SlideShare a Scribd company logo
1 of 1
12.21.2015
Ofer Cohen's
Major areas of expertise in IT Risk management and IT Audit
1. IT Management, Security and Governance - regulations, policies and procedures.
2. SDLC – Systems development life cycle.
3. Change management and versions.
4. Production management, managing varied IT environments, production phase.
5. Post implementation phase
6. Projects managements risks
7. Business Processes that include integrated varied systems and infrastructures
8. Complex User and Machine Interfaces.
9. Data Management - Files, Databases and DWH.
10. Assets and Risk Management.
11. Errors handling and management.
12. Business continuity management
13. Controls management (organizational, manual, applicative-technological, fraud)
14. Edge events and special conditions - EOL, SPOF, STP…
15. Information security (users, passwords, authorization, DLP, etc).
16. Physical information security.
17. IT Strategy.
18. Risk management Methodology.
19. Cyber security strategy and economical considerations.
20. Martial Arts, management and Risks – combined best practices.
21. Outsourcing and suppliers management.
22. Lecturing and conducting short workshops about all these subjects from practical
perspective.
Ofer999@gmail.com
Ofer JRL Cohen
(972) 052-8809109

More Related Content

What's hot

Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Maxpromotion
 
Is Department Roles
Is Department RolesIs Department Roles
Is Department Roleserickaselina
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1MLG College of Learning, Inc
 
Security technologies
Security technologiesSecurity technologies
Security technologiesDhani Ahmad
 
Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department memberseffinsquirrel
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspectivenooralmousa
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyaniAeliani92
 
Cyber war scenario what are the defenses
Cyber war scenario   what are the defenses Cyber war scenario   what are the defenses
Cyber war scenario what are the defenses A. V. Rajabahadur
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityDATA SECURITY SOLUTIONS
 

What's hot (20)

Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1Jupiter physical security ppt 2016 1
Jupiter physical security ppt 2016 1
 
How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure How You Can Keep Your Organization Secure
How You Can Keep Your Organization Secure
 
Is Department Roles
Is Department RolesIs Department Roles
Is Department Roles
 
Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1Information Assurance And Security - Chapter 2 - Lesson 1
Information Assurance And Security - Chapter 2 - Lesson 1
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Cyber Security in Power Systems
Cyber Security in Power SystemsCyber Security in Power Systems
Cyber Security in Power Systems
 
Istanbul issep2014
Istanbul issep2014Istanbul issep2014
Istanbul issep2014
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Roles of is department members
Roles of is department membersRoles of is department members
Roles of is department members
 
Jamie Schroeder's Resume
Jamie Schroeder's ResumeJamie Schroeder's Resume
Jamie Schroeder's Resume
 
Ghassan farra it security a cio perspective
Ghassan farra   it security a cio perspectiveGhassan farra   it security a cio perspective
Ghassan farra it security a cio perspective
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyani
 
Cyber war scenario what are the defenses
Cyber war scenario   what are the defenses Cyber war scenario   what are the defenses
Cyber war scenario what are the defenses
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
IoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware SecurityIoT Technologies for Context-Aware Security
IoT Technologies for Context-Aware Security
 

Viewers also liked

Viewers also liked (13)

Novoe v porjadke_attestacii_na_2014_god
Novoe v porjadke_attestacii_na_2014_godNovoe v porjadke_attestacii_na_2014_god
Novoe v porjadke_attestacii_na_2014_god
 
Getxo algorta
Getxo  algortaGetxo  algorta
Getxo algorta
 
Championnats 2015(1)
Championnats 2015(1)Championnats 2015(1)
Championnats 2015(1)
 
Desain dan struktur organisasi
Desain dan struktur organisasiDesain dan struktur organisasi
Desain dan struktur organisasi
 
RJZ Cyrela Like • Lançamento Imobiliário • Barra da Tijuca
RJZ Cyrela Like • Lançamento Imobiliário • Barra da TijucaRJZ Cyrela Like • Lançamento Imobiliário • Barra da Tijuca
RJZ Cyrela Like • Lançamento Imobiliário • Barra da Tijuca
 
خطبہ جمعہ 18 دسمبر 1992
خطبہ جمعہ 18 دسمبر 1992 خطبہ جمعہ 18 دسمبر 1992
خطبہ جمعہ 18 دسمبر 1992
 
Linux εντολές cp ,mv, ln
Linux εντολές cp ,mv, lnLinux εντολές cp ,mv, ln
Linux εντολές cp ,mv, ln
 
Design_Project.compressed
Design_Project.compressedDesign_Project.compressed
Design_Project.compressed
 
Culture
CultureCulture
Culture
 
Soundcloud
SoundcloudSoundcloud
Soundcloud
 
Intel Core i7
Intel Core i7Intel Core i7
Intel Core i7
 
Kickoff Connected Car Challenge
Kickoff Connected Car ChallengeKickoff Connected Car Challenge
Kickoff Connected Car Challenge
 
Von thunen Model
Von thunen ModelVon thunen Model
Von thunen Model
 

Similar to Ofer Cohen - areas of expertise

ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxharigopala
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxNapoleon NV
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15Thomas McDonald
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challengeFERMA
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.docAvinash Avuthu
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_introAleeza Aziz
 

Similar to Ofer Cohen - areas of expertise (20)

ISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptxISO27k Awareness presentation.pptx
ISO27k Awareness presentation.pptx
 
ISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptxISO27k Awareness presentation v2.pptx
ISO27k Awareness presentation v2.pptx
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
Information Security
Information SecurityInformation Security
Information Security
 
mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15mcdonald.thomas.resume11-15
mcdonald.thomas.resume11-15
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Komal Vora
Komal VoraKomal Vora
Komal Vora
 
MRC_CV_JBP_240414
MRC_CV_JBP_240414MRC_CV_JBP_240414
MRC_CV_JBP_240414
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Information security management.doc
Information security management.docInformation security management.doc
Information security management.doc
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Lecture 1 technology-management_intro
Lecture 1 technology-management_introLecture 1 technology-management_intro
Lecture 1 technology-management_intro
 
Mohamed Elsayed
Mohamed ElsayedMohamed Elsayed
Mohamed Elsayed
 

Ofer Cohen - areas of expertise

  • 1. 12.21.2015 Ofer Cohen's Major areas of expertise in IT Risk management and IT Audit 1. IT Management, Security and Governance - regulations, policies and procedures. 2. SDLC – Systems development life cycle. 3. Change management and versions. 4. Production management, managing varied IT environments, production phase. 5. Post implementation phase 6. Projects managements risks 7. Business Processes that include integrated varied systems and infrastructures 8. Complex User and Machine Interfaces. 9. Data Management - Files, Databases and DWH. 10. Assets and Risk Management. 11. Errors handling and management. 12. Business continuity management 13. Controls management (organizational, manual, applicative-technological, fraud) 14. Edge events and special conditions - EOL, SPOF, STP… 15. Information security (users, passwords, authorization, DLP, etc). 16. Physical information security. 17. IT Strategy. 18. Risk management Methodology. 19. Cyber security strategy and economical considerations. 20. Martial Arts, management and Risks – combined best practices. 21. Outsourcing and suppliers management. 22. Lecturing and conducting short workshops about all these subjects from practical perspective. Ofer999@gmail.com Ofer JRL Cohen (972) 052-8809109