• Grab A Quote

    Grab A Quote

    Services Required
     Security Posture Assessment
     Penetration Testing
     Vulnerability Assessment
     Architecture Review
     Source Code Review
     Other Services Required

    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.
  • Got Hacked? Get Instant Help 24/7

    Got hacked ? Let Us Help You

    Disclaimer: We require this information to understand your needs and provide you with a better service. Your privacy is important to us. We will not disclose your personal information to any third party.

Management Team


AKATI Consulting comprises a team of highly qualified and talented professionals in the industry; bringing forth deep industry expertise, professional integrity and dedication with a goal to deliver real, measurable results for our clients. Our staffs worldwide, team up to create solutions for our clients by collaborating in strategic planning, supporting implementation and management of IT solutions.

Backed by a group of credible, experienced team of professionals, AKATI Consulting has an edge to provide services to a wide spectrum of customers across the globe.

Let's take a look at the brains behind these information security operations, the ones who fight CYBER crime.

  • Krishna Rajagopal, Chief Executive Officer

    Krishna Rajagopal, Chief Executive Officer

    Krishna is a recognized expert in the IT industry focusing on security, forensics and training. He has been involved in the Information Technology field for close to two decades after graduating in the field of Internet Technology from Staffordshire University, UK. His particular passion is in Defence in Depth framework strategy formulation for corporates that encompasses areas such as Penetration Testing, Computer Forensics, SIEM, and DLP. Krishna has contributed extensively in helping numerous Governments and Banks to face the Information Technology age. He has consulted and advised numerous banks such as the Centrale Bank Van Aruba when they were about to move into the Online Banking scene. Thus the standards and procedures he has set for them are being used by all banks in Aruba today.

    He was instrumental in designing, planning and organizing the training needs of the Malaysian Civil Service on the Generic Office Environment (GOE − Electronic Government) Project and the Business Process Re-Engineering (BPR) Project of the Malaysian government. He has been certified through EC − Council specializing in Project Management and Customer Relationship Management. He holds a Certified E−Business Associate ( CEA ), Certified E−Business Professional (CEP) accreditation, Certified E−Business Consultant (CEC) accreditation, Certified Ethical Hacker (CEH) accreditation, and the Computer Hacking Forensic Investigator (CHFI) accreditation.

    Krishna, as he is fondly known as, holds more than 50 various professional certifications and is recognized internationally as one of the best in the industry for IT Forensics / Computer Security. His professional certification includes Prince2 Certified Practitioner, CEH, CHFI, Microsoft Certified Professional (MCP), Microsoft Certified Systems Engineer (MCSE) and numerous others. To date he holds the record of being the youngest MCSE in the country and also holds the record for scoring a perfect 1000 marks on the final exam − Networking Essentials. Besides certification from Microsoft, he has also certifications from EC−Council, Adobe, Cisco, Apple, Checkpoint, and Sun in various areas and field. All of the above has equipped him with substantial knowledge and expertise to excel in the training field where his training experience ranges from training corporate executives for Microsoft Certification, Programming Languages, Networking systems, application programs, web designing to E-commerce certification. Krishna has extensive hands-on technical experience, possessing a vast range of industry and specific certifications that demonstrate high technical proficiency and in-depth knowledge. He has progressively extended his interests to encompass a wide array of organizational, economic and legal aspects of IT. His extremely broad industry experience an business acumen is instrumental in providing professional consulting services to the public and private corporations, government departments at all levels of organizational structure. Industry leaders, universities and government departments often seek Krishna's expertise to give presentations on information security, infrastructure protection and electronic privacy.

    Krishna has assisted and trained numerous Police forces around the globe on security measures and is accredited as a specialist in the successful investigation and prosecution of hackers, fraudsters and others. His work as a forensic computer consultant includes analyzing computer documents, e-mails and data files. Krishna has also been approached by the enforcement in Mexico, and requested his knowledge and expertise in creating a customized mobile forensic station investigation methodology for the Policia Federal (Federal Police), Mexico, for the sole purpose of investigating cyber criminals. Currently Krishna, is being sought after for his expertise in setting up a forensic investigation unit and lab for the Police Force in a South East Asian nation.

    Krishna also conducts trainings and consulting in various countries across 5 continents of the world and has appeared in numerous television interviews and press releases talking about Computer Forensics, IT Security and various other pertinent and related issues. The latest being a series of interview at BFM 89.9 in Malaysia, TV3, NET2 in Ghana and in Mongolia. Krishna has recently been invited by the US Military to conduct a training at the US Pacific Command for two consecutive years (2012 and 2013).

    A distinguished and popular speaker, he has conducted training and given talks at numerous events around the globe , i.e. In Mexico City where he delivered his address on a series of conferences organized by Universidad de Tecnologica de Mexico (UNITEC) where nothing less than 1000 participants arrived every night for his conference on Ethical Hacking and Computer Forensics. Last year (2014), Krishna has led his team to successfully conduct over 351 different Pen Tests across the globe (across different clients from Banking, Governmental, Enforcement, Military, Telecommunication, etc.) with a 100% success rate. He is responsible for developing, maintaining and publishing information security standards, policies, procedures and guidelines for the company's key clients. He is also an expert witness assisting various enforcement bodies across the globe and the Interpol.

  • Dr. Bhaskar Subramaniam, Chief Legal Officer

    Dr. Bhaskar Subramaniam, Chief Legal Officer

    Dr. Bhaskar Subramaniam engages in developing and driving legal strategies to increase awareness on legal aspects of forensics security for our clients.

    Bhaskar has over two decades of extensive experience in the legal arena, mainly in the areas of International & Comparative Business Law, case management and preparation of Criminal cases including attendance at Police Station, Contract disputes as well as the principles of conveyance practice.

    During his tenure as In-House Barrister, Bhaskar dealt with both civil and criminal litigation. He has also taken training in Quality Assured legal practice under the ISO9001-2000 standards.

    Bhaskar holds Honours and Master's degrees in Law and Arts from The University of London and Guildhall University where his studies focused on International & Comparative Business Law. He also carries the Degree of the Utter Bar, Middle Temple Inns of Court, a Solicitor to the Supreme Court of England and Wales and a Doctorate of Business Administration (Legal Practice Management).

  • Peder Thornstrom, Chief Technology Officer

    Peder Thornstrom, Chief Technology Officer

    Peder has approximately 20 years of experience in the IT space and also been exposed to various cultures across Europe and Asia. Peder has certainly gained some useful experiences and he has also spent some 10 years working with PKI solutions.

    Although Peder has much experience in terms of business and management, his core is still the technical aspect of Information Technology for the past 20 years. His knowledge and experience has certainly been a key of achievements and recognition.

    Peder participated in the whole concept to build PKI solutions and PKI production solution, including technical-, and pre-sales, implementation, user training, and post-implementation support, i.e. Proof of Concept (PoC)installations, CA production systems capable of generating 40.000 certificates an hour. Projects of various sizes scaling form PoC's to national PKI solutions.

    Peder's core skills include but not limited to the following:

    Technical & Pre-salesWorking with stakeholders to capture business requirements and translating them into technical specifications. Includes implementation support.
    Public Key Infrastructure (PKI)Working with digital certificates & smart cards, CA implementations, etc.
    Large system implementationImplementation of national PKI solutions.
    Project ManagementDeveloping project plans, identifying skills and mobilising resources, monitoring progress and status up-dates, providing technical support, and interfacing with customers for feedback and project sign-off.
    TrainingProduct training including new processes and training materials.
    IT securityMCSE: Security, Security+, PCI−QSA − 2007, etc.
    User and implementation documentationFor future maintenance and support model.

  • Dr. Patrick Eulogious Yau, Head of Research

    Dr. Patrick Eulogious Yau, Head of Research

    Patrick's experience ranges from Quality Assurance, Business Operations, Risk Management, Information System audit to consultancy.

    Patrick is known as a true innovator in the field of Information Technology Management and brings AKATI Consulting 15 years of experience in establishing networks and business operations, complimenting a range of portfolios. He leads AKATI's technology and products organizations, including engineering, product management and product marketing.

    Patrick has held positions in major technology and consulting firms including Jardine Matheson, Hong Kong Housing Authority, Hutchison Whampoa Limited and Coopers & Lybrand.

    Patrick holds a Doctorate in Management and Business Administration, Master of Commerce in Information Systems, Master of Science in Security Management and Master of Business Administration in IT Management.

    Besides, Patrick also has 26 other Industry Certifications through which he has earned a keen eye for strategic execution. He is instrumental for AKATI's direction in operations and is responsible for managing projects globally; while establishing relationships with our esteemed clients and key technology partners.

    Patrick is also a renowned researcher and writer in the field of IT Security. Throughout the years he has written and published the following papers:

    • "Security Incident Response and Management 101", 21st Info-Security Project Handbook 2014, The 15th Info-Security Conference 2014, 20-21 May 2014, Hong Kong.
    • "Social Media − The Security Risks and Solutions", 21st Info-Security Project Handbook 2014, The 15th Info-Security Conference 2014, 20-21 May 2014, Hong Kong.
    • "Software Security Deployment, Maintenance and Disposal − Principle and Practices", 21St Info-Security Project Handbook 2013, The 14th Info-Security Conference 2013, 28-29 May 2013, Hong Kong.
    • "Bring Your Own Device (BYOD) − Security Problems and Solutions", 21st Info-Security Project Handbook 2013, The 14th Info-Security Conference 2013, 28-29 May 2013, Hong Kong.
    • "Software Security Coding and Testing − Principle and Practices", 21St Info-Security Project Handbook 2012, The 13rd Info-Security Conference 2012, 8 May 2012, Hong Kong.
    • "IT Fraud and Risk − Awareness and Solutions", working paper for 21St Info-Security Project Handbook 2012, The 13rd Info-Security Conference 2012, 8 May 2012, Hong Kong.
    • "Data Breach − The Risks and Solutions", 21st Info-Security Project Handbook 2011, The 12th Info-Security Conference 2011, 17 May 2011, Hong Kong.
    • "Insider Threat − The Human Factors and Governance Issues", 21st Info-Security Project Handbook 2010, The 11th Info-Security Conference 2010, 4 May 2010, Hong Kong.
    • "IT Risk Management in IT Governance", 21St Info-Security Project Handbook 2009, The 10th Info-Security Conference 2009, 21 May 2009, Hong Kong. Pg79-81.
    • "Information Security Program Management and Project Management: The Unification for Proper Governance", 21St Info-Security Project Handbook 2008, The 9th Info-Security Conference 2008, 21 May 2008, Hong Kong. Pg103-105.
    • "Information Security Program Management and Project Management: The Unification for Proper Governance", re-published at IAPPM website, article database on 18 July 2008.