Conducting a risk assessment in compliance with industrial standards and local regulations. Leading the development of cybersecurity training and awareness programs in the context of the OT/ICS.
Develop cybersecurity content for training programs that cover a wide range of topics, such as networking, virtualization, and security, via practical examples and hands-on exercises.
Developed and launched the company's website.
Twitter Sentiment Analysis During the Lockdown on New Zealand.
Forensic Hash Value Guidelines: Why Md5 and SHA-1 Should No Longer be Used and a Recommendation for Their Replacement.
Malware development.
AI-Defense mechanisms and theories of adversarial attacks against end-to-end communication systems.
Navigating the Concepts of the OT Cybersecurity Landscape