Enviar pesquisa
Carregar
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
•
0 gostou
•
443 visualizações
Infosecurity2010
Seguir
As the IT auditors arrives….
Leia menos
Leia mais
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 13
Baixar agora
Baixar para ler offline
Recomendados
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Secunoid Systems Inc
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
Kirsty Donovan
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
Richard Emrich
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
Omid Mogharian
Siskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
10 the-finstix-data-model
10 the-finstix-data-model
Christos Laganas
Recomendados
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Secunoid Systems Inc
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
A Data Breach Prevention, Detection & Response Strategy to Combat Today' Threats
Kirsty Donovan
InfraGard Webinar October 2015 102815
InfraGard Webinar October 2015 102815
Richard Emrich
The journey to Private AI, where Privacy-Preserving ML meets DLT
The journey to Private AI, where Privacy-Preserving ML meets DLT
Omid Mogharian
Siskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
10 the-finstix-data-model
10 the-finstix-data-model
Christos Laganas
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Kroll
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Ulf Mattsson
Are You Being Anti-Social
Are You Being Anti-Social
NetIQ
09 blockchain-security-information-sharing
09 blockchain-security-information-sharing
Christos Laganas
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
Gareth Niblett
A Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
Cyber Safe Southwark
Cyber Safe Southwark
The Integrate Agency CIC
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
iFour Technolab Pvt. Ltd.
Legal Services
Legal Services
Tony Richardson CISSP
RisingStarsOfCybersecurity
RisingStarsOfCybersecurity
Indy Dh
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
Will O'Brien
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
willbitgo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
Marc Vael
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
Tony Richardson CISSP
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016
BNI Exponential
OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015
Francisco Maroto
Mais conteúdo relacionado
Mais procurados
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Kroll
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Ulf Mattsson
Are You Being Anti-Social
Are You Being Anti-Social
NetIQ
09 blockchain-security-information-sharing
09 blockchain-security-information-sharing
Christos Laganas
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
Gareth Niblett
A Case For Information Protection Programs
A Case For Information Protection Programs
Michael Annis
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec
Cyber Safe Southwark
Cyber Safe Southwark
The Integrate Agency CIC
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
iFour Technolab Pvt. Ltd.
Legal Services
Legal Services
Tony Richardson CISSP
RisingStarsOfCybersecurity
RisingStarsOfCybersecurity
Indy Dh
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
Will O'Brien
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
willbitgo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
SSIMeetup
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
Marc Vael
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
automatskicorporation
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
Tony Richardson CISSP
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
SSIMeetup
Mais procurados
(20)
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Blockchains: Opportunities & Risks for Law Firms [RelativityFest 2018]
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Are You Being Anti-Social
Are You Being Anti-Social
09 blockchain-security-information-sharing
09 blockchain-security-information-sharing
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
A Case For Information Protection Programs
A Case For Information Protection Programs
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Cyber Safe Southwark
Cyber Safe Southwark
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Blockchain Use Cases in Financial Services Industry - iFour Technolab Pvt. Ltd.
Legal Services
Legal Services
RisingStarsOfCybersecurity
RisingStarsOfCybersecurity
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
BitGo Presents Multi-Sig Bitcoin Security at Inside Bitcoins NYC
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
The Future of Bitcoin Security Will O'Brien BitGo Presentation at TNABC #btcm...
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
Meeting your information security obligations april 2012
Meeting your information security obligations april 2012
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
Semelhante a Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016
BNI Exponential
OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015
Francisco Maroto
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Hugo van Hoogstraten
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
anandkumar558548
CC14GMS
CC14GMS
Bethan Thomas
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
SandeepMandal42
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management
mkeuning
Glotel
Glotel
guesta7c7d5f
Agency Presentation typovision GmbH
Agency Presentation typovision GmbH
typovision GmbH
Transformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC Amsterdam
Piet van Vugt
FinTech - Cafe Numerique
FinTech - Cafe Numerique
Levi Vangoidsenhoven
Presentation n pulse-2015
Presentation n pulse-2015
Georg Panagos
Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...
IPPAI
OIES Short Overview 201509
OIES Short Overview 201509
Francisco Maroto
EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014
EBRC
IP Advantages LLC
IP Advantages LLC
hyingli
Corporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 english
AnyHelp International
Digitization Strategies in Corporate Banking von Brigitte Ross
Digitization Strategies in Corporate Banking von Brigitte Ross
Bosshard & Partner Unternehmensberatung
Beta for business & technology research & innovation 2015
Beta for business & technology research & innovation 2015
Beta-Research.org
Oliver James Insurance
Oliver James Insurance
Claudine Edwards
Semelhante a Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
(20)
Synergy Technology Services Corporate Profile - 28-01-2016
Synergy Technology Services Corporate Profile - 28-01-2016
OIES Company Overview - Updated November 2015
OIES Company Overview - Updated November 2015
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
Data Quality Challenges to Big Data_Practical Insights_KPMG Presentation 20.4...
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
SAP_S4HANA_Compliance_and_Security_Webinar.pdf
CC14GMS
CC14GMS
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
presentation-kpmg-industry-4-0-digital-scm-for-enabling-growt-2019.pdf
2020041 cv meindert keuning valor_en valor management
2020041 cv meindert keuning valor_en valor management
Glotel
Glotel
Agency Presentation typovision GmbH
Agency Presentation typovision GmbH
Transformatie door innovatie IGC Amsterdam
Transformatie door innovatie IGC Amsterdam
FinTech - Cafe Numerique
FinTech - Cafe Numerique
Presentation n pulse-2015
Presentation n pulse-2015
Forensics: Regional trends in anti-corruption legislation and corporate best ...
Forensics: Regional trends in anti-corruption legislation and corporate best ...
OIES Short Overview 201509
OIES Short Overview 201509
EBRC Trusted Partners at ICT Spring 2014
EBRC Trusted Partners at ICT Spring 2014
IP Advantages LLC
IP Advantages LLC
Corporate presentation + infraestructure 2013 english
Corporate presentation + infraestructure 2013 english
Digitization Strategies in Corporate Banking von Brigitte Ross
Digitization Strategies in Corporate Banking von Brigitte Ross
Beta for business & technology research & innovation 2015
Beta for business & technology research & innovation 2015
Oliver James Insurance
Oliver James Insurance
Mais de Infosecurity2010
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Infosecurity2010
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Infosecurity2010
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Infosecurity2010
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Infosecurity2010
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Infosecurity2010
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Mais de Infosecurity2010
(12)
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
1.
IT ADVISORY As the
IT auditors arrives …. InfoSecurity 2010 4 November 2010 ADVISORY 4 November 2010
2.
As the IT
Auditor arrives … Understand the Purpose of the IT Audit © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 1
3.
Se As the
IT Auditor arrives … Be aware of your own Attitude Effectiveness and Efficiency of AuditEffectiveness and Efficiency of Audit depend on behaviour Client Soft Controls Auditor Soft Controls Audit Sponsor is leading by example Involving stakeholders Soft Controls Seeking for Facts Clearly in providing Judgment Transparence, providing adequate Information Be involved with Audit C ea y p o d g Judg e t © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 2
4.
As the IT
Auditor arrives … Consider the Auditor’s perspective First line of Defense Second line of Defense Third line of Defense • Self- assessment by operational • Management Assessment • Audit operational staff © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 3
5.
As the IT
Auditor arrives … Be specific regarding your expected maturity of IT Cobit maturity levels © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 4
6.
As the IT
Auditor arrives … Understand each Phase of the Audit • Scope of Objects to be assessed Risk-based • Scope of Objects to be assessed • Requirements to be applied Compliance- based • Fact finding based • Evaluation of noted Deficiencies Risk-based • Evaluation of noted Deficiencies © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 5
7.
As the IT
Auditor arrives … Risk-based scoping – Financial Reporting AAccounts and disclosures Focus of financial audit Accou s a d d sc osu es Entities Business processes Manual controls Key controls IT-dependent Manual controls Automated controls Generic ICT infrastructure Application-specific ICT Key application controls IT management processes Focus of IT audit B © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 6 Generic ICT infrastructure Focus of IT audit
8.
As the IT
Auditor arrives … Risk-based scoping – Assess an IT service © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 7
9.
As the IT
Auditor arrives … Compliance-based fact-finding Be aware that the auditor evaluates also your own (Continuous) Monitoring Event event Deduction of Event Deduction of events © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 8
10.
As the IT
Auditor arrives … Risk-based evaluation Business critical list of Risk based critical list of Applications Sensitivity (CIA) People Soft controls Risk-based Selection of controls (CIA) Selection of Controls - Soft controls Processes -Three levels of defenseMonitoring Compliance-based monitoring IT Environment Technology - Compliance monitoring - Vulnerabilities monitoring Incident detection o to g Analysis of Issues IssueTracking - Incident detection Risk-based evaluation and follow-up Follow-up (improve or accept) © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 9 9
11.
As the IT
Auditor arrives … You can help to make it effective and efficient ! Consider how the IT Auditor can help you, to improve your IT environment RegardingRegarding People ProcesesProceses Technology © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 10
12.
Questions © 2010 KPMG
Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 111 1
13.
Contact details Name
Ir Peter Kornelisse RE CISAName Ir. Peter Kornelisse RE CISA Position Director, experienced with regard to Information Security and Technology, having performed and coordinated many advisory services, as well as compliance audits and security tests, since 1990. Peter is globally responsible for security testing services at KPMG andPeter is globally responsible for security testing services at KPMG, and mainly delivers IT audit support for Financial Audits, and Information Protection and Business Continuity services in the Netherlands. E-mail kornelisse.peter@kpmg.nl Telephone +31 (0)6 – 53 165 596 © 2010 KPMG Advisory N.V., the Dutch member firm of KPMG International, a Swiss cooperative. All rights reserved. KPMG and the KPMG logo are registered trademarks of KPMG International, a Swiss cooperative. 121 2
Baixar agora