GWIS

Great Wall InfoSec 

    Sdn. Bhd. (930024-D)

GWiS

 

New Threats:
With the rapid growth of 
the Internet of Things (IoT), the value of 
real-time data collection becomes more menacing.

Call us and we will help prevent data breach. 

Contact us for a free consultation on how 

to secure your system



Michelle Chan, MBA.
Director

Magdy Saeb, Ph.D.,
Chief Technology Officer



A-0-3, Ground Floor, Anjung Hijau (Green Field) Apartment, 
57000 Bukit Jalil, Kuala Lumpur, Malaysia.

Phone:   +603 8998 3388
Mobile: +6011 1661 8000

Fax:         +603 8994 2288  






Certified Trainer by Pembangunan Sumber Manausia Malaysia under the Ministry of Human Resources Malaysia.
Registered Real Estate Agent under The Board of Valuers, Appraisers and Estate Agents Malaysia. 
Michelle Chan practiced as Registered Estate Agent since 1995 and obtain MBA in the year, 2010. 
She in also the key personal  in a development company for the housing project in the year 2012 to 2015. 
Completed courses for digital threats and cyber security – 2014. 
COMPLETED COURSES FOR MARKETING RESEARCH – 2015. 
COMPLETED COURSES FOR INFORMATION SECURITY RISK management - 2016
Train the trainer by PSMB- 2016
Professional courses: 
  1. Malaysia Company Law by Brickfield College, Malaysia.
  2. Diploma in Estate Agent Malaysia

 

Prof. Magdy Saeb received the BSEE. School of Engineering, Cairo University, in 1974, the MSEE, and Ph.D. Degrees in Electrical & Computer Engineering, University of California, Irvine, in 1981 and 1985, respectively. He was with Kaiser Aerospace and Electronics, Irvine California, and The Atomic Energy Establishment, Anshas, Egypt. He is a professor emeritus & former head of the Department of Computer Engineering, Arab Academy of Science, Technology & Maritime Transport, Alexandria, Egypt. He was on leave working as a principal researcher in the Malaysian Institute of Microelectronic Systems (MIMOS). Now he is the CTO of Great Wall Information Security, Kuala Lumpur, Malaysia. His current research interests include Cryptography, FPGA Implementations of Cryptography and Steganography Data Security Techniques, Encryption Processors, Mobile Agent Security. He holds five Intellectual Property Patents in the area of cryptography. He has published more than 70 technical peer-reviewed papers in the information security area.

GWIS
Location