Looking back while moving forward

10 years...

It gives me great satisfaction that over the last decade, cyberSecurist has made an impressive progress.

We set out in 2015 with 3 objectives:

  1. Create cybersecurity professional service offerings which are provably far superior to competitors.
  2. Develop systems to continually improve skills in information and software security which can compete with the best in the world.
  3. Build technologies to solve the difficult problems in the cybersecurity practice.

The cyberSecurist team has achieved all the three objectives with high success.


Highlights


We have created a highly skilled pool of about 100 cybersecurity engineers with solid security thinking and maturity. More than 30 engineers are in the cyberSecurist team as of now, and the rest are employed or hired by companies such as Grab, Deloitte, Veritas, Grant Thornton, and several other product companies/MNCs.

cyberSecurist is accredited with CREST and CERT-IN and is the trusted security vendor for over 50 customers, performing over 150 security reviews and assessments.

Invariably, our customers are pleasantly surprised with the quality and scope of the outcome.

While building the team and providing high quality professional services, we have built the mindset, "always think about augmenting human effort with technology". This allowed us to build and customize the toolchain for higher productivity and better outcomes.


Change is good


So, it is time for me to make way for the new leadership – in technical as well as execution. I remain with cyberSecurist as the Technical Director and look after Business Development.

Archana, Archana Saptarshi | LinkedIn, takes over the responsibilities and the role of CEO.

She has ably led the project delivery and customer success functions and streamlined the project delivery and quality procedures over the last 4 years.

She is the key person for the next phase of the company’s journey.


SO, WHAT CAN WE DO FOR YOU?

For all your software product security and IT security compliance requirements

Contact us ☎