I LOVE HACKING

I AM

image
Hello,

I'm Putthik Leang

Security challenges are changing fast. Home-grown hacking operations have become advanced persistent threats and attack entry points have proliferated exponentially. Breaches are now considered inevitable, and the security focus has changed from trying to prevent breaches to swiftly identifying and remediating attacks to stem the damage.
In this kind of threat environment, you need someone who can be there for you around the clock – you need experts who have made security their core business and have top-notch, intelligence-driven technology supporting them. That’s why security as a service – which combines automated security technology with 24/7 analysis by human experts – has become the best way to fortify your business against today’s threats.


Education
University of NUM

Bachelor of Information Technology

College of Sisowath

Master of Science

School of Sereipheap

Bachelor of Mathematics


Experience
Penetration Tester

IBEL Co., LTD.

CyberSecurity Researcher

Angkor Cyber Team

Front-End Developer

Amatak Solution


My Skills
Penetration Testing
Ethical Hacking
UNIX/LINUX
Networking

157

Awards Won

272

Happy Customers

7

Projects Done

1404

Photos Made

WHAT CAN I DO

Cyber Network Defense

Cyber Network Defence (CND) is CF’s team of cyber experts, engaged across all competencies and functions, tasked with identifying and responding to the most advanced threats, threat actors and cyber attacks.

Infrastructure & System Integration

Infrastructure and System Integration (I&SI) underpins our professional services offering for governments and corporations, providing applications, services and solutions that ensure our clients stay at the forefront of cyber security.

Governance, Risk & Compliance

The purpose behind regulations and standards is to create a rational and objective framework to help organisations address the myriad risks associated with the overwhelmingly complex and continually evolving nature of cyber attacks, threats and exploits.

Risk Assessment

With a nuanced understanding of all applicable national and international regulations and standards, PCI Data Security Standards, ISO 27001 and 27002, NIST 80053, IEC 62443 and the ISACA COBIT framework, We works alongside organisations to conduct end to end and top to bottom risk assessments.

Regulations

Today, the Internet, data systems, cloud services and other virtual environments are all essential to a strong and vibrant economy. Governments and industry specific regulators and authorities can support economic growth and encourage foreign and domestic investment by putting in place rules and regulations that encourage strong and vigilant cyber security postures by all government and private sector actors.

Compliance

Compliance is not a check the box exercise for us at CF, because we leverage the compliance process as an opportunity to identify an organisation’s cyber threat weaknesses and implement mitigation strategies that will have a real impact on raising the defence posture through true business level risk mitigation.

SOME OF WORK
No posts.
No posts.

Start Work With Me

Contact Us
PUTTHIK LEANG
+855-70-701-845
Phnom Penh, Cambodia