With my background in IT audit, I help my customers demonstrably improve their information security (and cybersecurity and privacy). In doing so, I focus on all three facets from the "people, process and technology" triangle in all phases of information security. In doing so, I help prevent incidents and non-compliance and put my customers in a position to act in the event of an information security incident.
My clients operate in different markets. On the one hand, I help them perform assessments against certain industry standards, such as from NIST or ISO, or certain legislation. On the other hand, I advise on and support the implementation of measures. Proportionality with the size of risks is a must as far as I am concerned: Information security is often seen as an inhibiting force or pure cost item. I believe that information security also adds value to organizations. That is why I try not to lose sight of the opportunities that the organization wants to exploit and have appropriate measures taken. By doing so, an organization can maintain the speed to exploit those opportunities and information is secured at the right level.
I am a registered IT auditor (RE) and hold several information security (and privacy) certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager and Certified Data Protection Officer (CDPO). In my free time, I prefer sports, soccer in particular. In addition, I can often be found in the kitchen and enjoy reading/listening about personal development.
Related pages
- RTO, RPO: New Perspectives on BCM in cyber threats
- What solutions does the market offer for cyber recovery?
- The dilemma between forensics and quick recovery during a cyber attack
- The dilemma between preparation and flexibility in cyber recovery
- Cyber recovery and outsourcing: insourcing or outsourcing
- What should you really recover after a cyberattack and what shouldn't? - Part 1
- Cyber attacks are inevitable: Is your company prepared to bounce back?
Topics & pages of Toine
Current events & blogs by Toine
- RTO, RPO: New Perspectives on BCM in cyber threats
- What solutions does the market offer for cyber recovery?
- The dilemma between forensics and quick recovery during a cyber attack
- The dilemma between preparation and flexibility in cyber recovery
- Cyber recovery and outsourcing: insourcing or outsourcing
- What should you really recover after a cyberattack and what shouldn't? - Part 1
- Cyber attacks are inevitable: Is your company prepared to bounce back?