Cybersecurity
Navigate the dynamic landscape of Cybersecurity with insights from experts, cutting-edge technologies, and proactive defense strategies. Explore educational resources to stay informed and empowered in safeguarding your online presence. Trust the Security Hub pathway towards a safer and more secure digital experience.
Est. 2020
Champions
IN THE MAKING
Standards and frameworks
Threat modeling
Threat modeling enhances cybersecurity by systematically identifying, prioritizing, and mitigating potential risks in digital systems and applications.
Security TRaining
I enjoy giving training and workshops because it gives me the chance to share knowledge, inspire growth, and witness the transformative impact on participants' skills and confidence.
Security Architecture
security architecture and planning enables me to design resilient systems, anticipate threats, and fortify organizations against evolving cyber risks.
Human Centric Security
"Turning user behavior into a strength."
Me
User behavior and engagement to create effective, user-friendly defenses against cyber threats.
Culture
Assessments
Metrics
A recent Gartner survey found that 69% of employees have bypassed their organization’s cybersecurity guidance in the past 12 months, and 74% of employees would be willing to bypass cybersecurity guidance if it helped them or their team achieve a business objective.
What does this mean? Setting up, maturing and scaling security can only work if it’s integrated into people, fun and based on a people centric model.
Planning
01
Stakeholders & Teams
Engagement is the heartbeat of successful projects, fostering collaboration and driving shared commitment towards a common goal
02
Metrics
Measure, analyze, automate and refine controls for sustained success
03
Vulnerability Management
Analysis, program, methods and reporting
04
Technical
Tools, models, methods, processes and practices
measuring
Scanning
Security
Monitoring and logging
SAST, DAST, IAST
Reporting
Risks, KPI, models, roadmaps
3rd party sources
Libraries
Policy Scanning
dependencies
“In the hands of software engineers and architects, code becomes the silent guardian. Innovation & trust intersect.”
Technology
selection
Strategy
Augmentation
culture
Cultivation
Vulnerability management
remediation
security controls
optimization
secuirty operations
maturation
regulatory
compliance
Let’s network
Let’s start by chatting
Training experience
Individually or team focused
Get in Touch
Email Address
afshin.ghaziasgar@kerridgecs.com
https://za.linkedin.com/in/afshinghazi