Nancy Muriithi #SheHacks2025 (@sheina_techie) 's Twitter Profile
Nancy Muriithi #SheHacks2025

@sheina_techie

|| Galatians 2:20 || Lead Security Engineer || Community Builder @Awscloud ||
Programs Lead @shehacks_ke || Hunter @Hacker0x01||

ID: 1236970097077559296

linkhttps://www.linkedin.com/in/nancy-muriithi/ calendar_today09-03-2020 11:01:05

1,1K Tweet

2,2K Followers

456 Following

vx-underground (@vxunderground) 's Twitter Profile Photo

When you see someone on social media discussing using AI to code it is your personal responsibility to encourage them. Tell them to "ignore the haters" and "keep it up!". This will keep our cybersecurity pockets phat for generations to come.

SheHacks KE #SheHacks2025 (@shehacks_ke) 's Twitter Profile Photo

We are so excited to be collaborating with #BSidesNairobi2025 🇰🇪 as the community comes together once again! HackerOne and Safaricom PLC are making it possible for the event to be FREE so RSVP while spots last 👉 bit.ly/4jaZ2wD #BSidesNairobi #CyberSecurity #SheHacks2025

#BSidesNairobi2025 (@bsidesnairobi) 's Twitter Profile Photo

9 Days to go! We are excited to be collaborating with SheHacks KE #SheHacks2025 on this event, we hope to interact and meet some of the ladies killing it in hacking and bug bounties. See you soon! #BSidesNairobiPreCon2025

9 Days to go!

We are excited to be collaborating with <a href="/shehacks_ke/">SheHacks KE #SheHacks2025</a> on this event, we hope to interact and meet some of the ladies killing it in hacking and bug bounties.

See you soon!

#BSidesNairobiPreCon2025
#BSidesNairobi2025 (@bsidesnairobi) 's Twitter Profile Photo

Please fill in our survey and share to your friends for more reach. We are interesting in seeing how Vulnerability Disclosure and Bug Bounty are currently viewed in Kenya and what experiences you have had. bit.ly/4koNfM5

Please fill in our survey and share to your friends for more reach. 

We are interesting in seeing how Vulnerability Disclosure and Bug Bounty are currently viewed in Kenya and what experiences you have had.

bit.ly/4koNfM5
John Doe (@stanleymasinde_) 's Twitter Profile Photo

I'm not tweeting tech today. We need a better country. I don't wanna have to move 15k km away so that my tech career can thrive. #OcuppyStateHouse2025

ICJ Kenya (@icjkenya) 's Twitter Profile Photo

JOINT STATEMENT: We remind the Communications Authority of Kenya (CA) that the media acts as a watchdog, documenting the actions of both protesters and law enforcement. Live broadcasts can deter excessive force and human rights violations by ensuring that actions are witnessed and recorded, thus fostering

JOINT STATEMENT: We remind the <a href="/CA_Kenya/">Communications Authority of Kenya (CA)</a>  that the media acts as a watchdog, documenting the actions of both protesters and law enforcement.

Live broadcasts can deter excessive force and human rights violations by ensuring that actions are witnessed and recorded, thus fostering
Teacher John CW (@trjohncw) 's Twitter Profile Photo

To the leaders of Kenya, understand that just because people are young doesn't mean that they are foolish. Stop playing games with Kenyans. We want better leadership. Listen to what the young people are saying. #trjohncw #stateofthenation #TheChurchandTheState #sirininumbers

To the leaders of Kenya, understand that just because people are young doesn't mean that they are foolish. Stop playing games with Kenyans. We want better leadership. Listen to what the young people are saying.
#trjohncw
#stateofthenation
#TheChurchandTheState
#sirininumbers
CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

🗣️ “Most people don’t understand cybersecurity policies — they need to be broken down into simpler, local languages.” When policy meets people, clarity builds trust. It's time to stop writing cybersecurity for systems and start communicating for citizens. - — Nancy Muriithi

CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

“We don’t want a system that gets hacked every month, but we also don’t want users locked out by complexity.” Nancy calls for a balance between usability and security in public services. Strong, intuitive, and accessible — that's the bar. #CyberSecurity #UX #DigitalGovernment

CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

Many would ask, HOW? The answer is simple, “Start with basic rollout, train, build, repeat. Especially in rural areas, people need to see tech as relevant, not foreign. Effective cybersecurity strategies must meet people where they are — both digitally and culturally."

CIO Africa by dx5ve (@dx5ve) 's Twitter Profile Photo

“Security is beyond technology. It involves people. It involves processes.” Even the best system fails if the people using it don't understand it. Inclusion, awareness, and training must be baked into every GovTech rollout. — Nancy Muriithi, Cybersecurity Consultant & Lead,

“Security is beyond technology. It involves people. It involves processes.”
Even the best system fails if the people using it don't understand it. Inclusion, awareness, and training must be baked into every GovTech rollout.
— Nancy Muriithi, Cybersecurity Consultant &amp; Lead,