Anglade PERRIER (@peglade) 's Twitter Profile
Anglade PERRIER

@peglade

@Tekapcyber CEO

ID: 71285346

calendar_today03-09-2009 15:49:12

135 Tweet

133 Followers

421 Following

CloudSecurityAlliance (@cloudsa) 's Twitter Profile Photo

Learn the five important best practices that organizations should follow to ensure PCI DSS compliance in their cloud environments in this Orca Security blog → bit.ly/43SVng3

McKinsey & Company (@mckinsey) 's Twitter Profile Photo

What sets the best communicators apart from the rest? It starts with focusing on the synthesis over summary. Join McKinsey Forward online learning program to improve your communication skills, develop new ways of thinking, and learn to lead with purpose➡️mck.co/3XNy2dw

What sets the best communicators apart from the rest? It starts with focusing on the synthesis over summary. Join McKinsey Forward online learning program to improve your communication skills, develop new ways of thinking, and learn to lead with purpose➡️mck.co/3XNy2dw
FAIR Institute (@fairinstitute) 's Twitter Profile Photo

How to Achieve Quick Wins with FAIR Cyber Risk Quantification. Read just how simple it can be to have a successful program: hubs.la/Q01Ybq6y0

Center for Internet Security (CIS) (@cisecurity) 's Twitter Profile Photo

Are you looking to build or revamp their #governance, #risk, and #compliance program? Watch our on-demand webinar to see real-life scenarios and live demonstrations of tools that can help! bit.ly/3PrIzIL #audit #cybersecurity

Are you looking to build or revamp their #governance, #risk, and #compliance program? Watch our on-demand webinar to see real-life scenarios and live demonstrations of tools that can help! bit.ly/3PrIzIL #audit #cybersecurity
Harvard Business Review (@harvardbiz) 's Twitter Profile Photo

You need leaders who can look to the future with confidence and forge new paths. These aren't necessarily the same people who have had the best performance in the past. hbr.org/2019/08/hire-l…

Sandy Clervil (@clervilsandy) 's Twitter Profile Photo

@ISOCChapitreHaïti Le chiffrement de bout en bout : Où en sommes-nous? Le cryptage renforce la sécurité des données. Derniers développements technologiques et défis à relever. Protège les infos, mais législation et vie privée en jeu. Gouvernements doivent équilibrer sécurité et

Center for Internet Security (CIS) (@cisecurity) 's Twitter Profile Photo

Freely available to everyone, CIS RAM v2.1 guides you through the process of assessing your #cybersecurity posture against the #CISControls. wi.st/4673bM4 #riskanalysis #cyberthreat

CloudSecurityAlliance (@cloudsa) 's Twitter Profile Photo

🚀​​Registration is now open for CSA’s 2024 AI Summit! Secure your virtual seat for January 17-18 to join industry leaders & innovators in shaping the future of #AI in #cybersecurity. Don’t miss this opportunity to contribute to the conversations on AI: e.cloudsecurityalliance.org/l/908632/2023-…

🚀​​Registration is now open for CSA’s 2024 AI Summit! Secure your virtual seat for January 17-18 to join industry leaders & innovators in shaping the future of #AI in #cybersecurity. Don’t miss this opportunity to contribute to the conversations on AI:  e.cloudsecurityalliance.org/l/908632/2023-…
MIT Sloan Management Review (@mitsmr) 's Twitter Profile Photo

When should a #leader be pulled into a decision, and when can team members move autonomously? Identifying decisions as low risk or high risk and low urgency or high urgency helps to clarify expectations: mitsmr.com/3vlf2q7 Nancy Duarte

When should a #leader be pulled into a decision, and when can team members move autonomously? Identifying decisions as low risk or high risk and low urgency or high urgency helps to clarify expectations: mitsmr.com/3vlf2q7 <a href="/nancyduarte/">Nancy Duarte</a>
Harvard Business Review (@harvardbiz) 's Twitter Profile Photo

The barriers women face are a problem, but an even bigger problem may be the lack of barriers faced by mediocre men. hbr.org/2013/08/why-do…

Center for Internet Security (CIS) (@cisecurity) 's Twitter Profile Photo

Join us on April 16 to learn about how globally recognized security best practices are developed through a unique community consensus process and can help your organization speed policy to implementation. bit.ly/48PoSl9 #cybersecurity #security

Center for Internet Security (CIS) (@cisecurity) 's Twitter Profile Photo

To create a cloud security program, you have two main options to consider. Find out what they are and how to get started in a blog post written by our experts! bit.ly/3OrHJuK #cloudmigration #cloudsecurity #cloud #cybersecurity

MIT Sloan Management Review (@mitsmr) 's Twitter Profile Photo

To drive strategy execution, leaders should set goals that are F.A.S.T.: Frequently discussed, Ambitious, Specific, and Transparent. mitsmr.com/2Hnx2DX

To drive strategy execution, leaders should set goals that are F.A.S.T.: Frequently discussed, Ambitious, Specific, and Transparent. mitsmr.com/2Hnx2DX
Jean Marie ALTEMA (@altemajm) 's Twitter Profile Photo

Dans un monde où la technologie transforme tout, comment assurer une gouvernance responsable et une cybersécurité solide ? Dans cet épisode d'Haiti Tech Connect, je reçois Anglade Perrier ASC, C.Dir, NACD.DC Anglade PERRIER, administrateur certifié et stratège en gouvernance

Dans un monde où la technologie transforme tout, comment assurer une gouvernance responsable et une cybersécurité solide ?

Dans cet épisode d'Haiti Tech Connect, je reçois Anglade Perrier ASC, C.Dir, NACD.DC <a href="/peglade/">Anglade PERRIER</a>, administrateur certifié et stratège en gouvernance
Jean Marie ALTEMA (@altemajm) 's Twitter Profile Photo

20 épisodes, 20 conversations qui ont donné la parole à l’écosystème numérique haïtien et connecté Haïti et sa diaspora autour du numérique. À travers Haiti Tech Connect, nous avons exploré les défis, les innovations et les visages qui façonnent la transformation digitale

20 épisodes, 20 conversations qui ont donné la parole à l’écosystème numérique haïtien et connecté Haïti et sa diaspora autour du numérique.

À travers Haiti Tech Connect, nous avons exploré les défis, les innovations et les visages qui façonnent la transformation digitale