Jean-Baptiste Bres

Chief Information Security Officer

New role

πŸŽ‰ Exciting news! I am thrilled to announce that I am joining AMP as their new Director of Technology - Security, Risk & Compliance (CISO). Looking forward to embarking on this new journey.

Looking for new CISO @ HSBC

We are on a look out for a great new πŸ” CISO in HSBC Australia. Lead a fantastical team and join a great organisation!
Plus you get to fix all the crazy ideas I had over the last 3 years! 😁 No chance to get bored πŸ˜„
Apply now and feel free to reach out if you have questions.

πŸ” Security Operations

Article


Get Certified in Cybersecurity - Part 6 of 6
πŸ” Security Operations
Learn key elements of data security, including data handling, classification, logging, encryption, system hardening, configuration management, security policies, and social engineering defence through security awareness training.

Read More…

πŸ” Network Security

Article

Get Certified in Cybersecurity - Part 5 of 6
πŸ” Network Security
Delves into common threats and best practices for securing computer networks. It explores the array of network threats, from malware and ransomware to insider threats, and understand how network professionals mitigate these risks.

Read More…

πŸ” Network Concepts

Article

Get Certified in Cybersecurity - Part 4 of 6
πŸ” Network Concepts
Discover the intricate world of computer networks. This article covers topics such as network types, essential devices, IP addresses, DHCP, network ports, and key network terms. It also explores the OSI and TCP/IP models, showcasing their role in network communication. Furthermore, the article touches upon cloud computing, highlighting different service and deployment models.

Read More…

πŸ” Access Management

Article

Get Certified in Cybersecurity - Part 3 of 6
πŸ” Access Control
Delves into the importance of access control, covering concepts encompassing defence in depth, least privilege, segregation of duty, two-person integrity, passwords, multi-factor authentication, privileged access management, account provisioning, log management, physical access control, biometric access control, and logical access control.

Read More…

πŸ” Incident Response, Business Continuity and Disaster Recovery

Article

Get Certified in Cybersecurity - Part 2 of 6
πŸ” Incident Response, Business Continuity and Disaster Recovery
Explore the crucial aspects of cybersecurity incident response, business continuity, and disaster recover. We will talk about the importance of incident response plans, business impact analysis, recovery strategies, and crisis management in ensuring the resilience and continuity of organisations in the face of cyber threats and disruptive events.

Read More…

πŸ” Key Security Principles

Article


Get Certified in Cybersecurity - Part 1 of 6
πŸ” Key Security Principles
Discover the essentials of safeguarding sensitive data and protecting against cyber threats. From the CIA Triad to Risk Management and Privacy, this article breaks down key principles in an accessible way.

Read More…

πŸ’‘ Certified in CyberSecurity - Your Journey to Certification

Article

πŸš€ Unlock your path to a career in cybersecurity with the ISC2 Certified in Cybersecurity (CC)!
As part of Cyber Awareness Month 2023, I'll be sharing a series of articles throughout October covering the all the knowledge needed to prepare for the ISC2 Certified in Cybersecurity (CC).
Ideal for IT professionals, career changers, executives, and recent grads, this entry-level certification offers free exam and online training for a limited time, making it more accessible than ever.
Find out more about the ISC2 CC Certification. Your cybersecurity journey starts here!

Read More…

πŸ’‘ Ensuring CyberSecurity in Vendor Management

Article

As our interconnected world amplifies cyber risks in the supply chain, the indispensable role of vendor managers in protecting valuable assets cannot be overlooked. With their unique insights and strategic position, they are instrumental in identifying and mitigating potential vulnerabilities.

This article provides vendor managers with invaluable guidance on elevating their role in safeguarding the supply chain. From selecting secure vendors to establishing robust contractual agreements, they will find actionable steps to fortify their organisation's cybersecurity posture.

Read More…