
43,34%
Match com a taxonomia
empresa
Sem Parar
cargo
Diretor Segurança Infor
líder
Paulo Henrique Scrideli
Bio
Twenty two years of experience in Information Technology, fourteen of these dedicated to information security.
Strategic vision and ability to align business objectives with security, by applying different methodologies of risk management, that direct the deployment of security controls, based on a customized vision of the main security frameworks, such as: ISO 27001/27002/31000, Cobit, ITIL, COSO, PCI-DSS, PMI, SANS, NIST and others.
Successfully adopted methodologies that significantly raise the security level through projects to deploy security controls and maintain the level obtained in constant rise through a structured architecture of information security services.
Great experience in information security management, including people leadership, strategic and budget planning, project management and information security governance.
Extensive experience in the establishment and management of: information security policies, standards, controls, risk management, incident management, vulnerabilities and threats management, crisis management, business continuity, security monitoring, forensic analysis, audits (internal, SOX, DF, PCI-DSS), awareness, information classification, identities and access management, digital certificates management, and others.
Experience in security for cloud services, data leak prevention (DLP), mobile security, encryption, BYOD, advanced threats (APT), and security regarding social networks issues.
Facility in the leadership of people, experience in selecting and training of multidisciplinary teams. Practice in the management of third parties and outsourced security services (MSS).
Strong knowledge of security technologies, including: network architecture, communication protocols, and of different hardware and software platforms, including: operating systems, cryptography, firewalls, proxies, antispam, antivirus, application firewalls, IPS, SIEM, DLP, routers, switches, wireless networks, and management platforms.
Twenty two years of experience in Information Technology, fourteen of these dedicated to information security.
Strategic vision and ability to align business objectives with security, by applying different methodologies of risk management, that direct the deployment of security controls, based on a customized vision of the main security frameworks, such as: ISO 27001/27002/31000, Cobit, ITIL, COSO, PCI-DSS, PMI, SANS, NIST and others.
Successfully adopted methodologies that significantly raise the security level through projects to deploy security controls and maintain the level obtained in constant rise through a structured architecture of information security services.
Great experience in information security management, including people leadership, strategic and budget planning, project management and information security governance.
Extensive experience in the establishment and management of: information security policies, standards, controls, risk management, incident management, vulnerabilities and threats management, crisis management, business continuity, security monitoring, forensic analysis, audits (internal, SOX, DF, PCI-DSS), awareness, information classification, identities and access management, digital certificates management, and others.
Experience in security for cloud services, data leak prevention (DLP), mobile security, encryption, BYOD, advanced threats (APT), and security regarding social networks issues.
Facility in the leadership of people, experience in selecting and training of multidisciplinary teams. Practice in the management of third parties and outsourced security services (MSS).
Strong knowledge of security technologies, including: network architecture, communication protocols, and of different hardware and software platforms, including: operating systems, cryptography, firewalls, proxies, antispam, antivirus, application firewalls, IPS, SIEM, DLP, routers, switches, wireless networks, and management platforms.
Twenty two years of experience in Information Technology, fourteen of these dedicated to information security.
Strategic vision and ability to align business objectives with security, by applying different methodologies of risk management, that direct the deployment of security controls, based on a customized vision of the main security frameworks, such as: ISO 27001/27002/31000, Cobit, ITIL, COSO, PCI-DSS, PMI, SANS, NIST and others.
Successfully adopted methodologies that significantly raise the security level through projects to deploy security controls and maintain the level obtained in constant rise through a structured architecture of information security services.
Great experience in information security management, including people leadership, strategic and budget planning, project management and information security governance.
Extensive experience in the establishment and management of: information security policies, standards, controls, risk management, incident management, vulnerabilities and threats management, crisis management, business continuity, security monitoring, forensic analysis, audits (internal, SOX, DF, PCI-DSS), awareness, information classification, identities and access management, digital certificates management, and others.
Experience in security for cloud services, data leak prevention (DLP), mobile security, encryption, BYOD, advanced threats (APT), and security regarding social networks issues.
Facility in the leadership of people, experience in selecting and training of multidisciplinary teams. Practice in the management of third parties and outsourced security services (MSS).
Strong knowledge of security technologies, including: network architecture, communication protocols, and of different hardware and software platforms, including: operating systems, cryptography, firewalls, proxies, antispam, antivirus, application firewalls, IPS, SIEM, DLP, routers, switches, wireless networks, and management platforms.
Lacunas de habilidades
Lacunas de habilidades
Lacunas de habilidades
Habilidades
Pensamento Crítico
Comunicação Interpessoal
Liderança
Gerenciamento de Projetos
Conhecimento Regulatório
Conhecimento Regulatório
Gestão De Riscos
A inferência de habilidades nesta página foi realizada por meio da tecnologia proprietária da acaso, via Inteligência Artificial, com dados públicos disponíveis nos perfis do LinkedIn dos participantes.
Acesse aca.so e descubra como uma abordagem baseada em skills pode garantir mais agilidade e inteligência na construção de times.
A inferência de habilidades nesta página foi realizada por meio da tecnologia proprietária da acaso, via Inteligência Artificial, com dados públicos disponíveis nos perfis do LinkedIn dos participantes.
Acesse aca.so e descubra como uma abordagem baseada em skills pode garantir mais agilidade e inteligência na construção de times.
A inferência de habilidades nesta página foi realizada por meio da tecnologia proprietária da acaso, via Inteligência Artificial, com dados públicos disponíveis nos perfis do LinkedIn dos participantes.
Acesse aca.so e descubra como uma abordagem baseada em skills pode garantir mais agilidade e inteligência na construção de times.
powered by