I have been at home in cyber security consulting for over 10 years and am happy to provide you with comprehensive support in the key areas:
- Identity and access management: securing (privileged) identities, risk-based access, identity governance, role and authorization concepts, system integrations
Cloud security: data classification, prevention of data outflows, end device security, application migrations, system hardening, IT architecture and transformation