Nnenna Jennifer Okoroafor
@Jenniferokoroa1
Followers
329
Following
7K
Media
64
Statuses
2K
Cybersecurity Professional | GRC | ISO 27001 | Dr @ireteeh mentee
Lagos, Nigeria
Joined February 2020
Hi! My name is Nnenna Jennifer Okoroafor and thrilled to share this moment with y’all. Congratulations to me and everyone that made it to this cohort. Officially @ireteeh mentee.
16
5
72
My academic journey is a flex 🤍 I completed my MSc in Information Security and Computer Forensics with a Distinction, with a score of 86 in my dissertation. My supervisor invited me to present my work to the new set of Information Security students. It was also published. I
84
216
2K
The only reason why any woman will feel pain because you aren’t married is as a result of lack of purpose. When you lack purpose, you lack direction in life. Marriage is just a plus in life and shouldn’t make you feel pain because you aren’t married.
We ladies are not truthful to ourselves, yes there shouldn’t be a time limit to marriage but let’s not pretend the silent pains we go through seeing those younger than us getting married why we are not despite all our achievements. In all I pray we marry well and right 🙏🙏
2
0
6
GRC things…building an n8n workflow to streamline and automate our security questionnaire intake process for our clients. I broke this plan down to the smallest implementation of it & it’s working so let’s gooo :3
3
3
77
#Day14. Learnt about the cyber kill chain and how it identifies and prevents cyber intrusions. Focus more on the seven process o cyber kill chain.@ireteeh @The_Geminiman @LoyaMichael_
2
1
9
Hello Cyber friends, locking your screen is one of the easiest ways to protect sensitive information in any organization. Whether you step away from your computer for 5 or 10 minutes, leaving your screen unlocked exposes your data and the organization to unnecessary risk. How
19
99
277
RISK MANAGEMENT HELPS IDENTIFY AND PRIORITIZE THREATS, WHILE SECURITY CONTROLS REDUCE THEIR IMPACT. FROM POLICIES TO ENCRYPTION, EFFECTIVE CONTROLS STRENGTHEN RESILIENCE AND SUPPORT PROACTIVE DEFENSE. @ireteeh @LearningatCisco
#CYBERSECURITY #CISCO #INFOSEC
0
1
1
Monday Motivation ✨ Take things one step at a time. Progress is progress, no matter how small 💪
10
51
121
#Day13. I started module 6 where I learnt about what digital forensic is, digital forensic process like Collection, examination, analysis and report. I also explored more about the different type of evidence .@ireteeh @The_Geminiman @LoyaMichael_
1
2
7
#Day12.completed module 5. Key focus was on types of security control like physical, technical and administrative and functional control like preventive. Deterrent, detective, corrective, recovery and compensative.@ireteeh @The_Geminiman @LoyaMichael_
0
3
14
I’ve always known that GRC is the backbone of cybersecurity because you need to adhere to policies to stick to security . A lot of people have been asking me what am doing in GRC as they all think is boring. Thank God for my will.
I think every cybersecurity person should take a course in GRC 😎😎😎 Don’t come for me, let me explain. You must know how to read standard and policies and know how to interpret it. GRC will help you not to see policies as boring. I have written couple of „standards” (the
2
0
9
WE PRESENTED OUR FIRST MENTORSHIP TASK YESTERDAY AND MY GROUP KILLED IT! 🔥 TEAMWORK + CONSISTENCY + GREAT GUIDANCE = WIN 🏆 MORE GROWTH AHEAD! 💙🔐 @ireteeh @jay_hunts @LoyaMichael_ @Jenniferokoroa1 @GirlColossal @Cyber4912213025
#TEAMAPEX #CYBERSECURITY
1
1
8
Spending the weekend building a security tool and it’s been fun so far. Just a vulnerability scanner written in Python that uses an LLM to generate a vulnerability report w/ remediation & from there I want to expand
9
8
148
We just wrapped up our first project presentation last night and we absolutely pulled it off💯 Huge shoutout to the team. The energy is high & we’re just getting started! @Jenniferokoroa1 @iamshedrachking @hallybellar @Abas_Ukpabio @Cyber4912213025 @GirlColossal @umarmusaShehu2
4
5
8
#Day11. Started modules 5 where I learned abt risk,risk management process & ways to respond to risk like avoidance,transfer,acceptance and mitigation.I also explored abt security controls like administrative,technical and political control. @ireteeh @The_Geminiman @LoyaMichael_
2
3
9
To my follow group 4 @LoyaMichael_ @Cyber4912213025 @umarmusaShehu2 @Abas_Ukpabio @hallybellar @iamshedrachking @GirlColossal thank you all for your collaborative efforts.
5
5
10
As part of @ireteeh mentorship program, my team had a presentation this evening where we discussed how organizations use custom AI agent like Jit to track CVE.This AI agent help us identify the critical,low and high vulnerabilities and help security team to focus on what matters.
3
7
20
It’s been over a year since I started this security analyst role & I’ve managed the compliance programs for 10 startup clients. I wasn’t keeping track of the number 😅. I had zero knowledge of GRC but I came in with some years of dev exp & an AppSec interest and it’s worked out
10
9
229
This is the reason why most people get frustrated on the way and lose hope because they’re made to understand that after six months, they’ll start earning. Everything in life requires time and people should give themselves time.
It’s great to learn a tech skill, many people have built amazing careers from it. But please don’t start the journey with the mindset that you’ll begin earning immediately. Yes, it works out quickly for some people, but it’s not the same for everyone. Using Cybersecurity as an
0
0
2
#Day10. Completed module 4. Key focus was on network and server profiling,network vulnerability testing,Risk and risk management process and ways to respond to risk as well as vulnerabilities management and life cycle.@ireteeh @The_Geminiman @LoyaMichael_
0
1
13