requirements.
regulatory requirements. Oversees the identification, assessment and management of information security risks security regulations, laws, and industry standards. Assesses and selects appropriate security technologies manages internal and external security audits and assessments. Provides guidance and leadership to the information management, business risk management, IT risk assessment and management, IT continuity management, IT
of key communications. Assess the change impact Conduct impact analyses, assess change readiness, and performance areas Complete change management assessments Identify, analyse and prepare risk mitigation
successful completion of the project. Identifying and assessing risks within a project and have contingency plans
procurement process. Meeting with project clients to assess their needs and define project requirements, acceptance
incidents. Conduct regular security audits and risk assessments to identify potential threats and recommend solutions
deliverables with key stakeholders Continually assess the viability of the Projects/epic, leading indicators may adjust for client needs. Fair process: Fair assessment, only shortlisted candidates contacted due to
and potential threats to improving relationships Assess social, political, environmental and economic environment
may adjust for client needs. Fair process: Fair assessment, only shortlisted candidates contacted due to
may adjust for client needs. Fair process: Fair assessment, only shortlisted candidates contacted due to