<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Wael Aggan

Dr. Wael Aggan is a worldwide information security subject matter expert with more than 30 years of industry experience. He has been responsible for advising the United Nations, WTO, UNESCO and Société Générale 2 on security related issues. In addition, he is a serial entrepreneur, having successfully, conceptualized, co-founded, capitalized, grew and sold a number of start-ups in the security marketplace worldwide. His latest endeavor is co-founding CloudMask, that specializes in securing sensitive information in the public cloud, enabling organizations to implement secure collaboration across the supply and ensuring compliance with data sovereignty laws and regulations. Prior to this, he co-founded TradeMerit, a world leader in Cloud Business Process Management Solutions and Services, with customers in the banking and finance, automotive, international trade and public sectors. The company’s innovative patent pending technology has been recognized by organisations including Gartner, IDC and the Automotive Industry Action Group (AIAG). In 2001, Aggan co-founded ViaSafe, a leading security and trade compliance company. Within five years, the company had 40 percent market share in the North American trade compliance market and was acquired in 2006. Dr. Aggan holds a PhD in Computer Science and Master of Science degrees in Operations Research and Pure Mathematics from Cairo University in Egypt. He is an IBM Certified Solution Advisor - Cloud Computing Architecture, Certified Information Systems Security Professional (CISSP) and Certified Project Management Professional (CPMP). Aggan is a member of the IEEE, AIAG, PMI, OCEG and COSO and a university lecturer at MIT, Carleton University and Ottawa University. He is also participates as a speaker at many global events.
Find me on:

Recent Posts

US firms and the growing risk of cyberespionage

Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. In an attempt to stamp out cyberespionage, governments are creating agreements dedicated to preventing cybercriminal activity and promoting better cyberawareness on both a...

Data privacy disaster: Safe harbor agreement struck down

The safe harbor agreement is a key component of conducting business overseas, but all that has changed. Data privacy and trans-Atlantic relationships have been protected by the "safe harbor" agreement since 2000. This joint decision made by the European Union and the United States government stated that U.S.-based businesses could send EU citizens' data back to American...

A lesson in email security from an unlikely source

Without adequate email protection, some business people could experience personal and business-related disruption. The data breach of Avid Life Media demonstrated how easy it is for cybercriminal groups to steal incriminating information, as hackers successfully breached the company's network and made off with the personal records and account data of millions of...

Snapshot: The organized state of cybercrime

Organized cybercrime is a major problem for today's businesses. Given the sophisticated nature of modern attack vectors and the value of personal data, it should come as no surprise that criminal organizations have formed with the intent of inspiring political change, committing corporate espionage and instilling their views on digital privacy on the world. In fact,...

Incident Response Planning (IRP): 3 questions you should ask

If IRPs are mandatory to prepare for post-breach circumstances, organizations need to ask themselves these three questions. Data breach madness has reached a peak, as organizations slowly but surely discover one by one how no one is safe in today's cyberclimate. And experts universally agree that intrusions are inevitable, since attack vectors keep appearing in the form...

The Canadian Digital Privacy Act (Bill S-4): What it all means

Bill S-4 or the Digital Privacy Act or An Act to Amend the Personal Information Protection and Electronic Documents Act is the Canadian government's latest attempt to reform PIPEDA, and it was passed into a law as of June 18, 2015. After a tumultuous 2014 and a similar start to 2015, the Canadian government approved changes made to the Personal Information Protection...

How Cloud Computing is introducing new risks, and how Companies can protect themselves better

Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing data on their own servers in a server farm, they now store their data in much larger clusters of servers in someone’s data center. The Cloud's threats arise from the sheer scale of data that...

Part 3: Government's Digital surveillance programs

This is the third part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. W.A. Governments around the world have Digital Surveillance Programs that can be used to demand legal access to your data stored with a Cloud Service Provider (CSP) or Telecommunication companies....

Part 2: Data Security in the Cloud

This is the second part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. W.A. Any organization that is contemplating using cloud-based services for its computing architecture is necessarily worried about how it is to protect, control and ensure safety for its data...