Arkadiusz Osypiuk

Chief Information Security Officer at CD PROJEKT RED
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Warsaw, Mazowieckie, Poland, PL
Languages
  • English Full professional proficiency
  • Russian Elementary proficiency

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • CRISC
    CTS
    Oct, 2020
    - Nov, 2024
  • Leading SAFe - Scaled Agile Framework® (SAFe®)
    Scaled Agile, Inc.
    Dec, 2019
    - Nov, 2024
  • Software legality auditor
    BSS
    Oct, 2017
    - Nov, 2024
  • CISSP
    Altkom Akademia
    Oct, 2016
    - Nov, 2024
  • Barracuda Certified Engineer
    Barracuda (NYSE: CUDA)
    May, 2016
    - Nov, 2024
  • Barracuda NextGen Firewall F Certified Engineer
    Barracuda (NYSE: CUDA)
    May, 2016
    - Nov, 2024
  • Network security - pentesting
    Niebezpiecznik.pl
    Dec, 2015
    - Nov, 2024
  • Information Security Management Systems Auditor / Lead Auditor Training Course (ISO/IEC 27001:2005)
    BSI
    Dec, 2013
    - Nov, 2024
  • Attacking and application protection
    Compendium Education Center
    Dec, 2012
    - Nov, 2024
  • CCNA
    Cisco
  • ITIL v3 Foundation
    EXIN
  • NATO security clearance levels: NATO RESTRICTED (NR), NATO CONFIDENTIAL (NC), NATO SECRET (NS) and COSMIC TOP SECRET (CTS).
    The Internal Security Agency (ABW)
  • PL/EU Security clearance levels: Level I (CONFIDENTIAL), Level II (SECRET) and Level III (TOP SECRET)
    The Internal Security Agency (ABW)

Experience

    • Poland
    • Computer Games
    • 700 & Above Employee
    • Chief Information Security Officer
      • Jan 2021 - Present

      Responsibilities:- Acting as CISO for all companies from the CD Projekt S.A. capital group and subsidiaries- Designing and implementing information security strategy. Aligning it with the business and IT strategy - Establishing and leading Information Security Department (as an independent business unit reportingdirectly to the management board)- Managing information security budget- Developing and implementing an information security policy- Designing a roadmap of future activities, launching several programs and over 100 initiatives in thefield of information security and technological changes in the organization and subsidiaries- Designing, establishing and leading a risk-based approach in the organization. Implementing the strategic risk management process- Defining and effectively meeting goals, reporting statuses directly to the management board

    • Owner
      • Jan 2017 - Present

      Using my own business activity to influence and support various Companies in the way of handling Information Security Using my own business activity to influence and support various Companies in the way of handling Information Security

    • Poland
    • Education Management
    • 1 - 100 Employee
    • University Lecturer
      • Dec 2022 - Present

      Conducting lectures, workshops, and seminars on the subject of "Information security management" Conducting lectures, workshops, and seminars on the subject of "Information security management"

    • United Kingdom
    • Tobacco Manufacturing
    • 700 & Above Employee
    • IT Security Risk and Policy Senior Manager
      • Apr 2019 - Feb 2021

      Responsibilities:- Develop, implement and monitor reporting mechanisms for governance and security risk practices, to support compliance and highlight areas of exposure- Create a formal process to address security risk through the coordination and control of activities to manage these risks; support and confirm the implementation of agreed remedial actions- Monitoring and reviewing compliance with risk management strategies and practices to ensure all IT systems, applications and services are meeting minimum standards- Provide regular reporting on the status of the IT security program to senior IT and business leaders- Create, communicate and implement a risk-based process for vendor security risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers- Develop and maintain security policies, standards, guidelines, processes, procedures, as well as the process for business functions and employee’s acknowledgment of these

    • Poland
    • Technology, Information and Internet
    • 1 - 100 Employee
    • Data Protection Officer
      • Nov 2018 - Dec 2020

    • Poland
    • Computer Games
    • 1 - 100 Employee
    • Data Protection Officer
      • Nov 2018 - Dec 2020

    • Poland
    • Computer Games
    • 100 - 200 Employee
    • IT Security Expert
      • Nov 2018 - Dec 2020

    • Poland
    • Computer Games
    • 300 - 400 Employee
    • Information Security Manager
      • Apr 2013 - Mar 2019

      Responsibilities:- Create and implement an information security strategy for the organization- Develop and maintain security policies, standards, guidelines, processes, procedures, as well as the process for business functions and employee’s acknowledgment of these (including application security, access control, physical security and corporate data safeguards)- Develop industry security standards and best practices - Perform network and critical systems monitoring against security breaches - Conduct penetration testing- Perform incidents handling and manage the incidents- Data Protection Officer responsibilities- Prepare and perform data classification and risk management process- Prepare and conduct internal audits- Advise a secure configuration by routinely reviewing vendor sites, bulletins, and notifications for security information- Management over several IT Security solutions- Conducting security awareness employee training- Maintain compliance with all company policies and procedures

    • United States
    • Advertising Services
    • 100 - 200 Employee
    • Director of Information Security Department (CISO)
      • Nov 2016 - Sep 2018

      Responsibilities:- Create and implement IT security strategy for the organization- Create, establish and lead the IT Security Department- Develop and implement a cybersecurity plan, and report compliance status to executive leaders. - Responsible for monitoring and reviewing compliance with IT security strategies and practices to ensure all IT systems, applications and services are meeting required standards- Lead and execute assessments against local and international laws and regulations- Develop and maintain information security policy, standards, guidelines, processes, procedures, as well as the process for business functions and employee’s acknowledgment of these- Perform risk assessment processes- Deliver best practice cybersecurity solutions to support organizational partnership with third parties and customers- Create, implement and maintain incident management process

    • IT Security Chief Specialist, Inspector of the IT Security
      • Oct 2011 - Apr 2013

      Responsibilities:- Manage the ICT security projects (technical, organizational and legal) - Lead activities of protection of classified information in the Chancellery- Analysis and evaluation of IT classified systems security threats in the Chancellery - Manage the risk assessment process (as a part of handling incidents)- Conduct classified information trainings for employees- Involved in the checks of the principles of IT security and protection of classified information in the Chancellery- Implement and develop security policy based on the ISO-27001

    • IT Services and IT Consulting
    • Security and IT Administration Manager
      • Jun 2009 - Sep 2011

      Responsibilities:- Create and implement security policy based on the ISO-27001- IT security infrastructure management- Implement and develop disaster recovery and failover for monitoring system - Define and maintain monitoring and reporting for algotrading security system - Contact with major business partners and suppliers - Design, implement and maintain secure IT infrastructure- Manage high availability systems Responsibilities:- Create and implement security policy based on the ISO-27001- IT security infrastructure management- Implement and develop disaster recovery and failover for monitoring system - Define and maintain monitoring and reporting for algotrading security system - Contact with major business partners and suppliers - Design, implement and maintain secure IT infrastructure- Manage high availability systems

    • Assistant
      • Sep 2005 - Sep 2009

      Lectures and excerises at:- Computer networks- Operating systems- Security and data protection in computer systems- Algorithms and data structures- Basic programming- Internet engineeringCoordinator of students scientific club in the Institute of Computer Science Lectures and excerises at:- Computer networks- Operating systems- Security and data protection in computer systems- Algorithms and data structures- Basic programming- Internet engineeringCoordinator of students scientific club in the Institute of Computer Science

Education

  • Institute of Computer Science, Bialystok Technical University, Poland
    MSc
    1999 - 2004
  • The University of Finance and Management, Bialystok, Poland
    postgraduate
    2004 - 2005

Community

You need to have a working account to view this content. Click here to join now