My Articles

Publications at
International Forums

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Preventing the Storage Limitation Principle from Becoming an Elusive Dream

Humans have an innate nature to codify their experiences. We codify our experiences in the form of memories within our memory banks to ensure that we can reconnect with them, identify them and to cherish them.

ISACA - Data Privacy: A Public Policy Challenge

Public policy is an instrument that is used by nation-states to achieve their aspirations. The moral codes held and shared together by society compel its policymakers to draft policies, laws and regulations that represent the ethos and aspirations of society.

ISACA - Preventing Privacy by Design from Becoming a Privilege

Privacy is a desire that has remained consistent throughout history across all human societies regardless of culture, religion or ethnicity. It has been an area that has long been professed by religious scriptures and by the human intelligentsia.

How the CISO Can Build Support from Senior Management

Trust is the cornerstone of any relationship, and it is built and nurtured progressively based on many factors. When we as a customer decide to choose Product or Service “A” over “B,” it is primarily based on the perception of our trust that we place in that product or service provider.

Pakistan’s Cybersecurity Policy in 2021: A Review

Countries are increasingly adopting new technologies across various business spheres, and Pakistan is no exception. With its increasing number of start-ups, young professionals and digital transformation programs that have been implemented by established organizations.

Applied Collection Framework: A Risk-Driven Approach to Cybersecurity Monitoring

Cybersecurity or network security monitoring is incumbent upon organizations through various regulations or laws prevalent in respective countries or regions. The purpose of network security monitoring is to establish and maintain a command and control center.