As a specialized cybersecurity consulting house, our mission is to empower individuals and organizations to close the skills gap, equipping them with the skills and understanding they need to navigate the ever-evolving digital landscape.
Own a business and want to enter the cybersecurity market but don't know where to start?
Integrate systems and want to expand your offerings with cybersecurity solutions?
Sell cybersecurity products and need help showcasing their unique value or require assistance with Proof-of-Concept and presentations?
Needing guidance on cybersecurity challenges or career paths?
Ts. Gary is a cybersecurity professional with a passion for protecting critical infrastructure. With over 9 years of industry experience, Gary has honed his skills in various cybersecurity domains. He also holds the following qualifications: MBOT Professional Technologist (P. Tech), Offensive Security Certified Professional (OSCP), ISO 27001 Lead Implementer and Internal Auditor, and ICS4ICS Incident Commander Type 4.
He is dedicated to helping organizations understand the importance of robust security controls and implementing practical strategies to mitigate risks. By combining technical proficiency with a strong focus on practical application, Gary empowers organizations to navigate the complex cybersecurity landscape with confidence.
Furthermore, he has made appearances in local media China Press. He has also been regularly invited to serve as a guest speaker at both secondary schools and universities across Malaysia.
Gary's expertise has been instrumental in:
Assisting businesses and project teams in building and improving their management systems. Ensuring security is a core consideration throughout the planning and implementation phases.
Conducting engaging training sessions to upskill professionals and foster a culture of cybersecurity awareness. Gary is a HRD Corp accredited trainer. He began teaching during his university years, helping his classmates pass final exams with concise study notes that they affectionately referred to as a "bible."
Effective planning is the cornerstone of successful cybersecurity projects. By clearly defining project scope, identifying resource needs, and aligning security goals with business objectives, we ensure optimal outcomes.
With a proven track record of successful cybersecurity implementations, we provide the insights and strategies you need to ensure the security of your projects, all within your budget.
Our experts will meticulously examine your organization's security practices against industry-recognized standards like ISO 27001 and CCoP. By identifying vulnerabilities and non-compliance areas, we'll empower you to take proactive steps to ensure compliance and strengthen your overall security posture.
Our expert team will conduct a thorough evaluation of your Operational Technology (OT) environment to identify and assess potential risks that could impact your productivity, safety, and overall business continuity.
Our personalized one-on-one session are tailored to address your specific needs and provide actionable solutions. Gain the confidence and expertise you need to tackle complex cybersecurity challenges and achieve your career goals.
Our unique training approach is rooted in the "think red, act blue" philosophy. By simulating offensive attacks from every angle, we equip our clients with the insights necessary to anticipate and counter potential threats. This enables them to implement effective defensive measures that mitigate risks and protect their valuable business and assets.
Our training programs are designed to be engaging, regardless technical expertise of the participants. We break down complex cybersecurity concepts into clear, understandable terms, ensuring that our participants enjoy the learning experience and can apply their newfound knowledge to real-world scenarios.
Experience a realistic phishing attack simulation designed to test your employees' ability to identify and respond to malicious emails. Our immersive training program will help your team develop the critical thinking skills and awareness needed to protect your organization from the latest phishing threats.
Enhance your information systems security skills with this training course based on the ISO 27001 standard, combining theoretical concepts with practical demonstrations. Through engaging lectures and hands-on exercises, this course will help you evaluate your current IT security practices, identify areas for improvement, and establish information security policies, comprehensively protect your organizations from emerging cyber risks.
Intended for IT and cybersecurity professionals, this workshop provides in-depth knowledge of hacking techniques, specifically focusing on Remote Code Execution (RCE) through various network protocols. This knowledge will empower participants to assess the security level of their systems effectively.
Gary has a wealth of experience in both IT and Operational technology (OT) security.
In the IT realm, he has worked with diverse sectors in Malaysia, including government agencies, financial institutions, healthcare providers, telecommunications companies, data centers, universities, and system integrators.
In the OT domain, Gary has successfully delivered projects in Malaysia and Singapore, specializing in critical infrastructure such as glove manufacturing, steel manufacturing, water treatment plants, and FPSO.
Implementing and maintaining ISO 27001 (ISMS) and Singapore Cybersecurity Code of Practice (CCoP) compliance
Providing cybersecurity consultancy in project implementation, covering risk assessment, network architecture review, system hardening review, and vulnerability assessment and penetration testing review
Evaluate the security posture of OT systems: SCADA, HMI, and PLC systems
Conducting thorough testing on cybersecurity products to ensure their capabilities align with marketing claims
Analyzing the root causes of cyber incidents, such as ransomware or email attacks
Assisting customers in facing auditors to ensure smooth cybersecurity audit sessions
The training program conducted for Malaysia and Singapore companies includes:
Cybersecurity awareness (including a simulated phishing campaign)
Penetration testing for network, web application, and mobile applications
System hardening
Secure coding
Tabletop exercise
Information Security Management System (ISMS)
Industrial cybersecurity
Conducted vulnerability assessments and penetration testing to identify and demonstrate real vulnerabilities and their potential impact with proof-of-concept, going beyond the limitations of commercial vulnerability scanners.
"Gary has done a great job providing support to our company. His professionalism and dedication to attend to his customers requirements are exceptional"
"Gary has a very good knowledge on what he does"
"Not everyone can teach but you are one of the best tutor I met"
"Nice one! (The training) Can see employees was engaged"
"Well organized"
"Teaching very details, answering student question very clearly"
"Using illustrations and others to bring out the topic. Speaker also delivered the message clearly without much complications."
"I like it because Gary will always try to teach us the concept through a series of activities"
"铺陈衔接紧密,教材恰到好处、一针见血"
"分享很 systematic,可以清楚明白知道如何去落实一个策划"
"有耐心,有跟不上听不懂得可以重复解释"
"第一次看到那么多人没有在睡觉"