THIS is the final installment of my three-article series on data breaches for this year. Below is the description of the personnel responsible for data management for any organization, whether governmental or private, since mastery of the governance and technical skills is impertinent. He/She must have a mastery or, at the very least, a deep understanding of various fields of expertise in order to implement a secure digital environment for his/her organization. Acquiring a quasi-tech governance and cyber analyst persona is, at this point, a pragmatic approach for newbies in the secure digital trust profession arena. This is, in fact, the role of a chief information security officer (CISO). The description below brings to mind a government term of reference for a tender that prohibits the mention of any brand names. The distinction lies in the emphasis on trust.

In a descriptive sense, we all need or require the services of a secure digital trust professional. This is the Cybercrime Investigation and Coordinating Center's (CICC) newest addition to its certification training — CICC EDUC CyCON (secure digital upskilling training that is free to government instrumentalities).

Premium + Digital Edition

Ad-free access


P 80 per month
(billed annually at P 960)
  • Unlimited ad-free access to website articles
  • Limited offer: Subscribe today and get digital edition access for free (accessible with up to 3 devices)

TRY FREE FOR 14 DAYS
See details
See details