fbpx

Ahmed Fawzy

Managing Director at iExperts

Critical Infrastructure Security & Compliance

Session Title | How to Control your Service Provider

In this session we will discuss the best ways to control the trust security service in your outsourced service (Security, Confidentiality, processing integrity, availability, Privacy) and why many clients around the world mentioned in the contract The external Audit to cover from 6 to 12 Months The SOC2 report type| and type|| based on the SSAE18 standards is the way to have this contractual obligation achieved and assure the security of the service provider

Ahmed is Cyber Security Expert, he has more than 18 years of experience in Security consultation, Security Training, Information Security Management, GDPR, PCI DSS, ,ISO 27001 (ISMS), ISO 27701(Privacy FW), ISO22301(BCM) implementation, Penetration testing, Forensic investigation, Develop security policies, Security Assessment, Security auditing, Vulnerability Assessment, Code Reviewing, Development and Writing Exploits Ahmed won "Forensic Investigator of the year 2016" Award from Ec-Council, in addition to that he has been awarded as one of TOP 100 Information Security Managers in Middle East 2016 and 2017 Ahmed Delivered Many Training and Consultation Services in United Kingdom, USA, Ireland, Germany, Italy, France, Scotland, Poland, Hungary, Belgium, Netherland, Switzerland, Greece, Denmark, Sweden, KSA, UAE and Spain with excellent feedback Ahmed has the Master Degree in the Information Security in addition to many international certificates like: (CISM-CISSP-CISA-ISO27001-ISO27701-CEH-CHFI-ECSA-ECIH-ECSP-CEI-SPISI-ITIL-MCP-MCPD-MCSD-MCTS-MCT).

TOP