IT Security Architecture
Perimeterless Security
Cloud Security
Corporate Security Awareness
Identity Management, Federation and Biometrics
My Personal Interests
IT Security Architecture
Technology Forecasting
IT Risk Management
Shadow IT
Corporate Apps
My Job Priorities
IT Security Architecture
Cloud Security
Shadow IT
Perimeterless Security
Technology Forecasting
IT Architecture
IT Security Architecture
My Knowledge Level
My Personal Interests
My Job Priorities
IT Innovation / Product Management
Technology Forecasting
My Knowledge Level
My Personal Interests
My Job Priorities
IT Risk / Security Management
Cloud Security
My Knowledge Level
My Personal Interests
My Job Priorities
Corporate Security Awareness
My Knowledge Level
My Personal Interests
My Job Priorities
IT Risk Management
My Knowledge Level
My Personal Interests
My Job Priorities
Identity Management, Federation and Biometrics
My Knowledge Level
My Personal Interests
My Job Priorities
Shadow IT
My Knowledge Level
My Personal Interests
My Job Priorities
Mobile / Perimeterless / Ubiquitous Computing
Corporate Apps
My Knowledge Level
My Personal Interests
My Job Priorities
Perimeterless Security
My Knowledge Level
My Personal Interests
My Job Priorities
Challenges
International Expansion
Currently dealing with
Has experience with
Major Business Transformation
Currently dealing with
Has experience with
Contact Information
There is no public contact information for this user.
Elevator Pitch
I am passionate about cybersecurity and the big picture it entails for society, where technology and data is at the core of our modern life. The velocity of threats and our dependency on technology is increasing. In response to these facts I used the the Microsoft Zero Trust Security Strategy to start painting a new picture of IT services built from the ground up with security in mind, whilst not forgetting user productivity and experience. This involved moving to a modern workplace that is fully cloud managed with AI based threat response. Building a cloud identity that uses rich telemetry to identify compromise with the aim to move to a passwordless state. Infrastructure that reduces the blast radius of a malware infection. Preventing data leakage through automated labelling with file encryption.