Our Latest Content is on the FPT Blog
Feel free to browse our existing content below, however, if you're looking for the latest articles, we now post them to FPT Software's blog page.
Frederid Palacios
Fred Palacios is a seasoned software architect with more than 20 years of experience participating in the entire software development cycle across a host of different industries--from automotive and services to petroleum, financial, and supply chain. In that time, his experience working closely with high-level stakeholders has provided him with a strategic vision for developing the right solutions to flexibly meet critical business needs. As CTO of Intertec, he's continuing to focus on the creation of business-critical applications for large enterprise projects, particularly those that handle high concurrency and large datasets. He is passionate about using technology as a tool to solve real-world problems and also mentoring technical teams to achieve their maximum potential and deliver quality software.Posts by Frederid Palacios
ISO 27001 Success Relies on Your Control Objectives
April 20, 2021 / by Frederid Palacios posted in Cyber Security
Backup Management Best Practices
April 15, 2021 / by Frederid Palacios posted in Cyber Security
ISO Risk Treatment Process vs. Plan
April 13, 2021 / by Frederid Palacios posted in Cyber Security
Deciding on your ISO 27001 Certification Risk Treatment
April 8, 2021 / by Frederid Palacios posted in Cyber Security
Nothing is More Critical Than an ISO 27001 Statement of Applicability
April 1, 2021 / by Frederid Palacios posted in Cyber Security
IT Infrastructure and Operations Trends of 2021
March 30, 2021 / by Frederid Palacios posted in Cloud Migration, Remote Work
Key Benefits of ISO 27001 Implementation
March 23, 2021 / by Frederid Palacios posted in Cyber Security
Problems with Defining the Scope of your ISMS
March 18, 2021 / by Frederid Palacios posted in Cyber Security
Developing a Risk Assessment Methodology for your ISO Certification
March 16, 2021 / by Frederid Palacios posted in Cyber Security