practices for information security and risk management, such as COBIT 5 for Information Security, ITILv3 Security Service Management, ISO/IEC 27000 and ISO/IEC 31000 families of standards, using the TOGAF Architecture Development Method and Content Meta-model as the key integrators. It is a pragmatic security architecture framework which establishes a common language between IT, security, risk and business organisations within an enterprise and ensures effective and efficient support of long-term security needs of both business and IT, with a risk-driven enterprise as a final outcome.
We will present a case study of the implementation of the aforementioned business-outcome-focused and risk-driven Enterprise Security Architecture Framework at the University of New South Wales.
Key takeaways:
-- Overview of a risk-driven and business-outcome-focused security architecture methodology seamlessly integrated with the TOGAF
-> Security strategic planning
-> Enterprise-wide compliance, internal (policies and standards) and external (laws and regulations
-> Business-opportunity driven management of security risk of threats, vulnerabilities and compliance issues across business, information systems and technology architecture
How to minimize threats in your information system using network segregation? PECB
We will discuss the importance of network infrastructure and how we can minimize risks of attacks in our IT by segregating and segmenting our network infrastructure.
Main points that have been covered are:
• Why it’s always a primary target for attacks?
• What are the segmented networks?
• How can it be used?
Presenter:
Our presenter for this webinar is Mohamed Tawfik, who is a qualified Technocrat, and a seasoned IT/Telecom Professional having over 20 years of solid experience with multi-national corporate organizations planning, deployment, governance, audit and enforcing policy on Information Security Practice, while having in-depth knowledge of IT/Telecom Infrastructure and with a proven record of customer satisfaction.
Link of the recorded session published on YouTube:https://youtu.be/sKhihzgElH8
We work in close partnership with our client in order to create a competitive advantage using rapidly emerging technologies, open source, and proprietary tools always ensuring a versatile and reliable platform for your information systems that can adapt to changing business priorities.
DEPL Consulting is an IT audit and advisory firm based in Lagos Nigeria. We provide a high-quality information technology consulting services that cut across governance and risk management, cybersecurity, compliance program, audit and assurance services.
Cygnet Infotech is a Microsoft and Oracle Gold Certified Partner with CMMi Level 3, ISO 9001 and ISO 27001 accreditation. We are providing Custom Software Development and IT solution services since last 14+ years and we have clients across 25+ countries worldwide.
It's another new era of digital and marketers are faced with making big bets on their digital strategy. If you are looking at modernizing your tech stack to support your digital evolution, there are a few can't miss (often overlooked) areas that should be part of every conversation. We'll cover setting your vision, avoiding siloes, adding a democratized approach to data strategy, localization, creating critical governance requirements and more. Attendees will walk away with actions they can take into initiatives they are running today and consider for the future.
The session includes a brief history of the evolution of search before diving into the roles technology, content, and links play in developing a powerful SEO strategy in a world of Generative AI and social search. Discover how to optimize for TikTok searches, Google's Gemini, and Search Generative Experience while developing a powerful arsenal of tools and templates to help maximize the effectiveness of your SEO initiatives.
Key Takeaways:
Understand how search engines work
Be able to find out where your users search
Know what is required for each discipline of SEO
Feel confident creating an SEO Plan
Confidently measure SEO performance
SMM Cheap - No. 1 SMM panel in the worldsmmpanel567
Boost your social media marketing with our SMM Panel services offering SMM Cheap services! Get cost-effective services for your business and increase followers, likes, and engagement across all social media platforms. Get affordable services perfect for businesses and influencers looking to increase their social proof. See how cheap SMM strategies can help improve your social media presence and be a pro at the social media game.
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Valters Lauzums
E-commerce in 2024 is characterized by a dynamic blend of opportunities and significant challenges. Supply chain disruptions and inventory shortages are critical issues, leading to increased shipping delays and rising costs, which impact timely delivery and squeeze profit margins. Efficient logistics management is essential, yet it is often hampered by these external factors. Payment processing, while needing to ensure security and user convenience, grapples with preventing fraud and integrating diverse payment methods, adding another layer of complexity. Furthermore, fulfillment operations require a streamlined approach to handle volume spikes and maintain accuracy in order picking, packing, and shipping, all while meeting customers' heightened expectations for faster delivery times.
Amid these operational challenges, customer data has emerged as an important strategy. By focusing on personalization and enhancing customer experience from historical behavior, businesses can deliver improved website and brand experienced, better product recommendations, optimal promotions, and content to meet individual preferences. Better data analytics can also help in effectively creating marketing campaigns, improving customer retention, and driving product development and inventory management.
Innovative formats such as social commerce and live shopping are beginning to impact the digital commerce landscape, offering new ways to engage with customers and drive sales, and may provide opportunity for brands that have been priced out or seen a downturn with post-pandemic shopping behavior. Social commerce integrates shopping experiences directly into social media platforms, tapping into the massive user bases of these networks to increase reach and engagement. Live shopping, on the other hand, combines entertainment and real-time interaction, providing a dynamic platform for showcasing products and encouraging immediate purchases. These innovations not only enhance customer engagement but also provide valuable data for businesses to refine their strategies and deliver superior shopping experiences.
The e-commerce sector is evolving rapidly, and businesses that effectively manage operational challenges and implement innovative strategies are best positioned for long-term success.
The Secret to Engaging Modern Consumers: Journey Mapping and Personalization
In today's digital landscape, understanding the customer's journey and delivering personalized experiences are paramount. This masterclass delves into the art of consumer journey mapping, a powerful technique that visualizes the entire customer experience across touchpoints. Attendees will learn how to create detailed journey maps, identify pain points, and uncover opportunities for optimization. The presentation also explores personalization strategies that leverage data and technology to tailor content, products, and experiences to individual customers. From real-time personalization to predictive analytics, attendees will gain insights into cutting-edge approaches that drive engagement and loyalty.
Key Takeaways:
Current consumer landscape; Steps to mapping an effective consumer journey; Understanding the value of personalization; Integrating mapping and personalization for success; Brands that are getting It right!; Best Practices; Future Trends
Mastering Local SEO for Service Businesses in the AI Era is tailored specifically for local service providers like plumbers, dentists, and others seeking to dominate their local search landscape. This session delves into leveraging AI advancements to enhance your online visibility and search rankings through the Content Factory model, designed for creating high-impact, SEO-driven content. Discover the Dollar-a-Day advertising strategy, a cost-effective approach to boost your local SEO efforts and attract more customers with minimal investment. Gain practical insights on optimizing your online presence to meet the specific needs of local service seekers, ensuring your business not only appears but stands out in local searches. This concise, action-oriented workshop is your roadmap to navigating the complexities of digital marketing in the AI age, driving more leads, conversions, and ultimately, success for your local service business.
Key Takeaways:
Embrace AI for Local SEO: Learn to harness the power of AI technologies to optimize your website and content for local search. Understand the pivotal role AI plays in analyzing search trends and consumer behavior, enabling you to tailor your SEO strategies to meet the specific demands of your target local audience. Leverage the Content Factory Model: Discover the step-by-step process of creating SEO-optimized content at scale. This approach ensures a steady stream of high-quality content that engages local customers and boosts your search rankings. Get an action guide on implementing this model, complete with templates and scheduling strategies to maintain a consistent online presence. Maximize ROI with Dollar-a-Day Advertising: Dive into the cost-effective Dollar-a-Day advertising strategy that amplifies your visibility in local searches without breaking the bank. Learn how to strategically allocate your budget across platforms to target potential local customers effectively. The session includes an action guide on setting up, monitoring, and optimizing your ad campaigns to ensure maximum impact with minimal investment.
Short video marketing has sweeped the nation and is the fastest way to build an online brand on social media in 2024. In this session you will learn:- What is short video marketing- Which platforms work best for your business- Content strategies that are on brand for your business- How to sell organically without paying for ads.
Core Web Vitals SEO Workshop - improve your performance [pdf]Peter Mead
Core Web Vitals to improve your website performance for better SEO results with CWV.
CWV Topics include:
- Understanding the latest Core Web Vitals including the significance of LCP, INP and CLS + their impact on SEO
- Optimisation techniques from our experts on how to improve your CWV on platforms like WordPress and WP Engine
- The impact of user experience and SEO
Mastering Local SEO for Service Businesses in the AI Era is tailored specifically for local service providers like plumbers, dentists, and others seeking to dominate their local search landscape. This session delves into leveraging AI advancements to enhance your online visibility and search rankings through the Content Factory model, designed for creating high-impact, SEO-driven content. Discover the Dollar-a-Day advertising strategy, a cost-effective approach to boost your local SEO efforts and attract more customers with minimal investment. Gain practical insights on optimizing your online presence to meet the specific needs of local service seekers, ensuring your business not only appears but stands out in local searches. This concise, action-oriented workshop is your roadmap to navigating the complexities of digital marketing in the AI age, driving more leads, conversions, and ultimately, success for your local service business.
Key Takeaways:
Embrace AI for Local SEO: Learn to harness the power of AI technologies to optimize your website and content for local search. Understand the pivotal role AI plays in analyzing search trends and consumer behavior, enabling you to tailor your SEO strategies to meet the specific demands of your target local audience. Leverage the Content Factory Model: Discover the step-by-step process of creating SEO-optimized content at scale. This approach ensures a steady stream of high-quality content that engages local customers and boosts your search rankings. Get an action guide on implementing this model, complete with templates and scheduling strategies to maintain a consistent online presence. Maximize ROI with Dollar-a-Day Advertising: Dive into the cost-effective Dollar-a-Day advertising strategy that amplifies your visibility in local searches without breaking the bank. Learn how to strategically allocate your budget across platforms to target potential local customers effectively. The session includes an action guide on setting up, monitoring, and optimizing your ad campaigns to ensure maximum impact with minimal investment.
The digital marketing industry is changing faster than ever and those who don’t adapt with the times are losing market share. Where should marketers be focusing their efforts? What strategies are the experts seeing get the best results? Get up-to-speed with the latest industry insights, trends and predictions for the future in this panel discussion with some leading digital marketing experts.
10 Video Ideas Any Business Can Make RIGHT NOW!
You'll never draw a blank again on what kind of video to make for your business. Go beyond the basic categories and truly reimagine a brand new advanced way to brainstorm video content creation. During this masterclass you'll be challenged to think creatively and outside of the box and view your videos through lenses you may have never thought of previously. It's guaranteed that you'll leave with more than 10 video ideas, but I like to under-promise and over-deliver. Don't miss this session.
Key Takeaways:
How to use the Video Matrix
How to use additional "Lenses"
Where to source original video ideas
The Forgotten Secret Weapon of Digital Marketing: Email
Digital marketing is a rapidly changing, ever evolving industry--Influencers, Threads, X, AI, etc. But one of the most effective digital marketing tools is also one of the oldest: Email. Find out from two Houston-based digital experts how to maximize your results from email.
Key Takeaways:
Email has the best ROI of any digital tactic
It can be used at any stage of the customer journey
It is increasingly important as the cookie-less future gets closer and closer
How to Run Landing Page Tests On and Off Paid Social PlatformsVWO
Join us for an exclusive webinar featuring Mariate, Alexandra and Nima where we will unveil a comprehensive blueprint for crafting a successful paid media strategy focused on landing page testing.With escalating costs in paid advertising, understanding how to maximize each visitor’s experience is crucial for retention and conversion.
This session will dive into the methodologies for executing and analyzing landing page tests within paid social channels, offering a blend of theoretical knowledge and practical insights.
The Pearmill team will guide you through the nuances of setting up and managing landing page experiments on paid social platforms. You will learn about the critical rules to follow, the structure of effective tests, optimal conversion duration and budget allocation.
The session will also cover data analysis techniques and criteria for graduating landing pages.
In the second part of the webinar, Pearmill will explore the use of A/B testing platforms. Discover common pitfalls to avoid in A/B testing and gain insights into analyzing A/B tests results effectively.
How to Run Landing Page Tests On and Off Paid Social Platforms
Infoprive Brochure
1.
2. Background
I
nfoprive is a core Business Information Security Company
with strong competence in the development and management
of information security services covering advisory, program
development, program management and compliance. We deliver
and maintain trusted and enabling Information services and solutions
for our clients giving them the confidence to focus on their core
business objectives and operations knowing that the security and
resilience of the information capital that drives their business
operations is assured.
Vision and Mission
Vision
• To be the foremost client–driven organization
that provides quality and focused information
services to enable business growth
Mission
• To deliver cost effective services and solutions
that provide value.
Our Approach
Our value proposition is to deliver a suite of business
information services that help our clients achieve the
reliability, integrity, confidentiality and resilience of
their information capital.
The fulfillment of our client’s business objectives is
very important to us and we ensure that our clients
derive maximum value and satisfaction from our
services and solutions through the application of
our action framework to our client needs
3. Our Action Cycle
Our Action Cycle is a conceptual framework that helps delivers
actionable insights for proffering tailored services to meet our clients’ needs
Vision:
We put into consideration our clients strategic goals and aims in
proffering services and solutions
Strategy:
We ensure the integration of our programmes, plans into
organisational practices and policies to achieve business
objectives and goals
Execution:
We deploy cost – effective, tailored and value-driven
services and solution that meets our clients expectations
Operation:
We ensure that our services are continually usable
and manageable by our clients
Review:
We continuously monitor performance, make
improvements to our services to ensure maximum
value is derived
4. Advisory and Consultancy
Business Technology
Business Information Security
Governance
Governance
•
•
•
•
Information Security Strategy & Architecture Development
Information Security Performance Management and Tracking
Business Continuity Planning
Business Impact and Disaster Readiness Assessments
Management
• Information security Program Development and Integration
• Information Security Policies, Standards, Procedures development
and maintenance
• Employee Information Security Awareness Training and Workshop
• Information Security Improvement Programs
Compliance
•
•
•
•
IT Infrastructure Risk/ Security Posture Assessment and Review
PCIDSS Assessment and compliance management
ISO27001 Assessment and compliance management
Information and Data protection
• IT Strategy and Planning
• COBIT
• IT Risk Management and Service Assurance
Management
• IT service Management
• IT Infrastructure design and Management
• IT performance management
5. Implementation Services
We implement Information Security solutions from leading
solution providers based on our clients’ unique needs and
requirements. we recommend and implement solutions to
ensure that our clients have their security objectives met.
From solutions that protect an organization’s perimeter to
solutions that prevent the loss of confidential data and
information or those that ensure that the security /risk
standpoint of an organization can be define.
Managed and Outsourced Services
We offer a variety of Managed Security and Compliance
services. This is also completed by our skilled personnel
outsourcing services. These services help our clients to
reduce the capital costs associated with deploying and
managing Information Security and Technology
Infrastructure and allow them to focus on their core
business operations.
Compliance as a Service
Provide organizations with Compliance management services
leveraging on our Managed Services Platform. Infoprive will
demonstrate compliance with regulations (PCI-DSS, SOX),
standards (ISO 27001) and corporate policies
Firewall Management as a Service
Periodically providing Firewall Management services to customers
leveraging on our Managed Services Platform
Log Management as a Service
Provision of Log and Event Management services leveraging our
Managed Services Platform
Backup as a Service
Provision of Network and Security Device backups services
leveraging our Managed Services Platform
6. Our Products
Business Impact
• 60% reduction in change management costs
• 80% reduction in firewall auditing costs
• Improved security posture
• Improved troubleshooting and network availability
• Improved organizational alignment and accountability
Skybox Product Portfolio
Firewall Assurance
Automated firewall
analysis and audits
Change Manager
Complete firewall
change workflow
HP Fortify
Network Assurance
Network compliance
and access path analysis
ObserveIT
Risk Control
Prioritize vulnerabilities
and attack scenarios
Threat Manager
Workflow to address
new threats
Pervade Software
7. Our People
Management Team
Our team is made up of experienced, creative, professional and business focused
people with competence in the design, implementation and management of
trusted Information security services.
The team draws on its knowledge; skill and experience in providing clients with
cost effective, value-driven and enabling services and solutions that help drive and
protect business outcomes.
Our wealth of experience is supported with industry recognized certifications in
relevant technologies and subject matter. An overview of a few certifications our
team currently holds.
Adetokunbo Omotosho has over a decade experience in information
Technology and Information Security. He was formerly the Divisional Head, IT Infrastructure & Enterprise Security at Interswitch
Limited, the leading transaction switching and electronic payment
processing company in Nigeria where he was responsible for the uninterrupted Information Technology operations and integrity of the
electronic switching network comprising of all banks, government
agencies and web merchants.
He has vast experience in the deployment and management of information technology and security infrastructure across the e-payment
Adetokunbo Omotosho sector within financial services industry. He led the deployment of
Chief Executive Officer
several electronic transactions switching Front End Processing (FEP)
systems for Banks in Nigeria and successfully managed the first Payment Card Industry Data
Security Standard (PCIDSS) compliance project in the country as well ensuring a hitch free
recertification. He has also been an external consultant and project manager to a couple of
banks on their PCIDSS compliance initiatives as well as the disaster recovery implementation
for their electronic payment infrastructure.
Adetokunbo has a Bachelor’s degree in Computer engineering from the prestigious Obafemi
Awolowo University, Ile-Ife and has attended senior management courses at the Lagos Business School and Boston University School of Management. He holds CRISC, CISM, COBIT
and ISO27001 certifications.
Kele Akaniro has over 12 years of experience in Information technology, working for some of the top firms in the institutional banking
and securities trading industry such as Citigroup, Merrill Lynch,
Bank of America, and Susquehanna International Group LLP. He
specializes in the selection, implementation, and management of
business information security technology investments.
Our technology partners
Kele Akaniro
Director, Global Business
Strategy
Pervade Software
He is a principle partner in Infoprive, and a Global Professional
service manager for AlgoSec; responsible for working with high-level
cross-functional teams of partners and customers, to deliver top-tier
implementation projects, as well as providing training to clients and
partners on the AlgoSec suite of application in North and Latin
America, Europe and Africa.
Mr. Akaniro holds a BA in Economics from Rutgers University, graduate certifications in
Technology and Financial management from Rutgers Business School, a Master of Science in
Computer Information Systems, with a concentration in Information Security, from Boston
University, a Certified AlgoSec Security Trainer, and also certified as a Project Management
Professional (PMP) by the Project Management Institute (PMI).
8. Gbolabo Awelewa is an Information Systems Management & Enterprise Security Expert with almost 10 years’ experience in the design,
development and management of secure Information Systems and
Infrastructure. He is a VMware Expert with Infrastructure Virtualization specialization, a certified Chief Information Security Officer, a
certified IT Service Manager and an Enterprise Information Security
Architect with Specialty in execution of Information Security strategy
and programs.
Gbolabo has been involved in the design and implementation of
secure Identity Access management systems, Security Operation
Gbolabo Awelewa
Centers, and Information Security Controls that enhance organizaDirector, Professional
tions compliance to relevant security standards and Frameworks
Service
like ISO, PCIDSS and COBIT. He is experienced in establishing
relationships between Information Security and strategic business partners.
Gbolabo worked as the Unit Head, Information Systems Security & Support Team of InfraTrust the Information Technology Infrastructure and Security Management competence
of Interswitch and was charged with ensuring the development and oversight of a secure and
continuously available infrastructure in support of Interswitch’s and financial services organization’s business capabilities. He played a relevant role in the Team that helped Interswitch
achieve its PCIDSS compliance, making Interswitch the first organization in West Africa to
be PCIDSS compliant.
He was also an Information Security Consultant at Altech W.A and his responsibilities
amongst others include Information security implementations, IT Vulnerability/Threat
management and also define, review and enforce information security policies, standards and
guidelines for business operations and technology implementations.
His Specialties are;
COBIT 5, PCIDSS, IT Governance, Risk & Compliance (GRC), SIEM (Symantec, SecureVue & Arcsight), EMV Cryptography/Security Two-Factor Authentication (RSA & Gemalto), Enterprise Security Management, Security Advisory, Data Loss Prevention, Enterprise
Systems Administration, Infrastructure Virtualization, IT Service Management, Business
Process Automation, Messaging & Collaboration, IT Vulnerability/threat management,
Identity & Access Management, Disaster Recovery/Business Continuity mgmt, and Project
Management.
Lagos Office
185, Moshood Olugbani Street,
off Ligali Ayorinde, Victoria Island Extension,
Lagos
Phone: 01-815-8152
U.K Office
2nd Floor, 43 Broomfield Road, Chelmsford,
Essex, United Kingdom, CM1 1SY
Phone: 0203-002-0651
U.S Office
53 king Street, Suite 2, New York, NY 10003
Phone: 212-537-6914