Tag: Cybercrime

Special Feature – 10th Anniversary

Special Feature – 10th Anniversary

Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at 

Welcome New Member –  Samira Marquaille from France

Welcome New Member – Samira Marquaille from France

Please welcome our newest member from France, Samira Marquaille

Samira Marquaille is an IT Project Manager with more than 20 years of experience across both public and private sectors, with a strong focus on data privacy. She is skilled at uniting teams and fostering collaboration to manage projects involving new European regulations around data privacy, cybersecurity (DORA, NIS2, …) and AI (AI Act).

Beyond her project work, Samira actively contributes to professional associations, training initiatives, and public awareness efforts on data privacy. She also volunteers as a mentor, supporting young people and women entering the IT field.

Samira is widely recognised for her rigour, analytical skills, and deep commitment to the field.

It’s good to have you, Samira! We look forward to the expertise you bring and enabling you here at CyAN. Don’t hesitate to reach out or explore Samira’s profile to grow your networks mutually.

Welcome New Member – Andrew Pedroso from Australia

Welcome New Member – Andrew Pedroso from Australia

Please welcome our newest member from the Australia, Andrew Pedroso Andrew Pedroso has committed over a decade to business technology research, advisory, data, and consulting. Now, he has returned to his passion for cybersecurity and zero trust strategy. With deep expertise across key industries including BFSI, 

Welcome Back – Michael McDonald from Australia

Welcome Back – Michael McDonald from Australia

CyAN is thrilled to welcome back Michael McDonald, an internationally respected Senior Solution Architect, startup CTO, and technical visionary whose career spans three decades, five continents, and some of the most complex, high-stakes environments in industry and government. Michael brings rare breadth and depth across 

CyAN Voices: Growing Careers Through Mentorship

CyAN Voices: Growing Careers Through Mentorship

In this first mentorship story of 2025, Kuljit Kaur (Australia) shares her experience under the guidance of her CyAN mentor, Shakil Khan (UAE).

My Mentoring Experience with CyAN Mentorship Program and Mr. Shakil Khan

By Kuljit Kaur

Starting a career journey in cybersecurity can be both exciting and challenging. Thanks to the mentorship program offered by CyAN mentorship program and the guidance of Mr. Shakil Khan, I have gained clarity, confidence, and a practical roadmap to transition into the cybersecurity industry.

Setting the Stage: My Mentorship Goals

In our first mentoring session, I outlined my expectations from the program:

  • Career Guidance: Gaining insights into cybersecurity pathways, skills, and certifications aligned with industry demands.
  • Practical Knowledge: Learning about real-world cybersecurity challenges, SOC operations, risk management, and security compliance best practices.
  • Personalized Advice: Receiving guidance on areas for improvement and clear, practical steps for breaking into the cybersecurity field.
  • Career Readiness: Strengthening my resume, improving job applications, and preparing effectively for interviews.
  • Networking and Resources: Expanding my professional network and accessing valuable learning platforms and communities.

I also discussed my career goals, including:

  • Short-Term (6–12 Months): Secure a cybersecurity role in SOC operations, security monitoring, or IT support, using my skills in Microsoft Sentinel, Splunk, and SIEM tools.
  • Mid-Term (1–3 Years): Progress into a Cybersecurity Analyst or Risk & Compliance role, focusing on threat detection, incident response, and risk management.
  • Long-Term (Beyond 3 Years): Grow into a Cybersecurity Consultant or Security Engineer, contributing to security architecture, cloud security, and governance frameworks.

Resume Enhancement and Career Planning

One of the first areas Mr. Shakil Khan helped me with was improving my resume. He guided me on how to highlight my technical competencies, real-world experiences, and certifications in a way that directly speaks to cybersecurity recruiters. His feedback helped me present my SOC, SIEM, and security monitoring experience more effectively.

We also discussed the Three Lines of Defence model, deepening my understanding of how cybersecurity operations fit into broader risk and governance structures:

  • First Line: Operational management (security teams executing controls and monitoring)
  • Second Line: Risk management and compliance oversight
  • Third Line: Internal audit providing independent assurance

Additionally, we reviewed concepts related to Governance, Risk, and Compliance (GRC), helping me connect technical roles with broader organizational risk and policy frameworks.

SOC Operations Understanding

In our discussion about SOC operations, Mr. Shakil Khan encouraged me to share my practical understanding of threat detection, incident triage, escalation processes, and documentation. He emphasized the importance of not only technical skill but also clear communication, teamwork, and continuous learning to thrive in a SOC environment.

Workplace Success: Tips and KPIs

Mr. Shakil Khan also shared valuable tips on how to work successfully in a professional cybersecurity environment:

  • Time Management: Prioritize tasks and manage time effectively to meet deadlines.
  • Professional Communication: Always communicate clearly, whether writing incident reports, sending emails, or giving verbal updates.
  • Accountability: Own your work, be responsible for tasks assigned to you, and show initiative.
  • Adaptability: Be open to learning new tools, technologies, and adapting to fast-paced environments.
  • Attention to Detail: Accuracy in investigation, reporting, and documentation is critical in cybersecurity roles.

He also explained the importance of understanding Key Performance Indicators (KPIs):

  • Responding to incidents within the agreed SLA (Service Level Agreement) timeframe
  • Accuracy in incident classification and escalation
  • Timely completion of threat analysis and reporting tasks
  • Contribution to team goals and knowledge sharing

KPIs are not just performance metrics — they directly link to building trust with your team and showing your reliability to leadership.

The Importance of Networking

Another crucial part of the discussion was professional networking:

  • Why Networking Matters: In cybersecurity, many job opportunities are found through connections rather than job boards. Networking also exposes you to emerging industry trends, mentorship opportunities, and communities of practice.
  • How to Network Effectively:
    • Attend cybersecurity webinars, meetups, and conferences (even virtual ones).
    • Be active on LinkedIn — share your learnings, comment on cybersecurity posts, and connect with professionals in the field.
    • Join cybersecurity communities (e.g., ISACA, (ISC)², OWASP, or even informal Slack/Discord groups).
    • Always approach networking with a mindset of mutual learning — offer help, ask for advice, and stay genuinely curious.

Mr. Shakil Khan highlighted that networking is not just about finding a job; it’s about building long-term relationships that support continuous growth and development in your career.

Conclusion

This mentorship session with Mr. Shakil Khan through the CyAN mentorship program has been a transformational experience for me. His guidance has provided me with a strategic career roadmap, real-world advice, and a strong foundation for professional growth.

I feel more confident, better equipped, and motivated to achieve my career goals in cybersecurity. I am grateful for the time, effort, and insights shared by Mr. Shakil Khan and look forward to continuing to work on the action items we discussed — from enhancing my technical skills and workplace readiness to building a strong professional network.


About the Mentor

Mohammed Shakil Khan

LinkedIn

25+ years of diversified senior management experience in governance and transformation specializing in Risk management, Internal Audit, Cybersecurity, Business & Digital Transformation, Data Governance and sustainability implementation.

About the Mentee

Kuljit Kaur

LinkedIn

Kuljit Kaur is a recent Master of Cyber Security graduate from Edith Cowan University with hands-on experience in SOC operations, SIEM tools like Microsoft Sentinel and Splunk, and real-time threat investigations. Passionate about continuous learning, she is currently interning in a SOC role and actively building her career in the cybersecurity industry.

Cyber (In)Securities – Issue 144

News Quantum computer threat spurring quiet overhaul of internet securityCyberscoop – Greg Otto Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacksBleepingComputer – Bill Toulas Dems look to close the barn door after top DOGE dog has boltedThe Register – Brandon Vigliarolo Canadian Electric Utility 

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143

News Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedInThe Register – Brandon Vigliarolo Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOneCyberscoop – Greg Otto Marks & Spencer breach linked to Scattered Spider ransomware attackBleepingComputer – Lawrence 

Cyber (In)Securities – Issue 140

Cyber (In)Securities – Issue 140

Information Security News

  1. Tariffs May Prompt Increase in Global Cyberattacks
    Dark Reading – Robert Lemos
  2. US Comptroller Cyber ‘Incident’ Compromises Org’s Emails
    Dark Reading – Kristina Beek
  3. Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom Insecurity
    The Register – Jessica Lyons
  4. Trump Signs Order Stripping Chris Krebs of Security Clearance
    Cyberscoop – Greg Otto
  5. Hackers Target SSRF Bugs in EC2-Hosted Sites to Steal AWS Credentials
    BleepingComputer – Bill Toulas
  6. Sensitive Financial Files Feared Stolen From US Bank Watchdog
    The Register – Iain Thomson
  7. National Social Security Fund of Morocco Suffers Data Breach
    Security Affairs – Pierluigi Paganini
  8. BadBazaar and Moonshine Malware Targets Taiwanese, Tibetan and Uyghur Groups, U.K. Warns
    Cyberscoop – Tim Starks
  9. Critical FortiSwitch Flaw Lets Hackers Change Admin Passwords Remotely
    BleepingComputer – Sergiu Gatlan
  10. Fake Microsoft Office Add-in Tools Push Malware via SourceForge
    BleepingComputer – Bill Toulas
  11. Privacy Fights Over Expiring Surveillance Law Loom After House Hearing
    Cyberscoop – Tim Starks
  12. UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare
    Dark Reading – Kristina Beek
  13. Adobe Calls Urgent Attention to Critical ColdFusion Flaws
    SecurityWeek – Ryan Naraine
  14. 2 Android Zero-Day Bugs Under Active Exploit
    Dark Reading – Kristina Beek
  15. Treasury Department Bank Regulator Discloses Major Hack
    Cybersecurity Dive – Elizabeth Montalbano
  16. Inside a Powerful Database ICE Uses to Identify and Deport People
    404 Media – Jason Koebler
  17. Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube
    Dark Reading – Elizabeth Montalbano
  18. SAP Patches Critical Code Injection Vulnerabilities
    SecurityWeek – Ionut Arghire
  19. WhatsApp Vulnerability Could Facilitate Remote Code Execution
    SecurityWeek – Eduard Kovacs
  20. ESET Vulnerability Exploited for Stealthy Malware Execution
    SecurityWeek – Ionut Arghire
  21. UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
    The Hacker News – Ravie Lakshmanan
  22. Meta Blocks Livestreaming by Teenagers on Instagram
    The Guardian – Dan Milmo
  23. EVEREST Ransomware Group’s TOR Leak Site Offline After a Defacement
    Security Affairs – Pierluigi Paganini
  24. Russian Bots Hard at Work Spreading Political Unrest on Romania’s Internet
    Bitdefender – Graham Cluley
  25. Six Arrested for AI-Powered Investment Scams That Stole $20 Million
    BleepingComputer – Bill Toulas
  26. As CISA Braces for More Cuts, Threat Intel Sharing Takes a Hit
    The Register – Jessica Lyons
  27. Counterfeit Android Devices Found Preloaded with Triada Malware
    BleepingComputer – Bill Toulas
  28. Joint Letter on Swedish Data Storage and Access to Electronic Information Legislation
    Global Encryption Coalition – Ryan Polk

Analysis

  1. Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
    SecurityWeek – Joshua Goldfarb
  2. How Democratized Development Creates a Security Nightmare
    Dark Reading – Fernando José Karl
  3. Experts Optimistic About Secure by Design Progress
    Dark Reading – Arielle Waldman
  4. Machine Identity a Key Priority for Organisations’ Security Strategies
    itNews

CyAN Members Op Eds, Articles, etc.

  1. 🔐 End-to-End Encryption: A Cornerstone Under Pressure?
    – Peter Evans
  2. CyAN Member Spotlight: Łukasz Gawron – Advancing Cybersecurity in Poland

🗓️ Upcoming CyAN (and CyAN Partner) Global Events:

SCCS Logo

📍 Lisbon, Portugal

Supply Chain Cyber Security Summit (SCCS)
April 9–11

Read more
GITEX AFRICA Logo

📍 Marrakesh, Morocco

GITEX AFRICA
April 14–16

Read more
GITEX ASIA Logo

📍 Singapore

GITEX ASIA
April 23–25

Read more
GISEC Logo

📍 Dubai, UAE

GISEC
May 6–8

Read more
Cyber OSPAs Logo

📍 London, UK

Cyber OSPAs
May 8

Read more
CSG Awards Logo

📍 Dubai, UAE

CSG Awards 2025
May 7

Read more
World AI Expo Logo

📍 Dubai, UAE

World AI Technology Expo
May 14–15

Read more

🎉 Celebration

CyAN 10th Anniversary
(Details TBA)

GITEX Europe Logo

📍 Berlin, Germany

GITEX Europe Messe
May 21–23

Read more
MaTeCC Logo

📍 Rabat, Morocco

MaTeCC
June 7–9

Read more

🌐 Online

CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST

🌐 Online

CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all