top of page
Professional experience

John worked for numerous International and National organisations in most industry sectors, such as Financial Services, Oil & Gas, Telecommunications, Retail and Government, and is considered as one of the leaders in his field of expertise. John was involved in more than 150 national and international IT / cyber security projects across the world.

 

John’s significant involvements were in advising and supporting our clients in developing, defining and implementing their overall Cybersecurity strategies, building the required business cases for Executive Boards as well as Supervisory Boards, and performing multiple program management activities as well as executing quality assurance assignments.

John was also involved in numerous M&A deals (pre-deal assessment and due diligence activities) as Cyber Security Strategist.

 

John is specialised in both audit and advisory services in the field of Information Technology / Cybersecurity, Governance Risk & Compliance, Information Risk Management, Digital Risk Management, as well as Cloud Computing.

Areas of expertise

John is working since 1994 in the IT / Cybersecurity domain. Throughout his career, he gained profound knowledge and working- experience in the following areas:

 

  • Cybersecurity Strategy Services / Cybersecurity In the Board Room

  • (IT) Governance, Risk and Compliance

  • IT Outsourcing

  • Cyber Defence Services

  • Identity & Access Management

  • Cloud (Security) Computing

  • Technical Security Services

  • Business Continuity Services

  • Third-Party Risk Management

  • Data Privacy Services

  • SAAS / Managed Services delivery models

Industry expertise

John worked in most industries, such as:

  • Financials Services (Banking & Insurance)

  • Oil & Gas

  • Energy & Power / Water Utilities

  • Pharmaceutical

  • Telecommunications

  • Government

  • Retail

  • Health Technologies

 

During his career, he interacted with various industry regulators/bodies on (defining) applicable industry cyber security frameworks, both in the Netherlands as outside the Netherlands.

bottom of page