SlideShare a Scribd company logo
1 of 52
Download to read offline
VOLUME 01 | ISSUE 01 | JANUARY 2024
iTECH
MAGAZINE
CYBER IMMUNITY
THE KEY TO A SAFE
AND SECURE DIGITAL
TRANSFORMATION
THE DIGITAL
ECONOMY:
A NEW FRONTIER
FOR SECURITY
LATEST TRENDS
OF CYBERSECURITY
AND HOW WE CAN
EXPLAIN IT.
CRYPTO AND
TAXES IN 2024:
UPDATES,
CHALLENGES
& SOLUTION
CEO Office, Kaspersky
Genie Sugene Gan
Head of Government Affairs &
Public Policy, APJ & META regions
www.digitalconfex.com
Welcome to the inaugural issue of DIGITALCONFEX’s iTech
Magazine - your go-to source for cutting-edge insights, expert
analysis, and a front-row seat to the ever-evolving landscape
of technology.
Technology knows no boundaries, and neither do we. Our
Magazine strives to connect tech enthusiasts, professionals,
and curious minds from across the globe.
We’re also excited to spotlight trailblazing companies and
individuals who are redefining the landscape of technology.
Their stories are not just inspiring but also offer a blueprint
forsuccess in a constantly evolving industry.
Join us on this exciting journey through the ever-evolving
world of technology. Explore, learn, and engage with iTech
Magazine as we unravel the mysteries and celebrate the
triumphs of innovation.
Warmest regards,
DIGITALCONFEX
CONTENTS
CYBER IMMUNITY THE KEY TO
A SAFE AND SECURE DIGITAL
TRANSFORMATION
INFORMATION TECHNOLOGY
CONFEX 2023
CYBERSECURITY
PRODUCT
MANAGER: RAHUL
ANANTHANARAYANA
REDDIAR
UNLOCKING THE
POWER OF AI:
NAVIGATING THE GEN
AI ERA WITH PHOT.AI
AND BEYOND
LATEST TRENDS OF
CYBERSECURITY
AND HOW WE CAN
EXPLAIN IT.
AHMED YAHYA
AL-KINDI: **A
JOURNEY OF
RESILIENCE AND
INNOVATION**
THE 2023 TECH
RENAISSANCE:
A RECAP AND
PREVIEW OF THE
PROMISE FOR 2024
CRYPTO AND TAXES
IN 2024: UPDATES,
CHALLENGES &
SOLUTION
THE DIGITAL ECONOMY: A NEW
FRONTIER FOR SECURITY
HOW ACCELERATORS CAN HELP
WEB3 START-UPS?
TECH TRENDS RESHAPING THE AUTO
INDUSTRY: TURNING VEHICLES INTO
IMMERSIVE LIVING SPACES
06 24
36
40
44
39
42
48
12
16
18
G
enie heads up the Public
Policy & Government Affairs
business functions across
multiple regions in Kaspersky
(including Asia-Pacific, Japan, Middle
East, Turkey & Africa). Genie comes with
an excellent academic track record; she
holds a Juris Doctor in law, an honors
degree in Accountancy, and a Specialist
Diploma in Counselling Psychology.
Called to the Singapore Bar and a
qualified lawyer, she is also a Mediation
Coach and an International Mediator
amongst other things. Having a rich and
diverse career history, Genie started her
journeys in accountancy and law in Big
Four firms. Early on, she was an award-
winning entrepreneur, before spending
a significant length of time as a senior
official in the Singapore Government,
having assumed several key portfolios
such as Special Aide to the Minister for
Law, Singapore negotiator and delegate
to the United Nations General Assembly,
and Director for policy and law reform.
Outside her professional portfolio, her
passion for teaching, non-profit and
charity work has led her to be an adjunct
lecturer at universities and serve on
various Boards and Committees of Non-
Profit Organizations and volunteer for
pro bono legal causes.
6 -JANUARY 2024
Genie Sugene Gan
Head of Government Affairs &
Public Policy, APJ & META regions
CEO Office, Kaspersky
-JANUARY 2024 7
8 -JANUARY 2024
Digital transformation has brought about tremendous
opportunities for economic and industrial growth. The
Internet of Things (IoT), in particular, has allowed
businesses to build end-to-end digital services, and
improved their ability to analyze data and monitor
device operation and condition. Ops-Tech (OT)
platforms, which started as part of process controls for
manufacturing equipment, are now ubiquitous.
However, these developments have also created a
complex environment consisting of a large number of
disparate digital elements, which introduces more
points of vulnerability that cybercriminals can
potentially attack. A new paradigm is needed to ensure
that cybersecurity solutions for this complex
environment remains efficient and secure – Cyber
Immunity is one such vision upon which such solutions
can be built.
Growing Pervasiveness and Complexity of
Threats in IoT and OT Platforms
As the number of devices connected to the IoT grows
exponentially, the installation of protective tools that
need regular updates on each of these devices is a time-
consuming and resource-intensive process. The
problem is compounded by many of these devices not
having the processing capacity for cybersecurity add-
on tools such as antivirus software. One example is the
growing popularity of the cloud kettle, which is part of
the IoT and can be controlled through an app on a
smartphone; not all cloud kettles have the CPU or
memory for solutions against cyberattacks, but this
does not mean that they will not be targeted in attacks.
This is a problem that did not exist during the eras of
mere whistling or electric kettles.
A recent finding by Kaspersky’s researchers
illustrates just how pervasive IoT threats have become,
as well as the fact that they could be targeted at
seemingly innocuous devices. Researchers found that a
popular model of smart pet-feeder, which dispenses
pet food at regular intervals and has cameras to check
on the pet, could be easily hacked to allow an attacker
to gain unauthorized access to the device and effectively
use the pet feeder as a spy camera. There are also risks
of a chain reaction type of attack, as once an attacker
gains control of a pet feeder in the home network, it can
be used as a hub to launch more attacks against other
devices in the network.
Where OT platforms are concerned, the disparate
network of robots, industrial control systems (ICS),
supervisory control and data acquisition (SCADA)
CYBER IMMUNITY
The key to a safe and secure digital transformation
By Genie Sugene Gan, Head of Government Affairs & Public Policy APAC & META at Kaspersky
systems, programmable logic controllers (PLCs), and
computer numerical control (CNC) also offers
opportunities for professional targeted attacks. Just
between 2017 and 2021, the number of observed
Advance Persistent Threats (APTs) and activity clusters
grew from 100+ to 900+. Based on Kaspersky’s
research, more than 40% of all ICS computers
globally were attacked in 2022. Considering the vast
amountsofdatacreatedandprocessedbyOTplatforms,
there is an urgent need to find efficient yet customized
cybersecurity solutions that can be scaled up quickly.
The Vision of Cyber Immunity and
Kaspersky’s Operating System
Even with evolving technologies, the cybersecurity
industry often finds itself merely playing catch-up with
the attackers. This is especially so when traditional
cybersecurity solutions adopt an approach of detecting
andreacting.Kasperskythusembarkedonanambitious
effort to change things, by finding a way to develop IT
systemswith“innate”protection—CyberImmunity.
The vision of Cyber Immunity posits that by separating
the IT system into isolated parts and controlling the
interactions between them, the system continues to
perform critical functions even in an aggressive
environment and stops potential attackers in their
tracks. The goal is to ensure that the cost of an attack
on an organization far exceeds the cost of possible
damage, thus rendering an attack ineffective.
To operationalize the vision of Cyber Immunity,
Kaspersky developed its own operating system –
KasperskyOS – which comprises a microkernel and
the Kaspersky Security System (KSS) module, which
come together to provide protection by default.
Figure 1: Cyber Immunity as the Design Principle for KasperskyOS
The term microkernel implies that only the most
critical system operation mechanisms are located in
the kernel, while less important functions are ordinary
applications – located outside the kernel. This makes it
much easier to ensure that the kernel code is free of
errors and vulnerabilities, and that the attack surface is
minimal. This works hand in hand with the KSS
module, which checks each interaction for compliance
with security policies, and blocks any interaction that is
non-compliant – this ensures that even if a component
is compromised, KSS can eliminate or minimize any
possible damage.
Compared to the traditional monolithic kernel of a
general-purpose system, which requires 35 million
lines of code in Linux, the KasperskyOS microkernel
only requires approximately 100,000 lines of code to
develop. This drastically lowers the barrier for
developers to create Cyber Immune solutions using
KasperskyOS, and reduces the cost of developing and
supporting secure IT solutions, even if untrusted third-
party code is used. Notably, the microkernel
architecture of KasperskyOS also enables Provable
Security (based on mathe matical proofs), and
minimizes the Trusted Code Base required. While it is
possible to use Provable Security on other operating
systems, this will take considerably more effort.
Actual Applications of Cyber Immune
Solutions
Cyber Immunity is not just a vision or theory –
Kaspersky has successfully developed real world
applications for use in Industrial IoT Infrastructure
Security, Smart City Protection, and Safe Smart Cars,
among others, through a combination of KasperskyOS
and hardware developed in collaboration with partners
such as Siemens as well as Kaspersky’s subsidiary,
Adaptive Production Technology (Aprotech).
Industrial IoT Infrastructure Security
Industrial IoT infrastructure consists of many
components at various levels. One component to which
all devices in any IoT system connect is the gateway –
through which information is transferred to data
centers for further processing and storage. Kaspersky
IoT Secure Gateway (KISG), powered by KasperskyOS,
is installed on the boundary between IoT infrastructure
and external data networks to protect this crucial
interface. The gateway blocks attacks on smart ICS,
equipment and information-sharing channels by
identifying unauthorized network connections, and
providing secure updates and configuration of software,
and transfers control instructions to actuators.
Convenient centralized configuration and management
of the events of Kaspersky IoT Secure Gateway are
provided by Kaspersky Security Center, which enables
an administrator to monitor the status of gateways
from a single point and respond quickly to incidents.
Figure 2: KasperskyOS Components Interaction Scheme
Figure 3: Size of KasperskyOS microkernel code compared to
the monolithic kernel of a general-purpose system
Figure 4: Gateway functions in an industrial network
-JANUARY 2024 9
10 -JANUARY 2024
Smart City Protection
Large cities face the challenge of managing public
utilitiesforthousandsofresidentialandnon-residential
premises efficiently. This often requires automated
data, but collection of such data has to be secured.
Kaspersky, with support from the Orenburg regional
government, successfully built a cloud control room for
managing smart digital systems in the municipal
sphere, using several solutions for protection at
different levels. The cloud level is protected by
Kaspersky Hybrid Cloud Security, which
controls applications and devices, segments networks,
and prevents the use of unpatched vulnerabilities. The
data transfer channel from the controller (PLC) to the
cloud is protected by KISG 1000, which detects and
classifies all devices on the network, and has firewall
functions and blocks attacks on CCTV cameras, motion
and door sensors, and other local devices and data
links. This is in turn managed by the Kaspersky Security
Center platform. The cloud control room has thus made
it possible to monitor the actual consumption of
resources in real time, get notifications of accidents,
gain better control over the deterioration of utilities,
and increase transparency in public utilities
management – while ensuring the safekeeping of
automated data.
Safe Smart Cars
A modern motor vehicle can have more than 100
electronic control units (ECUs). They optimize fuel
consumption, inform the driver of road conditions,
entertain passengers, control braking, and perform
other important functions. The software for these
control units is becoming more and more sophisticated,
and can exceed 100 million lines of code (more than in
a modern operating system) and creates possibilities
for vulnerabilities. Kaspersky Automotive Secure
Gateway (KASG) is specialized software designed to
provide secure and reliable communication between
electronic units of the electrical/electronic architecture,
the connected vehicle cloud, and diagnostic devices.
This software can be used to implement remote
diagnostics, secure over-the-air ECU updates, and
other telematic services. KASG includes the Kaspersky
Automotive Adaptive Platform (KAAP), powered by
KasperskyOS, which is a software development kit that
supports secure solutions for ECUs, including
Figure 5: Solutions used for smart city protection in Orenberg
telecommunications units (TCU/V2X, gateways),
driver assistance systems, self-driving cars (HAD/
ADAS) and other components of the smart vehicle
digital cockpit. KasperskyOS ensures component
isolation and control over interprocess communication,
which prevents separated systems from affecting one
another, thus enabling the highest level of solution
reliability and security in smart cars.
There are many more applications of Cyber Immunity,
such as in Virtual Desktop Infrastructure and in
railway protection. Cyber Immunity has also
received much recognition, with KasperskyOS-based
products having won awards at the World Internet
Conference in China in both 2020 and 2022. In the
future, we hope to see even more uses of Cyber
Immunity for the vision to take root and become
established.
Hopes for the Future of Cyber Immunity
and Potential Partnerships
The vision of Cyber Immunity was designed to be
collaborative. Kaspersky alone does not have all the
solutions to bring it to fruition, and KasperskyOS was
designed for scalability and participation from like-
minded partners. Kaspersky seeks partners to join us
in building a Cyber Immune world. These could be
education and research institutions, which could
receive content on the basics of Cyber Immunity, and
which could potentially co-develop Cyber Immune
products with us. We are also keen to work with partner
resellers and system integrators, who can integrate
Cyber Immunity into both new and existing products.
Finally, our KasperskyOS-based products Kaspersky
Thin Client and KISG are ready to be applied in more
use cases. We hope to further the vision of Cyber
Immunity and see scalable solutions for KasperskyOS
that will underpin the infinite possibilities for digital
transformation.
Figure 6: Solutions used for safe smart cars
MEETS
CRAFTMANSHIP
CLOUD
Unleashing the Power of Cloud, Security, and
Cutting-Edge Development with an ESG
Advantage.
email at:
gurpeet@diggfull.com
Visit Our Website
www.diggfull.com
At DiggFull, we navigate the complexities of
technology with a commitment to ESG
principles. Our cloud services not only
ensure scalability, security and efficiency but
also prioritize sustainability, ethical
practices, and responsible governance. Dive
into a world where cloud solutions are
boundless, development is driven by passion,
and security is unwavering. With DiggFull,
you're not just embracing technology; you're
championing a sustainable and ethical
digital future
12 -JANUARY 2024
WING COMMANDER
ANURAG CHANDRA
MILITARY TRANSITION
Chief Information Security Officer
COMMISSIONED OFFICER OF TECHNICAL BRANCH IN INDIAN AIR
FORCE WITH A RICH AND DIVERSE EXPERIENCE IN STEERING THE
INFORMATION TECHNOLOGY EDGE.
Experienced Technology Executive Skilled In Cyber Security, It Project
Management, Vendor & Public Relations. Proficient In Procurement
Analytics And Strategic Growth. Worked As Chief Technology Program
Manager For Data Analytics, Ai, & Innovation. Passionate About
Leveraging Cutting-Edge Tech For Positive Impact.
-JANUARY 2024 13
THE DIGITAL ECONOMY:
A NEW FRONTIER FOR SECURITY
T
he digital economy has revolutionised the way
we live, work, and interact with each other. It
has brought about unprecedented opportunities
for innovation, growth, and prosperity.
However, with these opportunities come new challenges
and risks. The digital economy is under constant threat
from cybercriminals, hackers, and other malicious actors
who seek to exploit vulnerabilities in our digital
infrastructure. The need for digital security has never
been more urgent. In this article, its an endeavour to
bring out the importance of digital security in today’s
economy and why it is essential to safeguard our digital
assets. Lets try to investigate also, latest trends,
technologies, and best practices in digital security and
provide actionable insights that can help us secure our
digital future. Let try discovering as to how we can
protect the digital economy and ensure a safe and secure
digital transformation for all.
India has seen a significant boom in the digital economy
in recent years. The Digital India initiative has played a
key role in this growth. The initiative aims to provide
digital infrastructure to every citizen of India and has
been successful in increasing the number of internet
users in the country. The digital platform infrastructure
has enabled businesses to reach a wider audience and
has created new opportunities for entrepreneurs.
Digital Public Infrastructure (DPI). According to
Nandan Nilekani, an Indian entrepreneur, cofounder
Infosys. India is moving from an offline, informal, low
productivity, multiple set of micro-economies to a single
online, formal, high-productivity mega economy with
the help of Digital Public Infrastructure (DPI). The DPI
approach includes frameworks such as the Open
Network for Digital Commerce (ONDC), Open Credit
Enablement Network (OCEN), and the National Digital
Education Architecture (NDEAR), which are unlocking
new opportunities for businesses and individuals alike.
Nilekani believes that this transformation will continue
over the next 20 years and will create tremendous
economic value and empowerment of citizens as new
digital applications permeate sector after sector.
As per the Indian 2011 census, there is only 36 %chance
that two Indians selected at random could even talk to
each other. As we as Indians have a huge variations in
culture, markets, industrialisation and regulations. But
today in the year 2024 we have most closely micro
economies, electronic registering and digital IDs through
Aadhaar, a unique lifetime identity. In these eight years
of period India became the worlds highest volume of
digital payments.
India’s digital economy has grown 2.4 times faster than
the Indian economy, with strong forward linkages to
non-digital sectors. India’s digital consumer base is the
second largest in the world and growing at the second-
fastest rate amongst major economies. India’s inclusive
digital model is narrowing the digital divide within the
country and bringing benefits of Anurag Chandra Cyber
Enthusiast Digital Economy Security technology to all
segments of people.In times of crisis, DPIs elevate from
an efficient “good-tohave” to a necessary” must-have”
like bringing in the real time observability to vaccine
inventory visibility.
DPIs help strengthen a country’s public finances
through strengthening tax revenue or increased
financial transparency through linking of Public
Financial Management System (PFMS) with Aadhaar.
But then what are the challenges even if I can be
enabling targeted-welfare spends through Aadhaar-
like identity program or reduced risk and increase in
the supply of credit to MSMEs and the public. Countries
with many DPIS are best suited to adopt, spread as well
as regulate the use of Artificial Intelligence (AI)
technologies in service of their people.
As the digital realm continues to evolve, and with the
sharing DPIs, this can be unleashed as powerful
DIGITAL capital. In such scenarios, India’s cyber
insurance market has emerged as a domain of strategic
importance and robust growth. The significant rise in
cyber awareness, compelling companies, businesses,
and individuals to rely heavily on digital solutions for
daily operations. However, this has also led to increased
incidences of cybercrimes, targeting vulnerable group.
Therefore, certainly! Securing the digital economy is a
crucial aspect of the modern world.
CHALLENGES FOR THE DIGITAL ECONOMY
As per the various surveys, it reveals that securing the
digital economy is a complex and evolving challenge.
According to the World Economic Forum, two key
challenges for the digital economy are cybersecurity
and privacy.
The Asia-Pacific Economic Cooperation (APEC) has
identified the following challenges: cybersecurity, data
privacy,digitalinclusion,anddigitalskillsdevelopment.
In Southeast Asia, the digital economy has brought
about opportunities for innovation and growth, but
also poses challenges such as cybersecurity, data
privacy, and human and physical capital development.
14 -JANUARY 2024
SOURCES.
emerald Insight, government.economictimes.
indiatimes.com, apec.org, weforum.org
With the rise of digital payments in India, there has been
asignificantincreaseinthenumberoffraudsperpetrated
by exploiting digital payment systems and human
vulnerabilities. The Reserve Bank of India (RBI)
reported that the volume of frauds reported by financial
institutions (FIs) using cards and internet banking was
34% higher in 2021-22 than in 2019-20. During 2022-
23, public sector banks reported 3,405 frauds involving
Rs 21,125 crore, while private banks reported 8,932
cases involving Rs 8,727 crore. The rest were from
foreign banks, financial Anurag Chandra Cyber
Enthusiast Digital Economy Security institutions, small
finance banks, and payment banks. Frauds occurred
predominantly in the category of digital payments (card/
internet), in terms of number, said Reserve Bank’s
Annual Report 2022-23.
The dark web is a part of the internet that is not
indexed by search engines and is often used for
illegal activities. The changing nature of fraud and
increase in fraudulent activities can be attributed to the
major factors like :
- Diversified entry points. Businesses in India have
been digitizing across their value chains at breakneck
speeds. This increases the scope of opportunities for
fraudsters and offers them a wider attack surface for
exploitation. The common entry points include social
media, ecommerce, or services like retail transactions,
rideshares and lodging.
- Vulnerabilities in the new payment
technologies. Personal data of customers is made
available on the dark web, enabling fraudsters to carry
out this type of fraud.
In this year, AI would help cybercriminals manipulate
social media and shape public opinion like never before.
Bad actors would deploy AI tools to fabricate photos,
videos, and audios and lodge on social media.
As a CISO, it is important to be aware of the current
cybersecurity landscape in India. According to a survey
conducted by India’s print media, India’s digital
footprinthasmadeitanalluringtargetforcybercriminals
seeking to exploit vulnerabilities. Cybersecurity
providers have warned that data breaches would
skyrocket in 2024, and there would be continued
acceleration in ransomware activities in addition to a
surge in identity-based attacks resulting from increasing
cloud adoption. Deepfakes would also pose a looming
threat to the country’s cybersecurity this year.
As organizations migrate their data, applications, and
workloads to the cloud, the attack surface widens,
providing a broader canvas for threat actors to exploit.
Organisations may also have less visibility and control
over cloud resources than in on-premises environments,
which could make it difficult to detect intrusions and
prevent unauthorized access.
Importance of Digital Security in Today’s
Economy Safeguard Digital Assets. Digital security
is a critical aspect of today’s economy, and it is essential
to safeguard our digital assets. The rise of the digital
economy has brought about unprecedented opportunities
for innovation, growth, and prosperity. However, with
these opportunities come new challenges and risks. The
digital economy is under constant threat from
cybercriminals, hackers, and other malicious actors who
seek to exploit vulnerabilities in our digital infrastructure.
The need for digital security has never been more urgent.
Companies and governments alike must take proactive
measures to Anurag Chandra Cyber Enthusiast Digital
Economy Security secure their digital assets. By
embracing digital security, we can ensure a safe and
secure digital transformation for all, fostering trust in the
digital economy and enabling sustainable economic
growth.
As a CISO, it is important to stay up-to-date with the
latest cybersecurity trends and technologies. This includes
keeping up with the latest threats and vulnerabilities, as
well as understanding the best practices for securing
digital assets. It is also important to have a strong disaster
recovery plan in place in case of a cyber attack.
To secure the digital economy, it is important to have a
robust cybersecurity framework in place. This may need
measures such as encryption, firewalls, intrusion
detection system, and access controls to be mandatorily
be included. It is also important to have a disaster recovery
plan in place in case of a cyber attack. By taking few of the
industry proven steps, businesses can ensure that they
are well-protected in the digital age.
To combat these frauds, payment service providers have
been providing an enhanced seamless user experience at
competitive prices, promoting wider adoption of digital
payments. Users have multiple options for digital
payments such as cards, wallets, Unified Payments
Interface (UPI), mobile banking, QR code and various
other methods . UPI has contributed significantly to the
growth of digital transactions in India.
In the vast and intricate landscape of the internet, the
Dark Web stands as a shadowy realm that has captured
the imagination of both cyber enthusiasts and those
concerned about online security. This hidden corner of
the web is notorious for being a hub of illicit activities,
from drug trafficking and hacking services to stolen data
markets and more.
The Dark Web is a portion of the internet intentionally
hidden from search engines and casual users. It is only
accessible through specific software, such as Tor (The
Onion Router), which anonymizes users and their
activities. Unlike the Surface Web, which includes
websites indexed by search engines, and the Deep Web,
which comprises unindexed web pages (e.g., databases,
-JANUARY 2024 15
password-protected content), the Dark Web is designed
to be deliberately concealed.
The Dark Web is, in essence, a subset of the Deep Web,
but what sets it apart is the intent to hide content and
activities. This intentionality has made it a haven for
those seeking anonymity, whether for legitimate
purposes like whistleblowing or nefarious activities like
illegal trade.
Cybercriminals use the dark web as their base of
operations to carry out illegal activities, sell stolen data,
and launch cyber-attacks on businesses. It is a growing
concern for enterprises, as they face increasingly
sophisticated cyber threats every day.
The Dark Web poses significant threats to both
individuals and organizations in terms of Identity Theft,
Financial Fraud, Corporate Espionage, Reputational
Damage and also creating Law Enforcement Challenges.
The Digital Personal Data Protection Bill, 2023 (“DPDP
Bill”). In the era of digitisation, data protection must be
balanced with the right equation of fraud detection
associated with data. Businesses must be well-equipped
to combat the threats of data breaches and ensure their
customer’s data is not at risk. The Digital Personal Data
Protection Bill, 2023 (“DPDP Bill”) marks the onset of a
new data protection regime in India, the bill is ready to
set a benchmark amongst similar legal frameworks,
globally.
protect the enterprise from the dark web, cybersecurity
professionals must sharpen their skills, invest in
advanced security technologies, and implement effective
security policies.
To ensure digital payment security, it is important to
follow the best practices recommended by the
payment service providers. There will be few basic steps
which we all might have to adhere to, like :
• Use strong passwords and change them frequently.
• Avoid using public Wi-Fi networks for making digital
payments.
• Keep your device’s operating system and applications
up-to-date.
• Do not share your personal information, such as
passwords, PINs, or OTPs, with anyone.
• Check your bank statements regularly to detect any
unauthorized transactions.
• Integrated platforms can consolidate numerous point
products into a single purpose-built solution. The
consolidation of endpoint, server, and cloud security
and workload protection allows you to protect your
ecosystem, providing more visibility and simplifying
operations
• Educate Your Employees as they are often the first
point of contact with cybercriminals, who use social
engineering tactics to gain access to your network.
Provide awareness training that teaches them to
recognise suspicious and fraudulent messages, be
careful about the information they share online, and
verify any requests for sensitive data.
Implement Effective Security Policies and enterprises
should establish a comprehensive disaster recovery plan
to ensure they can recover their systems and data quickly
in case of a successful cyber-attack. To summarise and to
address these challenges, CISOs should consider
implementing the following measures:
Ø Conducting regular security assessments. Regular
security assessments can help identify vulnerabilities
and provide insights into the effectiveness of existing
security measures.
Ø Implementing multi-factor authentication. Multi-
factor authentication can help prevent unauthorized
access to sensitive data and systems.
Ø Establishing a security awareness program. A security
awareness program can help educate employees on
the importance of cybersecurity and how to identify
and report potential security threats.
Ø Implementing a data backup and recovery plan. A
data backup and recovery plan can help ensure that
critical data is not lost in the event of a security breach.
Ø Partnering with a trusted cybersecurity provider.
Partnering with a trusted cybersecurity provider can
help organizations stay up-to-date with the latest security
threats and implement effective security measures.
By implementing these measures, CISOs can help protect
their organizations from the growing threat of cyberattacks
and ensure the safety of their data and systems.
CONCLUSION
“As AI continues to lower the barrier to cybercrime and
ushers in a new era of AI-powered cyberthreats, scams
will become more sophisticated and more difficult to
distinguish from legitimate messages and sites. Even
experts will have trouble telling fact from fiction to
deepfakes that could impact everything including the
future of our children, and beyond,”.
Digital security is no longer an option, but a necessity in
today’s economy. As the world becomes increasingly
interconnected, the risks and threats to our digital
infrastructure, services, and data have grown
exponentially. The rise of artificial intelligence and the
Internet of Things has fundamentally altered the way we
use software and data, making software’s attack surfaces
more complicated and software itself more vulnerable.
The importance of digital security cannot be overstated,
and it is imperative that companies and governments
alike take proactive measures to secure their digital
assets. By embracing digital security, we can ensure a
safe and secure digital transformation for all, fostering
trust in the digital economy and enabling sustainable
economic growth.
To safeguard our digital assets, we must adopt a
comprehensive approach to digital security. This
approach should include measures such as implementing
robust cybersecurity protocols, conducting regular
security audits, and investing in employee training and
awareness programs. We must also leverage the latest
technologies and best practices in digital security to stay
ahead of emerging threats. By taking these steps, we can
protect our digital assets and ensure a safe and secure
digital future for all.
16 -JANUARY 2024
HOW ACCELERATORS CAN HELP
WEB3 START-UPS?
Artak is BD and IR
manager at yard[hub]
– web3 venture studio
& accelerator.
T
he Web3 space is a frontier of innovation,
presenting startups with intricate challenges
that demand expertise in blockchain and
tokenized ecosystems. Accelerators step into
this landscape, offering more than just mentorship,
education, networking, and funding. They become
architects of success, especially crucial in a domain
where equity or tokens often constitute compensation.
Tailoring Accelerator Programs for Web3
Diversity
Recognizing the diverse needs of Web3 startups at
various stages, accelerators play a pivotal role in tailoring
programs. The demands of an early-stage Web3 venture
vastly differ from those of a series-A health startup. This
nuanced understanding allows accelerators to provide
targeted mentorship, ensuring each cohort receives
specialized guidance for success.
• Mentorship: Accelerators offer invaluable
mentorship from seasoned industry professionals,
guiding startups through the complexities of Web3
with first-hand insights.
• Educational Resources: Curating specialized content,
accelerators empower entrepreneurs to stay abreast
of Web3 advancements, ensuring they are well-
informed and equipped for success.
• Networking Opportunities: Accelerators facilitate
meaningful connections with investors, mentors,
and peers, creating a collaborative environment
where ideas flourish and startups grow.
• Seed Funding: Crucial seed funding provided by
accelerators serves as the financial backbone for
early-stage startups, nourishing growth and
transforming innovative concepts into impactful
solutions.
The customization of accelerator programs is explored
further in subsequent chapters, highlighting their
adaptability to diverse startup needs in the vibrant Web3
ecosystem.
Different Accelerator Types in Web3
In the realm of startup accelerators, tailoring programs
to meet the distinct needs of various industry verticals
and startup stages is paramount. The diverse
requirements of Web3 early-stage startups differ
significantly from those of series-A health startups.
In the dynamic realm of Web3, where blockchain and tokenization take center stage, startups face
unique challenges on their path to success. Accelerators, specialized programs for rapid growth,
emerge as guiding beacons for these ventures. This article delves deeper into the profound impact of
accelerators, with a focus on the tailored approach required for diverse Web3 early-stage startups.
-JANUARY 2024 17
Recognizing these differences allows accelerators to
design programs that provide targeted mentorship,
resources,andsupport,ensuringthateachcohortreceives
the specialized guidance required for success in their
specific domain and stage of development.
This customized approach enhances the effectiveness of
accelerator programs in fostering innovation and
facilitating the growth of startups across a spectrum of
industries and developmental phases.
Explore the diverse structures of Web3 accelerators,
essential pathways for startups. Understanding this
variety is crucial for startups navigating their way to
success in the dynamic Web3 landscape.
• Regional Accelerators: Regional accelerators
strategically target startups within specific locations,
harnessing local entrepreneurial ecosystems to
provide contextual advantages.
• Corporate Accelerators: Large corporations drive
Web3 innovation through strategically aligned
accelerators. These programs offer startups exclusive
access to corporate resources and extensive networks,
propelling rapid growth.
• Government Startup Programs: Governments actively
contribute to Web3 innovation through initiatives like
Hub71 and DIFC Fintech Accelerator in the UAE.
Theseprogramsdemonstrateadedicationtonurturing
innovation by providing startups with essential
support to thrive in the evolving Web3 sector.
• Non-Corporate Accelerators: Initiated by small
companies with domain expertise, non-corporate
accelerators bring a unique flavor to the Web3 startup
scene. Often focused on specific fields, these
accelerators offer specialized support tailored to the
intricate needs of startups within those niches.
Addressing Web3 Startup Challenges
Web3 startups encounter specific challenges that
accelerators are adept at solving. Accelerators bring
experience and insights critical for tackling these hurdles.
Thespecificchallengesofweb3start-ups,thataccelerators
can solve.
• Creating Sustainable Business Models: Many Web3
startups focus on token launches or NFTs, posing
significantlong-termrisks.Fewprojectshaveachieved
a revenue stream that ensures long-term profitability.
• User Acquisition Challenge: dApps require users to be
familiar with blockchain technologies, including
blockchain wallets and custodial wallets. This
complexity deters regular users, narrowing the target
audience.
• Lack of Network: Startups face difficulties in
networking during their initial stages. Achieving goals
often requires substantial social capital, emphasizing
the importance of knowing the right people.
- Effective Go-to-Market Strategy: Web3 project
strategies differ significantly from traditional ones,
presenting challenges unfamiliar to Web2
entrepreneurs.
- Tokens and NFT Launch: The success of a project,
especially those involving tokens or NFTs, depends on
the effectiveness of the initial launch. Multiple factors
influence this, requiring experience and insight for
informed decision-making.
- Fundraising Hurdles: Successfully raising funds goes
beyond a compelling pitch deck. Warm introductions
from other founders or personal relationships with
VCs or angel investors are crucial. Feedback from VCs
early on can save significant time.
yard[hub] Accelerator: Nurturing Web3
Innovation
responsetotheuniquechallengesfacedbyWeb3startups,
the yard[hub] accelerator emerges as a beacon of support.
The accelerator leverages the team’s rich experiences
over the past two years in launching and nurturing
successful Web3 projects. The program is meticulously
crafted, focusing on product development, business
models, GTM strategy, marketing, business development,
and fundraising.
yard[hub] accelerator program offers:
• Mentorship from successful experts;
• Educational workshops focused on the needs of
startups;
• Strategic networking opportunities with key industry
players and investors;
• Market positioning assistance for user adoption and
brand development;
• Grant support from blockchains and other companies.
Unveiling the Second Cohort
The first cohort of yard[hub] accelerator witnessed
tremendous success, with over 100 applicants in
November. As the program gears up for its second cohort
in 2024, it continues to offer a 12-week journey that goes
beyond traditional acceleration. Participants benefit from
mentorship, educational workshops, strategic
networking, and the opportunity to pitch to VCs and
investors at the demo day.
Contributing to Web3 Industry Trends
Beyond the confines of individual accelerators, the Web3
industry is marked by dynamic trends. These trends
encompass decentralized finance (DeFi), non-fungible
tokens (NFTs), and blockchain applications. Accelerators
adapt to these emerging technologies, playing a pivotal
role in shaping the landscape of Web3 innovation.
Conclusion
Accelerators like yard[hub] are indispensable in the
Web3 ecosystem, bridging the gap between challenges
and opportunities for startups. The commitment to
fostering innovation and success in this dynamic sector is
evident in the announcement of the second cohort of
yard[hub] acceleration program. As Web3 continues to
evolve, accelerators play a crucial role in shaping the
narrative of success for emerging startups. Their
comprehensive support empowers startups to thrive in
the complex and ever-evolving landscape of Web3. Apply
for the 2nd cohort of yard[hub] acceleration program:
RABINDRA SAH
Chief Engineer - Strategic Projects at Tata Technologies Limited
Global Practices - Automotive & Industrial Heavy Machinery
Engineering Research & Design, PLM & Digital Enterprise System
Creating Industry engineering Business Solutions for Digital & Physical
Transformation from Product to Manufacturing
Mr Rabindra Sah is having 31+ Years of
working Experience with Tata Motors and
Tata Technologies. He is industry leader to
engineering services in various industries and
domain using digital technologies & Industry
4.0 solutions for more than 80 customers
worldwide - Asia Pacific, Europe & North
America.
In his current role, he is creating Industry
Business Solutions for Digital & Physical
Transformation in Product & Manufacturing
(Digital to Physical) and have worked for
the industries - Automotive, Aerospace,
Industrial Heavy Machinery, Process Industry
– Steel, Port, Air Cargo, FMCG, Media &
Entertainment.
He comes with strong Domain for End to
End - Product Design & Development,
CAE Product Validation, New Product
Introduction, Smart/Digital Manufacturing,
Digital Twin, Industry4.0, Process & Facility
Planning, Augmented & Virtual Reality, Additive Manufacturing, Data Science, Block chain,
Vehicle and Autonomous vehicle.
He is instrumental in digital transformation using solution of Dassault Systemes, Siemens,
Altair, MSCNastran, DEFORM-2D/3D, PTC, Euclid, Autodesk, UNITY, Unreal Engine, Xcelgo in
the industry.
Rabindra is an expert in the Digital Manufacturing world and has experience in Virtual
Production, Visualization, Digital Twin in the framework of Industry4.0, and Autonomous
vehicle.
Rabindra is Unreal Engine Authorised instructor (UAI) from Epic Games. One of his passions
is as and trainer on Games, Augmented & Virtual Reality and Virtual Production experiences
Unreal Engine.
He loves to interact, guide and motivate student, Faculty & industry professionals with his
talk, training, mentoring & coaching. He is passionate to share knowledge acquired from his
vast three decades of experience & leadership working across Industries, domains and digital
technologies and supports the mission skill of the nation for the noble cause.
Rabindra Sah holds B. Tech (Mechanical Engineering) from the National Institute of
Technology Patna M. Tech in Data Science and Engineering from Birla Institute of Technology
& Science, Pilani. He currently pursuing his PhD in Autonomous Vehicle at Amrita Vishwa
Vidyapeetham -Bangalore
Linkedin: www.linkedin.com/in/rabindra-sah
18 -JANUARY 2024
TECH TRENDS RESHAPING THE AUTO INDUSTRY:
Turning Vehicles into Immersive Living Spaces
By Rabindra Sah, Chief Engineer | Tata Technologies
https://www.linkedin.com/in/rabindra-sah/
T
he automotive industry is witnessing a
remarkable transformation in customer
behavior driven by the rapid adoption of
advanced technologies. As vehicles become
more connected and integrated with cutting-edge
digital features, the driving experience has evolved into
something akin to a second living room.
Customers now seek immersive experiences with high-
tech Human-Machine Interfaces (HMI) and digital
cockpits, creating an environment where they can stay
connected, entertained, and productive while on the
move.
In this era of smart vehicles, consumers are no longer
just passengers; they are active participants in their
journey. The automotive industry’s commitment to
sustainability and the circular economy has led to
vehicles designed with recycled and reusable materials,
aligning with the growing demand for eco-friendly
options.
TOP DIGITAL ENGINEERING
TECHNOLOGIES FOR IMMERSIVE
EXPERIENCE
1. Gamification for immersive Experience:
The technology of the game engine platform is being
employedbyOEMsforvariousengineeringapplications
in the automotive sector. Key areas of application
include Augmented Reality (AR) and Virtual Reality
(VR), Collaborative Design Review and Visualization,
Autonomous Vehicles, Advanced Driver-Assistance
Systems (ADAS), Metaverse, Virtual Production, Sales
and Marketing, Human-Machine Interface (HMI), and
more. AR and VR are particularly making significant
inroads in design, manufacturing, training,
maintenance, and sales marketing.
2. Innovation with Design Thinking
OEMs and Tier suppliers are heavily focusing on the
framework of Design Thinking to drive innovation and
improve their products and processes. This approach
aids in delving into problem statements and coming up
with unique solutions. The Design Thinking framework
has provided the Startup community with a systematic
methodology, enabling them to become leading global
automotive OEMs.
3. Growth with Collaboration &
Partnership
Collaboration and partnership have become the norms
of business for achieving growth.
OEMs face significant challenges when attempting to
be involved in the design and development of every
part of a vehicle. As a result, there is a global trend
toward collaboration and partnerships between OEMs.
These collaborations often involve startups and other
entities, with OEMs reserving funds for their partners
to develop solutions. This approach accelerates the
journey to success and product development.
FOR EXAMPLE:
o Tesla partners with BYD supplies electric vehicle
batteries;
o Toyota Produces EV powered by BYD Batteries
o The Volvo Group and Daimler Truck AG to lead the
development of sustainable transportation by
forming joint venture for large-scale production of
fuel cells
4. Adoption of Agile Framework:
In the realm of product development, automotive
OEMs strongly embrace the Scrum Framework. Unlike
-JANUARY 2024 19
20 -JANUARY 2024
the traditional waterfall approach, which is a defined
process, the Scrum Framework is empirical and
handles changing situations efficiently. Work is divided
into iterations, making it flexible and adaptable to
changes in priorities due to evolving circumstances.
The usage of Agile frameworks is prevalent in the
context of OTA (Over-The-Air) updates for software-
defined vehicles, particularly in the domains of electric
vehicles, connected vehicles, and autonomous vehicles.
5. New Perspective - The Car as a Second
Living Room:
o Nowadays car is being considered as second living
room. Prime considerations for designers are how
immersive experience can be created considering
more Space, Spatial Audio, ergonomics of Seats,
Infotainment systems, Comfort, Safety and new
Features.
6. Enhancing Safety with ADAS and AV
o There are large number of accidents happening
worldwide due to Human driving a vehicle due to
Human error considering perception, performance,
vehicle and environment situations.
o Auto OEMs, Startup, Software OEMs, Hardware
OEMs and Engineering service providers are
working to develop autonomous vehicle and
Advanced Driving Assistance Systems (ADAS) .
Globally technology is being developed and tested
to make vehicle driving safe, accident free and
enjoyable experience. Vehicle developed happens
on SAE defined level.
o Advanced Driving Assistance Systems (ADAS) like
Lane Departure Warning, Blind Spot
Warning,Parking Assistance,Automatic Lane
Change and more are being developed and provided
in the vehicle.
7. Adoption of Functional Safety and
Cybersecurity Standards by Auto OEMs:
There are three primary standards for automotive
embedded systems, safety, and security. These
standards are integral to the design, development, and
updates of vehicles by OEMs, especially for their
autonomous and ADAS endeavors. Automotive OEMs
are actively working to implement these frameworks.
ISO 26262 – Road vehicles Functional Safety
ISO/PAS 21448 – Safety of the Intended Functionality
(SOTIF)
ISO/SAE 21434 – Automotive Cybersecurity
8. Evolution of Automotive withRise of the
Software-Defined Vehicle (SDV):
In automotive, a software-defined vehicle is that relies
extensively on software for its various functions,
control, and features, rather than being solely
hardware-based. The core concept of a software-
defined vehicle revolves around the idea of flexibility,
adaptability, and upgradability through software,
which can enhance and even transform the vehicle’s
capabilities over time
It means that Software-Defined Everything in
automotive. Virtually every aspect of the vehicle, from
its engine and drivetrain to its safety systems and
infotainment, can be configured and controlled through
software. This means that changes and improvements
can be made via software updates, rather than requiring
physical modifications
Over-the-Air Updates (OTA)that updates and allow
manufacturers tosend patches, bug fixes, and new
features directly to the vehicle’s software systems,
much like you would update your smartphone’s
operating system.
E/E (Electrical/Electronic) architecture in the
automotive industry refers to the structured design and
layout of electrical and electronic components and
systemswithinavehicle.Thisarchitectureencompasses
all the electrical and electronic systems, modules,
sensors, controllers, and networks that enable various
functions, features, and operations within the vehicle.
E/E architecture is essential for the efficient and
reliable functioning of modern vehicles.
9. Embracing Sustainable Design and the
Circular Economy
o OEMs and suppliers are actively transitioning from
a linear economy to a circular economy. They are
shifting from a ‘Cradle to Grave’ to a ‘Cradle to
Cradle’ business model. In this new model, the focus
is on designing products with recycled and reusable
materials to minimize waste and achieve net carbon
neutrality. Each CEO of OEMs and suppliers has
sustainability targets defined for its integration into
their systems, which leads to a substantial amount
of innovation.
o The Fourth Industrial Revolution is being leveraged
to support the goal of achieving net-zero carbon
emissions and establishing a sustainable circular
economy. This endeavor primarily concentrates on
three major areas: Product, Manufacturing
Operations, and Supply Chain.
10. Widespread Adoption of UI/UX
Principles
o User Experience (UX) and User Interface (UI) skill
set is being highly used to create a better product
and better experience for users. It leads to high
demand of User Experience experts. US & UI
provides an engaging user with product & eco-
system for new level of experience.
11. Immersive Experiences through HMI
and Digital Cockpit Technologies:
o Every OEMs are working with their partner to create
unique Human Machine Interface, infotainment
systems and interior to provide their customers
enhanced and better immersive experience. It leads
to creativity, innovation and value proposition.
HMI & Digital Cockpit experience is the one of the
prime factors for users to decide purchasing of
vehicle.
o Combination of software from engineering, game
engine and hardware are being used to develop
HMI & Digital Cockpit functionality.
-JANUARY 2024 21
22 -JANUARY 2024
12. Auto OEM Building a Customer
Community
o OEMs place a strong focus on nurturing their user
community as a means to bolster their brand. To
achieve this, OEMs undertake various initiatives
aimed at engaging their users and involving them in
the journey to success. One notable approach is the
establishment of a User’s Advisory Board, a platform
through which OEMs actively seek input,
suggestions, and ideas from their users to enhance
their products. This endeavour not only encourages
a sense of belonging among users but also reinforces
their connection with the OEM.
o In addition to this, OEMs invest in the creation of
exclusive clubs and corporate social responsibility
(CSR) initiatives for their users, organizing regular
events that allow users to actively participate
13. Incorporating Passenger Vehicle (PV)
Features into Commercial Vehicles (CV)
A prevailing global trend involves the pursuit of fresh
business opportunities within the commercial sector.
Worldwide, OEMs are setting their sights on leveraging
the diverse features commonly found in passenger
vehicles and integrating them into commercial vehicles.
This expansion covers a spectrum of elements,
encompassing safety enhancements, Human Machine
Interface (HMI) innovations, advanced infotainment
systems, upgraded digital cockpits, and overall
improvements in the user experience. The objective is
to enhance the capabilities and user-centric features of
commercial vehicles, aligning them more closely with
the advancements and offerings in the passenger
vehicle segment
14. Emerging Trends of Subscription-Based
Business Models
o A novel business model is emerging within the
automotive industry, often referred to as “Flexibility
is the New Premium.” This model introduces the
concept of vehicle subscription, allowing users to
choose whether to buy or rent a vehicle according to
their specific needs. It offers a range of flexible
options in terms of pricing and duration, enabling
users to tailor their choice to fit their budget. In this
innovative approach, users have the freedom to
select a vehicle that precisely suits their
requirements, and they even have the flexibility to
switch cars as frequently as necessary. This model
empowers users with unprecedented choice and
adaptability, ushering in a new era of convenience
and personalization in the automotive landscape.
o In summary, the new business model allows for car
subscription, offering the following options:
 Purchase when needed
 Rent when needed
 Choose the vehicle you need
 Flexibility to meet your budget
References/Credit:
o Images are taken from websites/internet,OEMs
software and service provider
o Reference of images from Rivian, Ford, BMW,
Volvo, Unreal Engine, News, Technode and others
SOLUTIONARCHITECT&INTEGRATOR
FORCYBERSECURITY,DEFENCE,AND
INTELLIGENCENEEDS
Abdul Azeem Baqar Mohammed
IT Manager, Emirates Float Glass
Alexandre Horvath
Chief Information Security Officer (CISO) &
Data Protection Officer (DPO), Cryptix AG
Abhilash Radhadevi
Head of Cybersecurity, OQT
Adedolapo Peter
Akindehin
Cybersecurity Governance
and Compliance Manager/
BISO, Unity Bank Plc
Abdul Azeem is a distinguished IT Infrastructure
and Cybersecurity professional who has
consistentlydemonstratedexceptionalexpertise,
dedication, and innovation in the field of IT
Infrastructure and Cybersecurity. He has made
significant contributions to safeguarding digital
landscapes, protecting critical information
systems, and mitigating cyber threats.
20 years of experience in multinational
organizations on a global level. Proven business
partner of C-level executives. Successful
management of international cross-functional
teams and major IT security and risk programs.
Strong background in cybersecurity, data
protection and risk management as Alexandre
has over a decade of leadership experience in
those areas, from a strategic, operational as well
as project management point of view.
Abhilash Radhadevi, Head of Cybersecurity
at OQT is a Senior Cybersecurity executive
with more than twenty years of combined
experience in the Banking, Financial, and
Energy domains. Renowned for his leadership,
he has successfully guided global organizations
through complex security landscapes. Abhilash’s
extensive experience encompasses pioneering
Adedolapo Akindehin is a
seasoned professional with
over 12 years of experience
spanning across GRC, Project
Management, IT Audit, and IT
Security.
the Head Security Governance,
Program Management and
Compliance in one of the
top banks in Nigeria, he is
responsible for leading and
coordinating the operations
of the security strategies in line
with the business objectives.
He acts in the capacity of the
Business Information Security
Officer (BISO) and deputizes for
the CISO.
has implemented several
security projects, some of which
are email security, endpoint
security, data loss prevention
and system hardening.
Prior to now, he was a senior
cybersecurity consultant with
Digital Encode Limited, and
a certified member of ISC2,
ISACA, PMI, ACFE and ISO.
Adedolapo is a Fellow of
the Institute of Chartered
Accountants of Nigeria (ICAN)
and an alumnus of University
of Lagos and University of
Liverpool, from where he
bagged two Masters degrees
in Business Management and
Cybersecurity respectively.
Any special project/work you would like to highlight: Building
an Effective IT Infrastructure and Information Security
Strategy for the Organization
Any special project/work you would like to highlight:
Preparing several companies for the ISO27001 certification
Any special project/work you would like to highlight: Artificial
Intelligence in the absence of a 24/7 Security Operations
Center
His hobbies are fishing, reading,
teaching, travelling and
meeting people
cybersecurity strategies, earning him prestigious awards and
recognition. A respected thought leader, he has authored
multiple articles on emerging threats and innovative solutions,
contributing to industry knowledge. His global influence and
commitment to mentoring reflect his dedication to shaping
the future of cybersecurity.
INFORMATION
TECHNOLOGY
CONFEX
2023
24 -JANUARY 2024
TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
Ankit Agarwal
IT Infrastructure & Global System Architect,
Encora
Baidyanath Kumar
CISO and Data Protection Officer,
JK Lakshmi Cement
Cdr. Suman Kumar
Chakraborty
Head Customer Success,
Canvas,
LTIMINDTREE
As the Head of IT Infrastructure and
Governance at Encora Inc., Ankit Agawral
bring over 20 years of experience in managing
IT operations, driving tech transformation,
and ensuring cybersecurity. With exerience in
verticals like Governmet, Education, Finance,
Manufacturing, Ankit has successfully led tech
transformation and automation safeguarding
critical assets against evolving cyber threats
while ensuring the resilience and efficiency of
IT infrastructure.
Baidyanath is Chief Information Security
Officer (CISO) and Data Protection Officer at
JK Lakshmi Cement, part of the prestigious
JK Organisation. In his role, Baidyanath is
passionate about CISO as a Service, Cyber
Program / Threat Management, Identity as a
Service, Cyber Resilience, Privacy and Next-
generation Security Operations Center (SOC).
With over a decade of extensive experience
in the cybersecurity domain, Baidyanath has
played a crucial role in establishing information
security policies and objectives, evaluating
performance, and driving continuity in various
e-governance projects for GOI.
Cdr Suman Kumar Chakraborty
is a veteran of the Indian Navy,
an NDA alumnus where he’s
held various appointments which
have enabled contemporary
tech adoption at scale during his
over 20 years of service. He has
four Masters to his name and has
been a Gold Medallist in BTech
and MTech, awarded by Dr. APJ
Kalam for his project on Missile
Auto Pilot. In the recent past,
after pursuing his MBA in Strategy
and Marketing from ISB adjudged
Flag Bearer awardee, he has
been in tech leadership roles in
two successful start-ups. Firstly,
as a founding CTO in healthcare
and then as Head of Product
for a Blockchain-based portfolio
that included Web3 services and
was acclaimed as one of the top
3 in India.At LTIMindtree, he leads
the WEB3 incubation team with
close liaison with strategy teams
and other stakeholders toward
building a roadmap for service
offerings by spawning various
initiatives for GTO.
Any special project/work you would like to highlight: Zero
trust implementation across Organization
Any special project/work you
would like to highlight: Any
special project/work you would
liketohighlight:Ihavesuccessfully
Incubated WEB3 practise for
LTIMINDTREE and presently
Heading Customer Success for
CANVAS (AI/ML product) which
has this year won awards in 6th
Annual AI Breakthrough Awards
and 2023 Artificial Excellence
Awards in 3 categories.
Avinash Kumar Singh
Head Technology, Core Diagnostics
I bring over 13 years of experience as a
technology leader in diagnostics, hospitals,
andbiotechnology.I’mallaboutdrivingdigital
innovation and making big changes happen
in global healthcare companies. I’m certified
in Digital Innovation and Transformation
and have earned multiple top Global Tech
Certifications. I’ve also been recognized with
awards like CIO100, CSO100, Healthcare AI &
ML Innovation, INSIGHTS CXO, and CXO Tech
Champion
-JANUARY 2024 25
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
Prerna Sharma
Sr. Security Analyst III, Workato Inc.
Baljit Singh Dhillon
Head Cybersecurity Planning,
Strategy and Governance,
Digital Nasional Berhad,
Malaysia
Prerna Sharma is a cybersecurity
professional with 11 years of experience
in governance, risk and compliance. She
has a proven track record of architecting
and executing comprehensive GRC
strategies that safeguard assets, ensure
regulatory adherence, and optimise
internal processes—recognised for
Having spent 24 years across all layers
of technology and industries, Baljit has
focused time and effort in perfecting
an approach to help deliver business
results by using technology to its fullest
and safest potential.
Part of the initial team members who
started up Digital National Berhad (a
MYR 16.5B, 10 year Malaysian initiative
to enable rapid digitisation for the
economy by using 5G enablement),
Baljit was tasked to help kickstart and
run an approach to ensure adequate
cybersecurity monitoring, protection
and governance of the nations single
5G wholesale network that is meant
to service all 5 Telco operators and
enterprises.
Prior to that Baljit has had stints in
Axiata Group, Celcom, Experian,
Hewlett Packard and Shell focusing on
both cybersecurity and technology
solutions, governance and
management. He is a CISSP certified
professional with a Bachelor’s Degree
in Computer Science from University
Malaya and currently pursuing a
Masters in Computer Science in
Research from the same university.
Baljit spends he’s time outside work
with he’s wife and twin boys watching
movies, playing football and
traveling. He loves cybersecurity and
technology as a hobby and spends
time researching meaningful ways it
can be adopted better in businesses
and society.
Any special project/work you would
like to highlight: Starting up and
operationalising a secure wholesale
5g service for Malaysia
delivering tangible results, such as deploying
foundational processes for security governance,
data privacy and endpoint management. Adept
communicator and leader, consistently driving cross-
functional collaboration and fostering a commitment
to excellence.
Genie Sugene Gan
Head of Government Affairs and Public
Policy, Asia-Pacific, Japan, Middle
East, Turkey and Africa, Kaspersky
Genie heads up the Public Policy &
Government Affairs business functions
across multiple regions in Kaspersky
(including Asia-Pacific, Japan, Middle
East, Turkey & Africa).
Genie comes with an excellent
Any special project/work you would like to highlight:
Ms Genie Sugene Gan is an eminent leader in the
cybersecurity sector, who has actively contributed
to thought leadership on topics at the intersection
of law, technology and public policy. She is also a
passionate advocate for Women in Technology,
having spoken to international audiences to inspire
women to see their own futures in technology.
For her outstanding contributions in the field,
she had been awarded the Excellent Woman
in ICT Leadership Award by the United Nations’
International Telecommunication Union (ITU), and
the Telecom Equipment Manufacturers Association
of India (TEMA) – the only recipient from the
cybersecurity sector. She is also vice-chairperson of
the International Women’s Empowerment Forum.
Her effervescent presence in international events
has made her a sought-after speaker in the industry.
academic track record; she holds a Juris Doctor
in law, an honors degree in Accountancy, and
a Specialist Diploma in Counselling Psychology.
Called to the Singapore Bar and a qualified lawyer,
she is also a Mediation Coach and an International
Mediator amongst other things.
26 -JANUARY 2024
TOP 25 EMERGING WOMEN IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
Chi Wai HUI
Cybersecurity Solutions Consultant,
V-Key Pte Ltd
Chi Wai is an accomplished professional with
over two decades of experience in the fields
of cybersecurity. Currently he is serving at
V-Key as a Cybersecurity Solutions Consultant.
In this role, he focuses on advocating the
importance App Identity, Device Identity, and
User Identity. Chi Wai’s responsibilities include
recommending cybersecurity solutions to
clients, engaging partners and resellers to
expand market reach, all while promoting
mobile app security and authentication
awareness.
Chetna Rustagi
Technology Leader, TravClan
Any special project/work you
would like to highlight: Led The
Milestone Achievement Of Soc2
Certification At Allbound And
Led The Implementation Of Zero
Trust Architecture At Allbound
Chitij Chauhan
Director of Security,
Allbound Inc
Any special project/work you
would like to highlight: I have
a digital transformation project
going on. and a tech refresh
project as well.
David Pravinkumar
Head of IT, InfracoAsia
Development Pte Ltd
Betania Allo
Cybersecurity Innovation Manager, NEOM
Betania Allo is a cyber lawyer and policy
expert with a strong history of success
leveraging expert legal knowledge and
political experience across cybersecurity,
data privacy, compliance, and counter-
terrorism efforts. She has worked over
ten years in public policy, held global
executive positions in the private sector, is
an entrepreneur in Islamic finance, and has
Website: www.betaniaallo.com
succeeded as a program specialist in counter-terrorism
at the United Nations in projects involving technological
initiatives for criminal investigations and safeguarding
digital platforms from dangerous organizations, among
others. Ms. Allo graduated as a lawyer in Argentina, and
holds a Master of Laws (LL.M.) with an academic focus
on cyber law and policy from Syracuse University (USA).
In addition, she holds a Master’s in International Relations
with a Graduate Certificate in International Security from
Harvard University (USA), a Postgraduate in Cybersecurity
and Compliance from Universitat Internacional de
Catalunya (Spain), and is currently pursuing a Doctorate
(D. Eng.) in Cybersecurity Analytics at George Washington
University (USA). She’s fluent in English and Spanish and has
levels of working proficiency in French, Italian, Portuguese
and Arabic. Betania also lectures at several universities
worldwide and is a regular speaker at conferences about
cybersecurity, counter-terrorism, emerging technologies,
and leadership. She currently manages Cybersecurity
Innovation and Partnerships at NEOM, the first cognitive
city in the world.
-JANUARY 2024 27
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 EMERGING
WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT INFORMATION
TECHNOLOGY
CONFEX
2023
Dr. Tan Kian Hua
Chief Information Security Officer,
Lenovo PCCW Solutions Singapore
Harutyun Baghdasaryan
Vice President, Software Engineering, QLess
Assoc. Prof. Tan Kian Hua is a proven
solution leader in the field of cybersecurity
regionally with records of success and made
significant contributions. Well-versed with
security governance and policies, lead and
oversee to ensure all ICT security matters are
conducted according to the Government
Manual ICT Security Policy.
With over two decades of industry experience
and a decade in tech leadership, Harut
is a seasoned expert in product strategy
and people management. His innovative
approach and dedication to growth have
earned him a reputation as a driving force in
the industry. Harut’s track record of successfully
building and managing teams in both Armenia
Any special project/work
you would like to highlight:
Multi-national Digital Business
Transformation Strategy And
Operating Model
He is passionate about creating awareness of the
importance of cybersecurity in all companies and
continues to ensure a first-class standard for maintaining
cybersecurity procedures.
Any special project/work
you would like to highlight:
Digital Transformation / Cloud
Migration / ERP Implementation
/ Cybersecurity Enhancements
etc.
Any special project/work you would like to highlight :
I invest in my medium and LinkedIn pages, would be great
if you post them as well - medium, Instagram
Dr. Kobus Liebenberg
Chief Executive Officer and
Digital Leader, TMTDIGITAL
(PTY) LTD
Dr Mert ÖZARAR
Director of Cybersecurity
HAVELSAN
Gaurav Kole
Group Head Of IT, Leylaty Group
During his six years with an MNC, he was chosen as a
young leader and attended their leadership program. He
spearheaded a team to build from scratch the first world-
class defense cybersecurity infrastructure and rectified
a cyberattack within one day – the market average is
twenty-eight days.
Assoc. Prof. Tan holds multiple professional certifications
related to Cybersecurity and data privacy:
• FIP (International Association of Privacy Professionals)
• CIPP/US (Certified Information Privacy Professional/
United States)
• CIPM (Certified Information Privacy Manager)
• CISM (Certified Information Security Manager)
• CISA (Certified Information System Auditor)
• CDPSE (Certified Data Privacy Solution Engineer)
• CEH (Certified Ethical Hacker)
and overseas is a testament to his exceptional leadership
skills. He is deeply committed to developing and mentoring
top talent, and his passion for incorporating cutting-edge
technology into his product strategies is palpable.
28 -JANUARY 2024
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
Gaurav Mishra
Director of Information Technology, Digiplug
Technologies Pvt. Ltd.
Graeceinn Remiendo Mayos
Senior IT Software - ERP & CRM
Senoko Energy Pte Ltd, Singapore
• Innovative IT executive with 19+ years of
experience in all aspects of product
development, technology, marketing and
operation.
• I am a Self-driven and motivated person
with a proven track record of success and
extraordinary achievements in building
products from scratch..
Working as a Senior IT software in the areas of
CRM, Sales, Sales Operations, Point of Sales
and Billing.
Worked as a CRM Analyst Solution Developer
(Microsoft softwares), IT ERP Consultant and
Dev Business Analyst focusing on ERP softwares
Strong background in ERP softwares (Microsoft,
Infor, SAP) and HTML, COBOL, JavaScript and
Any special project/work you would like to highlight :
• Government projects under the Ministry of Trade and
Industry
• Central Provident Fund (CPF) a key pillar of Singapore’s
social security system that helps Singapore Citizens and
Permanent Residents set aside funds to build a strong
foundation for retirement
• World’s top banks, ranked ‘Aa1’ by Moody’s Investors
Service and ‘AA-’ by both S&P Global and Fitch Ratings.
• And currently working on projects with the largest
power generation company in Singapore, accounting
for approximately 20% of the nation’s electricity supply.
• Well-developed leadership/communication skills,
excellent time management skills, and great teamwork
abilities.
• I have done MBA in International Business and Engineering
in Computer Sc..
• Passion to innovate and explore new technologies which
can solve society problems using technology.
• Worked with Companies like AIG, Times Groups,
BookMyShow and Mentored many Startups.
• Currently associated with Digiplug Technologies as
Director - Information Technology.
• Member of Startup India Mentorship program, CXO
Cywayz Mentor, CIO Klub and PMI.
• Winner of Next100 CIO Award, 2023 by 9.9 Group
Automation.
Professional with a Bachelors of Science in Information
Technology major in Enterprise Resource Planning
Kazi Monirul Kabir
Founder & CEO, Spider Digital
Monirul is an influential, passionate,
entrepreneurial, innovative, and
objective-driven leader with
Global Perspective and strong
empathy for emerging market
realities. He possesses extensive
Marketing, Communication,
Innovation, Strategic Design,
and Business Development
experience across the Internet,
Telecoms, and Consumer Goods
Industries. Monirul has a successful
Track record of excelling across
Global Enterprises, multinationals,
Social Enterprise and Start-up
Environments. He is a great
believer the transformative power
of Strategic Innovation in driving
the growth and development
of emerging countries and has
chosen #Cybersecurity #Fintech
and #Sustaintech as his focus
areas.
Any special project/work you
would like to highlight :
National Sclale Telecom Data
Inspection and Analytics Platform
for a user base of 140 Mln user
Kapil Savaliya
Information Technology
Manager, Food Manufacturing
Group Co Ltd
-JANUARY 2024 29
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EMERGING WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
Gurpreet Singh
CTO/CISO, DiggFull
Gurpreet Singh: Pioneering
Leadership in IT
Ramkumar
Neelakandan
Head IT Operations
Noida International Airport
(Yamuna International
Airport Pvt Ltd – YIAPL)
Leadership in IT
Gurpreet Singh stands as a
paragon of leadership in the
ever-evolving landscape of
Information Technology. With
a career spanning over two
decades, he has consistently
Ramkumar Neelakandan is
an ambitious and seasoned
player in the field of
Any special project/work you would like to
highlight :
1. Scalable E-Learning Platforms for State
Education:
Gurpreet Singh has been at the forefront
of digital transformation in education,
architecting scalable e-learning platforms
for the Indian State Government. Catering
to millions, these platforms not only enhance
the learning experience but also streamline
assessments, making quality education
accessible and efficient for students across
the state.
2. Pioneering AgriTech Ecosystems:
With a keen understanding of the challenges
faced by Indian farmers, Gurpreet has
spearheaded the development of
integrated AgriTech ecosystems. These
platforms, encompassing e-commerce,
knowledge dissemination, and community
networking, have revolutionized the
agricultural sector, providing farmers with
holistic digital tools to enhance productivity
and market reac
Any special project/work you would like to
highlight :
Ram is grateful for being a part of many
prestigious and lauded projects across the
span of his two decades of successful career.
A few to name would be the:
• Successful transition of 06 airports in record
time to a PPP model.
• Deployment of “Critical Airport ICT Systems”
across 07 airports.
• Carried out various Digital Transformation
projects – a unique in Aviation Industry.
• Deployment of Smart Cities & Smart Building
systems & platform – For Corporates,
Universities and High-rise Buildings.
• Experienced in successful completion
of Mixed Development Projects across
countries.
• Hands on experience – in implementing
Data centres, Command & Control Centre.
• Specialist in OT (Operational Technology)
Systems, IT-OT Convergence.
demonstrated an innate ability to lead from
the front, guiding teams toward achieving
technological excellence.
A cornerstone of Gurpreet’s leadership
lies in his vision for scalable and secure
architectures. He understands the intricacies
of designing systems that meet the demands
of today and are future-ready. His expertise
in cloud computing and information
security ensures that deployments under his
guidance are robust, secure, and primed
for growth.
Beyond technical prowess, Gurpreet’s
true strength lies in his ability to inspire and
mentor. He fosters a culture of innovation,
encouraging his teams to push boundaries
and explore the uncharted territories of IT.
As he receives the “Top25 Exceptional
Leaders in IT” award from Digital Confex,
it’s a testament to Gurpreet’s unwavering
commitment to excellence and his
indomitable spirit of leadership in the realm
of IT.
Information Technology, holding more than
2 decades of global experience in multiple
industries and sectors such as Aviation, Mixed
Development projects, Smart Cities and
Buildings, Corporate Campus, Data centres,
Biomedical labs, Factories and Residences.
He earmarked his glorious career working with
brands such as Birla, Siemens, Reliance, L&T,
EDMI-Singapore & Adani. Presently Ram heads
IT operations for Noida International Airport
(NIA) and has been a part of multicultural
teams across nations. He believes that
perseverance and integrity as his assets and a
strong positive attitude is his main instrument at
the workplace. A nature lover by choice, Ram
travels to unique destinations to unwind in the
lap of mountains and waves of beaches. An
enthusiastic cricket player and a great chef
in his leisure time. Ram adores his teenage
daughter who is completing high school soon
and loves to have long talks with his spouse
who is a soft-skills trainer and a Chartered
Accountant
30 -JANUARY 2024
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
Keitumetsi Tsotetsi
Senior Specialist, Digital Security Designer,
MTN South Africa
Keitumetsi has been named one of Mail &
Guardian’s Top 200 South Africans in the
Science and Technology category for 2021
and has also been named one of South
Africa’s Top 50 most inspiring women in 2021.
She studied BCom IT Management at
the University of Johannesburg, holds a
Post Graduate Diploma in Management
Any special project/work you would like to highlight :
Lead the implementation of South Africa’s first student
focusedsecuritythemedhackathonin2017.Thehackathon
happens annually to date at one of the biggest security
conferences hosted by ITWeb in Africa. It continues to
provide opportunities for bursaries, internships and other
employment opportunities in South Africa.
specializing in Corporate Governance from Monash
University and is a BSI certified ISO27001 Lead auditor.
Prem Bhawnani
Head of IT, Standards Australia
Rahul Ananthanaraya-
na Reddiar
Development Manager –
Cybersecurity
Bulwark Distribution FZCO
Any special project/work
you would like to highlight:
Closed a Project in one of the
Government entity for DAST Tool
(Invicti Security) who is utilizing
the tool for scanning 1500 web
applications.
Shakthi Priya
Kathirvelu
VP and Head of Information
Security and IT,
Funding Societies | Modalku
Group
Pragya Varshney
Assistant Manager, Mashreq
With 7 years of work experience in the field of
information security, I have gained valuable
expertise and a deep understanding of the
industry. My role as an Assistant Manager
at Mashreq has allowed me to contribute
significantly to the organization’s security
initiatives. I have been involved in various
projects and have successfully implemented
robust security measures to safeguard sensitive
information.
Expertise:
My specialization lies in Vulnerability Assessment and
Penetration Testing (VAPT), Cloud Security, and Mobile
Pentesting. With my knowledge in these areas, I am skilled
at identifying vulnerabilities within systems and applications,
conducting comprehensive security assessments, and
recommending appropriate remediation measures. I
am well-versed in the tools and techniques required to
effectively analyze, exploit, and secure cloud-based
environments and mobile applications.
Skills:
In addition to my technical skills, I have developed
proficiency in vendor management and ISO auditing.
Managing relationships with external vendors is crucial
in ensuring that the organization’s security requirements
are met. Furthermore, my ISO auditing skills enable me to
assess and maintain compliance with international security
standards, ensuring that the organization adheres to best
practices.
-JANUARY 2024 31
TOP 25 EMERGING WOMEN IN IT
TOP 25 EMERGING WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
Moshe Weis
Chief Information Security Officer,
Aqua Security
Muhammad Razzaq Chishty
Head of Cybersecurity Audits,
Arab National Bank
Moshe is an accomplished
Cybersecurity leader and lecturer,
with more than16 years of extensive
experience in technology and
cybersecurity. He has a strong
educational foundation with a BSc in
Communications System Engineering
and an MBA in Technological
Entrepreneurship, both completed
Mr. Muhammad Razzaq Chishty, an
experienced IT and Cybersecurity
Audit Leader, brings to the table more
than 13 years of invaluable expertise.
His career has been defined by a
relentless commitment to safeguarding
organizations against evolving threats
and driving positive change in the ever-
Any special project/work you would like to highlight :
Innovative approach to Product & Application
Securiry
with excellence. In addition, Moshe holds numerous
prestigious global cybersecurity certifications.
With a rich history in hardware and software
development, Moshe has evolved his expertise
over the years to focus on pioneering innovative
methodologies within the realms of Application and
Cloud security. Notably, he currently serves as the
Chief Information Security Officer (CISO) at Aqua
Security, a renowned provider of cutting-edge
security solutions for cloud-native applications.
evolving landscape of cybersecurity.
Technical Mastery: With a deep understanding
of complex security programs and a knack for
implementing effective controls, Mr. Chishty has
consistently steered organizations toward greater
resilience. His experience spans a wide spectrum,
from introducing cutting-edge security technologies
to conducting meticulous risk assessments.
Results-Driven: Throughout his career, Mr. Chishty
has maintained a reputation for delivering tangible
results that align seamlessly with overarching business
objectives. Whether it’s enhancing cybersecurity
measures or leading compliance endeavors, he has
consistently achieved outcomes that matter.
Syed Missam Akhter
Cluster I.T Procurement Manager,
Emirates Stars Hospitality Group
Dubai & Sharjah
Kunal Malhotra
Founder & CEO, CYTERICO
Aseasonedprofessionalwithproficiency
in Cybersecurity & Technology Risk
and extensive leadership expertise.
10+ years of experience delivering
Risk Transformation projects in
Program Governance, Quality
Management, Industry Benchmarking,
Business Continuity Planning, Cyber
Resilience, IT Audit & Controls Testing.
Thrives in collaboration with clients
in diversified sectors, including
Financial Services (Banking &
Insurance), IT, Telecommunication,
Energy, Education, Government
& Pharmaceutical. In his recent
role, Kunal worked as an Executive
Director for a consulting firm, Kloudyy
Consulting Group (KCG), for which he
did contract work in the past known as
Ekloudyy Datamatics Private Limited,
setting and leading the Cybersecurity
and Technology Risk practice.
Any special project/work you would
like to highlight :
Cyber Strategy for Fotune 500, Setting
up the 3 LOD, Benchmarking against
the top tier banks in regards to TPRM.
32 -JANUARY 2024
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
Reaz shaheed
Educational Technology
Director,
Shattuck-St.Mary’s Forest
City International School,
JOHOR, Malaysia
Information Technology
Specialist since 1997 with
leadership roles at K-12
International Schools in
Bangladesh, Tanzania
and now at the Shattuck-
St. Mary’s Forest City
International School in
Malaysia, promoting
Digital Transformation in
learning and teaching with
21st Century Academic
Technologies.
A certified Technology
Director from the Texas
Computer Education
Association,USAand Trainer
in Google Workspace for
Education I believe in the
motto of lifelong learning to
help educators in building
global citizens beyond
the boundaries of cultural
differences.
Any special project/work
you would like to highlight :
Continued exploration
of integrating cloud
technology with productive
Business Systems to create
operational efficiencies
has made the transition to
remote learning during the
recent global pandemic
seamless, with ZERO
downtime.
Also Work in progress: Adopt
Industry standard Cyber
Security policies for Students
and Teachers.
Shariq Khan
VP, Head of IT, ERGO Insurance Pte Ltd.
Singapore
“I am Shariq Khan, VP and Head of IT at ERGO
Insurance Singapore.
A senior technology management leader with a
proven track record in driving IT transformation
and innovation in Insurance industry. I bring
expertise in strategic IT planning, organization-
wide change delivery, digital transformation,
IT operation management and IT Infrastructure
simplification/modernization. I am passionate about
leveraging my technical and leadership skills to help
organizations to achieve their business objectives.
I have also been recognized by IDG (Foundry) among top
100 CIO in South East Asia and HK region for year 2022
Runcy Oommen
Director, Software Engineering, SonicWall
Runcy is an accomplished professional in the
field of Software Engineering with strong SDLC
experience and a string of projects primarily in
the security domain. Runcy strives constantly
to build better software with extra focus on
data security that would be kept throughout
its life-cycle and not just as an after-thought.
Considers himself to be a perfectionist yet
remains practical, knowing where to draw the
line and stop. As he believes in giving back to the technical
community, he’s the organiser of Google Cloud chapter and
Cloud Native chapters of Bangalore
Steven Sim Kok Leong
Head Group Cybersecurity (CISO),
PSA International Pte Ltd
Steven Sim worked for more than 25 years in
cybersecurity with large end-user enterprises
and critical infrastructures, undertaken global
CISO role, driven award-winning security
governance and management initiatives and
headed incident response, security architecture,
technology and operations at local, regional and
global levels.
Any special project/work you would like to highlight :
PSA Cyber Security Master Plan
He currently leads cybersecurity across PSA Group,
heading the Group Cybersecurity Department and indirect
reports across regional offices and local business units in 42
countries and oversees both Group-wide IT and OT Security
Governance, Technology Management and Incident
Response as well as the Cyber Security Masterplan Office. He
also leads the Group Cybersecurity Centre of Expertise.
-JANUARY 2024 33
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
Shariza Umira Puteri Binti
Kamarozzaman
Cybersecurity Lead,
Tune Insurance Malaysia Sdn. Bhd
Vibhor Bhatnagar
Technical Architect – Presales Google
EcoSystem, HCLTech
I have 12 years of experience, with 8 years in
a server environment and 4 years in Security
Operations and Infrastructure, working with
clients from diverse business backgrounds.I
possess strong analytical skills, am hardworking,
self-disciplined, highly motivated, energetic,
curious, and a team player. I am also creative,
responsible, capable of working under
18 years of extensive experience in business
development initiatives and formulation of
presales strategies. A keen planner, strategist
& implementer with demonstrated abilities in
devising marketing activities and accelerating
business growth spans across multiple
geographies, including the USA, Europe,
Any special project/work you would like to highlight :
I am currently working on setting up Security Operation
Center automation for blocking malicious IP addresses
and handling multiple login failures. We are planning to
execute an annual Cyberdrill and Penetration Test for Tune
Insurance Malaysia in Q4. I am working closely with the
Head of the Department to plan and execute the Tune
Insurance Malaysia Cybersecurity Framework roadmap for
the upcoming year, 2024.
Any special project/work you would like to highlight :
Received
Eminence & Excellence Award 2012 and an Outstanding
Contributor Award in IBM
Received Metlife Insurance application migration
programme -
• Name that you would like to have in the award plaque:
Vibhor Bhatnagar
• Video byte of 30 seconds to 1 minute to acknowledge
the award recognition and how it feels to be the
recipient of the award: Can we get sample.
• Your walk up song: Any list from their side to select from
pressure, and excel in interpersonal and communication,
as well as organizational skills.
Australia, and India.
Vibhor dedicated his expertise to HCLTech, IBM, where he
playedapivotalroleintransformingbusinessesacrossvarious
sectors such as Insurance, Travel, and Communication. As
a visionary leader, he spearheaded initiatives to migrate
and modernize application landscapes, paving the way
for cloud adoption
Vivek Singh
Engagement Director,
TCS Ltd.
VivekisaseasonedInformation
Technology professional with
over 20 years of experience
in the industry, boasting a rich
and diverse career that spans
across multiple geographies,
including the USA, Canada,
Singapore, and India.
For nearly two decades, Vivek
dedicated his expertise to IBM,
where he played a pivotal
role in transforming businesses
across various sectors such
as Insurance, Aviation, and
Pharma. As a visionary leader,
he spearheaded initiatives
to migrate and modernize
application landscapes,
paving the way for cloud
adoption. Vivek’s leadership
not only led to substantial
cost reductions, directly
contributing to improved
EBITA for his clients, but also
served as a catalyst for
revenue growth. He achieved
this by harnessing data-driven
strategies and implementing
innovative solutions to tackle
supply-chain challenges.
In addition to his remarkable
career achievements,
Vivek boasts an impressive
intellectual property portfolio
with over 10 IPs published
under his name on IP.com.
Beyond the world of
technology, Vivek enjoys the
complexities of chess and
finds solace in nature, using
it as a means to unwind and
rejuvenate.
34 -JANUARY 2024
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
36 -JANUARY 2024
CYBERSECURITY PRODUCT
MANAGER:
RAHUL ANANTHANARAYANA
REDDIAR
Rahul Ananthanarayana Reddiar, working as a Cybersecutiy
professional in a Value Added Distributor in UAE. He comes
with a 9+ years of middle east experience in Information
Technology. He currently handles Cybersecurity Product
manager role covering the GCC market & Channel
Development Manager role for Oman region.
-JANUARY 2024 37
R
ahul Ananthanarayana Reddiar, working as a
Cybersecutiy professional in a Value Added
Distributor in UAE. He comes with a 9+ years
of middle east experience in Information
Technology. He currently handles Cybersecurity
Product manager role covering the GCC market &
Channel Development Manager role for Oman region.
As a Cybersecurity Product Manager Rahul
Ananthanarayana Reddiar is responsible for the
development, implementation, and ongoing
management of security products and solutions. He
work diligently to stay one step ahead of malicious
actors by creating and maintaining cutting-edge
cybersecurity tools and systems.
Responsibilities as a product manager in
Cybersecurity:
• One of the primary responsibilities of Rahul
Ananthanarayana Reddiar is to identify market
needs and develop products that address them. This
entails conducting market research, understanding
evolving threats, and collaborating with cross-
functional teams to design and develop effective
cybersecurity solutions.
• Cybersecurity products are not static entities. They
require continuous monitoring, updates, and
improvements to stay effective. Rahul
Ananthanarayana Reddiar is responsible for the
entire product lifecycle, from inception to
retirement.
• Effective communication with stakeholders is
essential. Rahul Ananthanarayana Reddiar liaise
with customers, marketing teams, sales teams, and
internal developers to gather feedback, understand
user needs, and align product development with
business goals.
• Identifying vulnerabilities and potential threats is a
core function. Rahul Ananthanarayana Reddiar
assess cybersecurity risks and develop strategies to
mitigate them. This involves a deep understanding
of potential threats, regulatory compliance, and
industry standards.
• Keeping an eye on the competition is crucial Rahul
Ananthanarayana Reddiar continuously monitor
the competitive landscape to identify gaps in
security offerings and opportunities for
improvement.
• Educating end-users about best practices in
cybersecurity is another vital aspect of the job.
Rahul Ananthanarayana Reddiar ensure that users
understand how to use security products effectively,
thereby reducing the risk of human error in security
breaches.
Challenges facing as a Product Manager in
Cybersecurity:
Working in cybersecurity is not without its challenges.
Cyber threats evolve rapidly, requiring constant
adaptation and innovation in product development.
Some key challenges faced by Rahul Ananthanarayana
Reddiar:
• Cyber threats are continually changing. Rahul
Ananthanarayana Reddiar must keep up with the
latest attack techniques and vulnerabilities to design
products that can withstand new and emerging
threats.
• Striking the right balance between a user-friendly
interface and strong security features can be
challenging. A product that is too cumbersome to
use will discourage adoption, while one that is too
user-friendly may compromise security.
Staying compliant with evolving data protection
regulations and standards is a significant challenge.
Rahul Ananthanarayana Reddiar must ensure that
his products meet legal requirements and industry
standards.
• Rahul Ananthanarayana Reddiar often must work
within budgetary constraints and find innovative
ways to achieve their security goals.
The Significance of Product Manager in
Cybersecurity:
The role of a Rahul Ananthanarayana Reddiar is
significant for several reasons:
• Rahul Ananthanarayana Reddiar play a vital role in
protecting sensitive data from theft, ensuring the
privacyandsecurityofindividualsandorganizations.
• Cyberattacks can disrupt business operations.
Effective cybersecurity products ensure business
continuity by preventing or mitigating the impact of
attacks.
• A security breach can damage an organization’s
reputation. Cybersecurity Product Managers help
maintain trust and credibility by safeguarding
against breaches.
• In the case of government agencies and critical
infrastructure, the role of Cybersecurity Product
Managers is pivotal in protecting national security
interests.
• Cyberattacks cost organizations billions of dollars
annually. By preventing these attacks, Cybersecurity
Product Managers contribute to the economic well-
being of organizations and nations.
In conclusion, Cybersecurity Product Managers like
Rahul Ananthanarayana Reddiar are at the forefront of
the battle against cyber threats. His role is multifaceted,
involving product development, risk management, and
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!

More Related Content

Similar to Cyber Immunity Unleashed: Explore the Future with iTech Magazine!

Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Ersin KARA
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and AnsweredADCBarcode
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 

Similar to Cyber Immunity Unleashed: Explore the Future with iTech Magazine! (20)

Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019Speaker Interview 1: IoT EurAsia 2019
Speaker Interview 1: IoT EurAsia 2019
 
16231
1623116231
16231
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Insights Success 20 Most Valuable IT Service Companies
Insights Success  20 Most Valuable IT Service CompaniesInsights Success  20 Most Valuable IT Service Companies
Insights Success 20 Most Valuable IT Service Companies
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Internet of Things - Asked and Answered
Internet of Things - Asked and AnsweredInternet of Things - Asked and Answered
Internet of Things - Asked and Answered
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Cyber Immunity Unleashed: Explore the Future with iTech Magazine!

  • 1. VOLUME 01 | ISSUE 01 | JANUARY 2024 iTECH MAGAZINE CYBER IMMUNITY THE KEY TO A SAFE AND SECURE DIGITAL TRANSFORMATION THE DIGITAL ECONOMY: A NEW FRONTIER FOR SECURITY LATEST TRENDS OF CYBERSECURITY AND HOW WE CAN EXPLAIN IT. CRYPTO AND TAXES IN 2024: UPDATES, CHALLENGES & SOLUTION CEO Office, Kaspersky Genie Sugene Gan Head of Government Affairs & Public Policy, APJ & META regions www.digitalconfex.com
  • 2.
  • 3.
  • 4. Welcome to the inaugural issue of DIGITALCONFEX’s iTech Magazine - your go-to source for cutting-edge insights, expert analysis, and a front-row seat to the ever-evolving landscape of technology. Technology knows no boundaries, and neither do we. Our Magazine strives to connect tech enthusiasts, professionals, and curious minds from across the globe. We’re also excited to spotlight trailblazing companies and individuals who are redefining the landscape of technology. Their stories are not just inspiring but also offer a blueprint forsuccess in a constantly evolving industry. Join us on this exciting journey through the ever-evolving world of technology. Explore, learn, and engage with iTech Magazine as we unravel the mysteries and celebrate the triumphs of innovation. Warmest regards, DIGITALCONFEX
  • 5. CONTENTS CYBER IMMUNITY THE KEY TO A SAFE AND SECURE DIGITAL TRANSFORMATION INFORMATION TECHNOLOGY CONFEX 2023 CYBERSECURITY PRODUCT MANAGER: RAHUL ANANTHANARAYANA REDDIAR UNLOCKING THE POWER OF AI: NAVIGATING THE GEN AI ERA WITH PHOT.AI AND BEYOND LATEST TRENDS OF CYBERSECURITY AND HOW WE CAN EXPLAIN IT. AHMED YAHYA AL-KINDI: **A JOURNEY OF RESILIENCE AND INNOVATION** THE 2023 TECH RENAISSANCE: A RECAP AND PREVIEW OF THE PROMISE FOR 2024 CRYPTO AND TAXES IN 2024: UPDATES, CHALLENGES & SOLUTION THE DIGITAL ECONOMY: A NEW FRONTIER FOR SECURITY HOW ACCELERATORS CAN HELP WEB3 START-UPS? TECH TRENDS RESHAPING THE AUTO INDUSTRY: TURNING VEHICLES INTO IMMERSIVE LIVING SPACES 06 24 36 40 44 39 42 48 12 16 18
  • 6. G enie heads up the Public Policy & Government Affairs business functions across multiple regions in Kaspersky (including Asia-Pacific, Japan, Middle East, Turkey & Africa). Genie comes with an excellent academic track record; she holds a Juris Doctor in law, an honors degree in Accountancy, and a Specialist Diploma in Counselling Psychology. Called to the Singapore Bar and a qualified lawyer, she is also a Mediation Coach and an International Mediator amongst other things. Having a rich and diverse career history, Genie started her journeys in accountancy and law in Big Four firms. Early on, she was an award- winning entrepreneur, before spending a significant length of time as a senior official in the Singapore Government, having assumed several key portfolios such as Special Aide to the Minister for Law, Singapore negotiator and delegate to the United Nations General Assembly, and Director for policy and law reform. Outside her professional portfolio, her passion for teaching, non-profit and charity work has led her to be an adjunct lecturer at universities and serve on various Boards and Committees of Non- Profit Organizations and volunteer for pro bono legal causes. 6 -JANUARY 2024
  • 7. Genie Sugene Gan Head of Government Affairs & Public Policy, APJ & META regions CEO Office, Kaspersky -JANUARY 2024 7
  • 8. 8 -JANUARY 2024 Digital transformation has brought about tremendous opportunities for economic and industrial growth. The Internet of Things (IoT), in particular, has allowed businesses to build end-to-end digital services, and improved their ability to analyze data and monitor device operation and condition. Ops-Tech (OT) platforms, which started as part of process controls for manufacturing equipment, are now ubiquitous. However, these developments have also created a complex environment consisting of a large number of disparate digital elements, which introduces more points of vulnerability that cybercriminals can potentially attack. A new paradigm is needed to ensure that cybersecurity solutions for this complex environment remains efficient and secure – Cyber Immunity is one such vision upon which such solutions can be built. Growing Pervasiveness and Complexity of Threats in IoT and OT Platforms As the number of devices connected to the IoT grows exponentially, the installation of protective tools that need regular updates on each of these devices is a time- consuming and resource-intensive process. The problem is compounded by many of these devices not having the processing capacity for cybersecurity add- on tools such as antivirus software. One example is the growing popularity of the cloud kettle, which is part of the IoT and can be controlled through an app on a smartphone; not all cloud kettles have the CPU or memory for solutions against cyberattacks, but this does not mean that they will not be targeted in attacks. This is a problem that did not exist during the eras of mere whistling or electric kettles. A recent finding by Kaspersky’s researchers illustrates just how pervasive IoT threats have become, as well as the fact that they could be targeted at seemingly innocuous devices. Researchers found that a popular model of smart pet-feeder, which dispenses pet food at regular intervals and has cameras to check on the pet, could be easily hacked to allow an attacker to gain unauthorized access to the device and effectively use the pet feeder as a spy camera. There are also risks of a chain reaction type of attack, as once an attacker gains control of a pet feeder in the home network, it can be used as a hub to launch more attacks against other devices in the network. Where OT platforms are concerned, the disparate network of robots, industrial control systems (ICS), supervisory control and data acquisition (SCADA) CYBER IMMUNITY The key to a safe and secure digital transformation By Genie Sugene Gan, Head of Government Affairs & Public Policy APAC & META at Kaspersky systems, programmable logic controllers (PLCs), and computer numerical control (CNC) also offers opportunities for professional targeted attacks. Just between 2017 and 2021, the number of observed Advance Persistent Threats (APTs) and activity clusters grew from 100+ to 900+. Based on Kaspersky’s research, more than 40% of all ICS computers globally were attacked in 2022. Considering the vast amountsofdatacreatedandprocessedbyOTplatforms, there is an urgent need to find efficient yet customized cybersecurity solutions that can be scaled up quickly. The Vision of Cyber Immunity and Kaspersky’s Operating System Even with evolving technologies, the cybersecurity industry often finds itself merely playing catch-up with the attackers. This is especially so when traditional cybersecurity solutions adopt an approach of detecting andreacting.Kasperskythusembarkedonanambitious effort to change things, by finding a way to develop IT systemswith“innate”protection—CyberImmunity. The vision of Cyber Immunity posits that by separating the IT system into isolated parts and controlling the interactions between them, the system continues to perform critical functions even in an aggressive environment and stops potential attackers in their tracks. The goal is to ensure that the cost of an attack on an organization far exceeds the cost of possible damage, thus rendering an attack ineffective. To operationalize the vision of Cyber Immunity, Kaspersky developed its own operating system – KasperskyOS – which comprises a microkernel and the Kaspersky Security System (KSS) module, which come together to provide protection by default. Figure 1: Cyber Immunity as the Design Principle for KasperskyOS
  • 9. The term microkernel implies that only the most critical system operation mechanisms are located in the kernel, while less important functions are ordinary applications – located outside the kernel. This makes it much easier to ensure that the kernel code is free of errors and vulnerabilities, and that the attack surface is minimal. This works hand in hand with the KSS module, which checks each interaction for compliance with security policies, and blocks any interaction that is non-compliant – this ensures that even if a component is compromised, KSS can eliminate or minimize any possible damage. Compared to the traditional monolithic kernel of a general-purpose system, which requires 35 million lines of code in Linux, the KasperskyOS microkernel only requires approximately 100,000 lines of code to develop. This drastically lowers the barrier for developers to create Cyber Immune solutions using KasperskyOS, and reduces the cost of developing and supporting secure IT solutions, even if untrusted third- party code is used. Notably, the microkernel architecture of KasperskyOS also enables Provable Security (based on mathe matical proofs), and minimizes the Trusted Code Base required. While it is possible to use Provable Security on other operating systems, this will take considerably more effort. Actual Applications of Cyber Immune Solutions Cyber Immunity is not just a vision or theory – Kaspersky has successfully developed real world applications for use in Industrial IoT Infrastructure Security, Smart City Protection, and Safe Smart Cars, among others, through a combination of KasperskyOS and hardware developed in collaboration with partners such as Siemens as well as Kaspersky’s subsidiary, Adaptive Production Technology (Aprotech). Industrial IoT Infrastructure Security Industrial IoT infrastructure consists of many components at various levels. One component to which all devices in any IoT system connect is the gateway – through which information is transferred to data centers for further processing and storage. Kaspersky IoT Secure Gateway (KISG), powered by KasperskyOS, is installed on the boundary between IoT infrastructure and external data networks to protect this crucial interface. The gateway blocks attacks on smart ICS, equipment and information-sharing channels by identifying unauthorized network connections, and providing secure updates and configuration of software, and transfers control instructions to actuators. Convenient centralized configuration and management of the events of Kaspersky IoT Secure Gateway are provided by Kaspersky Security Center, which enables an administrator to monitor the status of gateways from a single point and respond quickly to incidents. Figure 2: KasperskyOS Components Interaction Scheme Figure 3: Size of KasperskyOS microkernel code compared to the monolithic kernel of a general-purpose system Figure 4: Gateway functions in an industrial network -JANUARY 2024 9
  • 10. 10 -JANUARY 2024 Smart City Protection Large cities face the challenge of managing public utilitiesforthousandsofresidentialandnon-residential premises efficiently. This often requires automated data, but collection of such data has to be secured. Kaspersky, with support from the Orenburg regional government, successfully built a cloud control room for managing smart digital systems in the municipal sphere, using several solutions for protection at different levels. The cloud level is protected by Kaspersky Hybrid Cloud Security, which controls applications and devices, segments networks, and prevents the use of unpatched vulnerabilities. The data transfer channel from the controller (PLC) to the cloud is protected by KISG 1000, which detects and classifies all devices on the network, and has firewall functions and blocks attacks on CCTV cameras, motion and door sensors, and other local devices and data links. This is in turn managed by the Kaspersky Security Center platform. The cloud control room has thus made it possible to monitor the actual consumption of resources in real time, get notifications of accidents, gain better control over the deterioration of utilities, and increase transparency in public utilities management – while ensuring the safekeeping of automated data. Safe Smart Cars A modern motor vehicle can have more than 100 electronic control units (ECUs). They optimize fuel consumption, inform the driver of road conditions, entertain passengers, control braking, and perform other important functions. The software for these control units is becoming more and more sophisticated, and can exceed 100 million lines of code (more than in a modern operating system) and creates possibilities for vulnerabilities. Kaspersky Automotive Secure Gateway (KASG) is specialized software designed to provide secure and reliable communication between electronic units of the electrical/electronic architecture, the connected vehicle cloud, and diagnostic devices. This software can be used to implement remote diagnostics, secure over-the-air ECU updates, and other telematic services. KASG includes the Kaspersky Automotive Adaptive Platform (KAAP), powered by KasperskyOS, which is a software development kit that supports secure solutions for ECUs, including Figure 5: Solutions used for smart city protection in Orenberg telecommunications units (TCU/V2X, gateways), driver assistance systems, self-driving cars (HAD/ ADAS) and other components of the smart vehicle digital cockpit. KasperskyOS ensures component isolation and control over interprocess communication, which prevents separated systems from affecting one another, thus enabling the highest level of solution reliability and security in smart cars. There are many more applications of Cyber Immunity, such as in Virtual Desktop Infrastructure and in railway protection. Cyber Immunity has also received much recognition, with KasperskyOS-based products having won awards at the World Internet Conference in China in both 2020 and 2022. In the future, we hope to see even more uses of Cyber Immunity for the vision to take root and become established. Hopes for the Future of Cyber Immunity and Potential Partnerships The vision of Cyber Immunity was designed to be collaborative. Kaspersky alone does not have all the solutions to bring it to fruition, and KasperskyOS was designed for scalability and participation from like- minded partners. Kaspersky seeks partners to join us in building a Cyber Immune world. These could be education and research institutions, which could receive content on the basics of Cyber Immunity, and which could potentially co-develop Cyber Immune products with us. We are also keen to work with partner resellers and system integrators, who can integrate Cyber Immunity into both new and existing products. Finally, our KasperskyOS-based products Kaspersky Thin Client and KISG are ready to be applied in more use cases. We hope to further the vision of Cyber Immunity and see scalable solutions for KasperskyOS that will underpin the infinite possibilities for digital transformation. Figure 6: Solutions used for safe smart cars
  • 11. MEETS CRAFTMANSHIP CLOUD Unleashing the Power of Cloud, Security, and Cutting-Edge Development with an ESG Advantage. email at: gurpeet@diggfull.com Visit Our Website www.diggfull.com At DiggFull, we navigate the complexities of technology with a commitment to ESG principles. Our cloud services not only ensure scalability, security and efficiency but also prioritize sustainability, ethical practices, and responsible governance. Dive into a world where cloud solutions are boundless, development is driven by passion, and security is unwavering. With DiggFull, you're not just embracing technology; you're championing a sustainable and ethical digital future
  • 12. 12 -JANUARY 2024 WING COMMANDER ANURAG CHANDRA MILITARY TRANSITION Chief Information Security Officer COMMISSIONED OFFICER OF TECHNICAL BRANCH IN INDIAN AIR FORCE WITH A RICH AND DIVERSE EXPERIENCE IN STEERING THE INFORMATION TECHNOLOGY EDGE. Experienced Technology Executive Skilled In Cyber Security, It Project Management, Vendor & Public Relations. Proficient In Procurement Analytics And Strategic Growth. Worked As Chief Technology Program Manager For Data Analytics, Ai, & Innovation. Passionate About Leveraging Cutting-Edge Tech For Positive Impact.
  • 13. -JANUARY 2024 13 THE DIGITAL ECONOMY: A NEW FRONTIER FOR SECURITY T he digital economy has revolutionised the way we live, work, and interact with each other. It has brought about unprecedented opportunities for innovation, growth, and prosperity. However, with these opportunities come new challenges and risks. The digital economy is under constant threat from cybercriminals, hackers, and other malicious actors who seek to exploit vulnerabilities in our digital infrastructure. The need for digital security has never been more urgent. In this article, its an endeavour to bring out the importance of digital security in today’s economy and why it is essential to safeguard our digital assets. Lets try to investigate also, latest trends, technologies, and best practices in digital security and provide actionable insights that can help us secure our digital future. Let try discovering as to how we can protect the digital economy and ensure a safe and secure digital transformation for all. India has seen a significant boom in the digital economy in recent years. The Digital India initiative has played a key role in this growth. The initiative aims to provide digital infrastructure to every citizen of India and has been successful in increasing the number of internet users in the country. The digital platform infrastructure has enabled businesses to reach a wider audience and has created new opportunities for entrepreneurs. Digital Public Infrastructure (DPI). According to Nandan Nilekani, an Indian entrepreneur, cofounder Infosys. India is moving from an offline, informal, low productivity, multiple set of micro-economies to a single online, formal, high-productivity mega economy with the help of Digital Public Infrastructure (DPI). The DPI approach includes frameworks such as the Open Network for Digital Commerce (ONDC), Open Credit Enablement Network (OCEN), and the National Digital Education Architecture (NDEAR), which are unlocking new opportunities for businesses and individuals alike. Nilekani believes that this transformation will continue over the next 20 years and will create tremendous economic value and empowerment of citizens as new digital applications permeate sector after sector. As per the Indian 2011 census, there is only 36 %chance that two Indians selected at random could even talk to each other. As we as Indians have a huge variations in culture, markets, industrialisation and regulations. But today in the year 2024 we have most closely micro economies, electronic registering and digital IDs through Aadhaar, a unique lifetime identity. In these eight years of period India became the worlds highest volume of digital payments. India’s digital economy has grown 2.4 times faster than the Indian economy, with strong forward linkages to non-digital sectors. India’s digital consumer base is the second largest in the world and growing at the second- fastest rate amongst major economies. India’s inclusive digital model is narrowing the digital divide within the country and bringing benefits of Anurag Chandra Cyber Enthusiast Digital Economy Security technology to all segments of people.In times of crisis, DPIs elevate from an efficient “good-tohave” to a necessary” must-have” like bringing in the real time observability to vaccine inventory visibility. DPIs help strengthen a country’s public finances through strengthening tax revenue or increased financial transparency through linking of Public Financial Management System (PFMS) with Aadhaar. But then what are the challenges even if I can be enabling targeted-welfare spends through Aadhaar- like identity program or reduced risk and increase in the supply of credit to MSMEs and the public. Countries with many DPIS are best suited to adopt, spread as well as regulate the use of Artificial Intelligence (AI) technologies in service of their people. As the digital realm continues to evolve, and with the sharing DPIs, this can be unleashed as powerful DIGITAL capital. In such scenarios, India’s cyber insurance market has emerged as a domain of strategic importance and robust growth. The significant rise in cyber awareness, compelling companies, businesses, and individuals to rely heavily on digital solutions for daily operations. However, this has also led to increased incidences of cybercrimes, targeting vulnerable group. Therefore, certainly! Securing the digital economy is a crucial aspect of the modern world. CHALLENGES FOR THE DIGITAL ECONOMY As per the various surveys, it reveals that securing the digital economy is a complex and evolving challenge. According to the World Economic Forum, two key challenges for the digital economy are cybersecurity and privacy. The Asia-Pacific Economic Cooperation (APEC) has identified the following challenges: cybersecurity, data privacy,digitalinclusion,anddigitalskillsdevelopment. In Southeast Asia, the digital economy has brought about opportunities for innovation and growth, but also poses challenges such as cybersecurity, data privacy, and human and physical capital development.
  • 14. 14 -JANUARY 2024 SOURCES. emerald Insight, government.economictimes. indiatimes.com, apec.org, weforum.org With the rise of digital payments in India, there has been asignificantincreaseinthenumberoffraudsperpetrated by exploiting digital payment systems and human vulnerabilities. The Reserve Bank of India (RBI) reported that the volume of frauds reported by financial institutions (FIs) using cards and internet banking was 34% higher in 2021-22 than in 2019-20. During 2022- 23, public sector banks reported 3,405 frauds involving Rs 21,125 crore, while private banks reported 8,932 cases involving Rs 8,727 crore. The rest were from foreign banks, financial Anurag Chandra Cyber Enthusiast Digital Economy Security institutions, small finance banks, and payment banks. Frauds occurred predominantly in the category of digital payments (card/ internet), in terms of number, said Reserve Bank’s Annual Report 2022-23. The dark web is a part of the internet that is not indexed by search engines and is often used for illegal activities. The changing nature of fraud and increase in fraudulent activities can be attributed to the major factors like : - Diversified entry points. Businesses in India have been digitizing across their value chains at breakneck speeds. This increases the scope of opportunities for fraudsters and offers them a wider attack surface for exploitation. The common entry points include social media, ecommerce, or services like retail transactions, rideshares and lodging. - Vulnerabilities in the new payment technologies. Personal data of customers is made available on the dark web, enabling fraudsters to carry out this type of fraud. In this year, AI would help cybercriminals manipulate social media and shape public opinion like never before. Bad actors would deploy AI tools to fabricate photos, videos, and audios and lodge on social media. As a CISO, it is important to be aware of the current cybersecurity landscape in India. According to a survey conducted by India’s print media, India’s digital footprinthasmadeitanalluringtargetforcybercriminals seeking to exploit vulnerabilities. Cybersecurity providers have warned that data breaches would skyrocket in 2024, and there would be continued acceleration in ransomware activities in addition to a surge in identity-based attacks resulting from increasing cloud adoption. Deepfakes would also pose a looming threat to the country’s cybersecurity this year. As organizations migrate their data, applications, and workloads to the cloud, the attack surface widens, providing a broader canvas for threat actors to exploit. Organisations may also have less visibility and control over cloud resources than in on-premises environments, which could make it difficult to detect intrusions and prevent unauthorized access. Importance of Digital Security in Today’s Economy Safeguard Digital Assets. Digital security is a critical aspect of today’s economy, and it is essential to safeguard our digital assets. The rise of the digital economy has brought about unprecedented opportunities for innovation, growth, and prosperity. However, with these opportunities come new challenges and risks. The digital economy is under constant threat from cybercriminals, hackers, and other malicious actors who seek to exploit vulnerabilities in our digital infrastructure. The need for digital security has never been more urgent. Companies and governments alike must take proactive measures to Anurag Chandra Cyber Enthusiast Digital Economy Security secure their digital assets. By embracing digital security, we can ensure a safe and secure digital transformation for all, fostering trust in the digital economy and enabling sustainable economic growth. As a CISO, it is important to stay up-to-date with the latest cybersecurity trends and technologies. This includes keeping up with the latest threats and vulnerabilities, as well as understanding the best practices for securing digital assets. It is also important to have a strong disaster recovery plan in place in case of a cyber attack. To secure the digital economy, it is important to have a robust cybersecurity framework in place. This may need measures such as encryption, firewalls, intrusion detection system, and access controls to be mandatorily be included. It is also important to have a disaster recovery plan in place in case of a cyber attack. By taking few of the industry proven steps, businesses can ensure that they are well-protected in the digital age. To combat these frauds, payment service providers have been providing an enhanced seamless user experience at competitive prices, promoting wider adoption of digital payments. Users have multiple options for digital payments such as cards, wallets, Unified Payments Interface (UPI), mobile banking, QR code and various other methods . UPI has contributed significantly to the growth of digital transactions in India. In the vast and intricate landscape of the internet, the Dark Web stands as a shadowy realm that has captured the imagination of both cyber enthusiasts and those concerned about online security. This hidden corner of the web is notorious for being a hub of illicit activities, from drug trafficking and hacking services to stolen data markets and more. The Dark Web is a portion of the internet intentionally hidden from search engines and casual users. It is only accessible through specific software, such as Tor (The Onion Router), which anonymizes users and their activities. Unlike the Surface Web, which includes websites indexed by search engines, and the Deep Web, which comprises unindexed web pages (e.g., databases,
  • 15. -JANUARY 2024 15 password-protected content), the Dark Web is designed to be deliberately concealed. The Dark Web is, in essence, a subset of the Deep Web, but what sets it apart is the intent to hide content and activities. This intentionality has made it a haven for those seeking anonymity, whether for legitimate purposes like whistleblowing or nefarious activities like illegal trade. Cybercriminals use the dark web as their base of operations to carry out illegal activities, sell stolen data, and launch cyber-attacks on businesses. It is a growing concern for enterprises, as they face increasingly sophisticated cyber threats every day. The Dark Web poses significant threats to both individuals and organizations in terms of Identity Theft, Financial Fraud, Corporate Espionage, Reputational Damage and also creating Law Enforcement Challenges. The Digital Personal Data Protection Bill, 2023 (“DPDP Bill”). In the era of digitisation, data protection must be balanced with the right equation of fraud detection associated with data. Businesses must be well-equipped to combat the threats of data breaches and ensure their customer’s data is not at risk. The Digital Personal Data Protection Bill, 2023 (“DPDP Bill”) marks the onset of a new data protection regime in India, the bill is ready to set a benchmark amongst similar legal frameworks, globally. protect the enterprise from the dark web, cybersecurity professionals must sharpen their skills, invest in advanced security technologies, and implement effective security policies. To ensure digital payment security, it is important to follow the best practices recommended by the payment service providers. There will be few basic steps which we all might have to adhere to, like : • Use strong passwords and change them frequently. • Avoid using public Wi-Fi networks for making digital payments. • Keep your device’s operating system and applications up-to-date. • Do not share your personal information, such as passwords, PINs, or OTPs, with anyone. • Check your bank statements regularly to detect any unauthorized transactions. • Integrated platforms can consolidate numerous point products into a single purpose-built solution. The consolidation of endpoint, server, and cloud security and workload protection allows you to protect your ecosystem, providing more visibility and simplifying operations • Educate Your Employees as they are often the first point of contact with cybercriminals, who use social engineering tactics to gain access to your network. Provide awareness training that teaches them to recognise suspicious and fraudulent messages, be careful about the information they share online, and verify any requests for sensitive data. Implement Effective Security Policies and enterprises should establish a comprehensive disaster recovery plan to ensure they can recover their systems and data quickly in case of a successful cyber-attack. To summarise and to address these challenges, CISOs should consider implementing the following measures: Ø Conducting regular security assessments. Regular security assessments can help identify vulnerabilities and provide insights into the effectiveness of existing security measures. Ø Implementing multi-factor authentication. Multi- factor authentication can help prevent unauthorized access to sensitive data and systems. Ø Establishing a security awareness program. A security awareness program can help educate employees on the importance of cybersecurity and how to identify and report potential security threats. Ø Implementing a data backup and recovery plan. A data backup and recovery plan can help ensure that critical data is not lost in the event of a security breach. Ø Partnering with a trusted cybersecurity provider. Partnering with a trusted cybersecurity provider can help organizations stay up-to-date with the latest security threats and implement effective security measures. By implementing these measures, CISOs can help protect their organizations from the growing threat of cyberattacks and ensure the safety of their data and systems. CONCLUSION “As AI continues to lower the barrier to cybercrime and ushers in a new era of AI-powered cyberthreats, scams will become more sophisticated and more difficult to distinguish from legitimate messages and sites. Even experts will have trouble telling fact from fiction to deepfakes that could impact everything including the future of our children, and beyond,”. Digital security is no longer an option, but a necessity in today’s economy. As the world becomes increasingly interconnected, the risks and threats to our digital infrastructure, services, and data have grown exponentially. The rise of artificial intelligence and the Internet of Things has fundamentally altered the way we use software and data, making software’s attack surfaces more complicated and software itself more vulnerable. The importance of digital security cannot be overstated, and it is imperative that companies and governments alike take proactive measures to secure their digital assets. By embracing digital security, we can ensure a safe and secure digital transformation for all, fostering trust in the digital economy and enabling sustainable economic growth. To safeguard our digital assets, we must adopt a comprehensive approach to digital security. This approach should include measures such as implementing robust cybersecurity protocols, conducting regular security audits, and investing in employee training and awareness programs. We must also leverage the latest technologies and best practices in digital security to stay ahead of emerging threats. By taking these steps, we can protect our digital assets and ensure a safe and secure digital future for all.
  • 16. 16 -JANUARY 2024 HOW ACCELERATORS CAN HELP WEB3 START-UPS? Artak is BD and IR manager at yard[hub] – web3 venture studio & accelerator. T he Web3 space is a frontier of innovation, presenting startups with intricate challenges that demand expertise in blockchain and tokenized ecosystems. Accelerators step into this landscape, offering more than just mentorship, education, networking, and funding. They become architects of success, especially crucial in a domain where equity or tokens often constitute compensation. Tailoring Accelerator Programs for Web3 Diversity Recognizing the diverse needs of Web3 startups at various stages, accelerators play a pivotal role in tailoring programs. The demands of an early-stage Web3 venture vastly differ from those of a series-A health startup. This nuanced understanding allows accelerators to provide targeted mentorship, ensuring each cohort receives specialized guidance for success. • Mentorship: Accelerators offer invaluable mentorship from seasoned industry professionals, guiding startups through the complexities of Web3 with first-hand insights. • Educational Resources: Curating specialized content, accelerators empower entrepreneurs to stay abreast of Web3 advancements, ensuring they are well- informed and equipped for success. • Networking Opportunities: Accelerators facilitate meaningful connections with investors, mentors, and peers, creating a collaborative environment where ideas flourish and startups grow. • Seed Funding: Crucial seed funding provided by accelerators serves as the financial backbone for early-stage startups, nourishing growth and transforming innovative concepts into impactful solutions. The customization of accelerator programs is explored further in subsequent chapters, highlighting their adaptability to diverse startup needs in the vibrant Web3 ecosystem. Different Accelerator Types in Web3 In the realm of startup accelerators, tailoring programs to meet the distinct needs of various industry verticals and startup stages is paramount. The diverse requirements of Web3 early-stage startups differ significantly from those of series-A health startups. In the dynamic realm of Web3, where blockchain and tokenization take center stage, startups face unique challenges on their path to success. Accelerators, specialized programs for rapid growth, emerge as guiding beacons for these ventures. This article delves deeper into the profound impact of accelerators, with a focus on the tailored approach required for diverse Web3 early-stage startups.
  • 17. -JANUARY 2024 17 Recognizing these differences allows accelerators to design programs that provide targeted mentorship, resources,andsupport,ensuringthateachcohortreceives the specialized guidance required for success in their specific domain and stage of development. This customized approach enhances the effectiveness of accelerator programs in fostering innovation and facilitating the growth of startups across a spectrum of industries and developmental phases. Explore the diverse structures of Web3 accelerators, essential pathways for startups. Understanding this variety is crucial for startups navigating their way to success in the dynamic Web3 landscape. • Regional Accelerators: Regional accelerators strategically target startups within specific locations, harnessing local entrepreneurial ecosystems to provide contextual advantages. • Corporate Accelerators: Large corporations drive Web3 innovation through strategically aligned accelerators. These programs offer startups exclusive access to corporate resources and extensive networks, propelling rapid growth. • Government Startup Programs: Governments actively contribute to Web3 innovation through initiatives like Hub71 and DIFC Fintech Accelerator in the UAE. Theseprogramsdemonstrateadedicationtonurturing innovation by providing startups with essential support to thrive in the evolving Web3 sector. • Non-Corporate Accelerators: Initiated by small companies with domain expertise, non-corporate accelerators bring a unique flavor to the Web3 startup scene. Often focused on specific fields, these accelerators offer specialized support tailored to the intricate needs of startups within those niches. Addressing Web3 Startup Challenges Web3 startups encounter specific challenges that accelerators are adept at solving. Accelerators bring experience and insights critical for tackling these hurdles. Thespecificchallengesofweb3start-ups,thataccelerators can solve. • Creating Sustainable Business Models: Many Web3 startups focus on token launches or NFTs, posing significantlong-termrisks.Fewprojectshaveachieved a revenue stream that ensures long-term profitability. • User Acquisition Challenge: dApps require users to be familiar with blockchain technologies, including blockchain wallets and custodial wallets. This complexity deters regular users, narrowing the target audience. • Lack of Network: Startups face difficulties in networking during their initial stages. Achieving goals often requires substantial social capital, emphasizing the importance of knowing the right people. - Effective Go-to-Market Strategy: Web3 project strategies differ significantly from traditional ones, presenting challenges unfamiliar to Web2 entrepreneurs. - Tokens and NFT Launch: The success of a project, especially those involving tokens or NFTs, depends on the effectiveness of the initial launch. Multiple factors influence this, requiring experience and insight for informed decision-making. - Fundraising Hurdles: Successfully raising funds goes beyond a compelling pitch deck. Warm introductions from other founders or personal relationships with VCs or angel investors are crucial. Feedback from VCs early on can save significant time. yard[hub] Accelerator: Nurturing Web3 Innovation responsetotheuniquechallengesfacedbyWeb3startups, the yard[hub] accelerator emerges as a beacon of support. The accelerator leverages the team’s rich experiences over the past two years in launching and nurturing successful Web3 projects. The program is meticulously crafted, focusing on product development, business models, GTM strategy, marketing, business development, and fundraising. yard[hub] accelerator program offers: • Mentorship from successful experts; • Educational workshops focused on the needs of startups; • Strategic networking opportunities with key industry players and investors; • Market positioning assistance for user adoption and brand development; • Grant support from blockchains and other companies. Unveiling the Second Cohort The first cohort of yard[hub] accelerator witnessed tremendous success, with over 100 applicants in November. As the program gears up for its second cohort in 2024, it continues to offer a 12-week journey that goes beyond traditional acceleration. Participants benefit from mentorship, educational workshops, strategic networking, and the opportunity to pitch to VCs and investors at the demo day. Contributing to Web3 Industry Trends Beyond the confines of individual accelerators, the Web3 industry is marked by dynamic trends. These trends encompass decentralized finance (DeFi), non-fungible tokens (NFTs), and blockchain applications. Accelerators adapt to these emerging technologies, playing a pivotal role in shaping the landscape of Web3 innovation. Conclusion Accelerators like yard[hub] are indispensable in the Web3 ecosystem, bridging the gap between challenges and opportunities for startups. The commitment to fostering innovation and success in this dynamic sector is evident in the announcement of the second cohort of yard[hub] acceleration program. As Web3 continues to evolve, accelerators play a crucial role in shaping the narrative of success for emerging startups. Their comprehensive support empowers startups to thrive in the complex and ever-evolving landscape of Web3. Apply for the 2nd cohort of yard[hub] acceleration program:
  • 18. RABINDRA SAH Chief Engineer - Strategic Projects at Tata Technologies Limited Global Practices - Automotive & Industrial Heavy Machinery Engineering Research & Design, PLM & Digital Enterprise System Creating Industry engineering Business Solutions for Digital & Physical Transformation from Product to Manufacturing Mr Rabindra Sah is having 31+ Years of working Experience with Tata Motors and Tata Technologies. He is industry leader to engineering services in various industries and domain using digital technologies & Industry 4.0 solutions for more than 80 customers worldwide - Asia Pacific, Europe & North America. In his current role, he is creating Industry Business Solutions for Digital & Physical Transformation in Product & Manufacturing (Digital to Physical) and have worked for the industries - Automotive, Aerospace, Industrial Heavy Machinery, Process Industry – Steel, Port, Air Cargo, FMCG, Media & Entertainment. He comes with strong Domain for End to End - Product Design & Development, CAE Product Validation, New Product Introduction, Smart/Digital Manufacturing, Digital Twin, Industry4.0, Process & Facility Planning, Augmented & Virtual Reality, Additive Manufacturing, Data Science, Block chain, Vehicle and Autonomous vehicle. He is instrumental in digital transformation using solution of Dassault Systemes, Siemens, Altair, MSCNastran, DEFORM-2D/3D, PTC, Euclid, Autodesk, UNITY, Unreal Engine, Xcelgo in the industry. Rabindra is an expert in the Digital Manufacturing world and has experience in Virtual Production, Visualization, Digital Twin in the framework of Industry4.0, and Autonomous vehicle. Rabindra is Unreal Engine Authorised instructor (UAI) from Epic Games. One of his passions is as and trainer on Games, Augmented & Virtual Reality and Virtual Production experiences Unreal Engine. He loves to interact, guide and motivate student, Faculty & industry professionals with his talk, training, mentoring & coaching. He is passionate to share knowledge acquired from his vast three decades of experience & leadership working across Industries, domains and digital technologies and supports the mission skill of the nation for the noble cause. Rabindra Sah holds B. Tech (Mechanical Engineering) from the National Institute of Technology Patna M. Tech in Data Science and Engineering from Birla Institute of Technology & Science, Pilani. He currently pursuing his PhD in Autonomous Vehicle at Amrita Vishwa Vidyapeetham -Bangalore Linkedin: www.linkedin.com/in/rabindra-sah 18 -JANUARY 2024
  • 19. TECH TRENDS RESHAPING THE AUTO INDUSTRY: Turning Vehicles into Immersive Living Spaces By Rabindra Sah, Chief Engineer | Tata Technologies https://www.linkedin.com/in/rabindra-sah/ T he automotive industry is witnessing a remarkable transformation in customer behavior driven by the rapid adoption of advanced technologies. As vehicles become more connected and integrated with cutting-edge digital features, the driving experience has evolved into something akin to a second living room. Customers now seek immersive experiences with high- tech Human-Machine Interfaces (HMI) and digital cockpits, creating an environment where they can stay connected, entertained, and productive while on the move. In this era of smart vehicles, consumers are no longer just passengers; they are active participants in their journey. The automotive industry’s commitment to sustainability and the circular economy has led to vehicles designed with recycled and reusable materials, aligning with the growing demand for eco-friendly options. TOP DIGITAL ENGINEERING TECHNOLOGIES FOR IMMERSIVE EXPERIENCE 1. Gamification for immersive Experience: The technology of the game engine platform is being employedbyOEMsforvariousengineeringapplications in the automotive sector. Key areas of application include Augmented Reality (AR) and Virtual Reality (VR), Collaborative Design Review and Visualization, Autonomous Vehicles, Advanced Driver-Assistance Systems (ADAS), Metaverse, Virtual Production, Sales and Marketing, Human-Machine Interface (HMI), and more. AR and VR are particularly making significant inroads in design, manufacturing, training, maintenance, and sales marketing. 2. Innovation with Design Thinking OEMs and Tier suppliers are heavily focusing on the framework of Design Thinking to drive innovation and improve their products and processes. This approach aids in delving into problem statements and coming up with unique solutions. The Design Thinking framework has provided the Startup community with a systematic methodology, enabling them to become leading global automotive OEMs. 3. Growth with Collaboration & Partnership Collaboration and partnership have become the norms of business for achieving growth. OEMs face significant challenges when attempting to be involved in the design and development of every part of a vehicle. As a result, there is a global trend toward collaboration and partnerships between OEMs. These collaborations often involve startups and other entities, with OEMs reserving funds for their partners to develop solutions. This approach accelerates the journey to success and product development. FOR EXAMPLE: o Tesla partners with BYD supplies electric vehicle batteries; o Toyota Produces EV powered by BYD Batteries o The Volvo Group and Daimler Truck AG to lead the development of sustainable transportation by forming joint venture for large-scale production of fuel cells 4. Adoption of Agile Framework: In the realm of product development, automotive OEMs strongly embrace the Scrum Framework. Unlike -JANUARY 2024 19
  • 20. 20 -JANUARY 2024 the traditional waterfall approach, which is a defined process, the Scrum Framework is empirical and handles changing situations efficiently. Work is divided into iterations, making it flexible and adaptable to changes in priorities due to evolving circumstances. The usage of Agile frameworks is prevalent in the context of OTA (Over-The-Air) updates for software- defined vehicles, particularly in the domains of electric vehicles, connected vehicles, and autonomous vehicles. 5. New Perspective - The Car as a Second Living Room: o Nowadays car is being considered as second living room. Prime considerations for designers are how immersive experience can be created considering more Space, Spatial Audio, ergonomics of Seats, Infotainment systems, Comfort, Safety and new Features. 6. Enhancing Safety with ADAS and AV o There are large number of accidents happening worldwide due to Human driving a vehicle due to Human error considering perception, performance, vehicle and environment situations. o Auto OEMs, Startup, Software OEMs, Hardware OEMs and Engineering service providers are working to develop autonomous vehicle and Advanced Driving Assistance Systems (ADAS) . Globally technology is being developed and tested to make vehicle driving safe, accident free and enjoyable experience. Vehicle developed happens on SAE defined level. o Advanced Driving Assistance Systems (ADAS) like Lane Departure Warning, Blind Spot Warning,Parking Assistance,Automatic Lane Change and more are being developed and provided in the vehicle. 7. Adoption of Functional Safety and Cybersecurity Standards by Auto OEMs: There are three primary standards for automotive embedded systems, safety, and security. These standards are integral to the design, development, and updates of vehicles by OEMs, especially for their autonomous and ADAS endeavors. Automotive OEMs are actively working to implement these frameworks. ISO 26262 – Road vehicles Functional Safety ISO/PAS 21448 – Safety of the Intended Functionality (SOTIF) ISO/SAE 21434 – Automotive Cybersecurity 8. Evolution of Automotive withRise of the Software-Defined Vehicle (SDV): In automotive, a software-defined vehicle is that relies extensively on software for its various functions, control, and features, rather than being solely hardware-based. The core concept of a software- defined vehicle revolves around the idea of flexibility, adaptability, and upgradability through software, which can enhance and even transform the vehicle’s capabilities over time It means that Software-Defined Everything in automotive. Virtually every aspect of the vehicle, from its engine and drivetrain to its safety systems and infotainment, can be configured and controlled through software. This means that changes and improvements can be made via software updates, rather than requiring physical modifications Over-the-Air Updates (OTA)that updates and allow manufacturers tosend patches, bug fixes, and new features directly to the vehicle’s software systems, much like you would update your smartphone’s operating system. E/E (Electrical/Electronic) architecture in the automotive industry refers to the structured design and layout of electrical and electronic components and systemswithinavehicle.Thisarchitectureencompasses
  • 21. all the electrical and electronic systems, modules, sensors, controllers, and networks that enable various functions, features, and operations within the vehicle. E/E architecture is essential for the efficient and reliable functioning of modern vehicles. 9. Embracing Sustainable Design and the Circular Economy o OEMs and suppliers are actively transitioning from a linear economy to a circular economy. They are shifting from a ‘Cradle to Grave’ to a ‘Cradle to Cradle’ business model. In this new model, the focus is on designing products with recycled and reusable materials to minimize waste and achieve net carbon neutrality. Each CEO of OEMs and suppliers has sustainability targets defined for its integration into their systems, which leads to a substantial amount of innovation. o The Fourth Industrial Revolution is being leveraged to support the goal of achieving net-zero carbon emissions and establishing a sustainable circular economy. This endeavor primarily concentrates on three major areas: Product, Manufacturing Operations, and Supply Chain. 10. Widespread Adoption of UI/UX Principles o User Experience (UX) and User Interface (UI) skill set is being highly used to create a better product and better experience for users. It leads to high demand of User Experience experts. US & UI provides an engaging user with product & eco- system for new level of experience. 11. Immersive Experiences through HMI and Digital Cockpit Technologies: o Every OEMs are working with their partner to create unique Human Machine Interface, infotainment systems and interior to provide their customers enhanced and better immersive experience. It leads to creativity, innovation and value proposition. HMI & Digital Cockpit experience is the one of the prime factors for users to decide purchasing of vehicle. o Combination of software from engineering, game engine and hardware are being used to develop HMI & Digital Cockpit functionality. -JANUARY 2024 21
  • 22. 22 -JANUARY 2024 12. Auto OEM Building a Customer Community o OEMs place a strong focus on nurturing their user community as a means to bolster their brand. To achieve this, OEMs undertake various initiatives aimed at engaging their users and involving them in the journey to success. One notable approach is the establishment of a User’s Advisory Board, a platform through which OEMs actively seek input, suggestions, and ideas from their users to enhance their products. This endeavour not only encourages a sense of belonging among users but also reinforces their connection with the OEM. o In addition to this, OEMs invest in the creation of exclusive clubs and corporate social responsibility (CSR) initiatives for their users, organizing regular events that allow users to actively participate 13. Incorporating Passenger Vehicle (PV) Features into Commercial Vehicles (CV) A prevailing global trend involves the pursuit of fresh business opportunities within the commercial sector. Worldwide, OEMs are setting their sights on leveraging the diverse features commonly found in passenger vehicles and integrating them into commercial vehicles. This expansion covers a spectrum of elements, encompassing safety enhancements, Human Machine Interface (HMI) innovations, advanced infotainment systems, upgraded digital cockpits, and overall improvements in the user experience. The objective is to enhance the capabilities and user-centric features of commercial vehicles, aligning them more closely with the advancements and offerings in the passenger vehicle segment 14. Emerging Trends of Subscription-Based Business Models o A novel business model is emerging within the automotive industry, often referred to as “Flexibility is the New Premium.” This model introduces the concept of vehicle subscription, allowing users to choose whether to buy or rent a vehicle according to their specific needs. It offers a range of flexible options in terms of pricing and duration, enabling users to tailor their choice to fit their budget. In this innovative approach, users have the freedom to select a vehicle that precisely suits their requirements, and they even have the flexibility to switch cars as frequently as necessary. This model empowers users with unprecedented choice and adaptability, ushering in a new era of convenience and personalization in the automotive landscape. o In summary, the new business model allows for car subscription, offering the following options:  Purchase when needed  Rent when needed  Choose the vehicle you need  Flexibility to meet your budget References/Credit: o Images are taken from websites/internet,OEMs software and service provider o Reference of images from Rivian, Ford, BMW, Volvo, Unreal Engine, News, Technode and others
  • 24. Abdul Azeem Baqar Mohammed IT Manager, Emirates Float Glass Alexandre Horvath Chief Information Security Officer (CISO) & Data Protection Officer (DPO), Cryptix AG Abhilash Radhadevi Head of Cybersecurity, OQT Adedolapo Peter Akindehin Cybersecurity Governance and Compliance Manager/ BISO, Unity Bank Plc Abdul Azeem is a distinguished IT Infrastructure and Cybersecurity professional who has consistentlydemonstratedexceptionalexpertise, dedication, and innovation in the field of IT Infrastructure and Cybersecurity. He has made significant contributions to safeguarding digital landscapes, protecting critical information systems, and mitigating cyber threats. 20 years of experience in multinational organizations on a global level. Proven business partner of C-level executives. Successful management of international cross-functional teams and major IT security and risk programs. Strong background in cybersecurity, data protection and risk management as Alexandre has over a decade of leadership experience in those areas, from a strategic, operational as well as project management point of view. Abhilash Radhadevi, Head of Cybersecurity at OQT is a Senior Cybersecurity executive with more than twenty years of combined experience in the Banking, Financial, and Energy domains. Renowned for his leadership, he has successfully guided global organizations through complex security landscapes. Abhilash’s extensive experience encompasses pioneering Adedolapo Akindehin is a seasoned professional with over 12 years of experience spanning across GRC, Project Management, IT Audit, and IT Security. the Head Security Governance, Program Management and Compliance in one of the top banks in Nigeria, he is responsible for leading and coordinating the operations of the security strategies in line with the business objectives. He acts in the capacity of the Business Information Security Officer (BISO) and deputizes for the CISO. has implemented several security projects, some of which are email security, endpoint security, data loss prevention and system hardening. Prior to now, he was a senior cybersecurity consultant with Digital Encode Limited, and a certified member of ISC2, ISACA, PMI, ACFE and ISO. Adedolapo is a Fellow of the Institute of Chartered Accountants of Nigeria (ICAN) and an alumnus of University of Lagos and University of Liverpool, from where he bagged two Masters degrees in Business Management and Cybersecurity respectively. Any special project/work you would like to highlight: Building an Effective IT Infrastructure and Information Security Strategy for the Organization Any special project/work you would like to highlight: Preparing several companies for the ISO27001 certification Any special project/work you would like to highlight: Artificial Intelligence in the absence of a 24/7 Security Operations Center His hobbies are fishing, reading, teaching, travelling and meeting people cybersecurity strategies, earning him prestigious awards and recognition. A respected thought leader, he has authored multiple articles on emerging threats and innovative solutions, contributing to industry knowledge. His global influence and commitment to mentoring reflect his dedication to shaping the future of cybersecurity. INFORMATION TECHNOLOGY CONFEX 2023 24 -JANUARY 2024 TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 EXCEPTIONAL LEADER IN IT
  • 25. Ankit Agarwal IT Infrastructure & Global System Architect, Encora Baidyanath Kumar CISO and Data Protection Officer, JK Lakshmi Cement Cdr. Suman Kumar Chakraborty Head Customer Success, Canvas, LTIMINDTREE As the Head of IT Infrastructure and Governance at Encora Inc., Ankit Agawral bring over 20 years of experience in managing IT operations, driving tech transformation, and ensuring cybersecurity. With exerience in verticals like Governmet, Education, Finance, Manufacturing, Ankit has successfully led tech transformation and automation safeguarding critical assets against evolving cyber threats while ensuring the resilience and efficiency of IT infrastructure. Baidyanath is Chief Information Security Officer (CISO) and Data Protection Officer at JK Lakshmi Cement, part of the prestigious JK Organisation. In his role, Baidyanath is passionate about CISO as a Service, Cyber Program / Threat Management, Identity as a Service, Cyber Resilience, Privacy and Next- generation Security Operations Center (SOC). With over a decade of extensive experience in the cybersecurity domain, Baidyanath has played a crucial role in establishing information security policies and objectives, evaluating performance, and driving continuity in various e-governance projects for GOI. Cdr Suman Kumar Chakraborty is a veteran of the Indian Navy, an NDA alumnus where he’s held various appointments which have enabled contemporary tech adoption at scale during his over 20 years of service. He has four Masters to his name and has been a Gold Medallist in BTech and MTech, awarded by Dr. APJ Kalam for his project on Missile Auto Pilot. In the recent past, after pursuing his MBA in Strategy and Marketing from ISB adjudged Flag Bearer awardee, he has been in tech leadership roles in two successful start-ups. Firstly, as a founding CTO in healthcare and then as Head of Product for a Blockchain-based portfolio that included Web3 services and was acclaimed as one of the top 3 in India.At LTIMindtree, he leads the WEB3 incubation team with close liaison with strategy teams and other stakeholders toward building a roadmap for service offerings by spawning various initiatives for GTO. Any special project/work you would like to highlight: Zero trust implementation across Organization Any special project/work you would like to highlight: Any special project/work you would liketohighlight:Ihavesuccessfully Incubated WEB3 practise for LTIMINDTREE and presently Heading Customer Success for CANVAS (AI/ML product) which has this year won awards in 6th Annual AI Breakthrough Awards and 2023 Artificial Excellence Awards in 3 categories. Avinash Kumar Singh Head Technology, Core Diagnostics I bring over 13 years of experience as a technology leader in diagnostics, hospitals, andbiotechnology.I’mallaboutdrivingdigital innovation and making big changes happen in global healthcare companies. I’m certified in Digital Innovation and Transformation and have earned multiple top Global Tech Certifications. I’ve also been recognized with awards like CIO100, CSO100, Healthcare AI & ML Innovation, INSIGHTS CXO, and CXO Tech Champion -JANUARY 2024 25 TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT INFORMATION TECHNOLOGY CONFEX 2023
  • 26. Prerna Sharma Sr. Security Analyst III, Workato Inc. Baljit Singh Dhillon Head Cybersecurity Planning, Strategy and Governance, Digital Nasional Berhad, Malaysia Prerna Sharma is a cybersecurity professional with 11 years of experience in governance, risk and compliance. She has a proven track record of architecting and executing comprehensive GRC strategies that safeguard assets, ensure regulatory adherence, and optimise internal processes—recognised for Having spent 24 years across all layers of technology and industries, Baljit has focused time and effort in perfecting an approach to help deliver business results by using technology to its fullest and safest potential. Part of the initial team members who started up Digital National Berhad (a MYR 16.5B, 10 year Malaysian initiative to enable rapid digitisation for the economy by using 5G enablement), Baljit was tasked to help kickstart and run an approach to ensure adequate cybersecurity monitoring, protection and governance of the nations single 5G wholesale network that is meant to service all 5 Telco operators and enterprises. Prior to that Baljit has had stints in Axiata Group, Celcom, Experian, Hewlett Packard and Shell focusing on both cybersecurity and technology solutions, governance and management. He is a CISSP certified professional with a Bachelor’s Degree in Computer Science from University Malaya and currently pursuing a Masters in Computer Science in Research from the same university. Baljit spends he’s time outside work with he’s wife and twin boys watching movies, playing football and traveling. He loves cybersecurity and technology as a hobby and spends time researching meaningful ways it can be adopted better in businesses and society. Any special project/work you would like to highlight: Starting up and operationalising a secure wholesale 5g service for Malaysia delivering tangible results, such as deploying foundational processes for security governance, data privacy and endpoint management. Adept communicator and leader, consistently driving cross- functional collaboration and fostering a commitment to excellence. Genie Sugene Gan Head of Government Affairs and Public Policy, Asia-Pacific, Japan, Middle East, Turkey and Africa, Kaspersky Genie heads up the Public Policy & Government Affairs business functions across multiple regions in Kaspersky (including Asia-Pacific, Japan, Middle East, Turkey & Africa). Genie comes with an excellent Any special project/work you would like to highlight: Ms Genie Sugene Gan is an eminent leader in the cybersecurity sector, who has actively contributed to thought leadership on topics at the intersection of law, technology and public policy. She is also a passionate advocate for Women in Technology, having spoken to international audiences to inspire women to see their own futures in technology. For her outstanding contributions in the field, she had been awarded the Excellent Woman in ICT Leadership Award by the United Nations’ International Telecommunication Union (ITU), and the Telecom Equipment Manufacturers Association of India (TEMA) – the only recipient from the cybersecurity sector. She is also vice-chairperson of the International Women’s Empowerment Forum. Her effervescent presence in international events has made her a sought-after speaker in the industry. academic track record; she holds a Juris Doctor in law, an honors degree in Accountancy, and a Specialist Diploma in Counselling Psychology. Called to the Singapore Bar and a qualified lawyer, she is also a Mediation Coach and an International Mediator amongst other things. 26 -JANUARY 2024 TOP 25 EMERGING WOMEN IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 27. Chi Wai HUI Cybersecurity Solutions Consultant, V-Key Pte Ltd Chi Wai is an accomplished professional with over two decades of experience in the fields of cybersecurity. Currently he is serving at V-Key as a Cybersecurity Solutions Consultant. In this role, he focuses on advocating the importance App Identity, Device Identity, and User Identity. Chi Wai’s responsibilities include recommending cybersecurity solutions to clients, engaging partners and resellers to expand market reach, all while promoting mobile app security and authentication awareness. Chetna Rustagi Technology Leader, TravClan Any special project/work you would like to highlight: Led The Milestone Achievement Of Soc2 Certification At Allbound And Led The Implementation Of Zero Trust Architecture At Allbound Chitij Chauhan Director of Security, Allbound Inc Any special project/work you would like to highlight: I have a digital transformation project going on. and a tech refresh project as well. David Pravinkumar Head of IT, InfracoAsia Development Pte Ltd Betania Allo Cybersecurity Innovation Manager, NEOM Betania Allo is a cyber lawyer and policy expert with a strong history of success leveraging expert legal knowledge and political experience across cybersecurity, data privacy, compliance, and counter- terrorism efforts. She has worked over ten years in public policy, held global executive positions in the private sector, is an entrepreneur in Islamic finance, and has Website: www.betaniaallo.com succeeded as a program specialist in counter-terrorism at the United Nations in projects involving technological initiatives for criminal investigations and safeguarding digital platforms from dangerous organizations, among others. Ms. Allo graduated as a lawyer in Argentina, and holds a Master of Laws (LL.M.) with an academic focus on cyber law and policy from Syracuse University (USA). In addition, she holds a Master’s in International Relations with a Graduate Certificate in International Security from Harvard University (USA), a Postgraduate in Cybersecurity and Compliance from Universitat Internacional de Catalunya (Spain), and is currently pursuing a Doctorate (D. Eng.) in Cybersecurity Analytics at George Washington University (USA). She’s fluent in English and Spanish and has levels of working proficiency in French, Italian, Portuguese and Arabic. Betania also lectures at several universities worldwide and is a regular speaker at conferences about cybersecurity, counter-terrorism, emerging technologies, and leadership. She currently manages Cybersecurity Innovation and Partnerships at NEOM, the first cognitive city in the world. -JANUARY 2024 27 TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 EMERGING WOMEN IN IT TOP 25 EXCEPTIONAL LEADER IN IT INFORMATION TECHNOLOGY CONFEX 2023
  • 28. Dr. Tan Kian Hua Chief Information Security Officer, Lenovo PCCW Solutions Singapore Harutyun Baghdasaryan Vice President, Software Engineering, QLess Assoc. Prof. Tan Kian Hua is a proven solution leader in the field of cybersecurity regionally with records of success and made significant contributions. Well-versed with security governance and policies, lead and oversee to ensure all ICT security matters are conducted according to the Government Manual ICT Security Policy. With over two decades of industry experience and a decade in tech leadership, Harut is a seasoned expert in product strategy and people management. His innovative approach and dedication to growth have earned him a reputation as a driving force in the industry. Harut’s track record of successfully building and managing teams in both Armenia Any special project/work you would like to highlight: Multi-national Digital Business Transformation Strategy And Operating Model He is passionate about creating awareness of the importance of cybersecurity in all companies and continues to ensure a first-class standard for maintaining cybersecurity procedures. Any special project/work you would like to highlight: Digital Transformation / Cloud Migration / ERP Implementation / Cybersecurity Enhancements etc. Any special project/work you would like to highlight : I invest in my medium and LinkedIn pages, would be great if you post them as well - medium, Instagram Dr. Kobus Liebenberg Chief Executive Officer and Digital Leader, TMTDIGITAL (PTY) LTD Dr Mert ÖZARAR Director of Cybersecurity HAVELSAN Gaurav Kole Group Head Of IT, Leylaty Group During his six years with an MNC, he was chosen as a young leader and attended their leadership program. He spearheaded a team to build from scratch the first world- class defense cybersecurity infrastructure and rectified a cyberattack within one day – the market average is twenty-eight days. Assoc. Prof. Tan holds multiple professional certifications related to Cybersecurity and data privacy: • FIP (International Association of Privacy Professionals) • CIPP/US (Certified Information Privacy Professional/ United States) • CIPM (Certified Information Privacy Manager) • CISM (Certified Information Security Manager) • CISA (Certified Information System Auditor) • CDPSE (Certified Data Privacy Solution Engineer) • CEH (Certified Ethical Hacker) and overseas is a testament to his exceptional leadership skills. He is deeply committed to developing and mentoring top talent, and his passion for incorporating cutting-edge technology into his product strategies is palpable. 28 -JANUARY 2024 TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 29. Gaurav Mishra Director of Information Technology, Digiplug Technologies Pvt. Ltd. Graeceinn Remiendo Mayos Senior IT Software - ERP & CRM Senoko Energy Pte Ltd, Singapore • Innovative IT executive with 19+ years of experience in all aspects of product development, technology, marketing and operation. • I am a Self-driven and motivated person with a proven track record of success and extraordinary achievements in building products from scratch.. Working as a Senior IT software in the areas of CRM, Sales, Sales Operations, Point of Sales and Billing. Worked as a CRM Analyst Solution Developer (Microsoft softwares), IT ERP Consultant and Dev Business Analyst focusing on ERP softwares Strong background in ERP softwares (Microsoft, Infor, SAP) and HTML, COBOL, JavaScript and Any special project/work you would like to highlight : • Government projects under the Ministry of Trade and Industry • Central Provident Fund (CPF) a key pillar of Singapore’s social security system that helps Singapore Citizens and Permanent Residents set aside funds to build a strong foundation for retirement • World’s top banks, ranked ‘Aa1’ by Moody’s Investors Service and ‘AA-’ by both S&P Global and Fitch Ratings. • And currently working on projects with the largest power generation company in Singapore, accounting for approximately 20% of the nation’s electricity supply. • Well-developed leadership/communication skills, excellent time management skills, and great teamwork abilities. • I have done MBA in International Business and Engineering in Computer Sc.. • Passion to innovate and explore new technologies which can solve society problems using technology. • Worked with Companies like AIG, Times Groups, BookMyShow and Mentored many Startups. • Currently associated with Digiplug Technologies as Director - Information Technology. • Member of Startup India Mentorship program, CXO Cywayz Mentor, CIO Klub and PMI. • Winner of Next100 CIO Award, 2023 by 9.9 Group Automation. Professional with a Bachelors of Science in Information Technology major in Enterprise Resource Planning Kazi Monirul Kabir Founder & CEO, Spider Digital Monirul is an influential, passionate, entrepreneurial, innovative, and objective-driven leader with Global Perspective and strong empathy for emerging market realities. He possesses extensive Marketing, Communication, Innovation, Strategic Design, and Business Development experience across the Internet, Telecoms, and Consumer Goods Industries. Monirul has a successful Track record of excelling across Global Enterprises, multinationals, Social Enterprise and Start-up Environments. He is a great believer the transformative power of Strategic Innovation in driving the growth and development of emerging countries and has chosen #Cybersecurity #Fintech and #Sustaintech as his focus areas. Any special project/work you would like to highlight : National Sclale Telecom Data Inspection and Analytics Platform for a user base of 140 Mln user Kapil Savaliya Information Technology Manager, Food Manufacturing Group Co Ltd -JANUARY 2024 29 TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EMERGING WOMEN IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 30. Gurpreet Singh CTO/CISO, DiggFull Gurpreet Singh: Pioneering Leadership in IT Ramkumar Neelakandan Head IT Operations Noida International Airport (Yamuna International Airport Pvt Ltd – YIAPL) Leadership in IT Gurpreet Singh stands as a paragon of leadership in the ever-evolving landscape of Information Technology. With a career spanning over two decades, he has consistently Ramkumar Neelakandan is an ambitious and seasoned player in the field of Any special project/work you would like to highlight : 1. Scalable E-Learning Platforms for State Education: Gurpreet Singh has been at the forefront of digital transformation in education, architecting scalable e-learning platforms for the Indian State Government. Catering to millions, these platforms not only enhance the learning experience but also streamline assessments, making quality education accessible and efficient for students across the state. 2. Pioneering AgriTech Ecosystems: With a keen understanding of the challenges faced by Indian farmers, Gurpreet has spearheaded the development of integrated AgriTech ecosystems. These platforms, encompassing e-commerce, knowledge dissemination, and community networking, have revolutionized the agricultural sector, providing farmers with holistic digital tools to enhance productivity and market reac Any special project/work you would like to highlight : Ram is grateful for being a part of many prestigious and lauded projects across the span of his two decades of successful career. A few to name would be the: • Successful transition of 06 airports in record time to a PPP model. • Deployment of “Critical Airport ICT Systems” across 07 airports. • Carried out various Digital Transformation projects – a unique in Aviation Industry. • Deployment of Smart Cities & Smart Building systems & platform – For Corporates, Universities and High-rise Buildings. • Experienced in successful completion of Mixed Development Projects across countries. • Hands on experience – in implementing Data centres, Command & Control Centre. • Specialist in OT (Operational Technology) Systems, IT-OT Convergence. demonstrated an innate ability to lead from the front, guiding teams toward achieving technological excellence. A cornerstone of Gurpreet’s leadership lies in his vision for scalable and secure architectures. He understands the intricacies of designing systems that meet the demands of today and are future-ready. His expertise in cloud computing and information security ensures that deployments under his guidance are robust, secure, and primed for growth. Beyond technical prowess, Gurpreet’s true strength lies in his ability to inspire and mentor. He fosters a culture of innovation, encouraging his teams to push boundaries and explore the uncharted territories of IT. As he receives the “Top25 Exceptional Leaders in IT” award from Digital Confex, it’s a testament to Gurpreet’s unwavering commitment to excellence and his indomitable spirit of leadership in the realm of IT. Information Technology, holding more than 2 decades of global experience in multiple industries and sectors such as Aviation, Mixed Development projects, Smart Cities and Buildings, Corporate Campus, Data centres, Biomedical labs, Factories and Residences. He earmarked his glorious career working with brands such as Birla, Siemens, Reliance, L&T, EDMI-Singapore & Adani. Presently Ram heads IT operations for Noida International Airport (NIA) and has been a part of multicultural teams across nations. He believes that perseverance and integrity as his assets and a strong positive attitude is his main instrument at the workplace. A nature lover by choice, Ram travels to unique destinations to unwind in the lap of mountains and waves of beaches. An enthusiastic cricket player and a great chef in his leisure time. Ram adores his teenage daughter who is completing high school soon and loves to have long talks with his spouse who is a soft-skills trainer and a Chartered Accountant 30 -JANUARY 2024 TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT INFORMATION TECHNOLOGY CONFEX 2023
  • 31. Keitumetsi Tsotetsi Senior Specialist, Digital Security Designer, MTN South Africa Keitumetsi has been named one of Mail & Guardian’s Top 200 South Africans in the Science and Technology category for 2021 and has also been named one of South Africa’s Top 50 most inspiring women in 2021. She studied BCom IT Management at the University of Johannesburg, holds a Post Graduate Diploma in Management Any special project/work you would like to highlight : Lead the implementation of South Africa’s first student focusedsecuritythemedhackathonin2017.Thehackathon happens annually to date at one of the biggest security conferences hosted by ITWeb in Africa. It continues to provide opportunities for bursaries, internships and other employment opportunities in South Africa. specializing in Corporate Governance from Monash University and is a BSI certified ISO27001 Lead auditor. Prem Bhawnani Head of IT, Standards Australia Rahul Ananthanaraya- na Reddiar Development Manager – Cybersecurity Bulwark Distribution FZCO Any special project/work you would like to highlight: Closed a Project in one of the Government entity for DAST Tool (Invicti Security) who is utilizing the tool for scanning 1500 web applications. Shakthi Priya Kathirvelu VP and Head of Information Security and IT, Funding Societies | Modalku Group Pragya Varshney Assistant Manager, Mashreq With 7 years of work experience in the field of information security, I have gained valuable expertise and a deep understanding of the industry. My role as an Assistant Manager at Mashreq has allowed me to contribute significantly to the organization’s security initiatives. I have been involved in various projects and have successfully implemented robust security measures to safeguard sensitive information. Expertise: My specialization lies in Vulnerability Assessment and Penetration Testing (VAPT), Cloud Security, and Mobile Pentesting. With my knowledge in these areas, I am skilled at identifying vulnerabilities within systems and applications, conducting comprehensive security assessments, and recommending appropriate remediation measures. I am well-versed in the tools and techniques required to effectively analyze, exploit, and secure cloud-based environments and mobile applications. Skills: In addition to my technical skills, I have developed proficiency in vendor management and ISO auditing. Managing relationships with external vendors is crucial in ensuring that the organization’s security requirements are met. Furthermore, my ISO auditing skills enable me to assess and maintain compliance with international security standards, ensuring that the organization adheres to best practices. -JANUARY 2024 31 TOP 25 EMERGING WOMEN IN IT TOP 25 EMERGING WOMEN IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 32. Moshe Weis Chief Information Security Officer, Aqua Security Muhammad Razzaq Chishty Head of Cybersecurity Audits, Arab National Bank Moshe is an accomplished Cybersecurity leader and lecturer, with more than16 years of extensive experience in technology and cybersecurity. He has a strong educational foundation with a BSc in Communications System Engineering and an MBA in Technological Entrepreneurship, both completed Mr. Muhammad Razzaq Chishty, an experienced IT and Cybersecurity Audit Leader, brings to the table more than 13 years of invaluable expertise. His career has been defined by a relentless commitment to safeguarding organizations against evolving threats and driving positive change in the ever- Any special project/work you would like to highlight : Innovative approach to Product & Application Securiry with excellence. In addition, Moshe holds numerous prestigious global cybersecurity certifications. With a rich history in hardware and software development, Moshe has evolved his expertise over the years to focus on pioneering innovative methodologies within the realms of Application and Cloud security. Notably, he currently serves as the Chief Information Security Officer (CISO) at Aqua Security, a renowned provider of cutting-edge security solutions for cloud-native applications. evolving landscape of cybersecurity. Technical Mastery: With a deep understanding of complex security programs and a knack for implementing effective controls, Mr. Chishty has consistently steered organizations toward greater resilience. His experience spans a wide spectrum, from introducing cutting-edge security technologies to conducting meticulous risk assessments. Results-Driven: Throughout his career, Mr. Chishty has maintained a reputation for delivering tangible results that align seamlessly with overarching business objectives. Whether it’s enhancing cybersecurity measures or leading compliance endeavors, he has consistently achieved outcomes that matter. Syed Missam Akhter Cluster I.T Procurement Manager, Emirates Stars Hospitality Group Dubai & Sharjah Kunal Malhotra Founder & CEO, CYTERICO Aseasonedprofessionalwithproficiency in Cybersecurity & Technology Risk and extensive leadership expertise. 10+ years of experience delivering Risk Transformation projects in Program Governance, Quality Management, Industry Benchmarking, Business Continuity Planning, Cyber Resilience, IT Audit & Controls Testing. Thrives in collaboration with clients in diversified sectors, including Financial Services (Banking & Insurance), IT, Telecommunication, Energy, Education, Government & Pharmaceutical. In his recent role, Kunal worked as an Executive Director for a consulting firm, Kloudyy Consulting Group (KCG), for which he did contract work in the past known as Ekloudyy Datamatics Private Limited, setting and leading the Cybersecurity and Technology Risk practice. Any special project/work you would like to highlight : Cyber Strategy for Fotune 500, Setting up the 3 LOD, Benchmarking against the top tier banks in regards to TPRM. 32 -JANUARY 2024 TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 33. Reaz shaheed Educational Technology Director, Shattuck-St.Mary’s Forest City International School, JOHOR, Malaysia Information Technology Specialist since 1997 with leadership roles at K-12 International Schools in Bangladesh, Tanzania and now at the Shattuck- St. Mary’s Forest City International School in Malaysia, promoting Digital Transformation in learning and teaching with 21st Century Academic Technologies. A certified Technology Director from the Texas Computer Education Association,USAand Trainer in Google Workspace for Education I believe in the motto of lifelong learning to help educators in building global citizens beyond the boundaries of cultural differences. Any special project/work you would like to highlight : Continued exploration of integrating cloud technology with productive Business Systems to create operational efficiencies has made the transition to remote learning during the recent global pandemic seamless, with ZERO downtime. Also Work in progress: Adopt Industry standard Cyber Security policies for Students and Teachers. Shariq Khan VP, Head of IT, ERGO Insurance Pte Ltd. Singapore “I am Shariq Khan, VP and Head of IT at ERGO Insurance Singapore. A senior technology management leader with a proven track record in driving IT transformation and innovation in Insurance industry. I bring expertise in strategic IT planning, organization- wide change delivery, digital transformation, IT operation management and IT Infrastructure simplification/modernization. I am passionate about leveraging my technical and leadership skills to help organizations to achieve their business objectives. I have also been recognized by IDG (Foundry) among top 100 CIO in South East Asia and HK region for year 2022 Runcy Oommen Director, Software Engineering, SonicWall Runcy is an accomplished professional in the field of Software Engineering with strong SDLC experience and a string of projects primarily in the security domain. Runcy strives constantly to build better software with extra focus on data security that would be kept throughout its life-cycle and not just as an after-thought. Considers himself to be a perfectionist yet remains practical, knowing where to draw the line and stop. As he believes in giving back to the technical community, he’s the organiser of Google Cloud chapter and Cloud Native chapters of Bangalore Steven Sim Kok Leong Head Group Cybersecurity (CISO), PSA International Pte Ltd Steven Sim worked for more than 25 years in cybersecurity with large end-user enterprises and critical infrastructures, undertaken global CISO role, driven award-winning security governance and management initiatives and headed incident response, security architecture, technology and operations at local, regional and global levels. Any special project/work you would like to highlight : PSA Cyber Security Master Plan He currently leads cybersecurity across PSA Group, heading the Group Cybersecurity Department and indirect reports across regional offices and local business units in 42 countries and oversees both Group-wide IT and OT Security Governance, Technology Management and Incident Response as well as the Cyber Security Masterplan Office. He also leads the Group Cybersecurity Centre of Expertise. -JANUARY 2024 33 TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT INFORMATION TECHNOLOGY CONFEX 2023
  • 34. Shariza Umira Puteri Binti Kamarozzaman Cybersecurity Lead, Tune Insurance Malaysia Sdn. Bhd Vibhor Bhatnagar Technical Architect – Presales Google EcoSystem, HCLTech I have 12 years of experience, with 8 years in a server environment and 4 years in Security Operations and Infrastructure, working with clients from diverse business backgrounds.I possess strong analytical skills, am hardworking, self-disciplined, highly motivated, energetic, curious, and a team player. I am also creative, responsible, capable of working under 18 years of extensive experience in business development initiatives and formulation of presales strategies. A keen planner, strategist & implementer with demonstrated abilities in devising marketing activities and accelerating business growth spans across multiple geographies, including the USA, Europe, Any special project/work you would like to highlight : I am currently working on setting up Security Operation Center automation for blocking malicious IP addresses and handling multiple login failures. We are planning to execute an annual Cyberdrill and Penetration Test for Tune Insurance Malaysia in Q4. I am working closely with the Head of the Department to plan and execute the Tune Insurance Malaysia Cybersecurity Framework roadmap for the upcoming year, 2024. Any special project/work you would like to highlight : Received Eminence & Excellence Award 2012 and an Outstanding Contributor Award in IBM Received Metlife Insurance application migration programme - • Name that you would like to have in the award plaque: Vibhor Bhatnagar • Video byte of 30 seconds to 1 minute to acknowledge the award recognition and how it feels to be the recipient of the award: Can we get sample. • Your walk up song: Any list from their side to select from pressure, and excel in interpersonal and communication, as well as organizational skills. Australia, and India. Vibhor dedicated his expertise to HCLTech, IBM, where he playedapivotalroleintransformingbusinessesacrossvarious sectors such as Insurance, Travel, and Communication. As a visionary leader, he spearheaded initiatives to migrate and modernize application landscapes, paving the way for cloud adoption Vivek Singh Engagement Director, TCS Ltd. VivekisaseasonedInformation Technology professional with over 20 years of experience in the industry, boasting a rich and diverse career that spans across multiple geographies, including the USA, Canada, Singapore, and India. For nearly two decades, Vivek dedicated his expertise to IBM, where he played a pivotal role in transforming businesses across various sectors such as Insurance, Aviation, and Pharma. As a visionary leader, he spearheaded initiatives to migrate and modernize application landscapes, paving the way for cloud adoption. Vivek’s leadership not only led to substantial cost reductions, directly contributing to improved EBITA for his clients, but also served as a catalyst for revenue growth. He achieved this by harnessing data-driven strategies and implementing innovative solutions to tackle supply-chain challenges. In addition to his remarkable career achievements, Vivek boasts an impressive intellectual property portfolio with over 10 IPs published under his name on IP.com. Beyond the world of technology, Vivek enjoys the complexities of chess and finds solace in nature, using it as a means to unwind and rejuvenate. 34 -JANUARY 2024 TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 EXCEPTIONAL LEADER IN IT TOP 25 CYBERSECURITY STAR OF THE YEAR INFORMATION TECHNOLOGY CONFEX 2023
  • 35.
  • 36. 36 -JANUARY 2024 CYBERSECURITY PRODUCT MANAGER: RAHUL ANANTHANARAYANA REDDIAR Rahul Ananthanarayana Reddiar, working as a Cybersecutiy professional in a Value Added Distributor in UAE. He comes with a 9+ years of middle east experience in Information Technology. He currently handles Cybersecurity Product manager role covering the GCC market & Channel Development Manager role for Oman region.
  • 37. -JANUARY 2024 37 R ahul Ananthanarayana Reddiar, working as a Cybersecutiy professional in a Value Added Distributor in UAE. He comes with a 9+ years of middle east experience in Information Technology. He currently handles Cybersecurity Product manager role covering the GCC market & Channel Development Manager role for Oman region. As a Cybersecurity Product Manager Rahul Ananthanarayana Reddiar is responsible for the development, implementation, and ongoing management of security products and solutions. He work diligently to stay one step ahead of malicious actors by creating and maintaining cutting-edge cybersecurity tools and systems. Responsibilities as a product manager in Cybersecurity: • One of the primary responsibilities of Rahul Ananthanarayana Reddiar is to identify market needs and develop products that address them. This entails conducting market research, understanding evolving threats, and collaborating with cross- functional teams to design and develop effective cybersecurity solutions. • Cybersecurity products are not static entities. They require continuous monitoring, updates, and improvements to stay effective. Rahul Ananthanarayana Reddiar is responsible for the entire product lifecycle, from inception to retirement. • Effective communication with stakeholders is essential. Rahul Ananthanarayana Reddiar liaise with customers, marketing teams, sales teams, and internal developers to gather feedback, understand user needs, and align product development with business goals. • Identifying vulnerabilities and potential threats is a core function. Rahul Ananthanarayana Reddiar assess cybersecurity risks and develop strategies to mitigate them. This involves a deep understanding of potential threats, regulatory compliance, and industry standards. • Keeping an eye on the competition is crucial Rahul Ananthanarayana Reddiar continuously monitor the competitive landscape to identify gaps in security offerings and opportunities for improvement. • Educating end-users about best practices in cybersecurity is another vital aspect of the job. Rahul Ananthanarayana Reddiar ensure that users understand how to use security products effectively, thereby reducing the risk of human error in security breaches. Challenges facing as a Product Manager in Cybersecurity: Working in cybersecurity is not without its challenges. Cyber threats evolve rapidly, requiring constant adaptation and innovation in product development. Some key challenges faced by Rahul Ananthanarayana Reddiar: • Cyber threats are continually changing. Rahul Ananthanarayana Reddiar must keep up with the latest attack techniques and vulnerabilities to design products that can withstand new and emerging threats. • Striking the right balance between a user-friendly interface and strong security features can be challenging. A product that is too cumbersome to use will discourage adoption, while one that is too user-friendly may compromise security. Staying compliant with evolving data protection regulations and standards is a significant challenge. Rahul Ananthanarayana Reddiar must ensure that his products meet legal requirements and industry standards. • Rahul Ananthanarayana Reddiar often must work within budgetary constraints and find innovative ways to achieve their security goals. The Significance of Product Manager in Cybersecurity: The role of a Rahul Ananthanarayana Reddiar is significant for several reasons: • Rahul Ananthanarayana Reddiar play a vital role in protecting sensitive data from theft, ensuring the privacyandsecurityofindividualsandorganizations. • Cyberattacks can disrupt business operations. Effective cybersecurity products ensure business continuity by preventing or mitigating the impact of attacks. • A security breach can damage an organization’s reputation. Cybersecurity Product Managers help maintain trust and credibility by safeguarding against breaches. • In the case of government agencies and critical infrastructure, the role of Cybersecurity Product Managers is pivotal in protecting national security interests. • Cyberattacks cost organizations billions of dollars annually. By preventing these attacks, Cybersecurity Product Managers contribute to the economic well- being of organizations and nations. In conclusion, Cybersecurity Product Managers like Rahul Ananthanarayana Reddiar are at the forefront of the battle against cyber threats. His role is multifaceted, involving product development, risk management, and