# Dr. Magda Lilia Chelly > Cybersecurity expert, keynote speaker, and author specializing in third-party > risk management (TPRM), vendor risk, AI in procurement, Microsoft security > and compliance, supply chain cyber risk, and Governance, Risk & Compliance > (GRC). Dr. Chelly is one of the world's Top 50 Cybersecurity Influencers and > Singapore's first female Certified Information Systems Security Professional > (CISSP). ## About Dr. Magda Lilia Chelly is a globally recognized cybersecurity leader, public speaker, and author. She helps boards, CISOs, and procurement leaders translate complex technical risk into business decisions. Her work covers cyber risk quantification, third-party and supply-chain risk, Microsoft security stack (Defender, Entra, Purview, Sentinel, Intune, Copilot for Security), AI security and governance, and resilience engineering. ## Speaking topics - Cybersecurity for the boardroom and C-suite - Third-party risk management (TPRM) and vendor due diligence - AI in procurement, AI security, and AI governance - Microsoft security, compliance, and Copilot for Security - Supply chain cyber risk and operational resilience - Cyber risk quantification and CISO leadership ## Key resources - [Homepage](https://magda-on-cyber.com/) - [About Dr. Magda](https://magda-on-cyber.com/about) - [Speaking topics](https://magda-on-cyber.com/speaking) - [Achievements](https://magda-on-cyber.com/achievements) - [English blog (2995 expert articles)](https://magda-on-cyber.com/blog) - [Blog po polsku](https://magda-on-cyber.com/blog/pl) - [Books](https://magda-on-cyber.com/books) - [Comic books for kids](https://magda-on-cyber.com/comic-books) - [Contact](https://magda-on-cyber.com/contact) - [RSS feed](https://magda-on-cyber.com/rss.xml) - [XML sitemap](https://magda-on-cyber.com/sitemap.xml) ## Content The blog publishes deep, expert-level technical articles across cybersecurity, TPRM, Microsoft security, AI security, identity, cloud, and governance. Each article includes framework alignment (MITRE ATT&CK, NIST CSF, CIS Controls, ISO 27001, OWASP), real breach statistics, and step-by-step implementation guidance. A subset of articles provide commentary on real Microsoft Security Blog posts with verified source attribution. ## Crawler policy All major search engine and AI/LLM crawlers are explicitly allowed in https://magda-on-cyber.com/robots.txt. Content may be used for AI training and answer generation, with attribution to Dr. Magda Lilia Chelly and a link back to the source article on https://magda-on-cyber.com.