CryptoForensics Leadership

The CryptoForensics cybersecurity operations team is lead by Austine Ohwobete, PhD, a hands-on, result-driven cybersecurity, data privacy and cryptoforensics strategist with more than 15 years of experience in information security and technology implementation capacities. The leadership team is comprised of seasoned cybersecurity and privacy evangelists with deep passion for cybersecurity and clear understanding of what it takes to make a critical relationship effective. Cryptoforensics Corporation offers a broad portfolio of cybersecurity capabilities backed by seasoned professionals with very deep technical knowledge of diverse threats and threat scenarios and the processes and tools to effectively respond and protect against them.

Our core team of specialized security professionals is always ready to take on complex cybersecurity and forensics challenges. Not only have they completed intensive immersion security training, but also have successfully pursued cyber and application risks mitigations from their regulatory and auditing backgrounds — making them aware of compliance concerns. Additionally, with increasingly global enterprises, organizations need to have professionals on their side who are highly communicative, understand business processes and can focus on executing and delivering high-quality services at the competitive price. That is where CryptoForensics would be your best bet!

Our personnel have earned the highest professional industry certifications, including:

  • National Security Agency Information Assessment Methodology (IAM) certification
  • National Security Agency Information Evaluation Methodology (IEM) certification
  • Certified Information System Security Professional (CISSP)
  • SANS Global Information Assurance Certifications
  • Certified Business Continuity Professional (CBCP)
  • Certified Disaster Recovery Planner (CDRP)
  • Certified Information Security Auditor (CISA)
  • Certified Information Security Manager (CISM)
  • Cisco Information Systems Security Professional (CISSP)
  • Certified Computer Examiner (CCE)
  • Cisco Certified Security Professional (CCSP)
  • Cisco Certified Network Professional (CCNP)

What's New?

Cyber Defense Diversification
Today, most enterprises try to deal with cybersecurity threats by focusing inwardly through conducting vulnerability assessments, making detailed network maps, and in some cases, deploying robust patch management processes to continuously monitor their networks and systems. While this approach provides some benefits, against many cyber threats it's ineffective. Most corporate networks are so large and complex that it's simply too difficult to identify all of their assets, or all of their vulnerabilities, and patch them fast enough. Today's cyber wrongdoers are sophisticated, well-funded, and patient—they use a wide range of techniques to penetrate even well-protected enterprises...


logo1 logo2 logo3 logo4 logo5 logo6 logo7 logo8 logo9

The Cryptoforensic Technology Newsletter
Get the latest news from Cryptoforensic Technology