Initial LetterLogo

Afshin

Ghaziasgar

Software. Security. Business.

Hacker Hand Stealing Data from Laptop Top down

Cybersecurity

Navigate the dynamic landscape of Cybersecurity with insights from experts, cutting-edge technologies, and proactive defense strategies. Explore educational resources to stay informed and empowered in safeguarding your online presence. Trust the Security Hub pathway towards a safer and more secure digital experience.

Est. 2020

Champions

IN THE MAKING

Standards and frameworks

OWASP ASVS

OWASP TOP 10

STIGS

SCAP

OWASP MASVS




Threat modeling

Threat modeling enhances cybersecurity by systematically identifying, prioritizing, and mitigating potential risks in digital systems and applications.

Security TRaining

I enjoy giving training and workshops because it gives me the chance to share knowledge, inspire growth, and witness the transformative impact on participants' skills and confidence.

Security Architecture

security architecture and planning enables me to design resilient systems, anticipate threats, and fortify organizations against evolving cyber risks.

Human Centric Security

"Turning user behavior into a strength."

Me

User behavior and engagement to create effective, user-friendly defenses against cyber threats.


Left Human Hand
Businessperson Analyzing Investment with a Calculator
Business Partners Discussing with Tablet

Culture

Assessments

Metrics

A recent Gartner survey found that 69% of employees have bypassed their organization’s cybersecurity guidance in the past 12 months, and 74% of employees would be willing to bypass cybersecurity guidance if it helped them or their team achieve a business objective.

What does this mean? Setting up, maturing and scaling security can only work if it’s integrated into people, fun and based on a people centric model.

Planning

01

Stakeholders & Teams

Engagement is the heartbeat of successful projects, fostering collaboration and driving shared commitment towards a common goal

Cool Corporate Team Having a Meeting

02

Metrics

Measure, analyze, automate and refine controls for sustained success

Development Plan Icon

03

Vulnerability Management

Analysis, program, methods and reporting

04

Technical

Tools, models, methods, processes and practices

measuring

Scanning

Security

Monitoring and logging

SAST, DAST, IAST

Reporting

Risks, KPI, models, roadmaps

3rd party sources

Libraries

Policy Scanning

dependencies

“In the hands of software engineers and architects, code becomes the silent guardian. Innovation & trust intersect.”

Working together.

Team of Business People Working Together

Technology

selection

Strategy

Augmentation

culture

Cultivation

Vulnerability management

remediation

security controls

optimization

secuirty operations

maturation

regulatory

compliance

Student with Headphones Using Laptop for Online Class
Initial LetterLogo

Let’s network

Let’s start by chatting

Training experience

Businesswoman Writing Notes While Using Laptop

Business

Overview

Strategy

Implementation

Risk

Agile management


Team in a Meeting

Devs

Hands-on training

Champion enablement

Implementation

Controls


Group of Students Holding Hands

QA

Automation

Hands-on training

Verification

Security controls gates

Individually or team focused

Dynamic

Factoring in product or project software strategy. Plugs into methodology.

Motivating and enabling

Practical involvement and applicability.

Standards and process

Checklists and gap analysis

Processes and cadence

Cloud, on-prem, hybrid, mobile.

Legal and compliance

Get in Touch

Address

Cape Town

South Africa

Buildable Twitter UI Filled Lists Icon

Email Address


afshin.ghaziasgar@kerridgecs.com




https://za.linkedin.com/in/afshinghazi