Tag: Cybercrime
Special Feature – 10th Anniversary
Editor-in-Chief Kim Chandler McDonald Co-Founder and CEO of 3 Steps Data Global VP at CyAN An award-winning author and advocate for cybersecurity, compliance, and digital sovereignty. Kim drives global conversations on data governance and user empowerment. Author Saba Bagheri, PhD Cyber Threat Intelligence Manager at …
Welcome New Member – Samira Marquaille from France

Please welcome our newest member from France, Samira Marquaille
Samira Marquaille is an IT Project Manager with more than 20 years of experience across both public and private sectors, with a strong focus on data privacy. She is skilled at uniting teams and fostering collaboration to manage projects involving new European regulations around data privacy, cybersecurity (DORA, NIS2, …) and AI (AI Act).
Beyond her project work, Samira actively contributes to professional associations, training initiatives, and public awareness efforts on data privacy. She also volunteers as a mentor, supporting young people and women entering the IT field.
Samira is widely recognised for her rigour, analytical skills, and deep commitment to the field.
It’s good to have you, Samira! We look forward to the expertise you bring and enabling you here at CyAN. Don’t hesitate to reach out or explore Samira’s profile to grow your networks mutually.
Welcome New Member – Andrew Pedroso from Australia
Please welcome our newest member from the Australia, Andrew Pedroso Andrew Pedroso has committed over a decade to business technology research, advisory, data, and consulting. Now, he has returned to his passion for cybersecurity and zero trust strategy. With deep expertise across key industries including BFSI, …
Welcome Back – Michael McDonald from Australia
CyAN is thrilled to welcome back Michael McDonald, an internationally respected Senior Solution Architect, startup CTO, and technical visionary whose career spans three decades, five continents, and some of the most complex, high-stakes environments in industry and government. Michael brings rare breadth and depth across …
CyAN Voices: Growing Careers Through Mentorship

My Mentoring Experience with CyAN Mentorship Program and Mr. Shakil Khan
By Kuljit Kaur
Starting a career journey in cybersecurity can be both exciting and challenging. Thanks to the mentorship program offered by CyAN mentorship program and the guidance of Mr. Shakil Khan, I have gained clarity, confidence, and a practical roadmap to transition into the cybersecurity industry.
Setting the Stage: My Mentorship Goals
In our first mentoring session, I outlined my expectations from the program:
- Career Guidance: Gaining insights into cybersecurity pathways, skills, and certifications aligned with industry demands.
- Practical Knowledge: Learning about real-world cybersecurity challenges, SOC operations, risk management, and security compliance best practices.
- Personalized Advice: Receiving guidance on areas for improvement and clear, practical steps for breaking into the cybersecurity field.
- Career Readiness: Strengthening my resume, improving job applications, and preparing effectively for interviews.
- Networking and Resources: Expanding my professional network and accessing valuable learning platforms and communities.
I also discussed my career goals, including:
- Short-Term (6–12 Months): Secure a cybersecurity role in SOC operations, security monitoring, or IT support, using my skills in Microsoft Sentinel, Splunk, and SIEM tools.
- Mid-Term (1–3 Years): Progress into a Cybersecurity Analyst or Risk & Compliance role, focusing on threat detection, incident response, and risk management.
- Long-Term (Beyond 3 Years): Grow into a Cybersecurity Consultant or Security Engineer, contributing to security architecture, cloud security, and governance frameworks.
Resume Enhancement and Career Planning
One of the first areas Mr. Shakil Khan helped me with was improving my resume. He guided me on how to highlight my technical competencies, real-world experiences, and certifications in a way that directly speaks to cybersecurity recruiters. His feedback helped me present my SOC, SIEM, and security monitoring experience more effectively.
We also discussed the Three Lines of Defence model, deepening my understanding of how cybersecurity operations fit into broader risk and governance structures:
- First Line: Operational management (security teams executing controls and monitoring)
- Second Line: Risk management and compliance oversight
- Third Line: Internal audit providing independent assurance
Additionally, we reviewed concepts related to Governance, Risk, and Compliance (GRC), helping me connect technical roles with broader organizational risk and policy frameworks.
SOC Operations Understanding
In our discussion about SOC operations, Mr. Shakil Khan encouraged me to share my practical understanding of threat detection, incident triage, escalation processes, and documentation. He emphasized the importance of not only technical skill but also clear communication, teamwork, and continuous learning to thrive in a SOC environment.
Workplace Success: Tips and KPIs
Mr. Shakil Khan also shared valuable tips on how to work successfully in a professional cybersecurity environment:
- Time Management: Prioritize tasks and manage time effectively to meet deadlines.
- Professional Communication: Always communicate clearly, whether writing incident reports, sending emails, or giving verbal updates.
- Accountability: Own your work, be responsible for tasks assigned to you, and show initiative.
- Adaptability: Be open to learning new tools, technologies, and adapting to fast-paced environments.
- Attention to Detail: Accuracy in investigation, reporting, and documentation is critical in cybersecurity roles.
He also explained the importance of understanding Key Performance Indicators (KPIs):
- Responding to incidents within the agreed SLA (Service Level Agreement) timeframe
- Accuracy in incident classification and escalation
- Timely completion of threat analysis and reporting tasks
- Contribution to team goals and knowledge sharing
KPIs are not just performance metrics — they directly link to building trust with your team and showing your reliability to leadership.
The Importance of Networking
Another crucial part of the discussion was professional networking:
- Why Networking Matters: In cybersecurity, many job opportunities are found through connections rather than job boards. Networking also exposes you to emerging industry trends, mentorship opportunities, and communities of practice.
- How to Network Effectively:
- Attend cybersecurity webinars, meetups, and conferences (even virtual ones).
- Be active on LinkedIn — share your learnings, comment on cybersecurity posts, and connect with professionals in the field.
- Join cybersecurity communities (e.g., ISACA, (ISC)², OWASP, or even informal Slack/Discord groups).
- Always approach networking with a mindset of mutual learning — offer help, ask for advice, and stay genuinely curious.
Mr. Shakil Khan highlighted that networking is not just about finding a job; it’s about building long-term relationships that support continuous growth and development in your career.
Conclusion
This mentorship session with Mr. Shakil Khan through the CyAN mentorship program has been a transformational experience for me. His guidance has provided me with a strategic career roadmap, real-world advice, and a strong foundation for professional growth.
I feel more confident, better equipped, and motivated to achieve my career goals in cybersecurity. I am grateful for the time, effort, and insights shared by Mr. Shakil Khan and look forward to continuing to work on the action items we discussed — from enhancing my technical skills and workplace readiness to building a strong professional network.
About the Mentor
Mohammed Shakil Khan
25+ years of diversified senior management experience in governance and transformation specializing in Risk management, Internal Audit, Cybersecurity, Business & Digital Transformation, Data Governance and sustainability implementation.
About the Mentee
Kuljit Kaur
Kuljit Kaur is a recent Master of Cyber Security graduate from Edith Cowan University with hands-on experience in SOC operations, SIEM tools like Microsoft Sentinel and Splunk, and real-time threat investigations. Passionate about continuous learning, she is currently interning in a SOC role and actively building her career in the cybersecurity industry.
Cyber (In)Securities – Issue 144
News Quantum computer threat spurring quiet overhaul of internet securityCyberscoop – Greg Otto Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacksBleepingComputer – Bill Toulas Dems look to close the barn door after top DOGE dog has boltedThe Register – Brandon Vigliarolo Canadian Electric Utility …
Cyber (In)Securities – Issue 143
News Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedInThe Register – Brandon Vigliarolo Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOneCyberscoop – Greg Otto Marks & Spencer breach linked to Scattered Spider ransomware attackBleepingComputer – Lawrence …
Cyber (In)Securities – Issue 140
Information Security News
- Tariffs May Prompt Increase in Global Cyberattacks
Dark Reading – Robert Lemos - US Comptroller Cyber ‘Incident’ Compromises Org’s Emails
Dark Reading – Kristina Beek - Wyden Blocks Trump’s CISA Boss Nominee, Blames Cyber Agency for ‘Actively Hiding Info’ About Telecom Insecurity
The Register – Jessica Lyons - Trump Signs Order Stripping Chris Krebs of Security Clearance
Cyberscoop – Greg Otto - Hackers Target SSRF Bugs in EC2-Hosted Sites to Steal AWS Credentials
BleepingComputer – Bill Toulas - Sensitive Financial Files Feared Stolen From US Bank Watchdog
The Register – Iain Thomson - National Social Security Fund of Morocco Suffers Data Breach
Security Affairs – Pierluigi Paganini - BadBazaar and Moonshine Malware Targets Taiwanese, Tibetan and Uyghur Groups, U.K. Warns
Cyberscoop – Tim Starks - Critical FortiSwitch Flaw Lets Hackers Change Admin Passwords Remotely
BleepingComputer – Sergiu Gatlan - Fake Microsoft Office Add-in Tools Push Malware via SourceForge
BleepingComputer – Bill Toulas - Privacy Fights Over Expiring Surveillance Law Loom After House Hearing
Cyberscoop – Tim Starks - UK Orgs Pull Back Digital Projects With Looming Threat of Cyberwarfare
Dark Reading – Kristina Beek - Adobe Calls Urgent Attention to Critical ColdFusion Flaws
SecurityWeek – Ryan Naraine - 2 Android Zero-Day Bugs Under Active Exploit
Dark Reading – Kristina Beek - Treasury Department Bank Regulator Discloses Major Hack
Cybersecurity Dive – Elizabeth Montalbano - Inside a Powerful Database ICE Uses to Identify and Deport People
404 Media – Jason Koebler - Dangerous, Windows-Hijacking Neptune RAT Scurries Into Telegram, YouTube
Dark Reading – Elizabeth Montalbano - SAP Patches Critical Code Injection Vulnerabilities
SecurityWeek – Ionut Arghire - WhatsApp Vulnerability Could Facilitate Remote Code Execution
SecurityWeek – Eduard Kovacs - ESET Vulnerability Exploited for Stealthy Malware Execution
SecurityWeek – Ionut Arghire - UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine
The Hacker News – Ravie Lakshmanan - Meta Blocks Livestreaming by Teenagers on Instagram
The Guardian – Dan Milmo - EVEREST Ransomware Group’s TOR Leak Site Offline After a Defacement
Security Affairs – Pierluigi Paganini - Russian Bots Hard at Work Spreading Political Unrest on Romania’s Internet
Bitdefender – Graham Cluley - Six Arrested for AI-Powered Investment Scams That Stole $20 Million
BleepingComputer – Bill Toulas - As CISA Braces for More Cuts, Threat Intel Sharing Takes a Hit
The Register – Jessica Lyons - Counterfeit Android Devices Found Preloaded with Triada Malware
BleepingComputer – Bill Toulas - Joint Letter on Swedish Data Storage and Access to Electronic Information Legislation
Global Encryption Coalition – Ryan Polk
Analysis
- Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
SecurityWeek – Joshua Goldfarb - How Democratized Development Creates a Security Nightmare
Dark Reading – Fernando José Karl - Experts Optimistic About Secure by Design Progress
Dark Reading – Arielle Waldman - Machine Identity a Key Priority for Organisations’ Security Strategies
itNews
CyAN Members Op Eds, Articles, etc.
End-to-End Encryption: A Cornerstone Under Pressure?
– Peter Evans- CyAN Member Spotlight: Łukasz Gawron – Advancing Cybersecurity in Poland
Upcoming CyAN (and CyAN Partner) Global Events:
Celebration
CyAN 10th Anniversary
(Details TBA)
Online
CyAN Q2 Call (APAC + Gulf)
June 11 – 12:00 GST / 16:00 SGT / 18:00 AEST
Online
CyAN Q2 Call (EMEA + Americas)
June 11 – 20:00 GST / 18:00 CET / 17:00 UTC / 12:00 EDT
Cyber (In)Securities – Issue 139
Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all …