{"id":15,"date":"2025-11-30T16:23:33","date_gmt":"2025-11-30T16:23:33","guid":{"rendered":"https:\/\/dawid.ch\/cv\/start\/?page_id=15"},"modified":"2026-03-15T08:01:21","modified_gmt":"2026-03-15T08:01:21","slug":"security","status":"publish","type":"page","link":"https:\/\/iam.dawid.ch\/en\/security\/","title":{"rendered":"Security"},"content":{"rendered":"<div style=\"text-indent:30px;text-align:justify;\"><mark style=\"background-color:rgba(0, 0, 0, 0);font-weight:550;color:#B76B54;\">IT security and data protection<\/mark> are a critical part of all my projects and solutions. Every project entrusted to me is carried out in accordance with Federal Information Processing Standars and best practices. Personal data, company secrets, classified information can concern many different areas and aspects of a company\u2019s operations. Depending on the adopted policy, critical information subject to protection may cover entirely different domains. General principles, established procedures, ISO norms, and FIPS standards \u2013 I will help you to secure and organize your environment.<\/div>\n<p><strong>I will gladly share my experience in the following areas:<\/strong><\/p>\n<li style=\"margin-left:15px;line-height:10px;\">Security audit and environmental intelligence<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Information security policy and data backup policy<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Tunnels and secure data transmission (VPN, TLS, SSL, SSH)<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Algorithms, certificates, tokens, and access keys<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Drive encryption and OS environment encryption<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Fully encrypted email transmission<\/li>\n<li style=\"margin-left:15px;line-height:10px;\">Disaster Recovery scenario.<\/li>\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);font-weight:550;color:#B76B54;\">Loyalty and an impeccable reputation<\/mark> are formal requirements for this role. Supporting such projects is both an honor and the highest form of trust. Awareness of these interdependencies is crucial for mutual understanding and effective collaboration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security and data protection are a critical part of all my projects and solutions. Every project entrusted to me is carried out in accordance with Federal Information Processing Standars and best practices. Personal data, company secrets, classified information can concern many different areas and aspects of a company\u2019s operations. Depending on the adopted policy, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/pages\/15","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/comments?post=15"}],"version-history":[{"count":5,"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/pages\/15\/revisions"}],"predecessor-version":[{"id":95,"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/pages\/15\/revisions\/95"}],"wp:attachment":[{"href":"https:\/\/iam.dawid.ch\/en\/wp-json\/wp\/v2\/media?parent=15"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}