IT Security Strategy

  • IT Security Strategy
    • Aligning IT security strategy to business goals
  • CISO role
    • Acting as a CISO for a company
    • Training a newly appointed CISO

IT Security Policies & Procedures

  • Defining IT Security Policies & Procedures using international standards such as ISO 27002 or ITIL to set force the IT operations of the company
  • Certified Information Security Manager (CISM) by ISACA
  • Over 7 years of experience as a CISO in international companies
  • Certified Information Security Manager (CISM) by ISACA
  • Certified ITIL (IT Service Management)

IT Security Awareness & Training

  • Defining IT Security Awareness strategy, content and format for all employees of a company (from executives to temp)
  • Defining IT Security Training material for employees
  • Setting up phishing campaigns

Vulnerability Management

  • Identifying vulnerabilities of internal and Internet-facing systems
  • Implementing solutions of vulnerability management with scanners
  • Defining the procedures for managing security vulnerabilities
  • Training IT staff on vulnerability management
  • Penetration Testing
  • Certified Information Security Manager (CISM) by ISACA
  • QualysGuard Certified Specialist


  • Assessing cryptographic solutions for strong authentication, eSignature or encryption
  • Designing Public Key Infrastructure (PKI)
  • Implementing PKI
  • Defining Certification Policy (CP) & Certification Practice Statement (CPS)
  • Key ceremony

Artificial Intelligence Management System Implementation

  • Scope of AIMS
  • AI policy
  • Awareness
  • Implementation of AI controls
  • Certified in Applied Cryptography (Master degree)
  • Certified ISO/IEC 42001: 2023 Implementor