cyber-attacks, intrusions, malware and various types of data breaches. · Assess IT security needs, align cyber Knowledge of the regulatory requirements such as Data Privacy and Protection of Personal Information Act Management § IT Risk Management § IT Control Monitoring § Data Protection § Information Security JOB-RELATED COMPETENCIES
Management § IT Risk Management § IT Control Monitoring § Data Protection § Information Security JOB-RELATED COMPETENCIES