
Zouheir Abdallah
Senior Information Security Risk Expert
Zouheir Abdallah
About Me
Senior level Information security risk expert, experienced in managing information security risks and developing information security management systems with focus on governance, risk, compliance, and information assurance across several industries (government, banking & finance, energy, telecom, transport, and utility). Extensive experience in developing and implementing comprehensive security management systems to enable organizations to strengthen their cybersecurity posture. Broad experience in information security and deep understanding of key security principles, industry best practices, and latest risk and threat landscapes. Broad expertise in creating tailored educational programs with the goal of empowering teams with the knowledge and skills needed to mitigate risks and protect critical assets.
- Phone
- Email support@zouheir.me
- Certifications CISSP, CISA, ex-CIPM, ex-CIPP/E
What I Do
Resume
Education
2023
University of YorkMaster of Science in Cyber Security (Merit)
Advanced studies in cyber security principles, risk management, and information assurance.
2006
UniversityBachelor's Degree in Business Computing
Comprehensive education in business and computing fundamentals.
Experience
2015 - Present
ConfidentialSenior Information Security Risk Expert
Providing expert information security consultancy to public sector agencies and critical national infrastructure organizations. Developing national information security frameworks and delivering comprehensive training programs.
2015 - 2023
ConfidentialProject Manager/Manager of National Technology Security Vetting Lab
Built and operated an international Common Criteria program, managed cybersecurity risks in emerging technologies, and provided mentorship to lab employees.
2013 - 2015
ConfidentialSenior Cyber Risk Specialist
Led a team of junior information security risk specialists, managed information security public-private-partnership programs, and delivered information security risk workshops.
Security Skills
Information Security Risk Management
Security Governance
Security Training & Awareness
Project Management
Technical Skills
Python
JavaScript
Java
C++
Professional Skills
- Public Speaking
- Team Leadership
- Strategic Planning
- Risk Assessment
- Security Frameworks
- Compliance Management
- Training Development
- Vulnerability Analysis
- Project Management
Certificates

Certified Information Systems Security Professional (CISSP)

Certified Information Systems Auditor (CISA)
Portfolio
Privacy Policy
FeedVox App Privacy Policy
1. Introduction
FeedVox respects your privacy and is committed to protecting it. This Privacy Policy explains how we collect, use, and safeguard your information when you use our app.
2. Information We Collect
We collect only the information necessary to provide our services, including feed searches. All app settings and preferences are stored on your device and is not shared with us. We do not collect personal information.
3. How We Use Your Information
Your information is used solely to provide and improve our services. We do not share or sell your data to third parties.
4. Data Storage
All data is stored locally on your device. Feed searches are stored on our servers to provide and improve our services. Data stored on our servers are not linkable to you.
5. Third-Party Services
We use OpenAI's services for AI features. Their use is governed by their privacy policy and our agreement with them.
6. Your Rights
You have the right to access, modify, or delete your data at any time through the app settings.
7. Updates to Policy
We may update this policy occasionally. Changes will be reflected in the app and on our website.
8. Contact Us
For questions about this privacy policy, please contact us at: support@zouheir.me
Publications
Information Security on a Budget: Data Classification & Data Leakage Prevention
Published in "Towards a Secure Cyber Space" special publication booklet
View PublicationLinkedIn Vulnerability
Ethically reported a very critical vulnerability in LinkedIn's mobile app
View ReportBypassing 2-Factor Authentication on Dropbox
Ethically reported a critical vulnerability in Dropbox's 2-factor authentication
Lebanese Banks and Counter Measuring Cyber-Security Threats
Analysis of Lebanese banks' effectiveness in countering cyber-security threats
View Article