Bright Gameli Mawudor, PhD

CTO

Kenya16 yrs 11 mos experience
Most Likely To Switch

Key Highlights

  • Presented at over 417 Cyber Security conferences.
  • Recognized as Top 40 Under 40 Entrepreneurs 2016 Kenya.
  • Pioneered the Cyber Security collective Africahackon.
Stackforce AI infers this person is a Cybersecurity expert with a focus on risk management and strategic IT alignment.

Contact

Skills

Core Skills

Strategic It Alignment & Technology AdvisoryEnterprise Risk ManagementPenetration TestingInformation Security ManagementCyber Threat Intelligence (cti)Public SpeakingProject ManagementAnalytical SkillsCyber Security RiskVulnerability ScanningInformation Security Management System (isms)

Other Skills

IT Investment PrioritizationData PrivacyDigital TransformationIT Infrastructure OptimizationDigital StrategyMicrosoft OfficeCybercrime InvestigationData ScienceElectronic EvidenceBlockchainCross-functional Team LeadershipMicrosoft 365Corporate SecurityRisk AssessmentISO 27001

About

💡 Just like art, technology is a soaring exercise of human ingenuity. I have always enjoyed bringing to insight imagination through driving technology advancements that form formidable solutions to problems in society. My career goes beyond making money. I believe it's a true expression of my passion, life purpose, and creativity. The result is that I am profoundly engaged, inquisitive, productive, and fulfilled. With my growing expertise in information technology, I am a seasoned Cybersecurity Engineer with strong expertise in Cyber resilience strategy building, risk management adoption, vulnerability management and system penetration testing. I have presented at over 417 Cyber Security conferences, lectured at various universities, and contributed to cybersecurity publications. 𝐊𝐞𝐲 𝐂𝐨𝐦𝐩𝐞𝐭𝐞𝐧𝐜𝐢𝐞𝐬: 🔹Cyber Security Engineer for 10 years 🔹Information Security 🔹Web Application 🔹Network Vulnerability Assessment, 🔹Corporate Governance 🔹Risk Assessment & Mitigation 🔹Cyber Security Training 🔹FOSS Enthusiast I capitalize lean analytical and problem-solving skills to maximize network performance through Cyber Security tools, implementing load-balancing techniques, and steering system optimization. I am adept at streamlining processes, procedures and conceptualizing technological strategies to improve bottom-line performance, optimize system performance, productivity and increase profitability. I have submitted bugs to organizations such as Safaricom, Zuku, and Multichoice group in the past amongst many others pertaining to Cyber Security of systems. Coupled with my skillset is a strong entrepreneurial instinct, that i engaged to pioneer the Cyber Security collective Africahackon. An organization that aims at the naturing talent in the Cyber Security space. Africahackon has converted over 60 professionals to practice Cybersecurity as their full-time job with the yearly conference drawing lots of professionals from across the globe and has ever since seen growth over the years. 𝐈𝐂𝐓 𝐂𝐨𝐦𝐩𝐞𝐭𝐞𝐧𝐜𝐞: 💻Good command of \Windows Active Directory, Exchange, SQL, TCP/IP, DHCP, and DNS. 🅲🅰🆁🅴🅴🆁 🅼🅸🅻🅴🆂🆃🅾🅽🅴🆂: 🏆 A monumental achievement in my career was being recognized as Top 40 Under 40 Entrepreneurs 2016 Kenya. 🏆 Highlighted as a Top IT Personnel 2019 and Rocheston Academy Cyber leader 2021 industry. 🔸 A tech-savvy professional with the ability to liaise with technology developments to execute plans as well as develop strategies to increase efficiency and enhance ROI.

Experience

Ec-council

2 roles

Global Advisory Board for Penetration Testing - CPENT

Nov 2024Present · 1 yr 4 mos

  • Member of the EC-Council Global Advisory Board for Penetration Testing (CPENT), collaborating with security leaders to shape advanced penetration testing standards.
  • Provide strategic guidance on enterprise-level vulnerability assessment methodologies and exploitation techniques.
  • Contribute African cybersecurity perspectives to global penetration testing frameworks while influencing certification requirements.
Penetration TestingInformation Security ManagementDigital Strategy

Global Advisory Board Member - CTIA

Apr 2022Present · 3 yrs 11 mos

  • The EC-Council Advisory Board for CTIA is comprised of prominent Industry leaders and top Threat Intelligence professionals from a diverse range of industries and globally-known brands. Their voices serve as an invaluable guidepost to help EC-Council in building new initiatives for Threat Intelligence
Analytical SkillsPublic SpeakingCyber Threat Intelligence (CTI)Microsoft Office

United states international university - africa

ICT Advisory Team

Nov 2024Present · 1 yr 4 mos · Kenya

  • Collaborating to align IT strategy with the University's mission, vision, and goals.
  • Overseeing IT governance, identifying risks, and ensuring regulatory compliance.
  • Assessing current IT systems, recommending improvements, and advising on technology selection.
  • Supporting informed IT investment decisions and optimal resource allocation.
  • Monitoring and advising on emerging technologies and fostering opportunities for innovation.
  • Providing guidance on cybersecurity best practices to protect IT infrastructure and data.
Strategic IT Alignment & Technology AdvisoryEnterprise Risk ManagementIT Investment PrioritizationData PrivacyDigital TransformationIT Infrastructure Optimization

Ushahidi

Product Advisory Group

Aug 2024Present · 1 yr 7 mos · Kenya · Remote

  • Contributing to the growth of Ushahidi products with special focus on Cyber security and overall technology.

Crystal intelligence

Regional Training Lead (Blockchain Intelligence)

Mar 2024Dec 2024 · 9 mos · Remote

Analytical SkillsProject ManagementISO 27001Microsoft Office

The commonwealth

Commonwealth Africa Cyber Fellowship

Jan 2024Present · 2 yrs 2 mos · Remote

  • Commonwealth Africa Cyber Fellowship is a selective program dedicated to advancing cybersecurity expertise across the continent.
  • Through out the program I get involved in:
  • 1. Collaborating with experts and policymakers to address emerging cyber threats, shape policy, and promote best practices in cybersecurity.
  • 2. I share and also gain hands-on experience through practical projects, workshops, and mentorship, aimed at fortifying digital infrastructure and governance.
  • 3. Work towards driving innovation and advocacy by leveraging new insights on threat intelligence, policy development, and responsible technology use.
  • 4. Committed to championing a secure digital future for Africa, contributing to sustainable cyber governance and industry-wide improvements

Moringa school

Tech Advisory Board Member

Mar 2023Jan 2026 · 2 yrs 10 mos · Kenya · Remote

  • Serving on the board to enhance the tech talent of Moringa school
  • Advise on skills trends in Kenya, Africa and Globally in Tech
  • Review of our curriculum options
  • Strategic guidance to Moringa school in the ecosystem
  • Mentoring Moringa Senior Management
Vulnerability ScanningAnalytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate Security+7

Mara

Cyber Security / Developer Relations Lead

Nov 2022Jan 2024 · 1 yr 2 mos · Remote

  • Application/Infrastructure/Blockchain Security Engineering
  • Engaging and leading Web3 communities to build on blockchain and adopt Web3

Cybersafe foundation

Advisory Board Member

Jul 2022Present · 3 yrs 8 mos

Africahackon

5 roles

Public Presentations And Appearances 2022+

Promoted

Apr 2022Present · 3 yrs 11 mos

  • In line with my experience as Cybersecurity Engineer, I founded the AfricaHackon. Through the organization, I share my expertise through multiple presentations and engagements across the globe.
  • Africa fintech Summit 2023
  • CIS Kenya Data Protection & Privacy workshop
  • KPMG Private Enterprise Tax Training for Startups Panel Session
  • Mozilla Africa Mradi Innovation Week
  • Protecting your business against Cyber threats- Nation Media group Digital Summit
  • Commonwealth secretariat – A practical walkthrough of a Cybercriminal and Electronic Evidence with the rule of law – ASIA Pacific
  • dx5 CIO (The Year Ahead) - Discussion on The Future of Blockchain, Cyber Security and Cloud Security
  • C-Vision CXO Council - C-Suite Conversation of Cyber Security and Strategy
  • MARA - Evolution of Web 3 and Blockchain Security
  • Central Bank of Kenya - Technical Cyber Security Awareness
  • EC-Council - Accelerating Your Cybersecurity Career in Today’s IT Ecosystem
  • EC-Council THREAT INTELLIGENCE: MOVING TOWARDS CYBER RESILIENCE IN 2022
  • Africa Cyber Defense Forum - Ensuring Security in the Modern-Day Workforce
  • Stanbic Bank Kenya - General Cyber Security awareness
  • KENIC DNS Forum - DNS Security
  • KENIC - Webinar on Educating Youth For A Cybersecurity Future
  • Civic Tech Innovation Forum 2022 - Cyber Security Acceleration
  • CPF - Future of Fintench innovation
  • IPSL - Tricks and Trends in Cyber Fraud: Lessons from Mobile and Digital Banking Platforms
Analytical SkillsProject ManagementMicrosoft Office

Public Presentations And Appearances 2020+

Jan 2020Mar 2022 · 2 yrs 2 mos

  • In line with my experience as Cybersecurity Engineer, I founded the AfricaHackon. Through the organization, I share my expertise through multiple presentations and engagements across the globe.
  • Presentations:
  • AI Keynote speech- Ai for Africa (AiFA) 2022 Boot Camp Demonstration Day
  • APTAK - Cyber Security for Pension Funds
  • NetGuardian - Keynote speech - Cyber Security and AI
  • Commonwealth Secretariat Conference on Addressing Cybercrime in Sub-Saharan Africa - Practical walkthrough of a Cyber Criminal
  • AGA Africa - Cybercrime investigation and Digital Forensics
  • StartUp Weekend - Judge with Startinev
  • YSK Exhibition - Keynote speech
  • Pangea Trust Connect - Host of Webinar Series
  • ISACA Pre-Conference workshop - Cloud & Corporate Security Operation Building
  • Lawyers Hub (Africa Law Tech Festival) - A Fireside Chat on Privacy vs Content Creation
  • TheRoom MasterClass - Cyber Security for growing Businesses
  • ABSA - Ready2Work- Future Skills: What every futuristic employer is looking for
  • Centonomy Career Hub - Professional Branding: Building a strong Personal Brand in your Industry
  • Co-operative Sacco workshop - Cloud Security and Threat Intelligence building
  • Sophos - Live Hacking Session with Sophos
  • Makini School - Child online protection
  • JWSeagon Achieving Corporate Cyber Resilience (Covid-19)
  • JWSeagon Personal Cyber Security (Covid-19)
  • CIO East Africa Webinar - Combating the next level of Cyber Threats with Intelligence & EDR
  • East Africa SACCOTECH Forum - Automation and Orchestration of Cyber Intelligence
  • KENIC - Reducing Cyber Fatigue in organizations
  • ISC2 Ghana - Responding to Threat Actors Exploitation
  • AGA-AFRICA (Court of Appeal Judges) - Cyber-Crime & Electronic Evidence Workshop
  • AGA-AFRICA (ODPP) - Financial Crimes Virtual Workshop
  • The Africa Cyber Defense Forum - The Evolving Role of the Board in Cyber Security Oversight
  • Business Ireland Workshop - Cyber Security and SupplyChain
  • Zetech College Cyber Security workshop
Analytical SkillsCybercrime InvestigationData ScienceProject ManagementElectronic EvidenceBlockchain+2

Public Presentations And Appearances 2019+

Jan 2019Dec 2019 · 11 mos

  • Presentations:
  • ESET ESD Security Session
  • Mybroadband SA Cyber Security
  • Africahackon Cyber Security Conference 2019
  • Strathmore Business School Guest Lecture
  • National Bank of Rwanda
  • USIU global MICE tourism
  • NACOSTI Data Science Workshop - Cyber Security
  • Afro Asia Fintech Summit (Central Bank of Kenya) - Cyber Security for Mobile Applications
  • CIO AI & IOT Summit
  • CIO Fintech Summit
  • 3rd Annual ICT conference BRICS consulting
  • Sage Sessions - Cyber Security
  • Nairobi Garage After Office hours
  • ISACA Ghana Cyber Security conference
  • Metta Cyber Security for SME
  • Metta Payments and Security Panel Discussion
  • Internet Safety and Child Online Protection - High Schools
  • Unilever Cyber Awareness day
  • Passport Experience conference
  • HackerVillage Campus Run
  • Pwani innovation week - Cyber Security session
  • Kenya Bankers Association CIO/Head of Risk Seminar
  • Oracle Kenya Cyber Security Webinar (2019)
Analytical SkillsPublic SpeakingProject ManagementMicrosoft OfficeCross-functional Team Leadership

Public Presentations and Appearances 2018+

Aug 2017Dec 2018 · 1 yr 4 mos

  • Presentations:
  • Raisina Dialogue 2019(India) --- Session on Data Protection and Data Protection Africa Summit 2018 Mauritius.
  • Oracle Cyber Security Session - Real Live hacking demonstration
  • Cyber Power Information Technology for Defense and National Security (South Africa). - A live hacking demonstration of compromising a corporate network
  • Building Cyber Resilience for a country
  • Afrisecure Summit 2018 - Power combinations in a cybersecurity ecosystem
  • Code4Africa Cyber Security Session - How to use online tools to Track People & Story Leads
  • ALX StoryFest - Cyber Security Discussion
  • CPAK Conference - Cyber Resilience for Financial Services Sector
  • High-Level Breakfast Session on Data Management and Data Governance
  • 2nd ISACA Hands on Workshop - CSX Training
  • 2nd ICT Infrastructure and Technology Conference (BRISCA Consulting) - Addressing Corporate Cyber Resilience
  • Young Scientist Kenya 2018 - Judge
  • 3rd SheHacks Cyber Security BootCamp 2018 - Lead Organizer
  • Momentum Conference 2018 - Cyber Security as a Career
  • Kenya Revenue Authority Business continuity week - Keynote Speech
  • Daystar University class of 2018 Guess Speaker (Keynote Speech)
  • 1st ISACA Hands on Cyber Security Trainer (CSX)
  • Board level training - Mabati Rolling Mills Kenya
  • TedX Parklands Nairobi – Insecurities of the Internet
  • ICPAK Cyber Security Cyber Security Awareness Training
  • CIO Cloud and Security Summit (Rwanda) 2018 - Breaking Down a Cyber Threat
  • ISACA Kenya Chapter Annual Conference 2018 - Are you ready for Cyber WarFare
  • ISACA Evening Talk May 2018 - Doing More with Less
  • East Africa Big Data & Cloud Computing Summit 2018 - Big Data and Cloud Computing
Analytical SkillsPublic SpeakingProject ManagementMicrosoft OfficeCross-functional Team Leadership

Public Presentations and Appearances 2018-

Jan 2017Jan 2018 · 1 yr

  • Presentations:
  • AfriSecure - South Africa 2017 Presenter (Live hacking Demo)
  • CIO East Africa Cyber Security Summit 2017: Breaking the Cyber KillChain
  • East Africa Cyber Security Forum (Amadeus/CIO/BitDefender)
  • Detecting and Preventing Active Cyber Attacks (Live Hacking Demonstration)
  • Data Protection Conference Ghana: Data Security, Encryption and other Issues, BYOD
  • Nairobi Tech Week 2017: Wave of Cyber Security & awareness
  • NextGen Tech: Moderator for Demystifying IoT & Blockchain
  • CODEGATE International Hacking Competition & IT Security Conference 2016 S.Korea:
  • The Dynamic Changing Face of Social Engineering Aiding in APT Attacks
  • Data Protection Conference, Ghana, 2016: Data Protection challenges faced by it professionals
  • IDC IT Forum 2016: Evolution of Hacking in emerging Cyberspace
  • Social Media Week 2016: Social Media Security and Mitigation
  • Plenary discussions on Cyber Security and Social Media
  • Rotaract Club 2016 & 2017: Cyber Security Awareness and Digital Media
  • Country Revenue Automation ICT Conference: Cyber Security Management for ICT Growth In Kenya
  • AITEC East Africa ICT Summit 2016: 2hr Cyber Security Workshop and Organizer of Young Innovators Anti-Corruption Pavilion Challenge
  • Banking Systems Penetration KillChain (Hackers Perspective)
  • Strathmore University Annual ICT conference, (Security Analysis of Ubiquitous Sensor Networks)
  • Africahackon 1: Advanced Reconnaissance & Hacker FootPrinting
  • AfricaHackon 2: Insider Threat for Evolving Cyber Threat Attacks in Corporate Networks
  • BarCamp Nairobi 2014: Faces OF Advanced Persistent Threat (APT)
  • ISACA Evening talk, Kenya Chapter 2014: Advanced Persistent Threat Attacks
  • Guest Lecturer (2012): United States International University
Analytical SkillsPublic SpeakingProject ManagementMicrosoft OfficeCross-functional Team Leadership

Xetova

Chief Technology Officer

Jan 2022Nov 2022 · 10 mos · Nairobi County, Kenya

  • Leading a brilliant technology team of Software Engineers, Product Managers, Data Scientists,Analysts,Engineers and Cyber Security experts to change the outlook of Data utilization to solve everyday problems that organiations encounter in the African space
Vulnerability ScanningAnalytical SkillsMicrosoft 365Project ManagementISO 27001Microsoft Office

Strathmore university

Cyber Security Lecturer (Msc Class) - Part Time

May 2019Present · 6 yrs 10 mos · Kenya

  • I lecture the Msc Class in Cyber Security courses ranging from Penetration Testing, Incidence Response, Governance, and Compliance.
  • Key Contributions:
  • ⦁ Collaborating, planning, and implementing vocational curriculum with other lecturers.
  • ⦁ Utilizing curriculum creative methods and differentiated instruction in multiple subjects in accordance with State Standards
  • ⦁ Assessing the development of students and modifying teaching styles to accommodate different learning needs.
  • ⦁ Implementing highly individualized instruction to accommodate the needs and abilities of the autistic population.
  • ⦁ Creating profitable cybersecurity workshops for specialized vocational programs.
Analytical SkillsPublic SpeakingProject ManagementMicrosoft OfficeCross-functional Team Leadership

Dimension data middle east and africa

Practice Lead - Managed Security Services & Consulting (MEA)

Oct 2017Dec 2021 · 4 yrs 2 mos · Nairobi County, Kenya

  • Presently, I engage my services at Dimension Data where I direct a team to provide Cybersecurity services to clients of Internet Solutions which include Strategy &Resilience building, Awareness training, Vulnerability Assessment &Penetration Testing, and general robust Cybersecurity solutions
  • building.
  • Key Contributions:
  • ⦁ Developing Go-to-Market Strategies for Cyber Resilience Solutions and plan with value propositions for external clients.
  • ⦁ Authorizing the development of a strategic, comprehensive enterprise information security governance, cyber security, and IT risk management program.
  • ⦁ Streamlining Internal IT audits, IT controls, change controls, penetration testing, identity/access management, and software defects review.
  • ⦁ Establishing the right security and governance practices for Data Protection, Privacy and Risk Awareness.
  • ⦁ Providing leadership to client enterprise information security awareness, execution, and training.
  • ⦁ Reviewing and improving client risk management and information security management policies/frameworks.
  • ⦁ Bolstering strategic partnerships with Vendors and Partners.
  • ⦁ Spearheading business technology planning, providing a current knowledge and future vision of technology and systems.
  • ⦁ Assisting clients in interpreting risk assessment results and validation of plans to address specific cyber risk issues.
  • ⦁ Researching on industry trends on cyber-security while ensuring the business is updated with the latest technologies in the industry.
  • ⦁ Directing the cyber team in the development, implementation, and ongoing improvement of products and services.
Vulnerability ScanningAnalytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate Security+8

Ushahidi

Cyber Security Engineer

Jun 2015Jan 2017 · 1 yr 7 mos · Kenya

  • As a Cybersecurity Engineer at Ushahidi, I worked on several projects focusing on Web and Mobile applications security written in various languages and environments. These had to follow the OWASP TOP 10 guidelines as a baseline.
  • Key Contributions:
  • ⦁ Conducted Vulnerability Assessment and Penetration Testing which entailed Mobile/Web Application & API Security.
  • ⦁ Authorized Project Gap analysis and Risk Profiling.
  • ⦁ Provided strategic advice and first-level recommendations on Cybersecurity systems.
  • ⦁ Oversaw effective Governance, Risk Management, and Compliance with company policies and procedures.
Analytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate SecurityRisk Assessment+6

Cellulant

2 roles

Group Head of Information Security & Risk

Jun 2011Aug 2012 · 1 yr 2 mos

  • In this capacity, I presided over the design and implementation of an overall information risk management process across the company. As the chief cybersecurity evangelist, I inculcated a “security-first” mentality within the organization.
  • Key Contributions:
  • ⦁ Established efficient workflow processes to protect the availability, confidentiality and integrity of customer, employee, and commercially sensitive information in compliance with policies and standards.
  • ⦁ Ensured global standards compliance within Cellulant through strict adherence to policies and procedures.
  • ⦁ Acted as Cellulant’s Lead Representative for inquiries from customers, partners, and the general public regarding the organization’s approach to Information Security and Risk.
  • ⦁ Maintained an updated t risk register in accordance to changes in the organization.
  • ⦁ Presided over security implementation program with sufficient width and depth to comprehensively mitigate information security risk across the company and applicable third-party systems.
  • ⦁ Developed and retained the adequate internal capacity to handle day-to-day operations and information governance requirements.
  • Examined, updated, and maintained a system of incident monitoring and response to ensure timely intervention in security incidents.
  • ⦁ Monitored, evaluated, and validated the company’s capacity to manage imminent risks. (E.g., fraud, hackers, IP theft, etc.) through recurrent security assessments.
Vulnerability ScanningAnalytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate Security+7

Cyber Security Engineer & Consultant

Jan 2011Sep 2017 · 6 yrs 8 mos

  • As a Cybersecurity Engineer, I provided strategic advice and chaired the implementation of best Security practices for systems, processes, and technology.
  • Key Contributions:
  • ⦁ Enhanced organizational efficiency through frontline Vulnerability Assessment and Penetration Testing.
  • ⦁ Streamlined Access control M of over 40 Linux servers across Africa and UK Conducting Vulnerability Assessment on applications developed by Cellulant (both in test environment and client sites)
  • ⦁ Aligned security policies, reviewed them in line upcoming trends, created awareness among the Cellulant team, and gave necessary advice or recommendations where needed to make Cellulant a more secure environment.
  • ⦁ Proactively assessed potential items of risk and opportunities of vulnerability in the network.
  • ⦁ Remediated security alerts and respond to information security-related incidents.
  • ⦁ Chaired the installation and managed Intrusion Detection/Prevention Systems and Firewall rules.
  • ⦁ Chaired training all staff about information security awareness periodically.
  • ⦁ Authorizing new staff induction on information security practices and policies.
Analytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate SecurityRisk Assessment+6

A.harvest

IT Consultant

May 2010Jun 2011 · 1 yr 1 mo

  • As an IT Consultant, I managed the following contributions:
  • Key Contributions:
  • ⦁ Prepared recommendations for the implementation of new systems, procedures, and organizational changes.
  • ⦁ Presided end-user training on all applications being used within the application including third parties.
  • ⦁ Troubleshot and resolved network hardware and software-related issues.
  • ⦁ Maintained 100% accurate inventory of hardware and software.
  • ⦁ Authorized Information Security training on awareness focusing on emerging hacking methodologies.
  • ⦁ Revolutionalized vulnerability assessment and penetration testing of internal network.
  • ⦁ Completed in-depth analyses for business optimization projects boosting revenue.
Vulnerability ScanningAnalytical SkillsPublic SpeakingMicrosoft 365Information Security Management System (ISMS)Corporate Security+7

Youth dynamics

Brand Ambassador

Jan 2008Jan 2009 · 1 yr

  • Liaison between Nokia and the entire Daystar University community

Education

Pukyong National University

Doctor of Philosophy (Ph.D.) — IT Convergence and Application Engineering

Jan 2014Jan 2016

Pukyong National University

Master's Degree — Computer and Information Systems Security (Banking Information Security Redesign)

Jan 2012Jan 2014

Daystar University

Bachelor's Degree — Applied Computer Science

Jan 2007Jan 2011

Saint Mary's College High School

General Certificate of Education | International Baccalaureate (IB)

Jan 2002Jan 2006

Stackforce found 100+ more professionals with Strategic It Alignment & Technology Advisory & Enterprise Risk Management

Explore similar profiles based on matching skills and experience