Ensuring compliance to information security policies and requirements for an international telecommunication provider
Definition, review and approval of information security requirements and policies within the project portfolio. From review and approval of solution designs, consulting on security implementation details, up to collection and review of evidences for project go live. Including risk analysis and risk management of any deviations from policies and standards along the lifecycle.
Project management
Consulting
Implementation
Support
- End-to-end security partner from introduction of new network generations to replacement and migration of legacy applications into the cloud.
- Security-by-design and flexible support for the internal cyber security team
- End-to-end security partner from introduction of new network generations to replacement and migration of legacy applications into the cloud.
- Security-by-design and flexible support for the internal cyber security team to minimize costly changes and avoid project delays in advance.