Description
Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
EssentialOptional
Theoretical Knowledge
ICT network security risksICT security standardscyber securitydata protectionICT security legislationinternal risk management policyethical hacking principlesICT project managementICT project management methodologiesorganisational resiliencesecurity engineeringinformation confidentialityICT process quality modelsattack vectorsinformation security strategyethicsrisk managementdecision support systemsaudit techniquescyber attack counter-measuresassessment of risks and threatsweb application security threatsICT communications protocolscontrol objectives for information and related technologyICT infrastructurecloud technologiesICT encryptioncloud security and complianceICT system user requirementsICT recovery techniquessoftware anomaliesWorld Wide Web Consortium standardscomputer forensicsInternet of Thingsinternet governancecloud monitoring and reportingcomputer programming
Practical Skills
engage with stakeholdersensure compliance with legal requirementsdevelop information security strategymaintain plan for continuity of operationscommunicate with stakeholdersensure cross-department cooperationestablish an ICT security prevention planforecast organisational risksimplement ICT security policiesutilise decision support systemmonitor technology trendsensure information privacycomply with legal regulationslead disaster recovery exercisesimplement ICT risk managementestablish an Information Security Management SystemICT safetymanage IT security compliancesmanage system securityensure adherence to organisational ICT standardsidentify ICT security risksmanage disaster recovery plansmonitor developments in field of expertiseadvice on security risk managementimplement corporate governanceeducate on data confidentialityoptimise choice of ICT solutionimplement cloud security and compliancetrain employeesimplement anti-virus softwareexecute ICT auditscoordinate technological activitiesidentify legal requirementsassess ICT knowledgemanage staffconduct impact evaluation of ICT processes on businessprotect personal data and privacyimplement a firewallmanage digital identitymanage keys for data protectionimplement a virtual private networkuse different communication channelsapply operations for an ITIL-based environmentcreate solutions to problems