Pieter Van der HulstVennoot - Computer Forensics & Incident Response
- Computer Forensics Auditor
- Certified Information Systems Auditor
- All kinds of fraud detection and investigations
- Analysing and data mining ERP and bookkeeping software
- Incident Response
- Information Security Management advisory
- Intellectual property & royalties
- Software Asset Management based on ITIL guides
Before joining i-Force in 2005, Pieter held a management position at Deloitte, where he specialized on Third Party Compliance and Revenue Assurance. Here he obtained a large experience in capturing and analysing electronic data, on different ERP-software packages at third parties (no direct client relation with the auditee). As a manager within the European hub, he became responsible for the coordination of a team of specialists in these matters and executed compliance and revenue assurance jobs for major clients like Microsoft, Adobe, Symantec, IBM, Unilin, … Within these revenue assurance jobs he gathered expert knowledge to analyse and verify company processes and to formulate recommendations.
Pieter has investigated and managed many fraud cases through which he gained a vast experience in the opportunities for fraud, as well as for its detection and deterrence.
He is also regularly appointed by court as a judicial IT expert, both in civil and (fiscal) penal cases.
Pieter regularly conducts formal incident investigations and handles advanced incident handling scenarios, including internal and external data breach intrusions, advanced persistent threats, anti-forensic techniques used by attackers, and complex digital forensic cases. Pieter is a seasoned cybersecurity professional.
Pieter has in-depth knowledge on authorization and authentication mechanisms, especially in online banking environments and as such has been investigating many security breaches in this area.
He enjoys combining his in-depth technical security skills with the ability to zoom out to higher-level people/process/technology risks.
i-Force comes up with results that are actually implementable. That is their strength compared to other consulting companies.
Keep your customer data safe and your company’s name out of the newspapers, that’s a good first goal. Keep your confidential data out of the hands of competitors or foreign adversaries, that’s also important. Assure customers and partners that you are safe to do business with? That’s essential, too. Wow, this list is getting long.21 januari 2019
With Privileged Access Management The importance of implementing privileged access management (PAM) is undeniable. A user with privileged access holds the keys to the kingdom, access to the highly valuable and confidential information that is often targeted by cybercriminals and malicious insiders. In fact, Gartner listed PAM as the No. 1 project for security teams to explore13 december 2018
- 23 juni 2018
If you’d like a free consultation, please start by completing the form: