Personal Information
Organization / Workplace
Bengaluru Area, India India
Occupation
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Website
www.cisoplatform.com
About
Very passionate about Entrepreneurship,Painting and knowing the unknown.
Key Skills:
Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing
Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Tags
cyber security
information security
ciso platform annual summit
information technology
ciso
defcon
security
sacon
cisoplatform
hacking and attack techniques
cisco
information
emerging areas
technology
architecture
cloud security
mobile security
.
incident response + soc
hacking
privacy
security awareness and human element
software/application security and devops
ai
framework
hardware security
data
threat intelligence
chief information security officer
security architecture
grc
infosec
network
threat hunting
vulnerabilities & exploits
workshop
3rdpartyrisk
cio
malware
application security
data protection
zero trust
iot
iot security
incident response
informationsecurity
firecompass
gen ai
mac/ios security
challenges
cisoplatform summit and sacon
aws
soc
regulations
wireless attack
artificial intelligence
api
gdpr
kubernetes
cloud
webinar
deception technologies
deception in security
internet of things
risk
owasp
security trends
forensic
android security
docker
learning
ml
mitigations
ci
threat
case study
threat protection
infrastructure
management
python
personal
devops
supply chain
mapping project
program
machine learning
threat modelling
crypto
yara rules
blockchain
data security
protocol
windows loader
network security
reverse engineering
big data
deception
red team
blue team
appsec
breach
cpas
vendorrisk
shadowit
informationtechnology
hardware attacks
shadow it
saas
dpdp
informatica
securing ai
cyber
devsecops
ransomware
smart city attacks
drones
anti-drone systems
nano drones
genesis scripting engine
scripting engine
reverseengineering
privilege pitfalls
samsung gear smart watch
smart watch vulnerabilities
security in medical
security in pharma
soviet russia smartcard
cnap
hacking the brain
pwn an sdn controller
identity threats
bypassing port-security
macsec
connected vehicle security issues
industrial iot
industrial iot security standards & frameworks
securityprogram
mfa
darkweb
windows security
windows defender antivirus
windows reverse engineering
tls
secure communication
browser security
device compromise
third party supply chain
automatic yara rules generation
application
replay attacks on ethereum smart contracts
hardware backdoors in x86 cpus
x86 cpus
ble devices security
cwp
google play store
zta
tracking malware developers
matlab
rce on pie binaries
man-in-the-disk
tineola
macos firewalls
jailbreaking the 3ds
wifi mitm
wifi mana
cellular networks
authentication security
end-to-end secure communication
weaponizing unicode
homographs beyond idns
hacking plcs
hacking ble bicycle locks
api security
multi-container applications
backdooring
smart city security
802.1x-2010
authentication
wingos
extreme networks
exploiting vulnerabilities
mobile point of sales systems
ssrf
ransparent session hijacking
edge side include injection
compromising online accounts
cracking voicemail systems
barcode security
barcode scanners
uefi exploitation
firmware security
embedded devices
vpn networks
compression oracle attacks
game hackers
instrumenting android emulators
network identification
device identification
csirt
incidentresponse
usb
techniques
sap
erp
alexanderpolyakov
sase
computer security
enterprise security
fire compass
iam
neural network
genai
cybersecurity
security decision
identity
compliance
governance
ai in cybersecurity
2013
ai code generation
iit
prof. indranil sengupta
ai risk
professional
branding
top100ciso
chatgpt
edr
def
open source security
infosec media
innovation
ai worksflows
operating system
defense
coordinated disclosure
internetofthings
eu data protection framework
nist cyber security framework
advance soc
soc architecture
api governance
data resilience
threat detection
security challenges
ciso priorities
new threats
forensics
kill chain
mfa bypass
head it
injecting security into web apps with runtime patc
technical architecture of rasp technology
application threat modelling
it managers
cybersecurity portfolio
cybersecurity portfolio management
google’s beyondcorp approach to security
automotive security
risk quantification
(source: rsa usa 2016-san francisco)
bfsi
exhibitor taxonomy
bank security
deepfake
vectors
security incidents
web3
attacks
risk management
healthcare
lessons
log4j
new age threats
evolution
change management
internet
zachman framework
sabsa
ciso platform security maturity model
siem
pcr
vlan
blitz
waf
redash
pam
building
program data
processing
ecosystem
data usage
data collection
data destruction
structure
law
cycle
landscape
protection
enumeration
mitre attack
financial
india
global
machine
lifecycle
oss
tech
dat mapping
wireless
operations
control
systems
industrial
enterprise
open source
intelligence
workflow
automation
processor
discovery
data inventory
sme
ioc
future
work
scalability
generation process
hypothesis
security control
organization
hunting
economy
market
drives
transformation
government
steganography
developing
digital
monetization
api architecture
digital transormation
world
dwell time
data privacy
policy
industry
transportation
transport
iso 27701
iso
dp regulation
privacy principles
international standards
certification
pims
standard
hackathon
mobile apps
website
database
ttp
sol
personal data
life
ios 11 sandbox
qualcomm basebands
active directory administrator insecurities
what the fax
macos kernel graphics driver
exploit of nxp socs vulnerability
ms17-010
eternal exploits
types of ethical hacking
cloud pentest
ethical hacking steps
azure
gcp
ethical hacking
wapt
web hacking
security vulnerabilities
sim architecture
cyber range
hidden internet
surface web
non human
breaking signatures
vendor supply chain
breaking smart speakers
third party
embedded supply chain
attacking apple kernel drivers
digital leviathan
nation-state big brothers
lost and found certificates
residual certificates
pre-owned domains
deserialization gadget chains
phy layer vulnerabilities
rf fuzzing tools
criminal justice system
reaping and breaking keys
security governance
breaking parser logic
malware analysis
automated disassembly
architecture setup
covid19
kids cyber safety
savetheworld
chennaichapter
international
destress
source
windows
system
trust
networks
vendor
offense
5g
surf
practical exploitation of iot networks and ecosyst
(sacon 2020) adventures in sdn security
share
dev
change
empowerment
radio signals
mobile network
bec
breachdisclosure
containersecurity
bestofsecurity
bos
paas
murraygoldschmidt
cyber terrorism
thirdparty
risk mitigation strategies with better context.
checklist
thirdpartyrisk
vendorriskmanagement
vendorriskassessment
nasa
databreach
next generation threat
digitalfootprint
osint
payments
See more
Presentations
(641)Documents
(11)Personal Information
Organization / Workplace
Bengaluru Area, India India
Occupation
Founder @ CISOPlatform,Worlds only exclusive social network for Senior Information Security Executives
Website
www.cisoplatform.com
About
Very passionate about Entrepreneurship,Painting and knowing the unknown.
Key Skills:
Business development,Brand development,Competitive Market Analysis,Strategy and Execution,Digital Marketing, Social Media Marketing
Strategic Consulting- including business plan & sales strategy, Aggressive development for the entire business from scratch
Tags
cyber security
information security
ciso platform annual summit
information technology
ciso
defcon
security
sacon
cisoplatform
hacking and attack techniques
cisco
information
emerging areas
technology
architecture
cloud security
mobile security
.
incident response + soc
hacking
privacy
security awareness and human element
software/application security and devops
ai
framework
hardware security
data
threat intelligence
chief information security officer
security architecture
grc
infosec
network
threat hunting
vulnerabilities & exploits
workshop
3rdpartyrisk
cio
malware
application security
data protection
zero trust
iot
iot security
incident response
informationsecurity
firecompass
gen ai
mac/ios security
challenges
cisoplatform summit and sacon
aws
soc
regulations
wireless attack
artificial intelligence
api
gdpr
kubernetes
cloud
webinar
deception technologies
deception in security
internet of things
risk
owasp
security trends
forensic
android security
docker
learning
ml
mitigations
ci
threat
case study
threat protection
infrastructure
management
python
personal
devops
supply chain
mapping project
program
machine learning
threat modelling
crypto
yara rules
blockchain
data security
protocol
windows loader
network security
reverse engineering
big data
deception
red team
blue team
appsec
breach
cpas
vendorrisk
shadowit
informationtechnology
hardware attacks
shadow it
saas
dpdp
informatica
securing ai
cyber
devsecops
ransomware
smart city attacks
drones
anti-drone systems
nano drones
genesis scripting engine
scripting engine
reverseengineering
privilege pitfalls
samsung gear smart watch
smart watch vulnerabilities
security in medical
security in pharma
soviet russia smartcard
cnap
hacking the brain
pwn an sdn controller
identity threats
bypassing port-security
macsec
connected vehicle security issues
industrial iot
industrial iot security standards & frameworks
securityprogram
mfa
darkweb
windows security
windows defender antivirus
windows reverse engineering
tls
secure communication
browser security
device compromise
third party supply chain
automatic yara rules generation
application
replay attacks on ethereum smart contracts
hardware backdoors in x86 cpus
x86 cpus
ble devices security
cwp
google play store
zta
tracking malware developers
matlab
rce on pie binaries
man-in-the-disk
tineola
macos firewalls
jailbreaking the 3ds
wifi mitm
wifi mana
cellular networks
authentication security
end-to-end secure communication
weaponizing unicode
homographs beyond idns
hacking plcs
hacking ble bicycle locks
api security
multi-container applications
backdooring
smart city security
802.1x-2010
authentication
wingos
extreme networks
exploiting vulnerabilities
mobile point of sales systems
ssrf
ransparent session hijacking
edge side include injection
compromising online accounts
cracking voicemail systems
barcode security
barcode scanners
uefi exploitation
firmware security
embedded devices
vpn networks
compression oracle attacks
game hackers
instrumenting android emulators
network identification
device identification
csirt
incidentresponse
usb
techniques
sap
erp
alexanderpolyakov
sase
computer security
enterprise security
fire compass
iam
neural network
genai
cybersecurity
security decision
identity
compliance
governance
ai in cybersecurity
2013
ai code generation
iit
prof. indranil sengupta
ai risk
professional
branding
top100ciso
chatgpt
edr
def
open source security
infosec media
innovation
ai worksflows
operating system
defense
coordinated disclosure
internetofthings
eu data protection framework
nist cyber security framework
advance soc
soc architecture
api governance
data resilience
threat detection
security challenges
ciso priorities
new threats
forensics
kill chain
mfa bypass
head it
injecting security into web apps with runtime patc
technical architecture of rasp technology
application threat modelling
it managers
cybersecurity portfolio
cybersecurity portfolio management
google’s beyondcorp approach to security
automotive security
risk quantification
(source: rsa usa 2016-san francisco)
bfsi
exhibitor taxonomy
bank security
deepfake
vectors
security incidents
web3
attacks
risk management
healthcare
lessons
log4j
new age threats
evolution
change management
internet
zachman framework
sabsa
ciso platform security maturity model
siem
pcr
vlan
blitz
waf
redash
pam
building
program data
processing
ecosystem
data usage
data collection
data destruction
structure
law
cycle
landscape
protection
enumeration
mitre attack
financial
india
global
machine
lifecycle
oss
tech
dat mapping
wireless
operations
control
systems
industrial
enterprise
open source
intelligence
workflow
automation
processor
discovery
data inventory
sme
ioc
future
work
scalability
generation process
hypothesis
security control
organization
hunting
economy
market
drives
transformation
government
steganography
developing
digital
monetization
api architecture
digital transormation
world
dwell time
data privacy
policy
industry
transportation
transport
iso 27701
iso
dp regulation
privacy principles
international standards
certification
pims
standard
hackathon
mobile apps
website
database
ttp
sol
personal data
life
ios 11 sandbox
qualcomm basebands
active directory administrator insecurities
what the fax
macos kernel graphics driver
exploit of nxp socs vulnerability
ms17-010
eternal exploits
types of ethical hacking
cloud pentest
ethical hacking steps
azure
gcp
ethical hacking
wapt
web hacking
security vulnerabilities
sim architecture
cyber range
hidden internet
surface web
non human
breaking signatures
vendor supply chain
breaking smart speakers
third party
embedded supply chain
attacking apple kernel drivers
digital leviathan
nation-state big brothers
lost and found certificates
residual certificates
pre-owned domains
deserialization gadget chains
phy layer vulnerabilities
rf fuzzing tools
criminal justice system
reaping and breaking keys
security governance
breaking parser logic
malware analysis
automated disassembly
architecture setup
covid19
kids cyber safety
savetheworld
chennaichapter
international
destress
source
windows
system
trust
networks
vendor
offense
5g
surf
practical exploitation of iot networks and ecosyst
(sacon 2020) adventures in sdn security
share
dev
change
empowerment
radio signals
mobile network
bec
breachdisclosure
containersecurity
bestofsecurity
bos
paas
murraygoldschmidt
cyber terrorism
thirdparty
risk mitigation strategies with better context.
checklist
thirdpartyrisk
vendorriskmanagement
vendorriskassessment
nasa
databreach
next generation threat
digitalfootprint
osint
payments
See more