Our Story & Values

Discover the scientific expertise and entrepreneurial vision that make CYBERISK a trusted partner in cybersecurity

Our Genesis

CYBERISK was born from the need to address growing challenges related to cybersecurity, digital risk management, and securing cloud environments in an accelerated digital transformation context.

Founded by CEO Dr. TCHIO TCHINDA Martin Guillaume, a cybersecurity and cloud solutions consultant with solid academic and professional experience, the company benefits from unique scientific expertise in cryptography applied to cloud infrastructures (IaaS) and challenges posed by quantum computing.

CYBERISK's creation was done in partnership with Mrs. FOUODO DJOMGOUE Lisla Lotta, co-founder whose involvement was decisive in the organizational structure, entrepreneurial vision, and consolidation of the company's human and ethical values.

YIMGA ESAIE Loic joined the founding team as a Software Engineering expert, bringing advanced technical skills in software development, system architecture, and innovative technological solutions that complement the company's cybersecurity expertise.

JACQUES KOMACLO joined the founding team as a Software Engineering expert Full-Stack, Databases: MySQL, PostgreSQL (including PostGIS), Oracle, MongoDB — relational, and NoSQL. Architecture & DevOps: Conception en microservices, UML, Docker, Kubernetes, AWS, VPS, CI/CD GitLab, Nginx, Elasticsearch, SonarQube.

Together, the team-member aimed to build a company combining scientific rigor, technical excellence, and professional responsibility, positioning CYBERISK as a specialized reference firm.

CYBERISK team in strategic meeting

Our Positioning

Cybersecurity Audit & Consulting

Expertise in vulnerability assessment and strategic recommendations based on international standards.

Specialized Cloud Security

Robust security solutions for IaaS infrastructures, with particular attention to hybrid and multi-cloud environments.

Digital Risk Management

Methodological approach to identify, assess, and treat organizations' cyber risks.

Regulatory Compliance

Support for compliance with current regulations (GDPR, NIS2, etc.) and protection of sensitive data.

Anticipation of Future Threats

Technological watch and applied research on emerging challenges, particularly the impact of quantum computing.

Strategic Partnership

Long-term partnership to sustainably secure information systems and critical infrastructures.

Our Experts Team

Dual scientific and entrepreneurial expertise

Portrait du Dr. TCHIO TCHINDA Martin Guillaume CEO of CYBERISK

Dr. TCHIO TCHINDA Martin Guillaume

CEO & Cloud & Cybersecurity Expert

PhD in computer science specialized in cryptography applied to cloud infrastructures (IaaS). His research focuses on security challenges posed by the advent of quantum computing. Expert in information system security with a rigorous scientific approach.

PhD Computer Science Cloud Expert Certified AWS SOLUTIONS ARCHITECT Certified COMPTIA security + Certified Database profidency of Dupage College Specialiste SaaS architecture Cryptography
Portrait de FOUODO DJOMGOUE Lisla Lotta

FOUODO DJOMGOUE Lisla Lotta

Marketing and Communication Director

Decisively involved in the organizational structure and entrepreneurial vision of CYBERISK. Responsible for consolidating the company's human and ethical values. Brings expertise in business management and strategic development to position CYBERISK as a reference player. Holder of a master's degree in management

Strategy Management Ethics
Portrait de YIMGA ESAIE Loic

YIMGA ESAIE Loic

Software Engineering Expert

Software engineering specialist with expertise in modern software development, system architecture, and innovative technological solutions. Contributes to the design and implementation of secure, scalable software solutions that integrate seamlessly with cybersecurity frameworks developed by CYBERISK.

Software Engineering System Architecture Full-Stack Development
Portrait de JACQUES KOMACLO

JACQUES KOMACLO

Software Engineering Expert/ARCHITECT Software

Senior Full Stack Java/Angular Developer with 10 years of experience, progressing towards technical leadership, software architecture and coaching roles. Backend: Java EE, Spring Boot, Spring Cloud, Spring Data, Spring Security, Hibernate, JPA, Apache Kafka, RabbitMQ, Keycloak. You have particular expertise in developing USSD gateways and middleware (Qsmpp), with a proven ability to manage systems processing over 20,000 transactions per day.

Software Engineering System Architecture Full-Stack Development

Our Core Values

The principles that guide every CYBERISK intervention

Scientific Rigor

Our approach relies on proven methodologies and deep scientific expertise, particularly in cryptography and information system security. Every analysis and recommendation results from a rigorous and documented process.

Continuous Innovation

We invest in research and innovation to anticipate emerging threats, particularly challenges posed by quantum computing. Our cloud security expertise allows us to propose solutions adapted to modern architectures.

Confidentiality & Ethics

We handle our clients' information with the utmost confidentiality and act with impeccable professional ethics. The trust our partners place in us is our most precious asset, which we scrupulously preserve.

Personalized Support

We consider each client as a unique partner. Our solutions are tailored to the specific needs of each organization, with personalized follow-up and a lasting trust relationship. We share our knowledge to strengthen your internal capabilities.

Our Technical Expertise

Specialization areas and methodologies

IaaS Cloud Security

In-depth expertise in security of cloud and virtualized infrastructures

Applied Cryptography

Research and implementation of modern cryptographic solutions

Software Engineering

Development of secure, scalable software solutions and system architecture

Risk Management

Methodologies for analyzing and treating digital risks

Regulatory Compliance

Support for GDPR, NIS2 and other sector regulations

Quantum Computing

Monitoring and preparation for quantum cryptographic challenges

Benefit from scientific expertise in cybersecurity

Combine academic rigor and operational experience to sustainably secure your business against current and future threats.