Common Objections and Rationalisations: “Our production systems are completely isolated from outside access.” “Our system is secure because it would be impossible for an outsider to understand it.” “We’re not a likely target. We’re not important or interesting enough to attract hackers.” “We’ve never had a problem. There has been no intrusion or disruption in our production network.” “It hasn’t happened yet, so it seems unlikely. I don’t think it will happen.” “We can’t justify the expense and manpower.” Being Vulnerable is not your fault. Staying vulnerable definitely is... Cyber Security is much more than a matter of IT... Passwords are like underwear: Don’t let people see it, Don't leave them lying around and Change them regularly... It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.. Technology trust is a good thing, but control is a better one... No technology that’s connected to the Internet is unhackable. Social engineering bypasses all technologies, including firewalls. Phishing is a major problem because there really is no patch for human stupidity. If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you. My message to companies that think they haven’t been attacked is: ‘You’re not looking hard enough. Never underestimate the determination of a kid who is time-rich and cash-poor. Time is what determines security. With enough time nothing is unhackable. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.

  Follow On Social:

NASAHD HUNTER

CTO/CISO: Cyber Security Specialist

Naushad Hunter is a Digital Intelligence Tactical Solutions Developer and Cyber Security Architect with a Master of Science in Cybersecurity and pursuing dual Ph.D. research. With over 20 years of experience, Naushad is an Enterprise Security Specialist with expertise across various sectors including government, banking, healthcare, retail, e-commerce, FinTech, and energy (oil/gas/SCADA). He is recognized as a renowned cyber security thought leader, specializing in Cyber Defence, Cyber Security Operations, Threat Analysis, Incident Response, Forensic Investigations, Malware Analysis, 0-Day Hunting, DarkWeb & DeepWeb Threat Intelligence Analytics.

SME Key Expertise:

  • Cyber Security Defence strategy
  • Building Zero-Trust architecture
  • Designing Enterprise Security Solutions (BlueTeam)
  • Implementing Cyber Resilience OffSEC programs (RedTeam)
  • Conducting Enterprise Information Security Assessments
  • Developing Global Security Monitoring Strategy
  • Overseeing SOC resilience programs and maturity assessments
  • Fine-tuning SIEM/SOC engineering
  • Automating Security and Orchestration processes
  • Leading Cyber Security Incident Response Teams (CSIRT)
  • Implementing Proactive Defense strategies
  • As an advocate of blockchain technology
  • Blockchain Security Specialist
  • Artificial Intelligence (AI) in Cyber Ops

  • "Naushad believes in continuous improvement in security practices, stating, "Nothing about security is ever set it and forget it. Security is a process, not a destination... I make things, I break things and I make things that break things." As a serial entrepreneur and crypto enthusiast, he is passionate about leveraging technology, particularly blockchain, to positively impact the world."

3rd Floor, 45 Albemarle Street, Mayfair, London, W1S 4JL

SecOp Logo