An early-career cybersecurity professional, knowledge-seeker, experiential learner, and creative-thinker interested in the intersection of Cybersecurity, Business & Management, and Tech & Innovation.
Looking for my next
opportunity
to make an impact.
The nexus way.
Welcome
Welcome to my personal and professional portfolio. I am excited that you are here. Both professionally and personally, this portfolio will act as a living and breathing documentation of my past career portfolio, current ventures, and future goals and aspirations as I seek knowledge, understanding, and experiences around the nexus of Cybersecurity, Business & Management, and Tech & Innovation. Thank you for being here and joining me on this journey!
This is Fè̩hìntó̩lá
Fehintola is a highly motivated early-career cybersecurity professional and student with a desire to further her educational and professional development in cybersecurity. She is currently pursuing a Master of Professional Studies in Cybersecurity Strategy & Information Management as a graduate student at George Washington University. Additionally, she is a 2024 CyberCorps® SFS Scholar at George Washington University.
Governance, Risk Management, and Compliance
Project Management
Forensics Password Cracking
Log Analysis Cryptography
Policy Writing
“You are going to find your purpose at the intersection of your passion and your proficiency.”
- Myron Golden
Fehintola is an extremely adept visual, oral, and written communicator, a competent-individual, a hardworking-professional, a leader who executes, and a flexible-learner with strong organizational and management skills. She has a growing curiosity about the individuality and cross-sectionality of Cybersecurity, GRC (Governance, Risk Management, and Compliance), policy, management, technological innovation, entrepreneurship, and business management and leadership. With this and her passion for serving within the federal government, Fehintola hopes to continue to develop the nexus of her curiosities to her background to develop a career in cybersecurity.
Projects
Cybersecurity Incident Response -Tabletop Exercise (TTX)
Read Presentation Here
As her final assignment for her Fall 2024 Cybersecurity Law and Policy course at GWU, Fehintola participated in a Cybersecurity Incident Response Tabletop Exercise (TTX) designed to simulate a real-world cyber crisis scenario involving a fictional conflict between two countries, Calorman and Narnia. In this exercise, she represented the Cybersecurity and Infrastructure Security Agency (CISA) as the Head of the Cybersecurity Division. Her role was crucial in advising and coordinating with Company Y, a global social media platform headquartered in Narnia's capital, Cair Paravel, to navigate and mitigate cybersecurity threats amidst escalating geopolitical tensions. Throughout the TTX, her group explored the intricacies of incident response, inter-agency collaboration, and strategic decision-making under pressure. At the conclusion of the exercise, Fehintola and her classmates presented the "After Action Report — The Calorman-Narnia Incident" to a hypothetical new incoming CEO and Chief of Staff of Company Y. This presentation detailed a comprehensive review of the incident, including a timeline of events, lessons learned, proposed enhancements for security, and highlighted the critical need for early and sustained involvement of CISA. Special emphasis was placed on the slides titled "How Company Y Should Have Included CISA" and "Resources CISA Could Have Provided," underscoring the missed opportunities for early threat intelligence sharing and the potential benefits of leveraging CISA's cybersecurity frameworks and risk assessment tools to better prepare and protect the company during such crises.
Strengthening Corporate Defense Against Insider Threat - Final Paper
Read Paper Here
As a part of the Fall 2024 Information Systems Protection course for her Master of Professional Studies in Cybersecurity Strategy & Information Management program at GWU, Fehintola Bright wrote a 50-page research paper, titled "Strengthening Corporate Defense Against Insider Threats", that examines the growing risks posed by insider threats to organizations. It provides a comprehensive analysis of various types of insider threats, including malicious and negligent employees, and explores the attack techniques commonly used, such as phishing, malware, social engineering, and industrial espionage. The paper emphasizes the financial, operational, and reputational damage that insider threat incidents can cause. It also outlines multiple prevention and intervention methods, including the importance of employee training, behavior monitoring, least privilege policies, email security, and detailed incident response plans. Fehintola’s paper stresses the need for organizations to adopt a multi-layered defense strategy to mitigate the potential damages of insider threats and improve corporate resilience.
Recent LinkedIn Articles
Welcome to my LinkedIn articles, where I share insights on governance, risk management, compliance, and cybersecurity. Whether you're navigating the complexities of policy development, exploring the risks of industrial espionage, or seeking strategies for asset identification and protection, these articles provide valuable perspectives and practical solutions. I hope you find them both informative and engaging!