What information security is considered optimal to implement in the PMO
1. Guest Speaker: Luis Duran
PMO Manager, Portfolio Manager, Program
Manager, IT Project Manager, Cybersecurity
Professional
Moderator: Associate Consultant PMOfficers
Wednesday October 7th 2020
20.00 Barcelona, Spain Local Time
Objective:
• What information security is considered optimal to
implement in the PMO.
What information security is
considered optimal to implement in
the PMO
Webinar Series
The Magic of the PMO
2. GUEST BIO
• Luis Duran
• +20 years of experience in different
industries such as manufacturing,
information technology, finance,
cybersecurity
• PMP, ITILV3 and Six Sigma Yellow Belt …
• PMO Manager who has worked in
projects in several countries such as
Canada, Mexico, Brazil, Switzerland, Italy
among others.
• …
3. INDEX
1. Steps to implement cybersecurity in your PMO
2. Exercise – What would you do?
3. Training, Risk, Roadmap
4. Start where you are
5. Continuous Improvement
4. Steps to implement Cybersecurity in a PMO
Los sistemas tradicionales
SIP/H323 son vulnerables
1.- What is Cybersecurity - Information Security
2.- Executive Engagement
3.- Training
4.- Develop a plan
5. What is Cybersecurity?
The state of being protected against the criminal or
unauthorized use of electronic data, or the measures
taken to achieve this.
11. Guest Speaker: Luis Duran
PMO Manager, Portfolio Manager, Program
Manager, IT Project Manager, Cybersecurity
Professional
Moderator: Associate Consultant PMOfficers
Wednesday October 7th 2020
20.00 Barcelona, Spain Local Time
Objective:
• What information security is considered optimal to
implement in the PMO.
What information security is
considered optimal to implement in
the PMO
Webinar Series
The Magic of the PMO