This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
User:Laszlo.a.toth
Objective To utilize my broad IT, information security and data privacy experience in a challenging environment, which promotes both the company’s and my personal growth.
Professional experiences
ITSH July 2013 to May 2016 Data Privacy officer functioning as a DPO to advise the company: on the statutory and DT Group level data privacy requirements how to design, implement and deploy appropriate technical & organizational countermeasures
ITSH Data Privacy function representation, promoter organization and policy management Commissioned Data Processing agreement management, process elaboration Privacy & Security Assessment roll-out implementation DTAG Technical & Organizational Privacy Measures compliance cover local Standardized Data & Security Concept process management Privacy support for projects and Service Lines DT Group level audit preparations, management Personal data handling log management (OSSIM)
Security Officer November 2010 to July 2013 functioned as a SO to ensure ITSH to meet Group/company level security requirements
Company Information security management system operation Security intensified operations support: Deutsche Mail, DekaBank, KPMG customer audit preparations: KPMG, BAT, BP, Heineken, DekaBank, BMW internal audit preparations: Umbrella (ISO 27 001, 20 000, 9001), DT Group Privacy solution deployment: McAfee Device Control, Nessus vulnerability scanner
TAKINFO Ltd., Hungary (Hungarian Savings bank) April 2010 to November 2010 Internal IT auditor
Business and IT process review to improve the process maturity and compliance level to statutory and internal regulations (such as Act on Credit Institutions and Financial Enterprises, Hungarian Financial Supervisory Authority 1/2007 recommendation, COBIT, ITIL)
Freelance Information Security Consultant October 2009 to April 2010 functioned as an independent IT consultant
Risk assessment project lead, log analysis concept creation Information security policies, guidelines, best practices audits Business Continuity Plan review project lead