Blog Overview Overview of all my blog posts on WORLDPRESS 1) Digital Transformation approach 2) Free-consultancy 3) Job seekers be aware… 4) Cybersecurity, a top priority for businesses 5) Covid 19, The dividing of the UAE 6) The bad side of job hunting 7) Hi Friend and Colleagues 8) Recruiters be more aware… 9) Hiring managers are too picky with what they want 10) Cybersecurity is not an on/off switch 11) Cybersecurity threats facing Financial Services 12) Special report: Inside the UAE’s secret hacking team of the US Mercenaries 13) Video Pitch Prof. Dr. Ir. Henk Jan Jansen 14) Covid 19 5th update 15) Covid 19 4th update 16) Covid 19 3rd update 17) Covid 19-2nd update 18) Covid-19-update 19) Covid 19 20) Awareness of cyber risks 21) Is LinkedIn no longer a “Social Network” 22) Video Pitch Prof. Dr. Ir. Henk Jan Jansen 23) Were they even talking about the Covid-19 virus? 24) Are there any positive sides of COVID-19? 25) Cyber Security landscape in the UAE 26) Initiative for a Framework for National Cyber Security Awareness (NCSA) 27) Cybersecurity Threats Facing Financial Services 28) Penny for your thoughts 29) WHY IS WHATSAPP OR ANY OTHER VOIP CALL UNAVAILABLE IN UAE? 30) Clickshare, a Barco presentation tool can be abused by hackers 31) Reaching out to you 32) The Big List of Information Security Vulnerabilities 33) IT Security Vulnerability vs Threat vs Risk: What are the Differences? 34) Minimizing the Risks to Your Business Using Security Measures and Disaster Planning 35) Employee of the year 2016 36) PRIVACY AND DATA PROTECTION IN THE UAE 37) Let us help you with your GDPR Needs… 38) No GDPR Compliancy yet, then read how to get compliant… 39) Best way to reduce cost for your recruiting needs? 40) Great confusion when you talk or think about the security of your infrastructure 41) So, you want to be a security engineer? 42) How to Think Like an Attacker 43) Different Security Models 44) Today I learned something new about GDPR 45) Questions I got the last four weeks about GDPR/DSGVO/AVG 46) GDPR, basically you are just to late… 47) Available for New Freelance Roles 48) Don’t believe everything you hear about the GDPR 49) When GDPR knocking at your doorstep…. 50) Who Needs Agile… 51) Soon it is no longer possible to find the owner of a website 52) THE ISO 27000 (ISO 27K) SERIES 53) Why ISO 27001 is not enough 54) Hi friends and colleagues, 55) How to Block Those ANNOYING Banner Ads 56) Trump: FBI ‘totally unable’ to stop leaks 57) Awareness of Cyber risks 58) Analytics, The Smart Way… 59) Compliance Expectations of the Unexpected 60) GOING TO RSA 2017? -WATCH OUT FOR THE SANDMAN 61) P@ssport Triple A- Aggressive Cyber Defense 62) Portfolio 63) GDPR Solution, The Smart Way… 64) Accelerate Your Response to EU General Data Protection Regulation the Smart Way… 65) Cyber Resilience It’s not a fairytale but reality… 66) The Evolution of PM & Scrum 67) How secure is your company? 68) Have you ever wondered…? 69) No 100% awareness of Cyber and Data Security within many companies worldwide 70) Trust Is a Necessity, Not a Luxury 71) The SANS 20 Critical Security Controls 72) What are the SANS 20 Critical Security Controls 73) Lack of Cyber Security 74) The ‘Triple A’ Security Approach 75) The Internet of Things is dangerous! 76) Security and free Analytical Software 77) Innovations, Awareness and anticipating on Security threat’s 78) Types of Hackers 79) Finance a Hacker 80) Social media dos and don’ts: What you need to know 81) Parsing The 20 Critical Security Controls 82) Data protection Overview of the General Data Protection Regulation (GDPR) 83) Die Entstehung von Triple A Vorbeugende Cyber Risk Management 84) NIS Directive Introducing New Cyber-Security Requirements in the EU 85) European NIS Directive and German IT Security Act: New Legal Requirements for Operators of Essential Infrastructure 86) SANS Top 20 Critical Security Controls and SSH 87) EU CYBERSECURITY STANDARDS IN CRITICAL BUSINESS SECTORS AND DIGITAL SERVICES Share this:Click to share on LinkedIn (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to email a link to a friend (Opens in new window)Click to share on Twitter (Opens in new window)MoreClick to share on Facebook (Opens in new window)Click to share on Telegram (Opens in new window)Like Loading...
Overview of all my blog posts on WORLDPRESS 1) Digital Transformation approach 2) Free-consultancy 3) Job seekers be aware… 4) Cybersecurity, a top priority for businesses 5) Covid 19, The dividing of the UAE 6) The bad side of job hunting 7) Hi Friend and Colleagues 8) Recruiters be more aware… 9) Hiring managers are too picky with what they want 10) Cybersecurity is not an on/off switch 11) Cybersecurity threats facing Financial Services 12) Special report: Inside the UAE’s secret hacking team of the US Mercenaries 13) Video Pitch Prof. Dr. Ir. Henk Jan Jansen 14) Covid 19 5th update 15) Covid 19 4th update 16) Covid 19 3rd update 17) Covid 19-2nd update 18) Covid-19-update 19) Covid 19 20) Awareness of cyber risks 21) Is LinkedIn no longer a “Social Network” 22) Video Pitch Prof. Dr. Ir. Henk Jan Jansen 23) Were they even talking about the Covid-19 virus? 24) Are there any positive sides of COVID-19? 25) Cyber Security landscape in the UAE 26) Initiative for a Framework for National Cyber Security Awareness (NCSA) 27) Cybersecurity Threats Facing Financial Services 28) Penny for your thoughts 29) WHY IS WHATSAPP OR ANY OTHER VOIP CALL UNAVAILABLE IN UAE? 30) Clickshare, a Barco presentation tool can be abused by hackers 31) Reaching out to you 32) The Big List of Information Security Vulnerabilities 33) IT Security Vulnerability vs Threat vs Risk: What are the Differences? 34) Minimizing the Risks to Your Business Using Security Measures and Disaster Planning 35) Employee of the year 2016 36) PRIVACY AND DATA PROTECTION IN THE UAE 37) Let us help you with your GDPR Needs… 38) No GDPR Compliancy yet, then read how to get compliant… 39) Best way to reduce cost for your recruiting needs? 40) Great confusion when you talk or think about the security of your infrastructure 41) So, you want to be a security engineer? 42) How to Think Like an Attacker 43) Different Security Models 44) Today I learned something new about GDPR 45) Questions I got the last four weeks about GDPR/DSGVO/AVG 46) GDPR, basically you are just to late… 47) Available for New Freelance Roles 48) Don’t believe everything you hear about the GDPR 49) When GDPR knocking at your doorstep…. 50) Who Needs Agile… 51) Soon it is no longer possible to find the owner of a website 52) THE ISO 27000 (ISO 27K) SERIES 53) Why ISO 27001 is not enough 54) Hi friends and colleagues, 55) How to Block Those ANNOYING Banner Ads 56) Trump: FBI ‘totally unable’ to stop leaks 57) Awareness of Cyber risks 58) Analytics, The Smart Way… 59) Compliance Expectations of the Unexpected 60) GOING TO RSA 2017? -WATCH OUT FOR THE SANDMAN 61) P@ssport Triple A- Aggressive Cyber Defense 62) Portfolio 63) GDPR Solution, The Smart Way… 64) Accelerate Your Response to EU General Data Protection Regulation the Smart Way… 65) Cyber Resilience It’s not a fairytale but reality… 66) The Evolution of PM & Scrum 67) How secure is your company? 68) Have you ever wondered…? 69) No 100% awareness of Cyber and Data Security within many companies worldwide 70) Trust Is a Necessity, Not a Luxury 71) The SANS 20 Critical Security Controls 72) What are the SANS 20 Critical Security Controls 73) Lack of Cyber Security 74) The ‘Triple A’ Security Approach 75) The Internet of Things is dangerous! 76) Security and free Analytical Software 77) Innovations, Awareness and anticipating on Security threat’s 78) Types of Hackers 79) Finance a Hacker 80) Social media dos and don’ts: What you need to know 81) Parsing The 20 Critical Security Controls 82) Data protection Overview of the General Data Protection Regulation (GDPR) 83) Die Entstehung von Triple A Vorbeugende Cyber Risk Management 84) NIS Directive Introducing New Cyber-Security Requirements in the EU 85) European NIS Directive and German IT Security Act: New Legal Requirements for Operators of Essential Infrastructure 86) SANS Top 20 Critical Security Controls and SSH 87) EU CYBERSECURITY STANDARDS IN CRITICAL BUSINESS SECTORS AND DIGITAL SERVICES