Selim Hasan- is a seasoned Sr. Security Architect at Shaw Communications, bringing over 15 years of extensive experience in Security Engineering, Architecture, and Operations. His expertise spans a diverse range of domains, including Application, Cloud, Mobile, Data, Network, and Infrastructure security. In his current role,...
Selim Hasan- is a seasoned Sr. Security Architect at Shaw Communications, bringing over 15 years of extensive experience in Security Engineering, Architecture, and Operations. His expertise spans a diverse range of domains, including Application, Cloud, Mobile, Data, Network, and Infrastructure security. In his current role, Selim is pivotal in shaping the organization's cyber security strategies, ensuring that they align with business objectives while addressing high-risk areas effectively. He leads the development of enterprise architecture and reference models, focusing on integrating security into every layer of the infrastructure.
One of Selim's key projects involves conducting comprehensive security design reviews and cyber security assessments, where he applies his deep knowledge of IT security governance and compliance. His proactive approach to identifying vulnerabilities and implementing robust security measures has been instrumental in maturing Shaw Communications' DevSecOps practices. By fostering a culture of security awareness and best practices, Selim ensures that security considerations are embedded throughout the software development lifecycle.
His technical acumen is complemented by a strong foundation in IT Security Assessments, Penetration Testing, and Cloud Security, making him a valuable asset in navigating the complexities of modern cyber threats. Selim's commitment to continuous improvement and innovation in security practices not only enhances the resilience of Shaw Communications but also positions the organization as a leader in the telecommunications sector. His ability to bridge the gap between technical security measures and business priorities underscores his role as a trusted advisor in the ever-evolving landscape of information security.