About

Founder of SCT

For personal privacy and enhanced security, paramount in cybersecurity, I will use a pseudonym here. My commitment to your protection remains absolute.

Sava

Sava

CEO

My journey into the intricate world of cybersecurity began early, fueled by an insatiable curiosity. From the tender age of 10, I was captivated by the complexities of hacking and reverse engineering, a fascination that quickly transformed into a profound understanding of digital systems.

By 13, this unconventional passion led to a significant discovery: I identified a critical flaw within Google's public advertising system architecture. This early insight into system vulnerabilities propelled me further, leading me to explore social engineering. I realized that a purely technical approach was incomplete; human vulnerabilities within large corporate infrastructures often presented the most significant exploits.

My activities, which included several high-profile international cyber events, eventually led to the issuance of arrest warrants and the apprehension of some associates. With these past incidents now legally prescribed, I transitioned from those pursuits, channeling my unique skills towards legitimate security consulting.

It was following my first major conference that my true purpose crystallized. Invited to speak at the Vatican before the assembled Bishops of Europe, with simultaneous translation into multiple languages, I addressed representatives from major internet players like Facebook, Wikipedia, and Google, raising awareness about the dangers of the web. This experience profoundly impacted me. I realized my goal wasn't just about identifying vulnerabilities, but about leveraging my unique perspective to help people and agencies proactively defend themselves in an increasingly complex digital world.

My academic path solidified this commitment. I pursued my education in France, completing my Master's degree, which provided a robust foundation in computer science and advanced networking. Driven by a desire to push the boundaries of cybersecurity, I then embarked on a doctorate in the United States. 

Complementing this academic rigor, I also underwent specialized military training focused on cyber operations and in-person missions. This rigorous program provided invaluable experience in physical security assessments, on-site digital forensics, and secure evidence collection in challenging environments, adding a unique, practical dimension to my technical and strategic expertise.

To safeguard my identity and our operations, especially given my past and the sensitive nature of my work, I was subsequently attributed a pseudonym. Furthermore, diplomatic immunity was conferred upon me during my travels, a necessary measure to navigate potential challenges with the head of the cybercrime bureau for Europe, Africa, and the Middle East at INTERPOL's General Secretariat.

Today, my mission is clear: to apply my comprehensive understanding of cyber threats, both technical and human, to fortify the digital defenses of critical organizations and governments worldwide.

Academic Background & Key Certifications

2016 - 2020: Ph.D. in Cybersecurity, Carnegie Mellon University's CyLab Security and Privacy Institute, USA

Specialization: Global Cyber Resilience Strategies for Critical Infrastructure (in partnership with the United Nations).

2011 - 2016: Master's Degree in Computer Science, CentraleSupélec

Focus: Advanced Network Security, Cryptography, Secure Software Development.

2023: Certified Information Systems Security Professional (CISSP)

Attesting to advanced expertise in designing, implementing, and managing enterprise-wide security programs

2022: Offensive Security Certified Professional (OSCP)

Demonstrating practical, real-world proficiency in ethical hacking and penetration testing methodologies.

2021: GIAC Certified Incident Handler (GCIH)

Validating critical skills in incident detection, response, and active defense against cyber threats.

Visiting Lecturer, European Cybercrime Centre (EC3) at Europol Academy / NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE), sharing insights on Cybersecurity.

Certified Ethical Hacker (CEH) / EC-Council Certified Security Analyst (ECSA) / Licensed Penetration Tester (LPT)

GIAC Reverse Engineering Malware (GREM) / GIAC Exploit Developer (GXPN)

Certified Cloud Security Professional (CCSP)

ISO 27001 Lead Auditor / Lead Implementer

Image

Certified Industries & Expertise

Our deep expertise extends across various highly regulated and critical sectors. We bring certified knowledge and specialized capabilities to each industry, ensuring compliance with unique standards and robust protection against complex threats.

  • Government Security
  • Threat Intelligence
  • Data Governance & Privacy
  • National Security Systems
  • Global Compliance
  • Financial & Banking
  • Red Teaming & Hacking
  • Critical Infrastructure (CIP)
  • Operational Technology (OT)
  • Incident Response
Shape Image
Image

Our Mission, Vision, and Core Values

At SCT, our mission is to redefine cybersecurity for the public and private sectors, moving beyond mere defense to proactive resilience. We envision a future where critical infrastructures and sensitive data are inviolable. This vision is underpinned by our core values: unwavering integrity, ceaseless vigilance, and a commitment to innovation that keeps us ahead of the curve.

  • Mission

    To safeguard critical digital assets and empower organizations against evolving cyber threats, ensuring resilience and continuity for the public good.

  • Vision

    A globally secure digital landscape where public and private entities can operate with absolute trust and confidence, unhindered by cyber adversary actions.

  • Core Values

    Integrity, Vigilance, Innovation, Client-Centricity, Discretion, Excellence

Shape Image

Our Approach / Methodology

Our methodology is built on a foundation of proactive intelligence and a holistic security paradigm. We don't just react to threats, we anticipate them, leveraging deep insights into adversary tactics, techniques, and procedures. Our approach integrates cutting-edge technology with strategic human elements, ensuring bespoke, resilient defenses tailored to each client's unique operational landscape and risk profile.

Intelligence-Driven

Our strategies are powered by real-time threat intelligence, anticipating emerging cyber risks to inform every defense.

Holistic & Adaptive

We integrate technical, human, and strategic elements, continuously adapting our defenses to evolving threat landscapes.

Partnership-Focused:

We collaborate closely with our clients, becoming an extension of their team to build shared resilience.

Proactive & Predictive

We move beyond reactive measures, employing foresight and advanced analytics to prevent incidents before they occur.

Shape Image
Shape Image