Fashion
- Ataya & Partners -

Find an external expert

A relevant digital consultant

We specialize in digital advisory and strategy development, offering tailored solutions to meet the unique needs of each client.

We specialize in digital advisory and strategy development, offering tailored solutions to meet the unique needs of each client. With our deep industry knowledge and specific methodologies, we guide organizations through the complexities of digital, ensuring alignment with their business
objectives and compliance with regulations

 The roles we provide are filled by experts with education and expertise.

 

CISO Women

 

 

We reach a broad network of our executive education alumni, peer members of professional organizations we're involved with, as well as many experts who contact us and become familiar with our advisory delivery methods.

solvay lifelong learning logo

 

Discover the roles we offer, for which we train future experts and leaders :

CHIEF INFORMATION SECURITY MANAGER
CHIEF INFORMATION SECURITY MANAGER (CISO)
- Decision making and relations with the General Management

- Security Architecture and its impact on cybersecurity and business strategy

- Cybersecurity operations and its impact on business activity

- Certification and accreditation in line with industry standards and regulatory requirements

- The risk profiles in relation to budget priorities and protection targets.
CYBERSECURITY IMPLEMENTATION MANAGER
CYBERSECURITY IMPLEMENTATION MANAGER
- Cybersecurity project and program management

- Security Architecture and its impact on targeted protections impact of implementation projects
and architecture on Cybersecurity operations

- Capabilities and technology requirements for reaching intended Industry standards and regulatory requirements

- The residual risks in relation to program and project delivery as well as business risks related to delivered capabilities.
SECURITY OPERATIONS PROFESSIONAL
SECURITY OPERATIONS PROFESSIONAL
- Understanding the business requirements and managing cybersecurity related operations

- Build adequate capabilities to support incident and crisis situations

- Manage the organisation capabilities including architecture, configuration, operations, and services.
Cybersecurity Academics
CHIEF INFORMATION SECURITY MANAGER
- Decision making and relations with the General Management

- Security Architecture and its impact on cybersecurity and business strategy

- Cybersecurity operations and its impact on business activity

- Certification and accreditation in line with industry standards and regulatory requirements; the risk profiles in relation to budget priorities and protection targets.
RISK MANAGER
RISK MANAGER
- Translate cybersecurity risks into business impact and formulate protection targets and priorities.

- Understand the financial returns on cybersecurity investments and advice general managers in their decision making.

- Assess risks of cybersecurity related projects and acquired external services.
Cybersecurity Architect
Cybersecurity Architect
- Use full knowledge of risks and mitigation actions in building layers of protection.

- Ensure that built architecture is capable of implementing targeted protection strategy.

- Align building blocks with cybersecurity operations and foreseen future needs.
COMPLIANCE PROFESSIONAL
COMPLIANCE PROFESSIONAL
- Management of compliance activities in relation to cybersecurity laws, regulations, and industry requirements.

- Implementation of and project activities related to implementing selected controls.


- Support in the accreditation and the certification of operations and systems.

- Support in reaching relevant maturity levels to build control layers towards reaching intended cybersecurity protection.
Audit Professional
Audit Professional
Review of lines of defence related to Cybersecurity services, risk evaluation, compliance activities, maturity improvement projects, and cybersecurity governance and monitoring activities. Review of external services and evaluation of technology components and cybersecurity profile of business operations.
Cybersecurity technical experts
Cybersecurity technical experts
Manage Technical cybersecurity activities including Digital Forensics investigators, Penetration testers, and Cyber Threat Intelligence specialist. Apply management methods while determining relevant actions to face related risks. Manage technical teams accordingly.
HRM
HUMAN RESOURCES MANAGER
Understand cybersecurity skills and roles that are required to support recruiting, upskilling, reskilling and promoting cybersecurity, IT and business personnel. Apply innovative methods to build cybersecurity maturity.
Business Manager
BUSINESS MANAGER
Use cybersecurity capabilities as a competitive advantage and integrate security protections in developed products and services; Actively use cybersecurity capabilities in FINTECH, technology start-ups, and innovative products and services.
CIO
Chief Information officer (CIO)
Lead Information and Cybersecurity activities vertically or liaise with horizontal cybersecurity activities in an enterprise; Understand the business capabilities; technical requirements and process implementation while leading the implementation of cybersecurity protections. Develop a technology savvy business management to support cybersecurity maturity in services and products and within technology and business personnel.
CYBERSECURITY MANAGEMENT ADVISOR
CYBERSECURITY MANAGEMENT ADVISOR
Capabilities to deliver CISO services, strategy, and architecture advisory and management counselling; Risk prioritisation and business impact analysis; Auditing; Risk assessment and maturity improvement projects; Review and assistance with external services, with the reliance on technology solutions, and with personnel maturity.
Senior Executive
SENIOR EXECUTIVE
Apply cybersecurity management methods while managing human resources, leading finance operations, directing operations and business processes, and selling products and services.
DIGITAL TRANSFORMATION PROFESSIONAL
DIGITAL TRANSFORMATION PROFESSIONAL
Managing portfolio, programs or projects involve adequate knowledge of Cybersecurity issues related to business, technology and implementation constraints. Cybersecurity Architecture, Business needs, risk, and compliance issues drive todays transformation initiatives.
previous arrowprevious arrow
next arrownext arrow
Block
CISO AAS
Unlock Custom IT Governance with CIO Service
CIO AAS
Elevate IT Governance for business success
DPO AAS
Enhance IT Governance to drive business success

hidden