Any project with the objective to store data or applications in the cloud, must be risk assessed, to identify the level of sentivitiy of the date, and more important proivde with the relevant security set up to keep the level of risks at an acceptable level. a close attention is required to ensure compliance with regulations like gdpr
jean-yves guilloteau
jean-yves guilloteau
Aviation, photo numérique, antilles, voyages
Ses blogs
Blog de Jean-Yves Guilloteau
photos désaturées, avions, papillons, monuments, en photo, photos vues du ciel, macro d'insectes
jean-yves guilloteau
Articles :
588
Depuis :
22/11/2009
Categorie :
Tourisme, Lieux et Événements
Articles :
4
Depuis :
23/12/2018
Categorie :
Technologie & Science
Articles à découvrir
Ci joint une offre promotionnelle : https://macphun.evyy.net/c/1928875/645022/3255
18 years on it security strong expertise in it security, physical security and business continuity it security management and strategy : iam, control iso27001, security tools (firewall, waf, antimalware, ia...) business continuity/disaster recovery plan/crisis management cyberfraud business continuity plan disaster recovery fraud policy, prevention
Https://www.blurb.fr/b/10489059-yellowstone