We understand and adapt to your needs.
We help you enhance security and compliance through identity
We accompany you throughout the complexities of security
We deliver tailored cybersecurity solutions to fortify you defences
Directed a zero-trust security strategy for a U.S. federal agency, aligned with President Biden’s Executive Order. Refined the agency’s cloud strategy to optimize costs and enhance security. Evaluated and integrated technology solutions to reduce system redundancies and advance cybersecurity.
Directed and executed an end-to-end infrastructure audit for one of the largest service providers in Morocco. Assisted in developing a homologation plan based on the new Law n°05-20 on cybersecurity, aimed at strengthening the country’s information systems security. Led the development and implementation of advanced cybersecurity frameworks using security protocols and best practices, including 3GPP and NIST standards.
Designed and implemented a Workforce IAM architecture to enable SSO and federation in a B2B context across two regions. Migrated and onboarded over 200 on-premise and SaaS applications. Enabled MFA, passwordless authentication, and risk-based access controls. Deployed various Access Management (AM), Identity Governance and Administration (IGA), and monitoring solutions. Helped the client enhance security and achieve a mature IAM state. Maintained service continuity and troubleshot issues with a 24/7 “follow the sun” support team.
Led and conducted over 250 third-party interviews to gather comprehensive security data. Performed thorough risk evaluations in accordance with ISO 27001/27002 standards, analyzing data sensitivity, vulnerability exposure, and compliance requirements. Presented detailed findings to clients, prioritizing mitigation strategies to address identified risks. Assisted clients in identifying, managing, and mitigating information security risks effectively, ensuring the confidentiality, integrity, and availability of their information assets.
Get in touch with us today.
Transforming IT. Strengthening Security.
© 2024 - All Rights Reserved.