SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Abhinav Biswas

Abhinav Biswas

39 Followers
10 SlideShares 1 Clipboard 39 Followers 214 Followings
  • Unblock User Block User
10 SlideShares 1 Clipboard 39 Followers 214 Followings

Personal Information
Organization / Workplace
Hyderabad Area, India India
Occupation
Alt. CISO at Electronics Corporation of India Ltd, ECIL
Website
http://abhinav-biswas.appspot.com
About
A technology evangelist with wide range of agile experience, starting from the days of embedded systems, moving to web & object-oriented development, followed by cyber security and then to the latest trend of cloud computing & machine learning. Currently, holding the role of Alt. CISO for Electronics Corporation of India limited (ECIL), a Public Sector Enterprise under Department of Atomic Energy (DAE), Government of India. He is accountable & responsible for security strategy planning, policy implementation, management of risks & threats, independent compliance reviews and implementation of new security products & technologies. Achievement Summary: - Spearheaded the implementation of N...
Contact Details
Tags
internet iot security tor docker privacy anonymity virtualization security apt threats cyber security and smart devices cryptography enterprise computer networks security & privacy threats in iot smart internet of things research deception honeypots private onion decoys hidden services tor cloud computing internet of things data center siem cloud dlp sandboxing cyber security networking networks rdx explosive detectors ims tnt augmented reality vtr virtual trial room
See more
Presentations (10)
See all
Virtual Trial Room - Abhinav Biswas
7 years ago • 1941 Views
Ion Mobility Spectrometry (IMS) based Explosive Detector
7 years ago • 1799 Views
Insights Into Modern Day Threat Protection
7 years ago • 1186 Views
Modern Cyber Threat Protection techniques for Enterprises
7 years ago • 1439 Views
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
6 years ago • 1702 Views
Dark - Side of Internet of Things (IOT)
6 years ago • 1353 Views
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & Anonymity Challenges
6 years ago • 739 Views
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
5 years ago • 1420 Views
Demystifying the Dark-Side of Internet of Things (IOT): A Journey through Security & Privacy Challenges
4 years ago • 661 Views
Internet of 'Hidden' Things: How to Build a Confidential IOT Network using TOR & Docker Containers
4 years ago • 1781 Views
Likes (7)
See all
CISSP INFORGRAPH MINDMAP
Deepak Kumar (D3) • 5 years ago
Fun & profit with bug bounties
n|u - The Open Security Community • 8 years ago
Catch-me if you can - TOR tricks for bots, shells and general hacking
Jan Seidl • 8 years ago
Emerging Career Opportunities in Cyber Security: The Bright Future Ahead
techievicky • 6 years ago
About Null open security community
Mohammed A. Imran • 10 years ago
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd • 6 years ago
Modern Cyber Threat Protection techniques for Enterprises
Abhinav Biswas • 7 years ago
  • Activity
  • About

Presentations (10)
See all
Virtual Trial Room - Abhinav Biswas
7 years ago • 1941 Views
Ion Mobility Spectrometry (IMS) based Explosive Detector
7 years ago • 1799 Views
Insights Into Modern Day Threat Protection
7 years ago • 1186 Views
Modern Cyber Threat Protection techniques for Enterprises
7 years ago • 1439 Views
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
6 years ago • 1702 Views
Dark - Side of Internet of Things (IOT)
6 years ago • 1353 Views
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & Anonymity Challenges
6 years ago • 739 Views
Are TOR Hidden Services really hidden? Demystifying HS Directory surveillance by injecting Decoys inside TOR!
5 years ago • 1420 Views
Demystifying the Dark-Side of Internet of Things (IOT): A Journey through Security & Privacy Challenges
4 years ago • 661 Views
Internet of 'Hidden' Things: How to Build a Confidential IOT Network using TOR & Docker Containers
4 years ago • 1781 Views
Likes (7)
See all
CISSP INFORGRAPH MINDMAP
Deepak Kumar (D3) • 5 years ago
Fun & profit with bug bounties
n|u - The Open Security Community • 8 years ago
Catch-me if you can - TOR tricks for bots, shells and general hacking
Jan Seidl • 8 years ago
Emerging Career Opportunities in Cyber Security: The Bright Future Ahead
techievicky • 6 years ago
About Null open security community
Mohammed A. Imran • 10 years ago
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd • 6 years ago
Modern Cyber Threat Protection techniques for Enterprises
Abhinav Biswas • 7 years ago
Personal Information
Organization / Workplace
Hyderabad Area, India India
Occupation
Alt. CISO at Electronics Corporation of India Ltd, ECIL
Website
http://abhinav-biswas.appspot.com
About
A technology evangelist with wide range of agile experience, starting from the days of embedded systems, moving to web & object-oriented development, followed by cyber security and then to the latest trend of cloud computing & machine learning. Currently, holding the role of Alt. CISO for Electronics Corporation of India limited (ECIL), a Public Sector Enterprise under Department of Atomic Energy (DAE), Government of India. He is accountable & responsible for security strategy planning, policy implementation, management of risks & threats, independent compliance reviews and implementation of new security products & technologies. Achievement Summary: - Spearheaded the implementation of N...
Contact Details
Tags
internet iot security tor docker privacy anonymity virtualization security apt threats cyber security and smart devices cryptography enterprise computer networks security & privacy threats in iot smart internet of things research deception honeypots private onion decoys hidden services tor cloud computing internet of things data center siem cloud dlp sandboxing cyber security networking networks rdx explosive detectors ims tnt augmented reality vtr virtual trial room
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.