<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Wael Aggan

Dr. Wael Aggan is a worldwide information security subject matter expert with more than 30 years of industry experience. He has been responsible for advising the United Nations, WTO, UNESCO and Société Générale 2 on security related issues. In addition, he is a serial entrepreneur, having successfully, conceptualized, co-founded, capitalized, grew and sold a number of start-ups in the security marketplace worldwide. His latest endeavor is co-founding CloudMask, that specializes in securing sensitive information in the public cloud, enabling organizations to implement secure collaboration across the supply and ensuring compliance with data sovereignty laws and regulations. Prior to this, he co-founded TradeMerit, a world leader in Cloud Business Process Management Solutions and Services, with customers in the banking and finance, automotive, international trade and public sectors. The company’s innovative patent pending technology has been recognized by organisations including Gartner, IDC and the Automotive Industry Action Group (AIAG). In 2001, Aggan co-founded ViaSafe, a leading security and trade compliance company. Within five years, the company had 40 percent market share in the North American trade compliance market and was acquired in 2006. Dr. Aggan holds a PhD in Computer Science and Master of Science degrees in Operations Research and Pure Mathematics from Cairo University in Egypt. He is an IBM Certified Solution Advisor - Cloud Computing Architecture, Certified Information Systems Security Professional (CISSP) and Certified Project Management Professional (CPMP). Aggan is a member of the IEEE, AIAG, PMI, OCEG and COSO and a university lecturer at MIT, Carleton University and Ottawa University. He is also participates as a speaker at many global events.
Find me on:

Recent Posts

Data Breaches: The Encryption Challenges

This article is the third in a series that discusses data breach threats and possible solutions. The first two articles, “What You Need to Know,” and “Threats and Consequences,” make it clear that businesses need to take action to reduce data breach risks. The current article presents encryption as a possible solution but details what type of encryption is needed to...

Data Breaches: What You Need to Know

This article is the first of a series that explores data breach issues, threats to data security, compliance with regulations and effective solutions to reduce the risk of data breaches. In "What You Need to Know” we define key terms and provide an overview of the data security problems businesses are facing. Data breaches are becoming more frequent while government...

How Cybersecurity Affects Legal Ethics Compliance

Effective cybersecurity is essential for law firm operations, for regulatory compliance and for keeping a good reputation, but it requires a familiarity with the principles of secure IT. Legal ethics require that lawyers keep private information secure and preserve client records. As a member of the legal profession, you have to ask how service providers deal with...

Your Liability for 3rd Party Data Breaches

The discussion of data breach liability is complex. In the Wired article “The Crooked Path to Determining Liability in Data Breach Cases “ highlights the complexity of this issue. Hackers target the weakest link along the chain of entities that protect customer data. Because the harm from data breaches falls to each party not just the party that failed to implement...

The cost of data security: Are cybersecurity investments worth it?

Where is the evidence that current cybersecurity spending works? Cybersecurity and data breaches continue to make headlines as businesses and associations around the world fall victim to network intrusion and data theft. However, some organizations are still hesitant to just start spending thousands of dollars upgrading their security systems and improving data...

Think Security Best Practices Can Keep Your Data Safe? Think Again

The application of best practices to a business process can give you the results you want. For example, quality assurance best practices result in the specified level of product quality and best practices in manufacturing reduce the number of product defects. Applied to data security, best practices can keep the data on your computer and mobile devices safe as long as it...

Meet Your Legal Obligations – Part 2 Protecting Client Confidentiality

Part I of this series, “A shifting Legal Landscape” looked at the changing business environment and the need for secure data access. It then discussed the threats to client confidentiality that accompany such technological changes. Part II, “Protecting Client Confidentiality to Meet Ethical Obligations,” suggests a way you can protect yourself against these threats and...

Meet Your Legal Obligations - Part 1: A Shifting Legal Landscape

This two-part series explores how information security enables and helps expand your practice by utilizing available cloud resources. Part one explores the changing business environment and the need to collaborate in a simpler, controlled and secure way. Part two discusses the technology changes, the risks of using technology and how to mitigate these risks. A Shifting...

Your data privacy is on the line

Your data privacy is under more of a threat than ever. In the age of cybercrime, cyberwarfare and cyberespionage, the average consumer might feel as though they are safe from hackers. There are bigger fish to fry, right? Unfortunately, your data privacy is under more of a threat than ever, as everyone from cybercriminals to government agencies and major tech companies...

Data privacy overseas: Germany to investigate U.S. businesses

American organizations should double down on data security with encryption and implement new data protection strategies in light of data privacy movements overseas. The Safe Harbor ruling certainly introduced a wrench into the typical enterprise's data security strategy, as it essentially dissolved a long-standing agreement between the U.S. and EU in regard to data...

CloudMask provides end-to-end encryption for emails, files and applications. Only those you explicitly trust can decrypt and see your data in clear; Not hackers, Cloud Providers, Government Agencies, or even CloudMask. Twenty-six government cybersecurity agencies around the world back these claims.

TRY IT FREE

Sign Up for our Newsletter to get the latest in everything cyber security. We care about your privacy, let us show you how.

Recent Posts