Curriculum Vitae - Education 2008
Curriculum Vitae - Education 2008
(ISC)2
•CISSP - Certified Information Systems Security Professional, Nov '07 to Nov '10
ISACA
•CGEIT - Certified in the Governance of Enterprise IT, Oct '08 to Jan ’12
•CISM - Certified Information Security Manager, Feb '03 to Jan '09
International Register of Certified Auditors (IRCA)
•ISMS Provisional Auditor, Dec '08 - '09
•ISMS Provisional Auditor, Dec '07 - '08
Information Technology Infrastructure Library (ITIL)
•ITIL: Foundation Certification v3, May '08
SunGard/Strohl Systems
•BIA Professional Software - Business Impact Assessment - Training, Apr '08
Intel
•Microsoft SCCM 2007 SP1 Intel vPro Training Videos Introduction, Nov '08
McAfee
•Technical: ePolicy Orchestrator 4.0 Essentials, Mar '08
•Technical: ePolicy Orchestrator 4.0 Introduction, Mar '08
Symantec
•STS - Symantec Endpoint Protection v11, Aug '08 ()
•SCS - Symantec Endpoint Protection v11.0 Administrator, Apr '08
•Partner Technical Training Class: Symantec Network Access Control 11.0 - Troubleshooting and Enforcers, Apr '08
•Partner Technical Training Class: Symantec Network Access Control 11.0 - Fundamentals, Apr '08
•Partner Technical Training Class: Symantec Endpoint Protection 11.0 - Technical Overview, Apr '08
•Partner Technical Training Class: Symantec Control Compliance Suite 8.5, Apr '08
Symantec Enablement Toolkit
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Planning Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Knowledge Transfer Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Assessment Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Initial Tuning Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Deployment/Migration Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Architecture Design Methodology, Mar '08
•Consulting Methodology: Service Offering: SEP/SNAC Enablement - Offering Overview SAV/SCS Migration, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Network Audit and Remote Client Installation, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Active Directory Integration, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: Component Placement, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Infrastructure and Deployment: System Architecture, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Reporting, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Logging, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Client Organization and Location, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Migration Overview, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Administration Overview, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - Introduction: Installation Overview, Mar '08
•Install, Configure, Deploy: Symantec Endpoint Protection 11.0 - What is New, Mar '08
•Pre-Sales Technical: Symantec Endpoint Protection 11.x Tips for Performing a Successful Customer Demo, Mar '08
•Pre-Sales Technical: Symantec Endpoint Protection 11.x Technical Architecture, Mar '08
Novell
•Positioning & Selling Novell Access Manager 3, Feb '08
ISACA e-Symposiums
Application Security: Attack and Response, Aug ’08
•Bridging SOA and IT Governance: Policy or Peril
Darren Jones, CMA, Director, CIO Solutions and Enterprise Information Management, Protiviti Canada
•The PCI Data Security Standard: A Practitioner’s Primer
Ken Zeng, CISA, Sr. Director - Governance, Risk, & Compliance, Oracle
•Compliance: Where are we now?
Ivan Wallis, U.S. West Applications Engineer, SSH Communications Security, Inc
•Gambling with security: Ignoring Web application security isn't just a compliance issue. It's a risk issue.
Michael Weider, Director of Security Products, IBM Rational IBM Software Group
Security and Compliance Unite, Jul ’08
•Realizing the Business Benefits of Deploying a Practical Model for Information Security and Risk Management
Vernon Poole, CISM,CGEIT, Head of Business Consultancy, Sapphire Technologies Ltd.
•Automating the Convergence of Security and Compliance
Mark Seward, CISA, CISSP, Director Product Marketing Compliance, Qualys
•Compliance Integration and Security Alignment
Roger Southgate, CISA, CISM, FCCA, MBA, Leader of the London COBIT Development Group and immediate past president of the London Chapter
•Risk and Compliance Management: An Approach Based on Real-world Statistics
Simon Oxley, Managing Director, Citicus Ltd.
Security, Privacy and Trust, Jun ’08
•Identity Attributes Design
Naiden Nedelchev, CISM, Technology Security Officer, Mobiltel EAD
•Security, Privacy, and Trust - Mission Impossible?
Mike Small, Principal Consultant Security Management, CA
•Identity Management – Beyond Provisioning
Meenu Gupta, CISA,CISM,CISSP, President, Mittal Technologies
•Assessing and Securing Wireless Networks
Douglas Haider, CISA,CISM,CISSP,PMP, Principal Wireless Security Consultant, Accuvant
Data Protection/Data Security, May ’08
•Common Information Security Threats Inside Our Organizations
Andrew Vesay, CISSP, Managing Partner. Practical Compliance Initiatives
•Meeting Global Compliance Intiatives While Protecting your Core Data Assets
Rob Barnes, Manager of Consultant Relations, Application Security Inc.
Toby Weiss, CEO, Application Security Inc
•Safeguarding Customer Data while Enabling Collaboration
Bruce Hicks, Data Security Services, IBM ISS
•Protecting Data Privacy; A Practical Guide to Managing Risk
Nathan Johns, Senior Audit Manager, Crowe Chizek
Assessing IT GRC Maturity, Apr ’08
•Enterprise Resiliency: Building Competencies to Adapt to Risk Environments
Lisa Young, Senior Member, Technical Staff, Carnegie Mellon University
•IT Governance Strategy
Renee Murphy, Managing Director, Fyoozhen Consulting
•IT GRC Maturity: Improving Business Results & Curtailing Financial Loss
Jim Hurley, Managing Director, IT Policy Compliance Group, Symantec
•Enterprisewide IT Risk Assessment
Julia Bird, Internal Auditor, City of Phoenix
PCI Compliance, Marc ’08
•CI and IT Governance
Jim Cowing, CISSP, CISM, CITP, Managing Director , Digital Resources Group
•Understanding the Requirements - What are they and What's New on the Horizon
Dorian Cougias, CEO, Network Frontiers and a member of the PCI Security Standards Council
•Specific Solutions to PCI and What to Look for in a Vendor
Geoff Webb, Senior Product Marketing Manager, NetIQ
•The PCI Data Security Standard
Steve Enevold, CISSP, GSEC, CISM, Director, Enterprise Security Architecture, Oracle
Application Security—The New Perimeter, Feb ’08
•Application Threat Modeling
Tony UcedaVelez, Executive Director, VerSprite
•Building Business Case for Application Security Using Value Chain Model
Robertas Vageris, CISA, CISM, Director, ASE.LT
•Why Should Your Web Applications Keep You From Sleeping at Night?
Humbert Low, CISM,CISA,CPA,CISSP, Service Line Leader/Information Protection and Business Resilience Advisory Services, KPMG LLP
•Changing Technologies for Meeting your Security Needs
Chris Wysopal, Co-Founder/Chief Technology Officer, Veracode
SANS Institute Webcast
•SQL Injection and My Oracle Database
Andrew R. Reese
Kansas City, Missouri Area
Mobile: (717) 395-3063
Links to more detail: