About
I help startups looking to level up their security at any stage. Worked with Masterclass,…
Articles by Ayman
-
MGM Hack Root Cause and How It Could Have Been Prevented
MGM Hack Root Cause and How It Could Have Been Prevented
By Ayman Elsawah ☕👋🏼
Contributions
Activity
-
Sooooo Cyber for Builders made its way to Andreessen Horowitz's office library in Menlo Park. Thanks to Christian Almenar, Greg Truesdell and the…
Sooooo Cyber for Builders made its way to Andreessen Horowitz's office library in Menlo Park. Thanks to Christian Almenar, Greg Truesdell and the…
Liked by Ayman Elsawah ☕👋🏼
-
Microsoft Recall is a good example of why cybersecurity is so lucrative. You have Microsoft, a 3 trillion dollar company, with a cybersecurity budget…
Microsoft Recall is a good example of why cybersecurity is so lucrative. You have Microsoft, a 3 trillion dollar company, with a cybersecurity budget…
Liked by Ayman Elsawah ☕👋🏼
Experience
Licenses & Certifications
Publications
-
Last Week As A vCISO
Self
A weekly newsletter for B2B SaaS leaders looking to improve their cybersecurity posture.
-
Reducing SIEM fatigue: Finding a signal in all the noise
SC Magazine
Interviewed for SC Magazine as a subject matter expert for SIEMs, especially for cloud based security.
-
Breaking IN: A Practical Guide to Starting a Career in Information Security
Self-Published
In this book, you will learn:
- The Information Security Culture
- Different jobs in the Information Security Field
- The passion needed to be successful in the field
- What life is like as an Information Security Professional
- How to find the information you're looking for
- Next steps to educate yourself
This book is designed to be the first book on your journey into a career in Information Security.
This book is for:
- Those looking for a career in…In this book, you will learn:
- The Information Security Culture
- Different jobs in the Information Security Field
- The passion needed to be successful in the field
- What life is like as an Information Security Professional
- How to find the information you're looking for
- Next steps to educate yourself
This book is designed to be the first book on your journey into a career in Information Security.
This book is for:
- Those looking for a career in Information Security
- Those looking to service the Information Security industry and want to understand more about it
- Those who have been given the responsibility of Infosec (accidentally or not) and would like a primer on it
Projects
-
Cloud Security Fundamentals
Authored and filed DeAnza's first Cloud Security Class! Created the outline and objectives and worked with senior faculty to file for approval.
-
Getting Into Information Security Podcast
- Present
Host and creator of the Getting Into Information Security Podcast. The aim is help those looking to get into the industry by learning from the experiences of others. There are so many different paths into the field and the hope is my audience will resonate with at least one of my guests.
-
Federating the AWSCLI
-
Created a tool in Python that would allow AWS Engineers to use the awscli with temporary tokens. This was before more modern and opensource tools have come out. It was integrated with SSO (Shibboleth) and allowed users 8 hours of uninterrupted use until they have to re-authenticate again.
-
Multi-Account Cloudtrail
-
Created a tool to enable and verify cloudtrail settings and centralize the log locations across multiple AWS accounts for a Fortune 1000 company .
Note: This was before Cloudtrail was enabled by default, and before AWS Organizations.
Recommendations received
-
LinkedIn User
-
LinkedIn User
6 people have recommended Ayman
Join now to viewMore activity by Ayman
-
I have moved to San Francisco 🌉 I have always believed that two of the best places on the planet to build the future of cybersecurity are Tel Aviv…
I have moved to San Francisco 🌉 I have always believed that two of the best places on the planet to build the future of cybersecurity are Tel Aviv…
Liked by Ayman Elsawah ☕👋🏼
-
We’re talking about LLM security and model serialization attacks at #AIDevSummit. Literally thousands of models on HuggingFace are open to these…
We’re talking about LLM security and model serialization attacks at #AIDevSummit. Literally thousands of models on HuggingFace are open to these…
Liked by Ayman Elsawah ☕👋🏼
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Ayman Elsawah ☕👋🏼
1 other named Ayman Elsawah ☕👋🏼 is on LinkedIn
See others named Ayman Elsawah ☕👋🏼