Anzar Hasan
Anzar Hasan is one of the leading information security audit professionals. He provided his services to Verizon’s Internal Audit Department. Before ut...voir plusAnzar Hasan
Anzar Hasan is one of the leading information security audit professionals. He provided his services to Verizon’s Internal Audit Department. Before utilizing his services for Verizon, Anzar worked with the Deloitte & Touche and other notable Fortune 100 companies. He has vast experience in telecommunications/IT/IS security. He graduated in electronics from NED University of Engineering and Technology. He is a CISSP and CISM. Anzar also has graduate certificates in business analytics from Southern Methodist University (SMU) and crisis management and business continuity from Massachusetts Institute of Technology (MIT). Anzar is a member of the IEEE study groups and a frequent speaker at international conferences in the telecom industry, such as LTE, Small Cells, Virtualization North America, and many more. Anzar serves as a board member for the American Cyber Security Association.
Abbas Mirza
Abbas Mirza is one of the renowned personalities in the computer world. He has over fifteen years of experience in architecture, analysis, design, development, implementation, and management of information technology systems. He is the laureate of the Computerworld Honors Program 2013. He is currently a part of PepsiCo. He has managed cross-functional teams to execute highly productive projects. In the year 2010, Abbas was able to launch the G7 Security app. G7 Security is a cybersecurity research and global information security services entity. This particular entity was developed by Abbas and Anzar so that they could make a head start on the initiative of cybersecurity. Abbas earned his bachelor’s degree in business computer information systems from Midwestern State University and advanced training from Southern Methodist University (SMU).
“After reading this book, you will be able to realize the fact that you were living a dangerous life by connecting your computer to the Internet. But by following the right steps, you will be able to secure your device and your identity from being misused.”voir moins