By combining the right theory and best practices, I help clients assessing their risks and vulnerabilities and implement the appropriate security measures. Intensive knowledge of Phishing, Identity and Access Management and Privacy.