Jakob Seierø work email
- Valid
Jakob Seierø personal email
Call me (+45) 26147007 or book me if you need my help.I am highly experienced Program Manager and SAFe Professional consultant (SPC) specialized in cyber security, governance, risk & compliance, ISO2700X, NIS2, DORA, GDPR and CIS 20/18.I have implemented various best practice and control frameworks in large complex critical infrastructure organizations.I have been responsible for several GRC, cyber security, transformation and change management projects covering strategic board decisions, e.g., investment programs and business cases.I have lead strategic initiatives, tactical roadmaps, creating operational and technical guidelines, processes, and controls with external and internal stakeholders.I am a strong leader, agile coach, and project manager, with the ability to communicate with external and internal stakeholders on all levels in an organization.Finally I am a certified training partner and instructor within SAFe and PECBSkills:- Security & compliance (critical infrastructure) - People leader, agile coach, project and change manager.- ISO 2700x, CIS 18/20, NIS2, NIST, GDPR, FDA and FSA- Disaster recovery and business continuity- Governance, risk and compliance (GRC) - Cyber security strategy & risk analysis - Stakeholder management & identification of needs - Strategic program planning & execution - Cyber Defense & Security Operation Center (CDC/SOC) - Cloud Security & GRC - Organizational change & agile transformation- Business case & cost-benefit-analysis - RFI/RFP - Vendor & contract management - Workshop facilitator & interviewer - Process optimization & management- Podcasting and SoMe management- Event & Education management#cyber #security # #governance #risk #compliance #iso2700x #cis #nis2 #dora #nist #cloud #gdpr #leader #agile #project
-
Dora Lead ImplementerFreelanceKøbenhavn, Dk
-
FounderCybersundhed Feb 2023 - PresentDenmarkHopeful philanthropists in Cyber thinking about humans -
FounderCyber Security Innovation Nov 2019 - PresentDenmark -
Cybersecurity & Disaster Recovery Program ManagerGn Group Feb 2023 - Dec 2023For IT Executive and portfolio management the Cybersecurity & Disaster Recovery Program was created to improve protection against cyber-attacks, respond and recover when cyber-attack happens. This strategic initiative was broken into Themes, Epics and Features that were all mapped to CIS 18 Controls and Safeguards and used by CISO and DPO to map the work into the NIS2 framework ensuring compliance with the needed requirements.Operation/Responsibilities• Program manager for +30 Security project/Epics and + 10 Product Owners and teams delivering into the program.• Drive an IT transformation using the CIS 18 Controls best practice benchmark to assess, report and improve the security posture.• Drive an Agile mindset transformation in IT Executive management based on SAFe principles.• Map Strategic Themes, Epics, Features with CIS 18 Controls and Safeguards, and ensure adherence to the NIS2 requirements across CISO, DPO, Business and IT.Result: Creation of +30 high level roadmaps and delivery plans on Epic and Feature level across CISO, DPO, Business and IT areas. Facilitating Big room meetings, PI planning and continuous SAFe events for Executive Management, Product Owners and Scrum Masters working in the Program. Creation of multiple strategic presentations for Executive management using Power Point, PowerBI and AzureDevOps depending on the audience. Delivering +100 Security Features in 1 year -
Isms And Cis Security Framework ImplementerNnit Oct 2022 - Dec 2022For the Cybersecurity advisory and operations team an ISMS and CIS 20 framework solution was created to support the delivery of Cybersecurity services and capabilities to the end customer (Financial/Public). The ISMS included both ISO 27002 and CIS 20 controls, Risk assessments, Security and Compliance Reporting, Annual-wheel, and the overall governance management.Operation/Responsibilities• Create supplier the Cyber Security Framework for the end customer.• Interpret end customer requirements (ISO/CIS) and govern contractual compliance.• Governance, process, and responsibility matrix across all delivery teams• Stakeholder management across organiszational unitsResult:Creation of the overall Security Framework to govern the 114 ISO and 160 CIS 20 requirements and deliverables to the end customer. Creation of Risk Assessment model based on ISO 27005 to connect cyber and compliance risk with the ISO and CIS controls. Creation of governance and RACI matrix across cybersecurity and compliance teams. Creation of the Annual-wheel actions including security and delivery board reporting -
Pam(Cyberark) And Siem(Splunk) Security ArchitectRamboll Apr 2022 - Sep 2022For the Architecture team the Splunk SIEM solution and the CyberArk PAM solution was documented and made ready for IT Operations. Project and Operation interviews with Business Managers, Project Managers, Managers and Subject Manager Experts (SME) was executed and the Business, Process, People, and Technology information was recorded in video, written in text and visualized in drawings. Both SIEM and PAM solutions was implemented during the transformation from On-premises to Cloud and both was included in the project documentation. The delivery was alligned with both IT Security, the Security Operations Center and the Infrastructure operation teams to secure a proper handover of both technical and process documentation.Operation/Responsibilities• Tactical lead for the enterprise architecture solutions• Governance, process, and responsibility matrix across all teams• Driver of both operational and tactical tasks in the projects • Stakeholder management across organiszational units• Interviewer and writer for the PAM and SIEM SMEs• Tactical lead for the enterprise architecture solutions• Governance, process, and responsibility matrix across all teams• Driver of both operational and tactical tasks in the projects • Stakeholder management across organiszational units• Interviewer and writer for the PAM and SIEM SMEs• Architectural drawings of the technical design in Visio and Power PointResult: Creation of overall CyberArk and Splunk processes and documentation for multi-cloud security architecture with new components and capability descriptions including integrations to the on-premises and cloud infrastructure. Integration of ITSM, PAM and SIEM between the teams with focus on creating high- and low-level design drawings in the project, and also to support the CIS 20 maturity journey and the Disaster Recovery documentation created in IT-Security. -
Security And Compliance Lead - Cis 20 & Iso 2700XKmd Apr 2021 - Apr 2022Ballerup, Capital Region, DenmarkFor the bid team the ISO 2700x and CIS 20 requirements was mapped to the IT supplier service catalogue and acting as a SIAM integrator multiple vendor RFIs and RFPs was made to finalize the tender. Internal and external project management and assessment was made to describe the business case, the pricing model, the technical architecture and processes across both on-premises, private and public cloud requirements for the customer. - Unlike the existing compliance level at the customer and the supplier, the tender included risk and governance of the Financial (EBA) and Personal (GDPR) regulation by using ISO2700x and CIS 20, best practices, and controls.Operation/Responsibilities:• Strategic lead for the security and compliance tender track • Governance, risk, and compliance management across all tracks• Interviewer and agile coach performing ISO2700x and CIS 20 gap analysis• Stakeholder and multi-vendor management (Customer, supplier, and vendors) • Facilitator of executive and big meetings.• Business case, roadmap, architecture, and service catalogue Result:Creation of overall CIS 20 project plan and detailed roadmap including supporting processes and security architecture. Creation of security and compliance multi-cloud architecture, with new service catalogue description and the supporting price and delivery model utilizing a multi-vendor supply chain strategy. Integration of ITSM and SIAM between the customer, the supplier, and the vendors to support the required technology and services needed by the customer -
Tiber White Team LeadSkandinavisk Data Center Mar 2021 - Mar 2022DenmarkLeading the White Team during a TIBER-EU test in the bank, leading and coordinating procurement, Threat Intelligence, Red Team, Blue Team, TCT and managing deliverables and risk communication to executive management in the bank.Operation/Responsibilities• White Team Lead • TIBER risk management. • Stakeholder and vendor management from Initiation to closure (The bank, bank central, TI, RT, and BT) • Facilitator of executive and steering group meetings• Threat Intelligence workshop and meetings for the TI phase• Red Team workshops and daily test meetings for the RT Phase• Feedback, review and 365 workshops for the closure PhaseResult:Creation of procurement and contract documents, project plan, Risk register, Steercom, workshop and meeting material. -
Ms 365 Cloud Security And Compliance LeadSydbank Jun 2020 - Feb 2021DenmarkFor executive management, the board and external authorities who requires risk and compliance documentation, the cloud compliance project is implementing 1st, 2nd and 3rd level of defense governance and documentation - Unlike the existing compliance level, the cloud project included risk and governance of the Financial (EBA) and Personal (GDPR) regulation by using ISO2700x, CSA and ENISA framework, best practices and controls.Operation/Responsibilities• Strategic lead for cloud compliance project • Governance, risk, and compliance management. • Interviewer and agile coach • Process and documentation analysis and optimization. • Stakeholder and vendor management (Bankdata, JN Data & Microsoft) • Audit, risk, and control management. • Facilitator of executive, steering group, and big meetings.Result:Creation of board approval material to be used with the Danish FSA. Updated security policies and guidelines to include cloud compliance. Updated internal governance processes and controls to include cloud workflows. -
Azure Cloud Security And Compliance LeadAlm Brand Nov 2019 - Apr 2020DenmarkFor executive management, the board and external authorities who requires risk and compliance documentation, the cloud compliance project is implementing 1st, 2nd and 3rd level of defense governance and documentation - Unlike the existing compliance level, the cloud project included risk and governance of the Financial (EBA), Insurance (EIOPA) and Personal (GDPR) regulation by using ISO2700x, CSA and ENISA framework, best practices and controls.Operation/Responsibilities:• Strategic lead for cloud compliance project • Governance, risk and compliance management. • Interviewer and agile coach of project members • Process and documentation analysis and optimization. • Stakeholder and vendor management (Microsoft). • Audit, risk and control management. • Facilitator of executive and big meetings (PI planning).Result:Creation of board approval material to be used with the Danish FSA. Updated security policies and guidelines to include cloud compliance. Updated internal ISMS processes and controls to include cloud workflows. Implemented ISO, CSA and ENISA cloud frameworks and guidelines. -
Head Of Cyber Security CommunicationsNordea Jun 2018 - Nov 2019DenmarkWe integrated security orchestration, automation and threat intelligence solutions to collect, visualize and present cyber security information.We automated reports for auditors and executive management and implemented a real time live dashboard solution.We executed audit, risk and control assessment including the development of a new framework and technology to align across business units.#leader #reporting #communication #managedsecurityserviceprovider #insourcing #keyriskindicator #keyperformanceindicator #metrics #securityorchestrationautomation #threatintelligence -
Head Of Cyber Security Engineering And ReportingNordea Sep 2017 - Jun 2018DenmarkWe implemented an enhanced Security Information and Event Management(SIEM) solution and build a new security monitoring team.We improved time to respond from days to minutes.We designed hybrid CDC architecture with insourced SIEM operations.We performed audit evidence gathering & live demo of security controls.#leader #businesscase #securityincidenteventmanagement #audit #livedemo -
Senior It Security SpecialistNordea Nov 2012 - Aug 2017Copenhagen Area, Denmark2016-2017 projectsImplemented frameworks and methodologies using SANS 20(CIS 20) and SOC CMM, created business case for insourcing the Cyber Defence Centre. Created SANS 20 and SOC assessment, report and framework, CDC business case, roadmap and project plan and Co-writer on the Cyber security strategy(NIST).2015-2016 projectsImplemented Security Incident Response Team(SIRT) exercises, handbooks and use cases for key stakeholders in business and IT. Designed the SIRT table top exercise process and framework, creating playbooks, use cases and training for SIRT members.2014-2015 projectsImplemented DoS prevention, Netflow, IDS/IPS and an external DDoS prevention solution.Contract and SLA created for on premise and cloud DDoS prevention, on premise IDS/IPS and on premise Netflow service.2012-2014 projectsImplemented security testing services for yearly penetration testing, monthly vulnerability scans and ad hoc security testing. Contract and frame agreement signed with security testing suppliers and implementation of security testing and vulnerability Mgt. process. -
SektionslederTeknologisk Institut May 2012 - Oct 2012Copenhagen Area, DenmarkWe provided IT training and competence development through classical and customised training courses for companies. We used our experience within learning styles and efficient learning in combination with company demands. -
Business Development ManagerInfinigate Sep 2011 - Mar 2012Copenhagen Area, DenmarkDeveloped Sophos business in Denmark, Working with the Danish partner channel and their customers. -
Senior Business Unit ManagerPc-Ware Jul 2009 - Sep 2011Developed and optimize IT- business and infrastructure towards PC-WARE Customers. Main focus on IT - security and 2nd and 3rd level services. -
Security Business ManagerAtea Feb 2008 - Jun 2009Developed Security Business. Manage internal sales training for Key Account Managers and responsible for direct sales and presentation towards customers. -
Systems Engineer, NordicCitrix Systems Jul 2007 - Dec 2007Developed and support Citrix partners in the Nordics, by executing sales and technical training programs -
Network Security EngineerDns Network Technologies May 2006 - Jun 2007Selling IT Security via Partners in Denmark, by executing training and certification programs -
Security ConsultantTempest Jan 2004 - Apr 2006Technical support/training for IT Security partners in Denmark, by executing training and certification programs.
Jakob Seierø Skills
Jakob Seierø Education Details
-
Managing Security Operations: Detection, Response, And Intelligence -
Advanced Digital Forensic And Incident Response -
Continuous Monitoring And Security Operations -
Lyngby UddannelsescenterOrganizational Leadership -
(Isc)2Security -
TackSales -
It, Network And Security -
Stenlã¸Se GymnasiumMathematics And English
Frequently Asked Questions about Jakob Seierø
What company does Jakob Seierø work for?
Jakob Seierø works for Freelance
What is Jakob Seierø's role at the current company?
Jakob Seierø's current role is DORA lead implementer.
What is Jakob Seierø's email address?
Jakob Seierø's email address is ja****@****dea.com
What schools did Jakob Seierø attend?
Jakob Seierø attended Sans Technology Institute, Sans Technology Institute, Sans Technology Institute, Lyngby Uddannelsescenter, (Isc)2, Tack, Copenhagen Business College, Stenlã¸se Gymnasium.
What skills is Jakob Seierø known for?
Jakob Seierø has skills like Security, It Management, Information Security, Network Security, Computer Security, Business Development, It Security Operations, It Security Policies, Firewalls, It Security Assessments, Cloud Computing, Team Leadership.
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial