Risk assessment methods…
  • Office Phone✆ +44 (0)207 126 8209
  • Home
  • About Us
  • What We Do
    • Our Services
    • Our Clients
  • Our Expertise
  • News
  • Contact
  • Home
  • About Us
  • What We Do
    • Our Services
    • Our Clients
  • Our Expertise
  • News
  • Contact

Cyber Security

  • Mike Lakoju
  • Cyber Security, Internet of Things
  • May 26, 2020

Risk assessment methods…

…for converged IoT and SCADA systems: review and recommendations.

Risk assessment is used to identify, estimate and prioritise risks that could impact organisations.

Mike Lakoju

Dr. Mike Lakoju is a highly accomplished, result-oriented IT Executive with over 12 years of collective work experience in both academia and industry. He has extensive experience in Big Data Strategy, Data-Driven Big Data Strategy, Data Science, Data Visualization, cybersecurity, Internet of Things (IoT), etc.

smartsafeuk.com
Read More
  • Mike Lakoju
  • Cyber Security, Internet of Things
  • May 26, 2020

Saving costs…

…with a big data strategy frameworks.

Disruptive innovations such as Big Data offer enormous benefits to organizations however they usually come with a cost.

Mike Lakoju

Dr. Mike Lakoju is a highly accomplished, result-oriented IT Executive with over 12 years of collective work experience in both academia and industry. He has extensive experience in Big Data Strategy, Data-Driven Big Data Strategy, Data Science, Data Visualization, cybersecurity, Internet of Things (IoT), etc.

smartsafeuk.com
Read More
  • Mike Lakoju
  • Cyber Security, Internet of Things
  • May 26, 2020

Security analytics…

…for real‐time forecasting of cyberattacks.

Protection of networked computing infrastructures (such as Internet of Things, Industrial Control Systems, and Edge computing)

Mike Lakoju

Dr. Mike Lakoju is a highly accomplished, result-oriented IT Executive with over 12 years of collective work experience in both academia and industry. He has extensive experience in Big Data Strategy, Data-Driven Big Data Strategy, Data Science, Data Visualization, cybersecurity, Internet of Things (IoT), etc.

smartsafeuk.com
Read More
  • A. Adedoyin
  • Cyber Security
  • May 19, 2020

Securing a Kubernetes Cluster

Securing a Kubernetes Cluster

In the early version of kubernetes, the default settings has left the control plane insecure.

A. Adedoyin

Dr. Akinbiyi is an experienced Cloud Architect and Data Engineer with over 6 years of experience working in Telecommunications, Academia, Consulting and Financial Services. He completed his Ph.D. at the prestigious Imperial College London and has worked for numerous companies in the UK.

smartsafeuk.com
Read More
  • Wale Omolere
  • Cyber Security
  • May 11, 2018

Improving your security mindset

Four ways to improve your organisation’s security mindset.

Every cyber security expert knows that the best technology in the world won’t protect…

Wale Omolere
Wale Omolere

Wale Omolere is an experienced Cyber Security instructor and practitioner with over 18 years’ experience working in Consulting, Oil & Gas, Telecommunication, Automobile, Asset & Wealth Management. He has a background in computer science, coupled with direct experience in all types of computing and networking platforms. He provides Cyber security advisory services to business, as well as hands-on management of IT systems, projects, and operations. He has led the deployment of various cyber security technologies, developing processes for managing and monitoring security incidents.

smartsafeuk.com
Read More
  • Wale Omolere
  • Compliance, Cyber Security, Privacy
  • May 11, 2018

Are you EU GDPR-ready?

May 2018 is creeping steadily closer, and if your organisation is based in the EU – or if you’re not an EU business but you operate within it – you’ll need to comply with the EU GDPR.

Wale Omolere
Wale Omolere

Wale Omolere is an experienced Cyber Security instructor and practitioner with over 18 years’ experience working in Consulting, Oil & Gas, Telecommunication, Automobile, Asset & Wealth Management. He has a background in computer science, coupled with direct experience in all types of computing and networking platforms. He provides Cyber security advisory services to business, as well as hands-on management of IT systems, projects, and operations. He has led the deployment of various cyber security technologies, developing processes for managing and monitoring security incidents.

smartsafeuk.com
Read More
  • Wale Omolere
  • Compliance, Cyber Security, Privacy
  • May 11, 2018

What does the GDPR mean for you?

The GDPR focuses on two levels of risk – risk and high risk. This means that, in GDPR world, riskless data processing activities don’t exist.

Wale Omolere
Wale Omolere

Wale Omolere is an experienced Cyber Security instructor and practitioner with over 18 years’ experience working in Consulting, Oil & Gas, Telecommunication, Automobile, Asset & Wealth Management. He has a background in computer science, coupled with direct experience in all types of computing and networking platforms. He provides Cyber security advisory services to business, as well as hands-on management of IT systems, projects, and operations. He has led the deployment of various cyber security technologies, developing processes for managing and monitoring security incidents.

smartsafeuk.com
Read More
  • Wale Omolere
  • Cyber Security
  • May 11, 2018

5 ways to fix the infosec gender balance

Diversity works. It’s good for every industry.  Dozens of research studies show that a diverse workforce is more innovative and creative.

Wale Omolere
Wale Omolere

Wale Omolere is an experienced Cyber Security instructor and practitioner with over 18 years’ experience working in Consulting, Oil & Gas, Telecommunication, Automobile, Asset & Wealth Management. He has a background in computer science, coupled with direct experience in all types of computing and networking platforms. He provides Cyber security advisory services to business, as well as hands-on management of IT systems, projects, and operations. He has led the deployment of various cyber security technologies, developing processes for managing and monitoring security incidents.

smartsafeuk.com
Read More

Recent Posts

  • Risk assessment methods…
  • Saving costs…
  • Security analytics…
  • Securing a Kubernetes Cluster
  • Improving your security mindset

Recent Comments

    Archives

    • May 2020
    • May 2018

    Categories

    • Compliance
    • Cyber Security
    • Internet of Things
    • Privacy

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org

    © 2020 SmartSafe UK by Xthetic Studio. All right reserved.

    • Home
    • About Us
    • Our Expertise
    • News
    • Contact