Security built on honesty.
A solo practice founded on a simple conviction: the best security advice comes from someone who has actually done the work — not managed the people who did.
Make organisations genuinely harder to attack.
Too many security programs are designed around demonstrating activity, not reducing exposure. TrustIn focuses exclusively on outcomes: fewer vulnerabilities, faster detection, and faster response.
Founded by Anas SAHEL, a practitioner with background in offensive security, identity governance, and enterprise risk management — with hands-on experience on both sides of the attack.
Practitioner-First
Senior expertise on every engagement. No bait-and-switch with junior teams.
Outcome-Oriented
We measure success by risk reduction, not report page counts.
Long-Term Thinking
We build programs, not one-off projects. Security matures over time.
What we stand for.
Intellectual Honesty
We tell clients what we find, including when the answer is uncomfortable. No sugar-coating, no upselling risks that don't exist.
Build, Don't Just Audit
Findings without remediation support are just paper. We stay with clients to fix what we find.
Bias Toward Action
A perfect plan executed late is worse than a good plan executed now. We move fast on what matters.
Attacker Mindset
We think like adversaries, test like adversaries, and train defenders to anticipate adversaries.
Client Partnership
We act as an extension of your team, not a vendor dropping off a PDF and moving on.
Transparent Communication
Plain-language reporting. Business-level summaries. No jargon hiding behind complexity.
Specific expertise. Not generic claims.
SailPoint ISC Expert
Identity governance delivery on SailPoint Identity Security Cloud — implementation, configuration, and lifecycle management.
ISO 27001 Lead Implementer
Framework-aligned security program design and gap assessments against ISO 27001, CIS Controls, and NIST CSF.
Anas SAHEL
Senior Cybersecurity Consultant
Anas built TrustIn around a simple conviction: organisations deserve security advice from someone who has actually done the work — not managed the people who did. With a background in offensive security, identity governance, and enterprise risk management, he leads every engagement directly, with no handoff to junior teams.
View LinkedIn profile →Assess. Design. Implement. Monitor.
Every engagement starts with understanding your actual risk. Then we design controls, implement them with your team, and monitor effectiveness — closing the loop on security improvement.