Sameer Somal is the Co-Founder & Chief Financial Officer at Blue Ocean Global Technology. Sameer is a CFA Charterholder, a CFP® professional, and a Chartered Alternative Investment AnalystSM. In May of 2017 he was named an Iconic Leader Creating a Better World for All by the All Ladies League & Women Economic Forum. Sameer is an internationally recognized speaker, educator and entrepreneur.
2016 - 2018 speaking engagements include, but are not limited to:
• The US State Department’s Foreign Service Institute (McLean, VA)
• Women Economic Forum (Delhi, India)
• Dimensional Fund Advisors Conference (Chicago, IL)
• Mick Law Conference (Scottsdale, AZ)
• Legal Week 2018 (New York, NY)
• Betta Gamma Sigma Leadership Conference (Chicago, IL)
• Scotiabank Executive Strategy Retreat (Grand Cayman, Cayman Islands)
• The LavaCon Content Strategy Conference (Las Vegas, NV)
• Global Digital Marketing Summit
• The Securities & Exchange Board of India (Mumbai, India)
• Chartered Alternative Investment Analyst (CAIA) Association (Mumbai, India)
• National Institute of Securities Markets (NISM), CFAI, & City of London (Mumbai, India)
• CFA Society Texas
Sameer is passionate about helping clients improve profitability, build brand equity, and adapt to the Digital Revolution.
• Blue Ocean Global Technology serves clients and agency partners in 40+ countries.
• We have completed 3000+ web development, portal, eCommerce, and software projects over the past 15 years.
Blue Ocean Global Technology proactively builds stellar reputations. We create and promote digital assets that accelerate the growth of brand equity. We provide comprehensive reputation management services, which often includes search engine optimization (SEO), and web development. When an individual or organization faces crisis, legal or PR issues that reach the internet, we specialize in mitigating the impact of the defamatory content and repairing the negative reputation.
Expertise - Sameer is a subject matter expert witness and frequent speaker on online reputation management, search engine optimization, digital marketing and the digital revolution. He helps clients build, monitor and repair their online reputation. Sameer also provide testimony in courts for client cases and expert consulting specific to the digital footprint of individuals, companies and governments. Blue Ocean Global Technology has completed over 3000+ SEO & Web Development projects. We serve clients globally.
Areas of Expertise - Search Engine Optimization • Online Reputation Management • Internet Defamation • Internet Consulting • Digital Marketing • Website Development • Online Review Management • Digital Reputation Repair
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
|Litigation||IT & Telecommunications||Critical Facilities|