Cyber-Physical Systems Security & Critical Infrastructure Risk Analytics Expert
Protecting critical infrastructure by transforming cybersecurity into operational, safety, and financial risk intelligence.
ABOUT ME
Securing cyber-physical environments
With over a decade of experience across power generation, oil and gas, industrial systems, and telecommunications, I specialize in securing cyber-physical environments where digital failures translate into real-world disruption. My work integrates cybersecurity, data analytics, compliance, and operational technology to reduce risk, strengthen resilience, and protect systems essential to national and economic security.
Creator of CPRA-X™ — Cyber-Physical Risk Analytics for Critical Infrastructure Resilience
cybersecurity and data analytics professional
I am an accomplished cybersecurity and data analytics professional with more than ten years of experience designing and implementing security solutions for high-stakes, mission-critical environments.
My career has focused on protecting critical infrastructure systems - including power generation, oil and gas logistics, industrial control systems, and large-scale enterprise platforms where cybersecurity failures can result in operational outages, safety incidents, regulatory exposure, and financial loss.
Master of Science in Management Information Systems
And a bachelor’s degree in computer science, complemented by multiple professional certifications in cybersecurity, forensics, cloud technologies, and data analytics. Across my roles, I have consistently delivered measurable outcomes, including significant reductions in vulnerabilities, attack surface, detection timelines, and cyber-enabled operational risk.
My professional philosophy is simple:
Cybersecurity is only effective when it prevents real-world harm.
This philosophy culminated in the development of my original framework, CPRA-X™.
CAREER LANDMARK CONTRIBUTION
CPRA-X™
— Cyber-Physical Risk Analytics for Critical Infrastructure Resilience
CPRA-X™ is my original cybersecurity framework designed to address a fundamental gap in modern security programs: the inability to connect cyber risk to physical operations, safety outcomes, regulatory exposure, and financial impact.
Traditional cybersecurity approaches focus on alerts, vulnerabilities, or compliance checklists. CPRA-X™ goes further by translating cyber threats into decision-grade intelligence that leaders can act on.
What CPRA-X™ Solves
- Disconnected IT, OT, and supply-chain risk assessments
- Compliance initiatives that do not improve real-world resilience
- Lack of quantified cyber impact on uptime, safety, and revenue
- Reactive incident response instead of predictive prevention
The CPRA-X™ Framework Pillars
- Context: Mapping digital systems to physical operations and dependencies
- Fuse: Integrating vulnerability, threat, and supply-chain intelligence
- Quantify: Measuring operational, regulatory, and financial cyber risk
- Predict: Modeling scenarios and cascading cyber-physical failures
- Decide: Delivering executive-ready risk intelligence and action plans
Impact
Principles behind CPRA-X™ have contributed to:
- Up to 60% reduction in vulnerability detection and remediation timelines
- Up to 60% reduction in vulnerability detection and remediation timelines
- 70% improvement in software supply-chain transparency through SBOM integration
- Significant improvements in threat detection, response time, and cyber resilience
CPRA-X™ represents my most significant professional contribution and serves as the foundation of my work in critical infrastructure cybersecurity.
Professional Experience
Product Cybersecurity Engineer — Cummins Inc.
I currently support cybersecurity initiatives for power generation and industrial systems, applying Department of Defense STIGs, IEC 62443 standards, and advanced vulnerability management practices.
My work has resulted in measurable improvements in compliance scores, vulnerability reduction, OT attack-surface reduction, threat detection capability, and supply-chain security through SBOM integration. I also contribute to threat modeling, penetration testing support, endpoint detection deployment, and organization-wide security awareness programs.
Cybersecurity Analyst– Attack Surface Management
In this role, I applied advanced data analytics, SIEM platforms, and cloud visibility tools to reduce enterprise attack surfaces and strengthen proactive risk management.
I leveraged Python, Power BI, Tableau, and automation platforms to correlate cyber risk with financial outcomes, contributing to reductions in insurance premiums, improved incident response efficiency, and enhanced leadership decision-making through actionable risk reporting.
Lead Information Security Officer — Chevron
I led cybersecurity analytics initiatives supporting oil and gas logistics, transportation systems, and supply-chain operations.
My responsibilities included embedding cybersecurity controls into enterprise platforms, securing transportation and inventory systems, negotiating cyber-focused vendor contracts, and implementing real-time monitoring KPIs. These efforts improved secure delivery timelines, reduced financial exposure, and increased operational resilience across critical energy infrastructure.
Information Security Officer — Chevron
I focused on securing transportation management systems, logistics workflows, and supply-chain platforms supporting high-value energy operations.
Through analytics-driven security controls and compliance alignment, I reduced cyber-exposed inefficiencies, improved monitoring effectiveness, and strengthened data integrity across enterprise systems.
Cybersecurity Associate — Ericsson
I began my career supporting secure telecommunications operations, applying foundational cybersecurity principles to large-scale infrastructure environments.
This role provided hands-on experience with system monitoring, outage analysis, SLA adherence, and cross-functional collaboration in a highly regulated industry.
Research & Publication
Akinola, D., Ajinaja, M. O., & Ogunwale, Y. E. (2025).
Machine learning-based network intrusion detection for IoT and smart detection using recursive feature elimination, binning technique, and Grid Search CV. International Journal of Scientific Research & Engineering Trends, 11(2), 1123–1137. https://ijsret.com/wp-content/uploads/2025/03/IJSRET_V11_issue2_284.pdf
Akinola, D., Oyedemi, A. O., & Ajinaja, M. O. (2024).
A deep learning-based hybrid CNN-LSTM model for human activity recognition. International Journal of Scientific Research in Computer Science and Engineering, 12(6). https://ijsrcse.isroset.org/index.php/j/article/view/605
Media & Public Engagement
US-based Cybersecurity Engineer Damilola Akinola Shares Insights on Nigeria’s Digital Future – The Guardian Nigeria (May 2023)
A featured interview discussing the future of digital transformation in Nigeria and cybersecurity trends.
Leading Cybersecurity Engineer Warns Nigeria of Emerging Threats to National Infrastructure – Vanguard Nigeria (October 2023)
An expert commentary on emerging cybersecurity threats targeting Nigeria’s critical infrastructure.
Certifications & Awards
National Institute of Professional Engineers and Scientists
– Outstanding Contribution to Research & Innovation
Chevron Human Energy Recognition and Award
– Invaluable Contributor
Chevron Human Energy Recognition and Award
– Project Leadership
Professional Membership
National Institute of Professional Engineers and Scientists, Fellow (FNIPES)
Information Systems Audit and Control Association (ISACA)
Information Systems Security Association (ISSA)
National Society of Black Engineers (NSBE)
Core Expertise
Cyber-Physical Systems Security
Critical Infrastructure Protection
Operational Technology (OT) Risk Management
Vulnerability & Attack Surface Management
Supply-Chain & SBOM Security
SIEM, Threat Intelligence & Incident Response
Compliance (IEC 62443, ISO 21434, STIGs, NIST)
Risk Analytics & Executive Cyber Risk Communication
Why My Work Matters
Critical infrastructure systems underpin modern society. When cybersecurity fails in these environments, the consequences extend far beyond data loss to operational disruption, safety hazards, economic damage, and national security risk.
My work focuses
On ensuring cybersecurity programs are measurable, operationally meaningful, and resilient by design—protecting not just systems, but the people and economies that depend on them.
Contact
Get In Touch
If you are responsible for securing critical infrastructure, industrial systems, or cyber-physical environments, I welcome conversations focused on resilience, risk analytics, and strategic security transformation.
- United States
- (240) 571 -6556
- akinoladamilola66@gmail.com
Specialization: Cyber-Physical Risk Analytics & Critical Infrastructure Security

