Security and Resilience
In a rapidly changing world where information has a significant value, supply chains are interconnected and there is uncertainty when doing business on a global basis, the security and resilience of operations has become a board level issue.
Our team has grown very rapidly over the past few years, and continues to do so. We have the largest UK Security Resilience team of the "big-4", with over 180 professionals in the UK. The team combines a wealth of deep industry knowledge with both business advisory experience and technical expertise. We provide our clients a full spectrum of services encompassing information security, corporate and physical security and business and technology resilience to help our clients fix their issues and bring them real, long-lasting benefits.
The Information Privacy Protection team help organisations secure information systems, protect intellectual property, and provide convenient but secure access to information and demonstrating compliance with regulatory mandates. We work with clients to identify and address a full range of issues from structure and policy, through to assisting in specific areas such as data privacy, data leakage prevention/monitoring, information rights management, third party security and PKI/cryptography.
To assist our clients in the defining their information security strategy as well as architect and design their IT security controls, the role will include:
· Defining an information security strategy, including guiding principles and future state vision, ensuring that the strategic objectives are aligned with business goals
· Defining an IT security systems architecture to support that strategy
· Analysis of IT security technologies and processes that clients already have in place and identifying potential deficiencies
· Defining key initiatives that will be incorporated in any strategic roadmap, including key drivers, benefits, objectives and deliverables, in collaboration with business and IT stakeholders
· Designing various types of IT security solutions across a range of security domains including identity and access management, threat and vulnerability management, risk and compliance management and encryption key management
Leave a Reply
You must be logged in to post a comment.