See Web Security Trend from OWASP Top 10 - 2017Chia-Lung Hsieh
OWASP Top 10 is the most well-known web security awareness document. From the first publication in 2003 till the latest one of 2017, OWASP Top 10 has become the de facto application security standard.
OWASP Top 10 – 2017 can be the best start for your journey on application security. The speaker will introduce the OWASP Top 10 structure, historical comparison, and the latest trends. Besides, the speaker will also introduce other popular application security documents and tools for developers, security testers and application managers.
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays
apidays LIVE New York 2021 - API-driven Regulations for Finance, Insurance, and Healthcare
July 28 & 29, 2021
Securing access to high performing API in a regulated environment
Subhabrata Chatterjee, Architect and Chapter Lead - Cloud at Danske IT Services
Secure Your Web Applications and Achieve Compliance Avi Networks
Security breaches are on the rise. According to the Verizon Data Breach Investigations Report 2018, web application attacks are the number one source of breaches, but web application security—especially as web applications are increasingly deployed outside of traditional on-premise environments—is lagging.
As a result, regulations and compliance needs are increasingly reinforcing the need for web application security. This webinar will focus on regulations such as GDPR, PCI DSS, and HIPAA and their impact on what you need to do for web security.
You will learn how advances in Web Application Firewalls and application insights can help you achieve your security and compliance goals.
Watch the full webinar: https://info.avinetworks.com/webinars-secure-web-applications-and-achieve-compliance
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
In this on-demand webcast, Quest AD experts will show you how to reduce incident response time investigations across your environment. Discover how to automate your AD business continuity plan (BCP) to minimize your RTO (recovery time objective) in the event of a security incident that causes partial or total damage across your AD infrastructure.
Find out more at: quest.com/stophank
For enterprises looking to protect cloud app data, Cloud Access Security Brokers (CASBs) have quickly emerged as the go-to solution. But how have CASBs matured and encompassed critical pieces of the security puzzle, from identity management to data leakage prevention?
Join Bitglass and (ISC)2 for Episode 1 of the CASB Wars webinar trilogy for a discussion about the evolution of CASBs from app discovery to complete cloud security suites and basic API-based controls to more capable multi-protocol proxies.
See Web Security Trend from OWASP Top 10 - 2017Chia-Lung Hsieh
OWASP Top 10 is the most well-known web security awareness document. From the first publication in 2003 till the latest one of 2017, OWASP Top 10 has become the de facto application security standard.
OWASP Top 10 – 2017 can be the best start for your journey on application security. The speaker will introduce the OWASP Top 10 structure, historical comparison, and the latest trends. Besides, the speaker will also introduce other popular application security documents and tools for developers, security testers and application managers.
apidays LIVE New York 2021 - Securing access to high performing API in a regu...apidays
apidays LIVE New York 2021 - API-driven Regulations for Finance, Insurance, and Healthcare
July 28 & 29, 2021
Securing access to high performing API in a regulated environment
Subhabrata Chatterjee, Architect and Chapter Lead - Cloud at Danske IT Services
Secure Your Web Applications and Achieve Compliance Avi Networks
Security breaches are on the rise. According to the Verizon Data Breach Investigations Report 2018, web application attacks are the number one source of breaches, but web application security—especially as web applications are increasingly deployed outside of traditional on-premise environments—is lagging.
As a result, regulations and compliance needs are increasingly reinforcing the need for web application security. This webinar will focus on regulations such as GDPR, PCI DSS, and HIPAA and their impact on what you need to do for web security.
You will learn how advances in Web Application Firewalls and application insights can help you achieve your security and compliance goals.
Watch the full webinar: https://info.avinetworks.com/webinars-secure-web-applications-and-achieve-compliance
Investigating and Recovering from a Potential Hybrid AD Security BreachQuest
In this on-demand webcast, Quest AD experts will show you how to reduce incident response time investigations across your environment. Discover how to automate your AD business continuity plan (BCP) to minimize your RTO (recovery time objective) in the event of a security incident that causes partial or total damage across your AD infrastructure.
Find out more at: quest.com/stophank
For enterprises looking to protect cloud app data, Cloud Access Security Brokers (CASBs) have quickly emerged as the go-to solution. But how have CASBs matured and encompassed critical pieces of the security puzzle, from identity management to data leakage prevention?
Join Bitglass and (ISC)2 for Episode 1 of the CASB Wars webinar trilogy for a discussion about the evolution of CASBs from app discovery to complete cloud security suites and basic API-based controls to more capable multi-protocol proxies.
Interested in how Cloud Access Security Brokers are being deployed by organizations in several industries? Learn about how Cloud, Mobile, and Discovery solutions are used by Bitglass customers.
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
Thousands of organizations across all verticals are leveraging CASBs to secure data in public cloud apps like Office 365, Google Apps, and Box. Learn about the use cases for complete control and visibility provided by CASBs across both managed and unmanaged devices and understand how your peers are leveraging CASBs to secure data beyond the firewall in this second part of our three-part series.
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Bitglass
Forrester analyst Andras Cser joins Bitglass for a webinar on Cloud Access Security Brokers and how they can help organizations protect data across any cloud app.
Layered Security / Defense in Depth
One area that I have found that even seasoned security professionals have a problem with articulating is layered security (defense in depth). Most are familiar with their area of expertise (servers, networks, pen testing, etc.), but have never viewed security as a heterogeneous process. In my presentation I use a layered diagram to highlight what controls are in what layers, what controls interact across layers, and what a complete layered security model would look like vs. what a more typical company security model does look like.
Nathan Shepard
CISSP, CISM, CRISC, CISA
33 Years in IT.
21 Years in Information Security.
Information Security consulting at the corporate governance level.
Information Security management for outsourced InfoSec delivery.
Office 365 Security: How to Safeguard Your DataBitglass
Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, provide practical cloud security advice that you can apply immediately in your organization.
Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and give examples of how your peers have responded to the cloud security challenge.
Slide on Cloud Security. This defines the possible aspects on Cloud Security. Images are taken from different Websites which are mentioned on references section.
People no longer hesitate when storing highly sensitive documents like health reports, legal papers, enterprise documents and bank details in cloud storage sites and when geotagging personal photos in social networking sites. Even though the cloud is now an integral part of computer users, there are hardly any universal rules or laws that protect users’ privacy, thereby placing that responsibility in the end user’s hands. This session will discuss key threats to end user privacy and what precautions users can take to eliminate or minimize the harm caused by them.
Preventing Data Cloud Breaches with Zero TrustSara Goodison
Large profile data breaches have become a part of our daily reality. Shouldn't the move to the data cloud make organizations more secure? Turns out, making sense of the who, what, where, and how of data use is only getting more complex. Join us to learn about how to protect your data with Zero Trust Architecture.
We'll cover the common security mistakes organizations make in the data cloud, and the tactics that attackers use to take advantage of them. By the end of the session, you'll learn new approaches that help your security or DevOps teams observe, control, and protect data.
International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security
The Shifting Landscape of PoS MalwareOutputSilas Cutler
2014 was plagued with news breaches involving the payment card processing systems of major retailers such as Target, Home Depot, and UPS. While most financially motivated hacking is done with banking Trojans such as Zeus, Point-of-Sale (PoS) malware has managed to archive a high degree of success and notoriety, while being relatively simplistic in design and untrodden in the malware world. Together, we'll take a look at some of the most well know Point-of-Sale malware families, their technical aspects, and explore a little bit of the underground credit card fraud market.
Learning about Security and Compliance in Office 365Aptera Inc
You will learn:
The type of businesses that are well suited for a move to the cloud
How to decide when you should make the move to the cloud
Ways the cloud can help your business meet government compliance recommendations
How storing your data in the cloud can be even more secure than storing them on premises
Why Microsoft's datacenter can be more secure than your companies datacenter
A unified discovery center for all of the following:
E-mail (Exchange)
Documents (SharePoint)
IM/Chat (Lync)
Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premises security solutions. In this webinar, we will discuss cloud access security brokers (CASBs) and how they can help financial services firms solve their security, compliance, and deployment concerns.
Information Security protects information from a wide range of threats in order to ensure business continuity, minimise business damage and maximise return on investment and business opportunities
Interested in how Cloud Access Security Brokers are being deployed by organizations in several industries? Learn about how Cloud, Mobile, and Discovery solutions are used by Bitglass customers.
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
Thousands of organizations across all verticals are leveraging CASBs to secure data in public cloud apps like Office 365, Google Apps, and Box. Learn about the use cases for complete control and visibility provided by CASBs across both managed and unmanaged devices and understand how your peers are leveraging CASBs to secure data beyond the firewall in this second part of our three-part series.
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)Bitglass
Forrester analyst Andras Cser joins Bitglass for a webinar on Cloud Access Security Brokers and how they can help organizations protect data across any cloud app.
Layered Security / Defense in Depth
One area that I have found that even seasoned security professionals have a problem with articulating is layered security (defense in depth). Most are familiar with their area of expertise (servers, networks, pen testing, etc.), but have never viewed security as a heterogeneous process. In my presentation I use a layered diagram to highlight what controls are in what layers, what controls interact across layers, and what a complete layered security model would look like vs. what a more typical company security model does look like.
Nathan Shepard
CISSP, CISM, CRISC, CISA
33 Years in IT.
21 Years in Information Security.
Information Security consulting at the corporate governance level.
Information Security management for outsourced InfoSec delivery.
Office 365 Security: How to Safeguard Your DataBitglass
Greg Schaffer, CISO at FirstBank and Rich Campagna, VP of Products at Bitglass, provide practical cloud security advice that you can apply immediately in your organization.
Focusing on O365 but offering a broad view, Greg and Rich will cover top concerns, mitigating controls and give examples of how your peers have responded to the cloud security challenge.
Slide on Cloud Security. This defines the possible aspects on Cloud Security. Images are taken from different Websites which are mentioned on references section.
People no longer hesitate when storing highly sensitive documents like health reports, legal papers, enterprise documents and bank details in cloud storage sites and when geotagging personal photos in social networking sites. Even though the cloud is now an integral part of computer users, there are hardly any universal rules or laws that protect users’ privacy, thereby placing that responsibility in the end user’s hands. This session will discuss key threats to end user privacy and what precautions users can take to eliminate or minimize the harm caused by them.
Preventing Data Cloud Breaches with Zero TrustSara Goodison
Large profile data breaches have become a part of our daily reality. Shouldn't the move to the data cloud make organizations more secure? Turns out, making sense of the who, what, where, and how of data use is only getting more complex. Join us to learn about how to protect your data with Zero Trust Architecture.
We'll cover the common security mistakes organizations make in the data cloud, and the tactics that attackers use to take advantage of them. By the end of the session, you'll learn new approaches that help your security or DevOps teams observe, control, and protect data.
International Journal on Cryptography and Information Security (IJCIS) is an open access peer reviewed journal that focuses on cutting-edge results in applied cryptography and Information security. It aims to bring together scientists, researchers and students to exchange novel ideas and results in all aspects of cryptography, coding and Information security
The Shifting Landscape of PoS MalwareOutputSilas Cutler
2014 was plagued with news breaches involving the payment card processing systems of major retailers such as Target, Home Depot, and UPS. While most financially motivated hacking is done with banking Trojans such as Zeus, Point-of-Sale (PoS) malware has managed to archive a high degree of success and notoriety, while being relatively simplistic in design and untrodden in the malware world. Together, we'll take a look at some of the most well know Point-of-Sale malware families, their technical aspects, and explore a little bit of the underground credit card fraud market.
Learning about Security and Compliance in Office 365Aptera Inc
You will learn:
The type of businesses that are well suited for a move to the cloud
How to decide when you should make the move to the cloud
Ways the cloud can help your business meet government compliance recommendations
How storing your data in the cloud can be even more secure than storing them on premises
Why Microsoft's datacenter can be more secure than your companies datacenter
A unified discovery center for all of the following:
E-mail (Exchange)
Documents (SharePoint)
IM/Chat (Lync)
Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they face heavier regulations than many other enterprises. As cloud adoption continues to spread within the industry, financial services firms must be particularly focused on ensuring cybersecurity. However, this means that they can no longer rely on traditional, on-premises security solutions. In this webinar, we will discuss cloud access security brokers (CASBs) and how they can help financial services firms solve their security, compliance, and deployment concerns.
Information Security protects information from a wide range of threats in order to ensure business continuity, minimise business damage and maximise return on investment and business opportunities
Guide to security patterns for cloud systems and data security in aws and azureAbdul Khan
Cloud has many advantages over the traditional on-premise infrastructure; however, this does bring many new concerns around issues of system security, communication security, data security, privacy, latency and availability. When designing and developing Cloud SaaS application, these security issues need to be addressed in order to ensure regulatory compliance, security and trusted environment in AWS and Azure.
The presentation provides real-world cloud security scenarios (problem statements) and proposed solutions for each security design pattern. Also covers the different security aspects of system including, data security to privacy and GDPR related problems.
Regulatory Compliance and Long-Term Storage of DataArkivum
How do you or your company tackle the long-term storage of data? Do you actively archive? In this topical webinar, Arkivum and S3 will look at the benefits and approaches to archiving electronic documents and records in the Life Sciences industry, including the challenges of regulatory requirements, how to comply with them, and how outsourcing long-term storage can form part of the solution.
The day when 3rd party security providers disappear into cloud bright talk se...Ulf Mattsson
How should we prepare for this new brave world where many 3rd party security providers disappeared into cloud providers? This will greatly impact many 3rd party security vendors, organizations and investors.
Cloud transformations are accelerating. By 2020, cloud will increase by 157% and on-premises ’traditional’ IT infrastructure will decrease by 54%, according to 452 Research, 2018.
We will cover how many security solutions will change, including:
- WAF – Web Application Firewalls
- SIEM
- Firewalls
- Encryption
- Tokenization
- Key Management
- AV – Anti Virus
- Network
- And more...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
Public concern for the safety of data is growing – not just in how criminals might use stolen data to commit fraud, but also in how personal data is used by the organisations we engage with. This is limiting growth in digital services, and damaging trust in government and enterprises.
The EU's General Data Protection Regulation (GDPR) came into force in May 2018. Now it is influencing new privacy regulations around the world, governing how organisations collect, store, process, retain, and share the personal data of citizens.
In this session, we explore the specific data management requirements demanded by new privacy regulations, digital ethics, and everyone's role in being conscientious stewards of customer data. We discuss how MongoDB can provide the core technology foundations to help you accelerate your path to compliance with new privacy demands.
Cloud computing 10 cloud security advantages and challengesVaibhav Khanna
Cloud security is the protection of data stored online via cloud computing platforms from theft, leakage, and deletion. Methods of providing cloud security include firewalls, penetration testing, obfuscation, tokenization, virtual private networks (VPN), and avoiding public internet connections
Security and privacy of cloud data: what you need to know (Interop)Druva
Is your company thinking about the cloud or already in there but learning fast about the many challenges of the security and privacy of cloud data?
Learn more about the landscape of data in the cloud, and the obstacles that every company should consider when it comes to protecting their down.
FINTECH, CYBERSECURITY AND BUSINESS READINESS Andrew_Goss
Presentation by Craig Spiezle, Chairman Emeritus, Online Trust Alliance, and Strategic Board Advisor, Internet Society, at the 5th annual National Cybersecurity Conference in Jamaica. Spiezle discusses cybersecurity in financial services and the security/privacy concerns of Internet connected devices.
Cloud Security for Regulated Firms - Securing my cloud and proving itHentsū
As a regulated cloud user, security and compliance are two of your primary concerns, a workshop on how to keep secure and demonstrate your compliance to key stakeholders.
Specifically, what can be done to secure cloud resources and show compliance for auditors, investors, DDQs, SSAE16, covering:
- Strategies for securing data in transit and at rest
- Federating with your internal directory for role based access to your cloud
- Capturing and processing audit logs for security event notifications
- Fun with Infrastructure as Code – detecting and reverting misconfigurations and manual changes
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
Do you have a GDPR Roadmap?
- How to measure Cybersecurity Preparedness
- Oversight of Third Parties
- Related International Standards
- Killing Cloud Quickly?
Technology aspects:
- International/EU PII Customer Case Studies
- Available Data Protection Options
- How to Integrate Security into Application Development
- Security Metrics
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
1. IT SECURITY – AN OVERVIEW
INSPIRATION FROM
ISO 2700X - DR. DANIEL SOPER – ”NYE SIKKERHEDSMODELLER” - GDPR
LARS KRAG KONGSGAARD - SENIOR PROJECT MANAGER 1
3. NEW PARADIGM -
FROM IDENTIFICATION TO AUTHORIZATION
• Authorization based on validation
• Prevention based on segmentation
• Security by design
• Privacy by design
• Credentials depending on Context
LARS KRAG KONGSGAARD - SENIOR PROJECT MANAGER 3
4. NEW MODELS FOR SECURITY
FROM IDENTIFICATION TO AUTHORIZATION
• Properties
• Authentication
• Responsibility
• Communication
Channel
• Integrity
• Responsibility
• Role
• Information
• Validity
• Private Key
• Authorization
per transaction
• Pseudonyms
• Authorization
disconnection
from
Identification
• Semantic
Interoperability
• Stakeholder
Segmentation
• Stakeholder-
based
Metadata
• Implicit - no
action for User
• Context
dependent
Credentials
• Transaction
Segmentation
• Information
disclosure based
on need
• Purpose-specific
Keys
• Transaction
Context
• Transparency
• User control
• Consent
• Code of conduct
• Virtual Identity
• Information
Level
Negotiation
• Data Enrichment
Control
• Positive
Properties
• Negative
Properties
• Holder
• Situation
• Issuer
• Usage
• Protocol
• Selective
Disclosure
• Undeniability
• Verifiable
Encryption
Authorization Prevention
Privacy by
Design
Security by
Design
Credentials
LARS KRAG KONGSGAARD - SENIOR PROJECT MANAGER 4
5. ENHANCED GENERAL DATA PROTECTION REGULATION
(GDPR) AGREED BY EUROPEAN PARLIAMENT.
• Deadline: GDPR compliance before May 25, 2018
• Failure: GDPR compliance failure subject to penalties and fines
• Application: European Union (consumer and personal data across EU nations)
• Key Requirements for GDPR privacy and data protection:
• Consent of subjects for data processing
• Privacy Protection by means of Anonymizing collected data
• Data breach notifications
• Safe transfer of data across borders
• Appointment of officer for GDPR compliance data protection for certain companies
LARS KRAG KONGSGAARD - SENIOR PROJECT MANAGER 5