Personal Information
Entreprise/Lieu de travail
Sydney, Australia Australia
Profession
Chief Technology and Security Officer
Secteur d’activité
Technology / Software / Internet
À propos
An experienced IT Architect with a passion for technology who has been successful across a broad range of competencies including CTO office, Large Outsource Deal wins, Enterprise Infrastructure solutions, transition, DC transformation, demand management, tools architecture and automation delivering value and innovation from IT.
I have experience of living and working in the UK and Australia. Multi sector experience [Public Sector, Finance, telecoms, Energy, Retail, Aviation] with proven ability in the customer and supplier domains delivering cost reduction, efficiency, and realisation of benefit.
- Présentations
- Documents
- Infographies
Cloud architecture with the ArchiMate Language
Iver Band
•
il y a 7 ans
SOC Architecture Workshop - Part 1
Priyanka Aash
•
il y a 7 ans
Information Asset Management...Comply for less!!
Geoff Broome
•
il y a 10 ans
Managing Information Asset Register
Ben Omoakin Oguntala, developingafrica(dot)net
•
il y a 13 ans
Introduction to Val IT
Varuna Harshana
•
il y a 10 ans
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
•
il y a 11 ans
Catalyst Strategies Strategic Planning Framework
CatStrat
•
il y a 9 ans
ITIL,COBIT and IT4IT Mapping
Rob Akershoek
•
il y a 4 ans
Next Level Enterprise Architecture
LeanIX GmbH
•
il y a 5 ans
WebriQ CMS for the JAM Stack
Philippe Bodart
•
il y a 6 ans
ENT401 Deep Dive with Amazon EC2 Systems Manager
Amazon Web Services
•
il y a 7 ans
Revolutionising Cloud Operations with AWS Config, AWS CloudTrail and AWS Cloudwatch – Matt House
Amazon Web Services
•
il y a 9 ans
Patch Management Best Practices
Ivanti
•
il y a 5 ans
What is an ITGP Documentation Toolkit?
IT Governance Ltd
•
il y a 11 ans
Running the Business of IT on ServiceNow using IT4IT
cccamericas
•
il y a 8 ans
HIPPA COMPLIANCE (SANJEEV.S.BHARWAN)
Sanjeev Bharwan
•
il y a 8 ans
Material best practices in network security using ethical hacking
Desmond Devendran
•
il y a 10 ans
Week3 lecture
Shaikha AlQaydi
•
il y a 11 ans
Monsters of cms
Concept Open Source
•
il y a 5 ans