Dr. Robert Poehler @ Winterthur for IT business | Home

Hi! I'm Robert

IT Specialist
based in Winterthur.

As a security professional for 30+ years, I have learned to adapt not only the methodologies but also the technologies to provide, cost effective security solutions that make sense. I am constantly seeking out new information and redesigning my own approaches to information security.

About Me

About Me

I have the ability to identify and translate applicable regulations to corporate policy, then working with the business and technical staff for developing a comprehensive program for addressing all-important business requirements with agility.

Hi There!

I am experienced in providing executive level leadership to ensure alignment with business strategic objectives, reducing impact to overall business operations, and implementing cost savings and risk reduction strategies to support a holistic security risk posture and continued compliance with laws, regulations, and standards. I hold an PhD in computer science and a MSc in computer science and international business.

Personal Infos

  • Name : Robert

  • Location : CH-8400 Winterthur

  • Age : 50 Years

  • Phone : +41 52 589 6776

  • Nationality : DE

  • Email : rp@winterthur.biz

  • Freelance : Available

  • Languages : German, English

Skill & Certification

Skills
IT Security & Risk management98%
Linux and Windows Server92%
Software and Cloud90%
Network and Routing93%
  • Memberships

  • Swiss Informatics Society SI

  • GI - Society for Computer Science

  • GPM - German society for project management

Certification
  • IT-Security Officer - TÜV

  • IT Expert - DEKRA

  • Lead Auditor ISO27001 - TÜV

    Lead Auditor ISO9001 - TÜV

    ISMS-Manager - TÜV

  • Additional examination process competence KRITIS - Bundesamt für Sicherheit in der Informationstechnik

  • Microsoft Certified Solutions Associate (MCSA)

    Microsoft Certified Technology Specialist (MCTS)

    Microsoft Enterprise Administrator (MCITP)

  • Certified Vulnerability Assessor (CVA)

    Certified Professional Ethical Hacker (CPEH)

    Certified Penetration Testing Engineer (CPTE)

    Certified Information Systems Rsik Manager (CISRM)

    Certified Information Systems Security Auditor (CISSA)

    Certified Forensic Network Examiner (CNFE)

    IS Certification & Accreditation Professional (ISCAP)

    Certified UN Cyberdiplomacy Consultant

Services

I provide wide range of digital services

Experienced Incident Manager with a demonstrated history of working in the management consulting industry. Strong information technology professional skilled in ISO 27001, Computer Forensics, IT Service Management, IT Strategy, and Data Center.

  • Security Frameworks

    Learn More
  • Strategic Consulting

    Learn More
  • Solutions & Services

    Learn More
  • IT Audit & Consulting

    Learn More
Portfolio

Recent Projects

Executive leadership in information security, audit, compliance, and risk management. Extensive expertise in technology governance, information protection, and systems assurance. Developed and managed these functions on a global level for major organizations.

Testimonials

What's Clients Say.

I take pride for being able to interact with all levels of management - IT, Legal, HR, the customer organization, third-party vendors, et al, communicating complex information in intelligible terms.

Blogs

Recent News

Topics include cybersecurity, risk and compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

  • ISO 27001 is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber attacks, hacks, data leaks or theft.

    Certification to ISO/IEC 27001 demonstrates that an organisation has defined and put in place best-practice information security processes. Not all organisations choose to get certified but use ISO 27001 as a framework for best practice.

    - Win new business and sharpen your competitive edge

    - Avoid the financial penalties and losses associated with data breaches

    - Protect and enhance your reputation

    - Comply with business, legal, contractual and regulatory requirements

    - Improve structure and focus

    - Reduce the need for frequent audits

    - Obtain an independent opinion about your security posture

    ISO 27001 is a requirement in certain industries where organizations handle highly-sensitive data. An ISO 27001 certification proves to customers, stakeholders, governments, and regulatory bodies that your organization is secure and trustworthy. For any organization dealing with sensitive data, be it profit or non-profit, a small business, a large business, a state-owned business or a private sector company, ISO 27001 certification is an indispensable asset for all of them.

    The certification adds value to your business and enhances your reputation in the marketplace by serving as an official document that is a testament to your high compliance standards and solid security systems. It also helps avoid financial damages or penalties incurred due to data breaches or security incidents. Organizations looking to work in an environment where data is securely processed will always seek and favor organizations that are ISO 27001 Certified as it becomes a prerequisite instead of an added advantage.

    The risks involved in Cyber Security and data breaches are constantly on the rise, along with a growing number of stakeholders whose primary concern is how their valuable information is being handled and protected. Demonstrating an ISO 27001 certification proves your commitment to meeting the highest standards of Information Security to customers and stakeholders This is a guaranteed way to help build trust and retain customers. Obtaining the internationally accredited ISO 27001 certification also means that new clients will that you have a demonstrable information security management process in place, and know that you can be trusted with their information and their business.

    ISO 27001 is a standard that puts Cyber Security at the forefront. Highly qualified Information Security experts (preferably external consultants) auditors will observe your organization’s security practices and seek to reinforce or replace them with industry best practices to mitigate security breaches.

    They will help map out goals and objectives, thus providing your organization with actionable information that will define data security measures and responsibilities across the board. Going through the certification process will help you compile professional reports and documents that will improve your information security strategies and serve as a trusty guide for years to come.

    ISO 27001 certification provides a clear framework for Information Security management processes and key operational elements. Practices such as keeping IT systems up to date, anti-virus protection, data storage and back-ups, IT Change Management, and event logging is clearly defined under this standard. The processes required to meet the ISO 27001 standard result in improved documentation and clear guidelines to follow for all personnel, this further keeps the organization secure and resilient from cyber attacks. Some of the policies introduced in organizations are clear instructions concerning the use of external drives, safe internet browsing, and strong passwords.

    Cyber-attacks and data breaches will always remain a possibility, but the forward planning involved with ISO 27001 demonstrates that you have evaluated the risks and taken into account business continuity and breach reporting if things were to go wrong, thus allowing your organization to stay functional with minimal damage.

    Annex A.18 of ISO 27001 specifically addresses the topic of compliance with legal and contractual requirements. The objective of this annex is to avoid breaches of legal, statutory, regulatory or contractual obligations related to information security. In simple terms, the organization must ensure that they are up-to-date with any documentation, legislation and regulation that affects the achievement of its business objectives and the outcomes of compliance with legal and contractual requirements.

    Since most of these requirements already come under the scope of ISO 27001 as an outcome of the Risk Management process,, organizations do not mostly require putting in place secondary processes to be compliant with these requirements.

    The process of implementing an ISO-compliant ISMS will help create strong, tested processes and policies for information protection, regardless of how and where information is stored and shared. As your organization develops a policy or process for each risk that is identified, you will find yourself digging deep into all of the avenues of communication and information storage spaces in the organization.

    The result is a clear picture of the company’s current standings and security processes along with an outline of what is required to satisfy functional, legal, regulatory and customer requirements. These findings will help you develop action items that will need to be completed to comply with your new and evolving threat scenarios. Consistent monitoring of these processes is what ensures that they function as intended.

    This requires routine leadership meetings aimed towards checking the functioning of the ISMS and making adjustments to optimize it as needed. This systematic approach requires consistency above all else. With systems that are continuously monitoring in place it becomes easier to detect potential weak spots and stop breaches before they affect your business.

    The long-term benefits of ISO 27001 will be shown through your ability to grow and prosper in our rapidly changing business environment. This new environment is one where Information Security is quickly becoming one of the most essential aspects of any business. With an ISO 27001 certification in place you are essentially future-proofing your business against these constantly-increasing security threats.

    With the above-mentioned benefits and the systems you will have in place for careful monitoring, planning, and quick breach realization, you will significantly reduce the cost and damage caused by information breaches, thus minimizing your losses. Even if you cannot predict when they’ll happen, you will be prepared to act as soon as you realize your information is compromised. ISO 27001 sets companies up with an Information Management System that automates and defines each step of the process. Your company will be positioned to capitalize on the structure, realizing growth opportunities and serving your existing customers with confidence for a long period of time.

    The true success of ISO 27001 lies in its alignment with business objectives and its effectiveness in realizing those objectives. With the benefits of ISO 27001 laid out so plainly you might be wondering how to get your own company a certification. I recommend visiting a trusted global Information Security Consulting Expert like me to help you at every step of the way, from consulting to certification. You can count on me to take care of all your compliance needs.

    Share:
  • Facebook is garnering headlines for another data leak putting users' privacy at risk. The latest incident involves the personal information of 533 million Facebook users from 106 different countries as apparently discovered by Alon Gal, co-founder and CTO of cybercrime intelligence firm Hudson Rock.

    In an April 3 tweet, Gal said the data, which includes Facebook members' account creation date, bio, birthdate, Facebook IT, full name, location, past location and relationship status, has been made available free to members of a hacking forum.

    In a January 14 post, he said an early 2020 vulnerability which exposed the phone numbers linked to every Facebook account had been exploited and that a hacker had advertised a paid bot that would allow users to query the database. Facebook claims the data must have been scraped prior to September 2019, before the vulnerability was addressed.

    Facebook has no plans to notify individuals whose information was exposed because the company claims it does not know who was affected. Despite the patch in September 2019, 419 million records were leaked which contained user IDs and phone numbers that same month. Then in December 2019, a Ukrainian researcher discovered a database on the open Internet which included the personal information of more than 267 million Facebook users.

    Interestingly, in July 2019, the FTC announced that it had completed a year-long investigation and concluded that Facebook had "used deceptive disclosures and settings to undermine users' privacy preferences" in violation of a 2012 FTC order. Specifically, third-party apps were allowed to collect the personal information of Facebook members whose friends had downloaded the apps.

    According to the new 20-year settlement order:

    Facebook must pay a $5 billion fine which the FTC claims is unprecedented.

    Facebook's board must form an independent privacy committee "removing unfettered control by Facebook's CEO Mark Zuckerberg over decisions affecting user privacy."

    Zuckerberg and Facebook compliance officers must independently file certifications with the FTC quarterly which state the company is complying with the order.

    A third-party assessor must make biennial assessments of Facebook's privacy program to identify any gaps and report to the new privacy board on a quarterly basis.

    The FTC can monitor Facebook's compliance using discovery tools provided by the Federal Rules of Civil Procedure.

    Every new or modified Facebook, Instagram, or WhatsApps product, service or practice must undergo a privacy review before it's implemented.

    If the data of 500 or more users has been compromised by a breach, the incident must be documented and shared with the FTC and the assessor within 20 days of the incident.

    Data privacy is a serious issue that organizations need to address proactively. While behemoths like Facebook can weather a $5 billion fine, lesser fines could be fatal to smaller organizations. A responsible approach to privacy should include:

    The trick here is to look slowly, and then look again. Take the time to look in detail and to look at the same thing from different angles, with different light, long lenses and wide lenses. Then move to the left a bit. You may never feel the need to leave the house again.

    Privacy by design so the right guardrails are built into products and services.

    Penetration testing to identify weak areas.

    Patching to avoid unnecessary vulnerabilities.

    Board-level oversight to ensure that privacy is given the attention it deserves.

    Compliance officers or a compliance officer, depending on the size of the company, whose job it is to ensure compliance.

    Data governance to avoid data misuse.

    Continuous monitoring to prevent or minimize data exfiltration.

    Scenario planning in case a breach occurs.

    A plan to notify affected victims and law enforcement should a PII leak occur.

    Ongoing security awareness training for IT and non-technical personnel to reduce the risk of inadvertent mistakes.

    Share:
  • On March 2nd, 2021, Microsoft reported it was the victim of a state-sponsored cyberattack from the Chinese hacking group called Hafnium. Microsoft explained in their notification that the group “primarily targets entities in the United States for the purpose of exfiltrating information from a number of industry sectors.”

    The attack affected over 30,000 organizations across the United States, including local governments, government agencies, and businesses. It is the eighth instance of a nation-state cyberattack against civil organizations and businesses Microsoft has reported in the last 12 months.

    The Microsoft breach was carried out through a sophisticated zero-day hacking campaign that targeted hundreds of thousands of on-premise servers running Microsoft’s Exchange software. Hafnium gained access to on-premise servers through a combination of stolen passwords and previously undetected vulnerabilities. Then, Hafnium created a web shell around those servers that provided them with the access they needed to steal email data remotely.

    Microsoft’s Exchange Server software handles email communications, and the attack exposed the emails of each organization.

    Hafnium was able to carry out this attack because of undiscovered vulnerabilities in Microsoft’s software. Although Microsoft released patches designed to correct these vulnerabilities, their customers are still at risk unless they update their software with those patches.

    Share:
Contact

Let's discuss your project

I'm always open to discussing IT
project work or partnerships.

Please fill required fields