Ms. Farhat Shah currently serves as the cyber security subject matter expert for the Department of Defense (DoD). Ms. Shah has worked in different capacities to launch and implement IA programs and initiatives within her organization. She provided critical cyber security support to systems across the U.S Army leading to successive mission completion.
Ms. Shah began her career as a software engineering intern. She graduated from the Army’s Intern Program earning a Master’s in Software Engineering from Monmouth University. Throughout this time she participated in planning, developing and maintaining assigned software projects.
Ms. Shah holds a Bachelor’s in Electrical Engineering and a second Master’s in Technical Management from the Johns Hopkins University. Her experience entails Software development, Systems Engineering, Project management and Cybersecurity for information systems that she has gained over her career as an engineer with the Army.
Ms. Shah is a CISSP (Certified Information Systems Security Professional) as well as a PMP (Project Management Professional). Ms. Shah is Level III Certified in Systems, Planning, Research, Development and Engineering. She is a current member of the IEEE.
Podcasts / Webinars
The CSIAC Podcast » 5 Best Practices for Software Security
As Software becomes more complex, it is critical to incorporate security from the very inception of the system rather than an afterthought. With the rapid shifts in technology and increasingly sophisticated threats, cybersecurity considerations are a critical factor, expressly for…
The CSIAC Podcast » 5 Best Practices for a Secure Infrastructure
Hackers are becoming progressively more sophisticated. The attacks can take place on companies, businesses, hospitals, government organizations and universities, alike. A non-intentional lack of awareness of basic security practices can easily lead to a ransomware attack with irreparable damage.
This video podcast describes some best practices that can assist in preventing incidents on a network and mitigate the risk in case of a cyber attack.
Leave a Comment
You must be logged in to post a comment.