Jean-Baptiste Bres

Chief Information Security Officer

πŸ’‘ Risk Management in Technology

Article

Learn about the importance of risk management in technology, particularly in mitigating cybersecurity threats, preventing system outages, and building trust with stakeholders.
This article covers the risk management process, including risk identification, assessment, treatment, and monitoring, as well as the significance of controls in information security.
Additionally, it introduces the concept of a quantitative risk model for assessing and managing risks using numerical data and metrics to enhance control effectiveness and resilience against cybersecurity threats.

Read More…

Looking for a Security Services Senior Specialist

We are looking for a Security Services Senior Specialist! - AMP is undergoing a transformative security uplift, and we're seeking exceptional talent to fortify our cyber defenses.
In this pivotal role, you'll transition us from a reactive to a preemptive security posture, safeguarding against ever-escalating threats.

If you're passionate about cybersecurity and want to make a lasting impact, apply now!
https://fa-esow-saasfaprod1.fa.ocs.oraclecloud.com/hcmUI/CandidateExperience/en/sites/CX_1/job/2607/?utm_medium=jobshare

New role

πŸŽ‰ Exciting news! I am thrilled to announce that I am joining AMP as their new Director of Technology - Security, Risk & Compliance (CISO). Looking forward to embarking on this new journey.

Looking for new CISO @ HSBC

We are on a look out for a great new πŸ” CISO in HSBC Australia. Lead a fantastical team and join a great organisation!
Plus you get to fix all the crazy ideas I had over the last 3 years! 😁 No chance to get bored πŸ˜„
Apply now and feel free to reach out if you have questions.

πŸ” Security Operations

Article


Get Certified in Cybersecurity - Part 6 of 6
πŸ” Security Operations
Learn key elements of data security, including data handling, classification, logging, encryption, system hardening, configuration management, security policies, and social engineering defence through security awareness training.

Read More…

πŸ” Network Security

Article

Get Certified in Cybersecurity - Part 5 of 6
πŸ” Network Security
Delves into common threats and best practices for securing computer networks. It explores the array of network threats, from malware and ransomware to insider threats, and understand how network professionals mitigate these risks.

Read More…

πŸ” Network Concepts

Article

Get Certified in Cybersecurity - Part 4 of 6
πŸ” Network Concepts
Discover the intricate world of computer networks. This article covers topics such as network types, essential devices, IP addresses, DHCP, network ports, and key network terms. It also explores the OSI and TCP/IP models, showcasing their role in network communication. Furthermore, the article touches upon cloud computing, highlighting different service and deployment models.

Read More…

πŸ” Access Management

Article

Get Certified in Cybersecurity - Part 3 of 6
πŸ” Access Control
Delves into the importance of access control, covering concepts encompassing defence in depth, least privilege, segregation of duty, two-person integrity, passwords, multi-factor authentication, privileged access management, account provisioning, log management, physical access control, biometric access control, and logical access control.

Read More…

πŸ” Incident Response, Business Continuity and Disaster Recovery

Article

Get Certified in Cybersecurity - Part 2 of 6
πŸ” Incident Response, Business Continuity and Disaster Recovery
Explore the crucial aspects of cybersecurity incident response, business continuity, and disaster recover. We will talk about the importance of incident response plans, business impact analysis, recovery strategies, and crisis management in ensuring the resilience and continuity of organisations in the face of cyber threats and disruptive events.

Read More…

πŸ” Key Security Principles

Article


Get Certified in Cybersecurity - Part 1 of 6
πŸ” Key Security Principles
Discover the essentials of safeguarding sensitive data and protecting against cyber threats. From the CIA Triad to Risk Management and Privacy, this article breaks down key principles in an accessible way.

Read More…