Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Besnik Limaj

Founder and CEO at Logic Plus

Vienna, Austria

Besnik Limaj has an extensive background as a Team Leader, CEO and Board Director.

He has held various Team Leader roles in EU-funded projects, including the three-year Cybersecurity East project for six EaP countries, the three-year "Enhancing Cyber Security - ENCYSEC" transregional project for four countries in Europe and Asia, as well as the Team Leader for an EU-funded project in Amman, Jordan and as Key Expert for Projects in Africa and Central America.

Besnik has extensive knowledge in Cybersecurity and Artificial Intelligence (AI) including: The European Commission WHITE PAPER on Artificial Intelligence, Artificial Intelligence Act (AIA), Data Science, NIST AI Risk Management Framework, NIST Cybersecurity Framework, NIS Directive, ISO 27001, Ethical Hacking, Metasploit, OSINT, Social Engineering, Burp-Suite, and Penetration testing. He is well-versed in various database management systems and programming languages, such as Python, ASP.NET, VB.NET, C#, Java, PHP, ORACLE, SQL Server, and MySQL.

Besnik has travelled the world and gained exposure to diverse people and cultures from Hong Kong to San Francisco.

He holds an MBA degree from the University of Sheffield and a Level 7 Diploma in Strategic Management and Leadership from the Chartered Management Institute in London. He is also certified as a DGQ Internal Auditor, Quality Manager, and Quality Systems Manager from the European Organization for Quality.

Besnik is an experienced professional with knowledge in conducting a stakeholder analysis, regulatory and policy framework analysis, research activities analysis, Business Process Re-engineering, Technology, TQM, Performance management, and strategy development. With over 20 years of experience, he is well-equipped to tackle complex AI and cybersecurity challenges and lead teams to success.

Besnik excels in motivating and guiding teams with logical decision-making methods, having managed teams in different continents. He can balance and prioritize tasks in fast-paced environments.

Skills: Cybersecurity · Information Security · Cybercrime · Cyber Threat Intelligence (CTI) · OSINT · Social Engineering · Pentesting · Cyber Exercises · Software Engineering · Artificial Intelligence · Data Science · Leadership · Organizational Leadership · Public Speaking · Project Management · Agile Business Analysis · Business Planning · Entrepreneurship · Strategic Partnerships · Business Strategy · Business Development · Business Continuity · Civil Society Organizations · Public Policy · Board of Directors · Corporate Events · Start-ups ·

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Pristina
Speaking Topics: Cybersecurity, Information Security, Cybersecurity Education; Cyber Certification; Cyber Exercises/Drills; Cyber Crimes;

Besnik Limaj Points
Academic 5
Author 9
Influencer 0
Speaker 30
Entrepreneur 0
Total 44

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Individual
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed

Areas of Expertise

Agile
AI 30.03
Analytics
Big Data
Blockchain 30.08
Business Continuity 30.74
Business Strategy
Change Management
Generative AI
Cryptocurrency 31.26
Cybersecurity 31.31
DevOps
Digital Transformation
Entrepreneurship
ERP
GovTech
Innovation
International Relations 32.59
IoT
Leadership 30.39
Lean Startup
Management
Mobility
National Security 32.73
Open Innovation
Privacy
Procurement
Project Management
Public Relations
Risk Management 33.27
Security 30.95
Social
Startups
Supply Chain
Sustainability

Industry Experience

Publications

9 Article/Blogs
Ethical Considerations in AI-Powered Cybersecurity
Medium
February 17, 2023
Artificial Intelligence (AI) is increasingly being deployed in cybersecurity as it offers more efficient ways to detect and prevent cyber-attacks. Nevertheless, AI's use in cybersecurity raises several ethical concerns that must be addressed. In this blog post, I discuss ethical considerations regarding the use of AI in cybersecurity and provide guidance on how to ensure the ethical and responsible use of AI in cybersecurity.

See publication

Tags: AI, Cybersecurity, Risk Management

How the NIST Cybersecurity Framework Helps Organizations Improve their Cybersecurity Posture
Medium
February 17, 2023
Cybersecurity is a dynamic and ever-changing field, and organizations need to keep up with the latest trends and challenges. The National Institute of Standards and Technology (NIST) has created a tool to help organizations achieve this goal — the NIST Cybersecurity Framework (CSF). In this blog post, I’ll discover how the NIST CSF can help organizations enhance their cybersecurity performance.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

OSINT tools and techniques for conducting online research and data collection
Medium
February 17, 2023
Join me on a thrilling exploration of the dynamic world of Open Source Intelligence (OSINT), a critical tool in modern investigations that unlocks the power of the digital landscape. With the internet's exponential growth and the abundance of online data, OSINT is an indispensable asset for data collection and research. Discover the myriad of OSINT tools and techniques available for conducting thorough online research and data collection in this exciting post.

See publication

Tags: Cybersecurity, Risk Management, Security

Understanding the EU NIS Directive: What it is and why it matters?
Medium
February 17, 2023
The EU NIS Directive requires organizations to secure their networks and information systems against cyber threats. In this article, we’ll explore best practices for NIS Directive compliance and provide tools to protect your business from cyberattacks.

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

A deep dive into the most common forms of Social Engineering: Phishing, Baiting, Tailgating and Pretexting
Medium
February 17, 2023
Discover the power of knowledge in safeguarding your personal and professional assets from the insidious threat of social engineering. By exploring the four most common forms of this malicious tactic - phishing, baiting, tailgating, and pretexting - you can equip yourself with the tools to protect against cyber criminals who seek to exploit human emotions and actions for their own gain. Join me on this informative journey as we fortify our defenses against this growing threat.

See publication

Tags: Cybersecurity, Risk Management, Security

Advanced Metasploit Techniques for experienced users
Medium
February 17, 2023
Looking to advance your Metasploit skills? This powerful framework is ideal for security research and penetration testing. In this blog, learn advanced techniques to maximize its potential. From third-party plugins and modules, to custom payloads with the latest tools, you'll gain the knowledge needed to be an effective Metasploit user. Get ready to take your skills to the next level!

See publication

Tags: AI, Cybersecurity, Risk Management

The CIS Controls Version 8: Everything You Need to Know
Medium
February 17, 2023
Discover the latest version of the Center for Internet Security (CIS) Controls in this comprehensive blog post. Get a deep dive into CIS Controls Version 8, exploring its key features, benefits, and how to implement them for ongoing compliance. Empower your organization with the best practices in cybersecurity!

See publication

Tags: Cybersecurity, Business Continuity, Security

Understanding the 20 Critical Security Controls: A comprehensive guide.
Medium
February 17, 2023
Unleash the full potential of the CIS Controls and fortify your organization's cybersecurity posture. Discover the 20 critical security controls, their implementation steps, and invaluable benefits in this comprehensive guide. Let's create a safer digital world together!

See publication

Tags: Cybersecurity, Risk Management, Business Continuity

The Differences between the NIST Cybersecurity Framework and other Cybersecurity Frameworks
Medium
February 17, 2023
Join me on an enlightening journey to discover the best cybersecurity framework for your organization. Explore the differences between the NIST CSF and other prominent frameworks, including ISO 27001, COBIT, and CIS Controls. Enhance your cybersecurity posture and safeguard your digital future.

See publication

Tags: Blockchain, Cybersecurity, Risk Management

1 Journal Publication
Enhancing Cyber Security: the Challenges in FYROM, Kosovo and Moldova
Information & Security: An International Journal ISSN 0861-5160 e-ISSN 1314-2119
May 12, 2015
Join me on an inspiring journey to fortify cyber security in the challenging environments of North Macedonia, Kosovo, and Moldova. With determination and strategic thinking, we can overcome the obstacles and create a safer digital world. Let us embrace the challenge of enhancing cyber security, one step at a time, and make a positive impact in the region.

See publication

Tags: Cybersecurity, Leadership, National Security

3 Keynotes
Cyber Threat Landscape at the Eastern Partnership Countries
ENISA
October 04, 2022
The study visit of the delegation to ENISA is a key part of the EU’s Cybersecurity East Project led by Mr. Besnik Limaj. Launched in 2019, the project intends to support Eastern partnership countries in developing their cyber capacities and legislative framework and promoting the compatibility and approximation of legal frameworks, best practices and cooperation.

The representatives presented to ENISA the assessment of their current cyber threat landscape and gave an account of some of the specific cybersecurity and security challenges they faced. EaP countries were particularly interested in discussing the implementation experiences in the EU linked to the Network and Information Security, NIS and NIS2 Directives, as well as certification and standardisation initiatives in the EU. ENISA explained its role in relation to these activities and scope of actions within the frame of the Cybersecurity Act. The capacity and awareness-building initiatives and activities were of particular interest. Further points of discussion covered approaches to cybercrime and cybersecurity and the general role and structures of ENISA within the EU’s cybersecurity set-up.

The project is part of the Eastern Partnership (EaP), a joint policy initiative designed to promote EU values, policies, best practices and interest in these neighbouring countries and ultimately strengthen the cooperation between the European Union (EU), the EU Member States and the Eastern countries involved.

See publication

Tags: Cybersecurity, International Relations, Leadership

Enhancing cooperation: PPPs and international cooperation
ENISA
December 17, 2015
ENISA received a visit from a group of representatives from France, The Former Yugoslav Republic of Macedonia, Moldova, and Kosovo of the project "Enhancing cybersecurity, Protecting information and Communication networks - ENCYSEC" led by Mr. Besnik Limaj.

The project is funded by the EU under the Instrument contributing to Stability and Peace, managed by EC DG DEVCO.

The topics discussed included:

* CERT capacity building;
* Cybersecurity strategies and awareness raising
* Enhancing cooperation: PPPs and international cooperation


Background:
ENCYSEC is a pilot project with the overall objective to increase the security and resilience of information Communication Technologies networks in the beneficiary countries by building and training local capacities to adequately prevent, respond and prosecute cyber-attacks and/or accidental failures

See publication

Tags: Cybersecurity, Risk Management, Security

Critical Information Infrastructure (CIIP) and Public Private Partnership
FIRST.ORG
October 26, 2015
With much of a Critical Infrastructure in the hands of the private sector, it seems a natural solution for industry and government to work together in ensuring it is both secure and resilient. A public–private partnership (PPP) establishes a common scope and objectives and uses defined roles and work methodology to achieve shared goals in addressing Critical Information Infrastructure Protection (CIIP). Using a real-life example, this session will demonstrate real cases of Critical Information Infrastructure incidents and how to deal with information sharing in Public Private Partnerships.

See publication

Tags: Cryptocurrency, Leadership, Risk Management

Thinkers360 Credentials

6 Badges

Blog

Opportunities

Contact Besnik Limaj

Book Besnik Limaj for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Besnik Limaj