Skip links

Joining Comodo as CISO (Great news for me 2021)

Joining Comodo Cybersecurity as CISO

I am really happy to announce that I will be a part of the Comodo family. I am really excited to work closely with our founder Melih Abdulhayoglu, a new CEO Ken Levine , and our new Chief Strategy Officer Dave Karp as well as the hero’s of ComodoFatih Orhan, Mehmet Özer Metin, Alan Knepfer and each team member of our Comodo family.

Customers need a better, more integrated and affordable means of preventing the onslaught of attacks!

For more info :

For the ones they don’t know , below is my career summary :

 Role                                                                                           Company                                       Location          Duration 

  •  CISO / Chief Cybersecurity Strategist          at Comodo                                          Sydney , AU    April 21- Present
  •  Regional CISO / Managing Director              at Standard Chartered Bank,      Dubai, UAE      (Apr 19 April 21)
  •  Cyber Security Architect                                   at Microsoft                                         Dubai, UAE      (Jan 16- April 19)
  •  CISO / Vice President                                         at emt Holdings ( Secunia)          Dubai, UAE      (Dec 4 -Jan 16)
  •  Regional Director                                                at KEMP Technologies                  Sydney , AU      (Dec 12 – Nov 14)
  •  Managing Director                                              at CEO IT training & Solutions  Sydney , AU     (Jun 02- Nov 12)
  •  Director of IT                                                         at The Bright Group                       Sydney , AU    (Mar 01- Jun 02)
  • Some junior IT  roles in Germany and Turkey  from 1992 – 2001


In a world where preventing all cyberattacks is impossible, Comodo delivers an innovative cybersecurity platform that renders threats useless across the LAN, web and cloud.

The Comodo Dragon platform enables customers to protect their systems and data against even military-grade threats, including zero-day attacks. It is highly effective at addressing the onslaught of ransomware. Based in Clifton, New Jersey, CSS has a 20-year history of protecting the most sensitive data for businesses and consumers globally. In 2018, CSS embarked on a journey to be the leader in endpoint security.

Today, CSS technology is precise, vigorous, and tailored to solve problems without downtime or undue stress. It renders an almost immediate verdict on the status of any unknown file to be handled accordingly by either software or human analysts. This shift from reactive to proactive makes CSS unique. It allows the capacity to protect all domains of business activity and threat—from network to web to cloud—with confidence and efficacy.

This fast and competent technology provides a seamless user experience and promotes ongoing customer trust. And, it recognizes a vital reality: while you cannot prevent 100% of malware – you can render malware useless.

Innovative Cybersecurity Solutions to Render Attacks Useless

The Problem

Some things in life are unavoidable, and malware is quickly becoming one of them. According to experts, emerging viruses, worms, Trojans, and other malicious “wares” generate approximately one million new specimens of hostile and intrusive software each day. Although many cybersecurity vendors will promise full protection against threats —the truth is, they can’t. No one can.

Businesses and people must accept that malware cannot be successfully blocked 100% of the time, nor can it be mitigated through mere defensiveness. Undetected threats are now a reality of digital age. And as such, the fight against this robust enemy will require a far more innovative and holistic approach to protection.

The Effect
Data surveys offer a glimpse into just how far down the attack cycle today’s malware has travelled, and the statistics are unsettling at best. As companies continue to zero in on the silver bullet of “protection” without considering the redundancy and impotence of their security layers, the result is a porous security posture with limited capabilities.

An attack cycle consists of four key stages:

Delivery of malware
Runtime as malware attempts to execute
Post-damage remediation
While a great deal of this threat can be prevented in the first phase, the defense in depth ability to block malware execution in real time—and repair the damage—hovers around 85%. This number simply isn’t high enough to beat the greatest enemy to the world of computing.

The Comodo Cybersecurity Solution
As a leader in cybersecurity for over twenty years, Comodo Cybersecurity seeks to protect businesses by understanding the true nature of the digital environment and what malware needs to survive. Without unfettered access and the ability to execute its malicious program, it has no power to breach other systems. But malware does have the capability to penetrate initial security measures, which means it cannot be fully prevented or denied—instead, it must be mitigated through the acceptance of its ability to penetrate even the most well-guarded systems.

While Comodo Cybersecurity solutions offer comprehensive detection services, our real prowess comes from the ability to determine if unknown files entering the system are good or bad, with no sandbox lag time or delayed productivity.

Comodo Cybersecurity

My career update announcement in my blog :

Thank you Standard Chartered Bank

Thank you Microsoft , here I come Standard Chartered

To learn more about Cybersecurity you can read articles like the below right in this blog

5 Important Cyber Threat Intelligence Resources

Comodo CISO  Dr Erdal Ozkaya- Joining Comodo as CISO (2021)- Joining Comodo as CISO – Chief Information Security Officer -Comodo CISO- cybersecurity vendors-Great news for me 2021-Joining Comodo as CISO (Great news for me 2021)