Self Assessment Tool

Compose your own Professional Profile, find  the best matching ICT Profiles and choose the certificates that could help you to meet your aspirations.

Start your self-assessment by clicking the button.

Start self-assessment tool

ICT Roles



As a response to the huge number of ICT Profile Frameworks and Profile descriptions used today in European ICT Business and Qualification systems, the CEN Workshop on ICT Skills created a number of representative ICT Profiles covering, at their level of granularity, the full ICT Business process.The profiles may be used for reference, or for the basis to develop further profile generations, by European stakeholders. Structured from six main ICT Profile families, these Profiles reflect the top of a European ICT Profiles family tree. The concept devised is broadly analogous to human genetics where the genes of one generation pass down to the next. In the same way it is envisaged that the core components of the 23 Generation 2 Profiles will pass down to profiles constructed to meet specific stakeholder requirements.These ICT Profiles have been published in the CEN Workshop Agreement CWA 16458.



The 23 Profiles combined with e-competences from the e-CF, provide a gene pool for the development of tailored profiles that may be developed by European ICT sector players in specific contexts and with higher levels of granularity.

Summary statement Manages the Information System security policy.
Mission Defines the Information System security policy. Manages security deployment across all Information Systems. Ensures the provision of information availability. Recognized as the ICT security policy expert by internal and external stakeholders.
Accountable Responsible Contributor
  • Information Security Policy
  • Information Security Strategy
  • Knowledge or Information Base
  • ICT Strategy and Implementation
  • New technology integration proposal
  • Risk Management Policy
Main task(s)
  • Define and implement procedures linked to IS security
  • Contribute to the development of the organization’s security policy
  • Establish the prevention plan
  • Inform and raise awareness among general management
  • Ensure the promotion of the IT security charter among users
  • Inspect and ensure that principles and rules for IS security are applied
  • E-competences
    A.7 Technology Trend Monitoring
    Level 4
    D.1 Information Security Strategy Development
    Level 5
    E.3 Risk Management
    Level 3
    E.8 Information Security Management
    Level 4
    E.9 IS Governance
    Level 4
    KPI area Security Policy effectiveness

    Back to list