Intervention by an expert in the field, to increase awareness of information systems security issues. Understand the issues, analyze critical situations, adopt appropriate practices.
Defining the scope of information systems security
Physical system protection: physical, thermal, electrical
Information backup: NAS, SAN, outsourcing, etc.
Integrity and confidentiality: encryption, authentication, PKI
Secure IT architectures: firewalls, intrusion detection, technology watch
Legal implications: CNIL, legal obligations.