Dive into the dynamic world of innovation with inaugural edition of iTech Magazine, where cutting-edge technology meets insightful storytelling. Explore the latest trends, uncover groundbreaking advancements, and connect with the forefront of the tech landscape.
Elevate your tech journey with in-depth features, expert perspectives, and a spotlight on the innovations shaping our digital future. Welcome to iTech Magazine – Where Tomorrow's Tech Unfolds Today!
Visit to know more: https://digitalconfex.com/itech-magazine/
Unblocking The Main Thread Solving ANRs and Frozen Frames
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
1. VOLUME 01 | ISSUE 01 | JANUARY 2024
iTECH
MAGAZINE
CYBER IMMUNITY
THE KEY TO A SAFE
AND SECURE DIGITAL
TRANSFORMATION
THE DIGITAL
ECONOMY:
A NEW FRONTIER
FOR SECURITY
LATEST TRENDS
OF CYBERSECURITY
AND HOW WE CAN
EXPLAIN IT.
CRYPTO AND
TAXES IN 2024:
UPDATES,
CHALLENGES
& SOLUTION
CEO Office, Kaspersky
Genie Sugene Gan
Head of Government Affairs &
Public Policy, APJ & META regions
www.digitalconfex.com
2.
3.
4. Welcome to the inaugural issue of DIGITALCONFEX’s iTech
Magazine - your go-to source for cutting-edge insights, expert
analysis, and a front-row seat to the ever-evolving landscape
of technology.
Technology knows no boundaries, and neither do we. Our
Magazine strives to connect tech enthusiasts, professionals,
and curious minds from across the globe.
We’re also excited to spotlight trailblazing companies and
individuals who are redefining the landscape of technology.
Their stories are not just inspiring but also offer a blueprint
forsuccess in a constantly evolving industry.
Join us on this exciting journey through the ever-evolving
world of technology. Explore, learn, and engage with iTech
Magazine as we unravel the mysteries and celebrate the
triumphs of innovation.
Warmest regards,
DIGITALCONFEX
5. CONTENTS
CYBER IMMUNITY THE KEY TO
A SAFE AND SECURE DIGITAL
TRANSFORMATION
INFORMATION TECHNOLOGY
CONFEX 2023
CYBERSECURITY
PRODUCT
MANAGER: RAHUL
ANANTHANARAYANA
REDDIAR
UNLOCKING THE
POWER OF AI:
NAVIGATING THE GEN
AI ERA WITH PHOT.AI
AND BEYOND
LATEST TRENDS OF
CYBERSECURITY
AND HOW WE CAN
EXPLAIN IT.
AHMED YAHYA
AL-KINDI: **A
JOURNEY OF
RESILIENCE AND
INNOVATION**
THE 2023 TECH
RENAISSANCE:
A RECAP AND
PREVIEW OF THE
PROMISE FOR 2024
CRYPTO AND TAXES
IN 2024: UPDATES,
CHALLENGES &
SOLUTION
THE DIGITAL ECONOMY: A NEW
FRONTIER FOR SECURITY
HOW ACCELERATORS CAN HELP
WEB3 START-UPS?
TECH TRENDS RESHAPING THE AUTO
INDUSTRY: TURNING VEHICLES INTO
IMMERSIVE LIVING SPACES
06 24
36
40
44
39
42
48
12
16
18
6. G
enie heads up the Public
Policy & Government Affairs
business functions across
multiple regions in Kaspersky
(including Asia-Pacific, Japan, Middle
East, Turkey & Africa). Genie comes with
an excellent academic track record; she
holds a Juris Doctor in law, an honors
degree in Accountancy, and a Specialist
Diploma in Counselling Psychology.
Called to the Singapore Bar and a
qualified lawyer, she is also a Mediation
Coach and an International Mediator
amongst other things. Having a rich and
diverse career history, Genie started her
journeys in accountancy and law in Big
Four firms. Early on, she was an award-
winning entrepreneur, before spending
a significant length of time as a senior
official in the Singapore Government,
having assumed several key portfolios
such as Special Aide to the Minister for
Law, Singapore negotiator and delegate
to the United Nations General Assembly,
and Director for policy and law reform.
Outside her professional portfolio, her
passion for teaching, non-profit and
charity work has led her to be an adjunct
lecturer at universities and serve on
various Boards and Committees of Non-
Profit Organizations and volunteer for
pro bono legal causes.
6 -JANUARY 2024
7. Genie Sugene Gan
Head of Government Affairs &
Public Policy, APJ & META regions
CEO Office, Kaspersky
-JANUARY 2024 7
8. 8 -JANUARY 2024
Digital transformation has brought about tremendous
opportunities for economic and industrial growth. The
Internet of Things (IoT), in particular, has allowed
businesses to build end-to-end digital services, and
improved their ability to analyze data and monitor
device operation and condition. Ops-Tech (OT)
platforms, which started as part of process controls for
manufacturing equipment, are now ubiquitous.
However, these developments have also created a
complex environment consisting of a large number of
disparate digital elements, which introduces more
points of vulnerability that cybercriminals can
potentially attack. A new paradigm is needed to ensure
that cybersecurity solutions for this complex
environment remains efficient and secure – Cyber
Immunity is one such vision upon which such solutions
can be built.
Growing Pervasiveness and Complexity of
Threats in IoT and OT Platforms
As the number of devices connected to the IoT grows
exponentially, the installation of protective tools that
need regular updates on each of these devices is a time-
consuming and resource-intensive process. The
problem is compounded by many of these devices not
having the processing capacity for cybersecurity add-
on tools such as antivirus software. One example is the
growing popularity of the cloud kettle, which is part of
the IoT and can be controlled through an app on a
smartphone; not all cloud kettles have the CPU or
memory for solutions against cyberattacks, but this
does not mean that they will not be targeted in attacks.
This is a problem that did not exist during the eras of
mere whistling or electric kettles.
A recent finding by Kaspersky’s researchers
illustrates just how pervasive IoT threats have become,
as well as the fact that they could be targeted at
seemingly innocuous devices. Researchers found that a
popular model of smart pet-feeder, which dispenses
pet food at regular intervals and has cameras to check
on the pet, could be easily hacked to allow an attacker
to gain unauthorized access to the device and effectively
use the pet feeder as a spy camera. There are also risks
of a chain reaction type of attack, as once an attacker
gains control of a pet feeder in the home network, it can
be used as a hub to launch more attacks against other
devices in the network.
Where OT platforms are concerned, the disparate
network of robots, industrial control systems (ICS),
supervisory control and data acquisition (SCADA)
CYBER IMMUNITY
The key to a safe and secure digital transformation
By Genie Sugene Gan, Head of Government Affairs & Public Policy APAC & META at Kaspersky
systems, programmable logic controllers (PLCs), and
computer numerical control (CNC) also offers
opportunities for professional targeted attacks. Just
between 2017 and 2021, the number of observed
Advance Persistent Threats (APTs) and activity clusters
grew from 100+ to 900+. Based on Kaspersky’s
research, more than 40% of all ICS computers
globally were attacked in 2022. Considering the vast
amountsofdatacreatedandprocessedbyOTplatforms,
there is an urgent need to find efficient yet customized
cybersecurity solutions that can be scaled up quickly.
The Vision of Cyber Immunity and
Kaspersky’s Operating System
Even with evolving technologies, the cybersecurity
industry often finds itself merely playing catch-up with
the attackers. This is especially so when traditional
cybersecurity solutions adopt an approach of detecting
andreacting.Kasperskythusembarkedonanambitious
effort to change things, by finding a way to develop IT
systemswith“innate”protection—CyberImmunity.
The vision of Cyber Immunity posits that by separating
the IT system into isolated parts and controlling the
interactions between them, the system continues to
perform critical functions even in an aggressive
environment and stops potential attackers in their
tracks. The goal is to ensure that the cost of an attack
on an organization far exceeds the cost of possible
damage, thus rendering an attack ineffective.
To operationalize the vision of Cyber Immunity,
Kaspersky developed its own operating system –
KasperskyOS – which comprises a microkernel and
the Kaspersky Security System (KSS) module, which
come together to provide protection by default.
Figure 1: Cyber Immunity as the Design Principle for KasperskyOS
9. The term microkernel implies that only the most
critical system operation mechanisms are located in
the kernel, while less important functions are ordinary
applications – located outside the kernel. This makes it
much easier to ensure that the kernel code is free of
errors and vulnerabilities, and that the attack surface is
minimal. This works hand in hand with the KSS
module, which checks each interaction for compliance
with security policies, and blocks any interaction that is
non-compliant – this ensures that even if a component
is compromised, KSS can eliminate or minimize any
possible damage.
Compared to the traditional monolithic kernel of a
general-purpose system, which requires 35 million
lines of code in Linux, the KasperskyOS microkernel
only requires approximately 100,000 lines of code to
develop. This drastically lowers the barrier for
developers to create Cyber Immune solutions using
KasperskyOS, and reduces the cost of developing and
supporting secure IT solutions, even if untrusted third-
party code is used. Notably, the microkernel
architecture of KasperskyOS also enables Provable
Security (based on mathe matical proofs), and
minimizes the Trusted Code Base required. While it is
possible to use Provable Security on other operating
systems, this will take considerably more effort.
Actual Applications of Cyber Immune
Solutions
Cyber Immunity is not just a vision or theory –
Kaspersky has successfully developed real world
applications for use in Industrial IoT Infrastructure
Security, Smart City Protection, and Safe Smart Cars,
among others, through a combination of KasperskyOS
and hardware developed in collaboration with partners
such as Siemens as well as Kaspersky’s subsidiary,
Adaptive Production Technology (Aprotech).
Industrial IoT Infrastructure Security
Industrial IoT infrastructure consists of many
components at various levels. One component to which
all devices in any IoT system connect is the gateway –
through which information is transferred to data
centers for further processing and storage. Kaspersky
IoT Secure Gateway (KISG), powered by KasperskyOS,
is installed on the boundary between IoT infrastructure
and external data networks to protect this crucial
interface. The gateway blocks attacks on smart ICS,
equipment and information-sharing channels by
identifying unauthorized network connections, and
providing secure updates and configuration of software,
and transfers control instructions to actuators.
Convenient centralized configuration and management
of the events of Kaspersky IoT Secure Gateway are
provided by Kaspersky Security Center, which enables
an administrator to monitor the status of gateways
from a single point and respond quickly to incidents.
Figure 2: KasperskyOS Components Interaction Scheme
Figure 3: Size of KasperskyOS microkernel code compared to
the monolithic kernel of a general-purpose system
Figure 4: Gateway functions in an industrial network
-JANUARY 2024 9
10. 10 -JANUARY 2024
Smart City Protection
Large cities face the challenge of managing public
utilitiesforthousandsofresidentialandnon-residential
premises efficiently. This often requires automated
data, but collection of such data has to be secured.
Kaspersky, with support from the Orenburg regional
government, successfully built a cloud control room for
managing smart digital systems in the municipal
sphere, using several solutions for protection at
different levels. The cloud level is protected by
Kaspersky Hybrid Cloud Security, which
controls applications and devices, segments networks,
and prevents the use of unpatched vulnerabilities. The
data transfer channel from the controller (PLC) to the
cloud is protected by KISG 1000, which detects and
classifies all devices on the network, and has firewall
functions and blocks attacks on CCTV cameras, motion
and door sensors, and other local devices and data
links. This is in turn managed by the Kaspersky Security
Center platform. The cloud control room has thus made
it possible to monitor the actual consumption of
resources in real time, get notifications of accidents,
gain better control over the deterioration of utilities,
and increase transparency in public utilities
management – while ensuring the safekeeping of
automated data.
Safe Smart Cars
A modern motor vehicle can have more than 100
electronic control units (ECUs). They optimize fuel
consumption, inform the driver of road conditions,
entertain passengers, control braking, and perform
other important functions. The software for these
control units is becoming more and more sophisticated,
and can exceed 100 million lines of code (more than in
a modern operating system) and creates possibilities
for vulnerabilities. Kaspersky Automotive Secure
Gateway (KASG) is specialized software designed to
provide secure and reliable communication between
electronic units of the electrical/electronic architecture,
the connected vehicle cloud, and diagnostic devices.
This software can be used to implement remote
diagnostics, secure over-the-air ECU updates, and
other telematic services. KASG includes the Kaspersky
Automotive Adaptive Platform (KAAP), powered by
KasperskyOS, which is a software development kit that
supports secure solutions for ECUs, including
Figure 5: Solutions used for smart city protection in Orenberg
telecommunications units (TCU/V2X, gateways),
driver assistance systems, self-driving cars (HAD/
ADAS) and other components of the smart vehicle
digital cockpit. KasperskyOS ensures component
isolation and control over interprocess communication,
which prevents separated systems from affecting one
another, thus enabling the highest level of solution
reliability and security in smart cars.
There are many more applications of Cyber Immunity,
such as in Virtual Desktop Infrastructure and in
railway protection. Cyber Immunity has also
received much recognition, with KasperskyOS-based
products having won awards at the World Internet
Conference in China in both 2020 and 2022. In the
future, we hope to see even more uses of Cyber
Immunity for the vision to take root and become
established.
Hopes for the Future of Cyber Immunity
and Potential Partnerships
The vision of Cyber Immunity was designed to be
collaborative. Kaspersky alone does not have all the
solutions to bring it to fruition, and KasperskyOS was
designed for scalability and participation from like-
minded partners. Kaspersky seeks partners to join us
in building a Cyber Immune world. These could be
education and research institutions, which could
receive content on the basics of Cyber Immunity, and
which could potentially co-develop Cyber Immune
products with us. We are also keen to work with partner
resellers and system integrators, who can integrate
Cyber Immunity into both new and existing products.
Finally, our KasperskyOS-based products Kaspersky
Thin Client and KISG are ready to be applied in more
use cases. We hope to further the vision of Cyber
Immunity and see scalable solutions for KasperskyOS
that will underpin the infinite possibilities for digital
transformation.
Figure 6: Solutions used for safe smart cars
11. MEETS
CRAFTMANSHIP
CLOUD
Unleashing the Power of Cloud, Security, and
Cutting-Edge Development with an ESG
Advantage.
email at:
gurpeet@diggfull.com
Visit Our Website
www.diggfull.com
At DiggFull, we navigate the complexities of
technology with a commitment to ESG
principles. Our cloud services not only
ensure scalability, security and efficiency but
also prioritize sustainability, ethical
practices, and responsible governance. Dive
into a world where cloud solutions are
boundless, development is driven by passion,
and security is unwavering. With DiggFull,
you're not just embracing technology; you're
championing a sustainable and ethical
digital future
12. 12 -JANUARY 2024
WING COMMANDER
ANURAG CHANDRA
MILITARY TRANSITION
Chief Information Security Officer
COMMISSIONED OFFICER OF TECHNICAL BRANCH IN INDIAN AIR
FORCE WITH A RICH AND DIVERSE EXPERIENCE IN STEERING THE
INFORMATION TECHNOLOGY EDGE.
Experienced Technology Executive Skilled In Cyber Security, It Project
Management, Vendor & Public Relations. Proficient In Procurement
Analytics And Strategic Growth. Worked As Chief Technology Program
Manager For Data Analytics, Ai, & Innovation. Passionate About
Leveraging Cutting-Edge Tech For Positive Impact.
13. -JANUARY 2024 13
THE DIGITAL ECONOMY:
A NEW FRONTIER FOR SECURITY
T
he digital economy has revolutionised the way
we live, work, and interact with each other. It
has brought about unprecedented opportunities
for innovation, growth, and prosperity.
However, with these opportunities come new challenges
and risks. The digital economy is under constant threat
from cybercriminals, hackers, and other malicious actors
who seek to exploit vulnerabilities in our digital
infrastructure. The need for digital security has never
been more urgent. In this article, its an endeavour to
bring out the importance of digital security in today’s
economy and why it is essential to safeguard our digital
assets. Lets try to investigate also, latest trends,
technologies, and best practices in digital security and
provide actionable insights that can help us secure our
digital future. Let try discovering as to how we can
protect the digital economy and ensure a safe and secure
digital transformation for all.
India has seen a significant boom in the digital economy
in recent years. The Digital India initiative has played a
key role in this growth. The initiative aims to provide
digital infrastructure to every citizen of India and has
been successful in increasing the number of internet
users in the country. The digital platform infrastructure
has enabled businesses to reach a wider audience and
has created new opportunities for entrepreneurs.
Digital Public Infrastructure (DPI). According to
Nandan Nilekani, an Indian entrepreneur, cofounder
Infosys. India is moving from an offline, informal, low
productivity, multiple set of micro-economies to a single
online, formal, high-productivity mega economy with
the help of Digital Public Infrastructure (DPI). The DPI
approach includes frameworks such as the Open
Network for Digital Commerce (ONDC), Open Credit
Enablement Network (OCEN), and the National Digital
Education Architecture (NDEAR), which are unlocking
new opportunities for businesses and individuals alike.
Nilekani believes that this transformation will continue
over the next 20 years and will create tremendous
economic value and empowerment of citizens as new
digital applications permeate sector after sector.
As per the Indian 2011 census, there is only 36 %chance
that two Indians selected at random could even talk to
each other. As we as Indians have a huge variations in
culture, markets, industrialisation and regulations. But
today in the year 2024 we have most closely micro
economies, electronic registering and digital IDs through
Aadhaar, a unique lifetime identity. In these eight years
of period India became the worlds highest volume of
digital payments.
India’s digital economy has grown 2.4 times faster than
the Indian economy, with strong forward linkages to
non-digital sectors. India’s digital consumer base is the
second largest in the world and growing at the second-
fastest rate amongst major economies. India’s inclusive
digital model is narrowing the digital divide within the
country and bringing benefits of Anurag Chandra Cyber
Enthusiast Digital Economy Security technology to all
segments of people.In times of crisis, DPIs elevate from
an efficient “good-tohave” to a necessary” must-have”
like bringing in the real time observability to vaccine
inventory visibility.
DPIs help strengthen a country’s public finances
through strengthening tax revenue or increased
financial transparency through linking of Public
Financial Management System (PFMS) with Aadhaar.
But then what are the challenges even if I can be
enabling targeted-welfare spends through Aadhaar-
like identity program or reduced risk and increase in
the supply of credit to MSMEs and the public. Countries
with many DPIS are best suited to adopt, spread as well
as regulate the use of Artificial Intelligence (AI)
technologies in service of their people.
As the digital realm continues to evolve, and with the
sharing DPIs, this can be unleashed as powerful
DIGITAL capital. In such scenarios, India’s cyber
insurance market has emerged as a domain of strategic
importance and robust growth. The significant rise in
cyber awareness, compelling companies, businesses,
and individuals to rely heavily on digital solutions for
daily operations. However, this has also led to increased
incidences of cybercrimes, targeting vulnerable group.
Therefore, certainly! Securing the digital economy is a
crucial aspect of the modern world.
CHALLENGES FOR THE DIGITAL ECONOMY
As per the various surveys, it reveals that securing the
digital economy is a complex and evolving challenge.
According to the World Economic Forum, two key
challenges for the digital economy are cybersecurity
and privacy.
The Asia-Pacific Economic Cooperation (APEC) has
identified the following challenges: cybersecurity, data
privacy,digitalinclusion,anddigitalskillsdevelopment.
In Southeast Asia, the digital economy has brought
about opportunities for innovation and growth, but
also poses challenges such as cybersecurity, data
privacy, and human and physical capital development.
14. 14 -JANUARY 2024
SOURCES.
emerald Insight, government.economictimes.
indiatimes.com, apec.org, weforum.org
With the rise of digital payments in India, there has been
asignificantincreaseinthenumberoffraudsperpetrated
by exploiting digital payment systems and human
vulnerabilities. The Reserve Bank of India (RBI)
reported that the volume of frauds reported by financial
institutions (FIs) using cards and internet banking was
34% higher in 2021-22 than in 2019-20. During 2022-
23, public sector banks reported 3,405 frauds involving
Rs 21,125 crore, while private banks reported 8,932
cases involving Rs 8,727 crore. The rest were from
foreign banks, financial Anurag Chandra Cyber
Enthusiast Digital Economy Security institutions, small
finance banks, and payment banks. Frauds occurred
predominantly in the category of digital payments (card/
internet), in terms of number, said Reserve Bank’s
Annual Report 2022-23.
The dark web is a part of the internet that is not
indexed by search engines and is often used for
illegal activities. The changing nature of fraud and
increase in fraudulent activities can be attributed to the
major factors like :
- Diversified entry points. Businesses in India have
been digitizing across their value chains at breakneck
speeds. This increases the scope of opportunities for
fraudsters and offers them a wider attack surface for
exploitation. The common entry points include social
media, ecommerce, or services like retail transactions,
rideshares and lodging.
- Vulnerabilities in the new payment
technologies. Personal data of customers is made
available on the dark web, enabling fraudsters to carry
out this type of fraud.
In this year, AI would help cybercriminals manipulate
social media and shape public opinion like never before.
Bad actors would deploy AI tools to fabricate photos,
videos, and audios and lodge on social media.
As a CISO, it is important to be aware of the current
cybersecurity landscape in India. According to a survey
conducted by India’s print media, India’s digital
footprinthasmadeitanalluringtargetforcybercriminals
seeking to exploit vulnerabilities. Cybersecurity
providers have warned that data breaches would
skyrocket in 2024, and there would be continued
acceleration in ransomware activities in addition to a
surge in identity-based attacks resulting from increasing
cloud adoption. Deepfakes would also pose a looming
threat to the country’s cybersecurity this year.
As organizations migrate their data, applications, and
workloads to the cloud, the attack surface widens,
providing a broader canvas for threat actors to exploit.
Organisations may also have less visibility and control
over cloud resources than in on-premises environments,
which could make it difficult to detect intrusions and
prevent unauthorized access.
Importance of Digital Security in Today’s
Economy Safeguard Digital Assets. Digital security
is a critical aspect of today’s economy, and it is essential
to safeguard our digital assets. The rise of the digital
economy has brought about unprecedented opportunities
for innovation, growth, and prosperity. However, with
these opportunities come new challenges and risks. The
digital economy is under constant threat from
cybercriminals, hackers, and other malicious actors who
seek to exploit vulnerabilities in our digital infrastructure.
The need for digital security has never been more urgent.
Companies and governments alike must take proactive
measures to Anurag Chandra Cyber Enthusiast Digital
Economy Security secure their digital assets. By
embracing digital security, we can ensure a safe and
secure digital transformation for all, fostering trust in the
digital economy and enabling sustainable economic
growth.
As a CISO, it is important to stay up-to-date with the
latest cybersecurity trends and technologies. This includes
keeping up with the latest threats and vulnerabilities, as
well as understanding the best practices for securing
digital assets. It is also important to have a strong disaster
recovery plan in place in case of a cyber attack.
To secure the digital economy, it is important to have a
robust cybersecurity framework in place. This may need
measures such as encryption, firewalls, intrusion
detection system, and access controls to be mandatorily
be included. It is also important to have a disaster recovery
plan in place in case of a cyber attack. By taking few of the
industry proven steps, businesses can ensure that they
are well-protected in the digital age.
To combat these frauds, payment service providers have
been providing an enhanced seamless user experience at
competitive prices, promoting wider adoption of digital
payments. Users have multiple options for digital
payments such as cards, wallets, Unified Payments
Interface (UPI), mobile banking, QR code and various
other methods . UPI has contributed significantly to the
growth of digital transactions in India.
In the vast and intricate landscape of the internet, the
Dark Web stands as a shadowy realm that has captured
the imagination of both cyber enthusiasts and those
concerned about online security. This hidden corner of
the web is notorious for being a hub of illicit activities,
from drug trafficking and hacking services to stolen data
markets and more.
The Dark Web is a portion of the internet intentionally
hidden from search engines and casual users. It is only
accessible through specific software, such as Tor (The
Onion Router), which anonymizes users and their
activities. Unlike the Surface Web, which includes
websites indexed by search engines, and the Deep Web,
which comprises unindexed web pages (e.g., databases,
15. -JANUARY 2024 15
password-protected content), the Dark Web is designed
to be deliberately concealed.
The Dark Web is, in essence, a subset of the Deep Web,
but what sets it apart is the intent to hide content and
activities. This intentionality has made it a haven for
those seeking anonymity, whether for legitimate
purposes like whistleblowing or nefarious activities like
illegal trade.
Cybercriminals use the dark web as their base of
operations to carry out illegal activities, sell stolen data,
and launch cyber-attacks on businesses. It is a growing
concern for enterprises, as they face increasingly
sophisticated cyber threats every day.
The Dark Web poses significant threats to both
individuals and organizations in terms of Identity Theft,
Financial Fraud, Corporate Espionage, Reputational
Damage and also creating Law Enforcement Challenges.
The Digital Personal Data Protection Bill, 2023 (“DPDP
Bill”). In the era of digitisation, data protection must be
balanced with the right equation of fraud detection
associated with data. Businesses must be well-equipped
to combat the threats of data breaches and ensure their
customer’s data is not at risk. The Digital Personal Data
Protection Bill, 2023 (“DPDP Bill”) marks the onset of a
new data protection regime in India, the bill is ready to
set a benchmark amongst similar legal frameworks,
globally.
protect the enterprise from the dark web, cybersecurity
professionals must sharpen their skills, invest in
advanced security technologies, and implement effective
security policies.
To ensure digital payment security, it is important to
follow the best practices recommended by the
payment service providers. There will be few basic steps
which we all might have to adhere to, like :
• Use strong passwords and change them frequently.
• Avoid using public Wi-Fi networks for making digital
payments.
• Keep your device’s operating system and applications
up-to-date.
• Do not share your personal information, such as
passwords, PINs, or OTPs, with anyone.
• Check your bank statements regularly to detect any
unauthorized transactions.
• Integrated platforms can consolidate numerous point
products into a single purpose-built solution. The
consolidation of endpoint, server, and cloud security
and workload protection allows you to protect your
ecosystem, providing more visibility and simplifying
operations
• Educate Your Employees as they are often the first
point of contact with cybercriminals, who use social
engineering tactics to gain access to your network.
Provide awareness training that teaches them to
recognise suspicious and fraudulent messages, be
careful about the information they share online, and
verify any requests for sensitive data.
Implement Effective Security Policies and enterprises
should establish a comprehensive disaster recovery plan
to ensure they can recover their systems and data quickly
in case of a successful cyber-attack. To summarise and to
address these challenges, CISOs should consider
implementing the following measures:
Ø Conducting regular security assessments. Regular
security assessments can help identify vulnerabilities
and provide insights into the effectiveness of existing
security measures.
Ø Implementing multi-factor authentication. Multi-
factor authentication can help prevent unauthorized
access to sensitive data and systems.
Ø Establishing a security awareness program. A security
awareness program can help educate employees on
the importance of cybersecurity and how to identify
and report potential security threats.
Ø Implementing a data backup and recovery plan. A
data backup and recovery plan can help ensure that
critical data is not lost in the event of a security breach.
Ø Partnering with a trusted cybersecurity provider.
Partnering with a trusted cybersecurity provider can
help organizations stay up-to-date with the latest security
threats and implement effective security measures.
By implementing these measures, CISOs can help protect
their organizations from the growing threat of cyberattacks
and ensure the safety of their data and systems.
CONCLUSION
“As AI continues to lower the barrier to cybercrime and
ushers in a new era of AI-powered cyberthreats, scams
will become more sophisticated and more difficult to
distinguish from legitimate messages and sites. Even
experts will have trouble telling fact from fiction to
deepfakes that could impact everything including the
future of our children, and beyond,”.
Digital security is no longer an option, but a necessity in
today’s economy. As the world becomes increasingly
interconnected, the risks and threats to our digital
infrastructure, services, and data have grown
exponentially. The rise of artificial intelligence and the
Internet of Things has fundamentally altered the way we
use software and data, making software’s attack surfaces
more complicated and software itself more vulnerable.
The importance of digital security cannot be overstated,
and it is imperative that companies and governments
alike take proactive measures to secure their digital
assets. By embracing digital security, we can ensure a
safe and secure digital transformation for all, fostering
trust in the digital economy and enabling sustainable
economic growth.
To safeguard our digital assets, we must adopt a
comprehensive approach to digital security. This
approach should include measures such as implementing
robust cybersecurity protocols, conducting regular
security audits, and investing in employee training and
awareness programs. We must also leverage the latest
technologies and best practices in digital security to stay
ahead of emerging threats. By taking these steps, we can
protect our digital assets and ensure a safe and secure
digital future for all.
16. 16 -JANUARY 2024
HOW ACCELERATORS CAN HELP
WEB3 START-UPS?
Artak is BD and IR
manager at yard[hub]
– web3 venture studio
& accelerator.
T
he Web3 space is a frontier of innovation,
presenting startups with intricate challenges
that demand expertise in blockchain and
tokenized ecosystems. Accelerators step into
this landscape, offering more than just mentorship,
education, networking, and funding. They become
architects of success, especially crucial in a domain
where equity or tokens often constitute compensation.
Tailoring Accelerator Programs for Web3
Diversity
Recognizing the diverse needs of Web3 startups at
various stages, accelerators play a pivotal role in tailoring
programs. The demands of an early-stage Web3 venture
vastly differ from those of a series-A health startup. This
nuanced understanding allows accelerators to provide
targeted mentorship, ensuring each cohort receives
specialized guidance for success.
• Mentorship: Accelerators offer invaluable
mentorship from seasoned industry professionals,
guiding startups through the complexities of Web3
with first-hand insights.
• Educational Resources: Curating specialized content,
accelerators empower entrepreneurs to stay abreast
of Web3 advancements, ensuring they are well-
informed and equipped for success.
• Networking Opportunities: Accelerators facilitate
meaningful connections with investors, mentors,
and peers, creating a collaborative environment
where ideas flourish and startups grow.
• Seed Funding: Crucial seed funding provided by
accelerators serves as the financial backbone for
early-stage startups, nourishing growth and
transforming innovative concepts into impactful
solutions.
The customization of accelerator programs is explored
further in subsequent chapters, highlighting their
adaptability to diverse startup needs in the vibrant Web3
ecosystem.
Different Accelerator Types in Web3
In the realm of startup accelerators, tailoring programs
to meet the distinct needs of various industry verticals
and startup stages is paramount. The diverse
requirements of Web3 early-stage startups differ
significantly from those of series-A health startups.
In the dynamic realm of Web3, where blockchain and tokenization take center stage, startups face
unique challenges on their path to success. Accelerators, specialized programs for rapid growth,
emerge as guiding beacons for these ventures. This article delves deeper into the profound impact of
accelerators, with a focus on the tailored approach required for diverse Web3 early-stage startups.
17. -JANUARY 2024 17
Recognizing these differences allows accelerators to
design programs that provide targeted mentorship,
resources,andsupport,ensuringthateachcohortreceives
the specialized guidance required for success in their
specific domain and stage of development.
This customized approach enhances the effectiveness of
accelerator programs in fostering innovation and
facilitating the growth of startups across a spectrum of
industries and developmental phases.
Explore the diverse structures of Web3 accelerators,
essential pathways for startups. Understanding this
variety is crucial for startups navigating their way to
success in the dynamic Web3 landscape.
• Regional Accelerators: Regional accelerators
strategically target startups within specific locations,
harnessing local entrepreneurial ecosystems to
provide contextual advantages.
• Corporate Accelerators: Large corporations drive
Web3 innovation through strategically aligned
accelerators. These programs offer startups exclusive
access to corporate resources and extensive networks,
propelling rapid growth.
• Government Startup Programs: Governments actively
contribute to Web3 innovation through initiatives like
Hub71 and DIFC Fintech Accelerator in the UAE.
Theseprogramsdemonstrateadedicationtonurturing
innovation by providing startups with essential
support to thrive in the evolving Web3 sector.
• Non-Corporate Accelerators: Initiated by small
companies with domain expertise, non-corporate
accelerators bring a unique flavor to the Web3 startup
scene. Often focused on specific fields, these
accelerators offer specialized support tailored to the
intricate needs of startups within those niches.
Addressing Web3 Startup Challenges
Web3 startups encounter specific challenges that
accelerators are adept at solving. Accelerators bring
experience and insights critical for tackling these hurdles.
Thespecificchallengesofweb3start-ups,thataccelerators
can solve.
• Creating Sustainable Business Models: Many Web3
startups focus on token launches or NFTs, posing
significantlong-termrisks.Fewprojectshaveachieved
a revenue stream that ensures long-term profitability.
• User Acquisition Challenge: dApps require users to be
familiar with blockchain technologies, including
blockchain wallets and custodial wallets. This
complexity deters regular users, narrowing the target
audience.
• Lack of Network: Startups face difficulties in
networking during their initial stages. Achieving goals
often requires substantial social capital, emphasizing
the importance of knowing the right people.
- Effective Go-to-Market Strategy: Web3 project
strategies differ significantly from traditional ones,
presenting challenges unfamiliar to Web2
entrepreneurs.
- Tokens and NFT Launch: The success of a project,
especially those involving tokens or NFTs, depends on
the effectiveness of the initial launch. Multiple factors
influence this, requiring experience and insight for
informed decision-making.
- Fundraising Hurdles: Successfully raising funds goes
beyond a compelling pitch deck. Warm introductions
from other founders or personal relationships with
VCs or angel investors are crucial. Feedback from VCs
early on can save significant time.
yard[hub] Accelerator: Nurturing Web3
Innovation
responsetotheuniquechallengesfacedbyWeb3startups,
the yard[hub] accelerator emerges as a beacon of support.
The accelerator leverages the team’s rich experiences
over the past two years in launching and nurturing
successful Web3 projects. The program is meticulously
crafted, focusing on product development, business
models, GTM strategy, marketing, business development,
and fundraising.
yard[hub] accelerator program offers:
• Mentorship from successful experts;
• Educational workshops focused on the needs of
startups;
• Strategic networking opportunities with key industry
players and investors;
• Market positioning assistance for user adoption and
brand development;
• Grant support from blockchains and other companies.
Unveiling the Second Cohort
The first cohort of yard[hub] accelerator witnessed
tremendous success, with over 100 applicants in
November. As the program gears up for its second cohort
in 2024, it continues to offer a 12-week journey that goes
beyond traditional acceleration. Participants benefit from
mentorship, educational workshops, strategic
networking, and the opportunity to pitch to VCs and
investors at the demo day.
Contributing to Web3 Industry Trends
Beyond the confines of individual accelerators, the Web3
industry is marked by dynamic trends. These trends
encompass decentralized finance (DeFi), non-fungible
tokens (NFTs), and blockchain applications. Accelerators
adapt to these emerging technologies, playing a pivotal
role in shaping the landscape of Web3 innovation.
Conclusion
Accelerators like yard[hub] are indispensable in the
Web3 ecosystem, bridging the gap between challenges
and opportunities for startups. The commitment to
fostering innovation and success in this dynamic sector is
evident in the announcement of the second cohort of
yard[hub] acceleration program. As Web3 continues to
evolve, accelerators play a crucial role in shaping the
narrative of success for emerging startups. Their
comprehensive support empowers startups to thrive in
the complex and ever-evolving landscape of Web3. Apply
for the 2nd cohort of yard[hub] acceleration program:
18. RABINDRA SAH
Chief Engineer - Strategic Projects at Tata Technologies Limited
Global Practices - Automotive & Industrial Heavy Machinery
Engineering Research & Design, PLM & Digital Enterprise System
Creating Industry engineering Business Solutions for Digital & Physical
Transformation from Product to Manufacturing
Mr Rabindra Sah is having 31+ Years of
working Experience with Tata Motors and
Tata Technologies. He is industry leader to
engineering services in various industries and
domain using digital technologies & Industry
4.0 solutions for more than 80 customers
worldwide - Asia Pacific, Europe & North
America.
In his current role, he is creating Industry
Business Solutions for Digital & Physical
Transformation in Product & Manufacturing
(Digital to Physical) and have worked for
the industries - Automotive, Aerospace,
Industrial Heavy Machinery, Process Industry
– Steel, Port, Air Cargo, FMCG, Media &
Entertainment.
He comes with strong Domain for End to
End - Product Design & Development,
CAE Product Validation, New Product
Introduction, Smart/Digital Manufacturing,
Digital Twin, Industry4.0, Process & Facility
Planning, Augmented & Virtual Reality, Additive Manufacturing, Data Science, Block chain,
Vehicle and Autonomous vehicle.
He is instrumental in digital transformation using solution of Dassault Systemes, Siemens,
Altair, MSCNastran, DEFORM-2D/3D, PTC, Euclid, Autodesk, UNITY, Unreal Engine, Xcelgo in
the industry.
Rabindra is an expert in the Digital Manufacturing world and has experience in Virtual
Production, Visualization, Digital Twin in the framework of Industry4.0, and Autonomous
vehicle.
Rabindra is Unreal Engine Authorised instructor (UAI) from Epic Games. One of his passions
is as and trainer on Games, Augmented & Virtual Reality and Virtual Production experiences
Unreal Engine.
He loves to interact, guide and motivate student, Faculty & industry professionals with his
talk, training, mentoring & coaching. He is passionate to share knowledge acquired from his
vast three decades of experience & leadership working across Industries, domains and digital
technologies and supports the mission skill of the nation for the noble cause.
Rabindra Sah holds B. Tech (Mechanical Engineering) from the National Institute of
Technology Patna M. Tech in Data Science and Engineering from Birla Institute of Technology
& Science, Pilani. He currently pursuing his PhD in Autonomous Vehicle at Amrita Vishwa
Vidyapeetham -Bangalore
Linkedin: www.linkedin.com/in/rabindra-sah
18 -JANUARY 2024
19. TECH TRENDS RESHAPING THE AUTO INDUSTRY:
Turning Vehicles into Immersive Living Spaces
By Rabindra Sah, Chief Engineer | Tata Technologies
https://www.linkedin.com/in/rabindra-sah/
T
he automotive industry is witnessing a
remarkable transformation in customer
behavior driven by the rapid adoption of
advanced technologies. As vehicles become
more connected and integrated with cutting-edge
digital features, the driving experience has evolved into
something akin to a second living room.
Customers now seek immersive experiences with high-
tech Human-Machine Interfaces (HMI) and digital
cockpits, creating an environment where they can stay
connected, entertained, and productive while on the
move.
In this era of smart vehicles, consumers are no longer
just passengers; they are active participants in their
journey. The automotive industry’s commitment to
sustainability and the circular economy has led to
vehicles designed with recycled and reusable materials,
aligning with the growing demand for eco-friendly
options.
TOP DIGITAL ENGINEERING
TECHNOLOGIES FOR IMMERSIVE
EXPERIENCE
1. Gamification for immersive Experience:
The technology of the game engine platform is being
employedbyOEMsforvariousengineeringapplications
in the automotive sector. Key areas of application
include Augmented Reality (AR) and Virtual Reality
(VR), Collaborative Design Review and Visualization,
Autonomous Vehicles, Advanced Driver-Assistance
Systems (ADAS), Metaverse, Virtual Production, Sales
and Marketing, Human-Machine Interface (HMI), and
more. AR and VR are particularly making significant
inroads in design, manufacturing, training,
maintenance, and sales marketing.
2. Innovation with Design Thinking
OEMs and Tier suppliers are heavily focusing on the
framework of Design Thinking to drive innovation and
improve their products and processes. This approach
aids in delving into problem statements and coming up
with unique solutions. The Design Thinking framework
has provided the Startup community with a systematic
methodology, enabling them to become leading global
automotive OEMs.
3. Growth with Collaboration &
Partnership
Collaboration and partnership have become the norms
of business for achieving growth.
OEMs face significant challenges when attempting to
be involved in the design and development of every
part of a vehicle. As a result, there is a global trend
toward collaboration and partnerships between OEMs.
These collaborations often involve startups and other
entities, with OEMs reserving funds for their partners
to develop solutions. This approach accelerates the
journey to success and product development.
FOR EXAMPLE:
o Tesla partners with BYD supplies electric vehicle
batteries;
o Toyota Produces EV powered by BYD Batteries
o The Volvo Group and Daimler Truck AG to lead the
development of sustainable transportation by
forming joint venture for large-scale production of
fuel cells
4. Adoption of Agile Framework:
In the realm of product development, automotive
OEMs strongly embrace the Scrum Framework. Unlike
-JANUARY 2024 19
20. 20 -JANUARY 2024
the traditional waterfall approach, which is a defined
process, the Scrum Framework is empirical and
handles changing situations efficiently. Work is divided
into iterations, making it flexible and adaptable to
changes in priorities due to evolving circumstances.
The usage of Agile frameworks is prevalent in the
context of OTA (Over-The-Air) updates for software-
defined vehicles, particularly in the domains of electric
vehicles, connected vehicles, and autonomous vehicles.
5. New Perspective - The Car as a Second
Living Room:
o Nowadays car is being considered as second living
room. Prime considerations for designers are how
immersive experience can be created considering
more Space, Spatial Audio, ergonomics of Seats,
Infotainment systems, Comfort, Safety and new
Features.
6. Enhancing Safety with ADAS and AV
o There are large number of accidents happening
worldwide due to Human driving a vehicle due to
Human error considering perception, performance,
vehicle and environment situations.
o Auto OEMs, Startup, Software OEMs, Hardware
OEMs and Engineering service providers are
working to develop autonomous vehicle and
Advanced Driving Assistance Systems (ADAS) .
Globally technology is being developed and tested
to make vehicle driving safe, accident free and
enjoyable experience. Vehicle developed happens
on SAE defined level.
o Advanced Driving Assistance Systems (ADAS) like
Lane Departure Warning, Blind Spot
Warning,Parking Assistance,Automatic Lane
Change and more are being developed and provided
in the vehicle.
7. Adoption of Functional Safety and
Cybersecurity Standards by Auto OEMs:
There are three primary standards for automotive
embedded systems, safety, and security. These
standards are integral to the design, development, and
updates of vehicles by OEMs, especially for their
autonomous and ADAS endeavors. Automotive OEMs
are actively working to implement these frameworks.
ISO 26262 – Road vehicles Functional Safety
ISO/PAS 21448 – Safety of the Intended Functionality
(SOTIF)
ISO/SAE 21434 – Automotive Cybersecurity
8. Evolution of Automotive withRise of the
Software-Defined Vehicle (SDV):
In automotive, a software-defined vehicle is that relies
extensively on software for its various functions,
control, and features, rather than being solely
hardware-based. The core concept of a software-
defined vehicle revolves around the idea of flexibility,
adaptability, and upgradability through software,
which can enhance and even transform the vehicle’s
capabilities over time
It means that Software-Defined Everything in
automotive. Virtually every aspect of the vehicle, from
its engine and drivetrain to its safety systems and
infotainment, can be configured and controlled through
software. This means that changes and improvements
can be made via software updates, rather than requiring
physical modifications
Over-the-Air Updates (OTA)that updates and allow
manufacturers tosend patches, bug fixes, and new
features directly to the vehicle’s software systems,
much like you would update your smartphone’s
operating system.
E/E (Electrical/Electronic) architecture in the
automotive industry refers to the structured design and
layout of electrical and electronic components and
systemswithinavehicle.Thisarchitectureencompasses
21. all the electrical and electronic systems, modules,
sensors, controllers, and networks that enable various
functions, features, and operations within the vehicle.
E/E architecture is essential for the efficient and
reliable functioning of modern vehicles.
9. Embracing Sustainable Design and the
Circular Economy
o OEMs and suppliers are actively transitioning from
a linear economy to a circular economy. They are
shifting from a ‘Cradle to Grave’ to a ‘Cradle to
Cradle’ business model. In this new model, the focus
is on designing products with recycled and reusable
materials to minimize waste and achieve net carbon
neutrality. Each CEO of OEMs and suppliers has
sustainability targets defined for its integration into
their systems, which leads to a substantial amount
of innovation.
o The Fourth Industrial Revolution is being leveraged
to support the goal of achieving net-zero carbon
emissions and establishing a sustainable circular
economy. This endeavor primarily concentrates on
three major areas: Product, Manufacturing
Operations, and Supply Chain.
10. Widespread Adoption of UI/UX
Principles
o User Experience (UX) and User Interface (UI) skill
set is being highly used to create a better product
and better experience for users. It leads to high
demand of User Experience experts. US & UI
provides an engaging user with product & eco-
system for new level of experience.
11. Immersive Experiences through HMI
and Digital Cockpit Technologies:
o Every OEMs are working with their partner to create
unique Human Machine Interface, infotainment
systems and interior to provide their customers
enhanced and better immersive experience. It leads
to creativity, innovation and value proposition.
HMI & Digital Cockpit experience is the one of the
prime factors for users to decide purchasing of
vehicle.
o Combination of software from engineering, game
engine and hardware are being used to develop
HMI & Digital Cockpit functionality.
-JANUARY 2024 21
22. 22 -JANUARY 2024
12. Auto OEM Building a Customer
Community
o OEMs place a strong focus on nurturing their user
community as a means to bolster their brand. To
achieve this, OEMs undertake various initiatives
aimed at engaging their users and involving them in
the journey to success. One notable approach is the
establishment of a User’s Advisory Board, a platform
through which OEMs actively seek input,
suggestions, and ideas from their users to enhance
their products. This endeavour not only encourages
a sense of belonging among users but also reinforces
their connection with the OEM.
o In addition to this, OEMs invest in the creation of
exclusive clubs and corporate social responsibility
(CSR) initiatives for their users, organizing regular
events that allow users to actively participate
13. Incorporating Passenger Vehicle (PV)
Features into Commercial Vehicles (CV)
A prevailing global trend involves the pursuit of fresh
business opportunities within the commercial sector.
Worldwide, OEMs are setting their sights on leveraging
the diverse features commonly found in passenger
vehicles and integrating them into commercial vehicles.
This expansion covers a spectrum of elements,
encompassing safety enhancements, Human Machine
Interface (HMI) innovations, advanced infotainment
systems, upgraded digital cockpits, and overall
improvements in the user experience. The objective is
to enhance the capabilities and user-centric features of
commercial vehicles, aligning them more closely with
the advancements and offerings in the passenger
vehicle segment
14. Emerging Trends of Subscription-Based
Business Models
o A novel business model is emerging within the
automotive industry, often referred to as “Flexibility
is the New Premium.” This model introduces the
concept of vehicle subscription, allowing users to
choose whether to buy or rent a vehicle according to
their specific needs. It offers a range of flexible
options in terms of pricing and duration, enabling
users to tailor their choice to fit their budget. In this
innovative approach, users have the freedom to
select a vehicle that precisely suits their
requirements, and they even have the flexibility to
switch cars as frequently as necessary. This model
empowers users with unprecedented choice and
adaptability, ushering in a new era of convenience
and personalization in the automotive landscape.
o In summary, the new business model allows for car
subscription, offering the following options:
Purchase when needed
Rent when needed
Choose the vehicle you need
Flexibility to meet your budget
References/Credit:
o Images are taken from websites/internet,OEMs
software and service provider
o Reference of images from Rivian, Ford, BMW,
Volvo, Unreal Engine, News, Technode and others
24. Abdul Azeem Baqar Mohammed
IT Manager, Emirates Float Glass
Alexandre Horvath
Chief Information Security Officer (CISO) &
Data Protection Officer (DPO), Cryptix AG
Abhilash Radhadevi
Head of Cybersecurity, OQT
Adedolapo Peter
Akindehin
Cybersecurity Governance
and Compliance Manager/
BISO, Unity Bank Plc
Abdul Azeem is a distinguished IT Infrastructure
and Cybersecurity professional who has
consistentlydemonstratedexceptionalexpertise,
dedication, and innovation in the field of IT
Infrastructure and Cybersecurity. He has made
significant contributions to safeguarding digital
landscapes, protecting critical information
systems, and mitigating cyber threats.
20 years of experience in multinational
organizations on a global level. Proven business
partner of C-level executives. Successful
management of international cross-functional
teams and major IT security and risk programs.
Strong background in cybersecurity, data
protection and risk management as Alexandre
has over a decade of leadership experience in
those areas, from a strategic, operational as well
as project management point of view.
Abhilash Radhadevi, Head of Cybersecurity
at OQT is a Senior Cybersecurity executive
with more than twenty years of combined
experience in the Banking, Financial, and
Energy domains. Renowned for his leadership,
he has successfully guided global organizations
through complex security landscapes. Abhilash’s
extensive experience encompasses pioneering
Adedolapo Akindehin is a
seasoned professional with
over 12 years of experience
spanning across GRC, Project
Management, IT Audit, and IT
Security.
the Head Security Governance,
Program Management and
Compliance in one of the
top banks in Nigeria, he is
responsible for leading and
coordinating the operations
of the security strategies in line
with the business objectives.
He acts in the capacity of the
Business Information Security
Officer (BISO) and deputizes for
the CISO.
has implemented several
security projects, some of which
are email security, endpoint
security, data loss prevention
and system hardening.
Prior to now, he was a senior
cybersecurity consultant with
Digital Encode Limited, and
a certified member of ISC2,
ISACA, PMI, ACFE and ISO.
Adedolapo is a Fellow of
the Institute of Chartered
Accountants of Nigeria (ICAN)
and an alumnus of University
of Lagos and University of
Liverpool, from where he
bagged two Masters degrees
in Business Management and
Cybersecurity respectively.
Any special project/work you would like to highlight: Building
an Effective IT Infrastructure and Information Security
Strategy for the Organization
Any special project/work you would like to highlight:
Preparing several companies for the ISO27001 certification
Any special project/work you would like to highlight: Artificial
Intelligence in the absence of a 24/7 Security Operations
Center
His hobbies are fishing, reading,
teaching, travelling and
meeting people
cybersecurity strategies, earning him prestigious awards and
recognition. A respected thought leader, he has authored
multiple articles on emerging threats and innovative solutions,
contributing to industry knowledge. His global influence and
commitment to mentoring reflect his dedication to shaping
the future of cybersecurity.
INFORMATION
TECHNOLOGY
CONFEX
2023
24 -JANUARY 2024
TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
25. Ankit Agarwal
IT Infrastructure & Global System Architect,
Encora
Baidyanath Kumar
CISO and Data Protection Officer,
JK Lakshmi Cement
Cdr. Suman Kumar
Chakraborty
Head Customer Success,
Canvas,
LTIMINDTREE
As the Head of IT Infrastructure and
Governance at Encora Inc., Ankit Agawral
bring over 20 years of experience in managing
IT operations, driving tech transformation,
and ensuring cybersecurity. With exerience in
verticals like Governmet, Education, Finance,
Manufacturing, Ankit has successfully led tech
transformation and automation safeguarding
critical assets against evolving cyber threats
while ensuring the resilience and efficiency of
IT infrastructure.
Baidyanath is Chief Information Security
Officer (CISO) and Data Protection Officer at
JK Lakshmi Cement, part of the prestigious
JK Organisation. In his role, Baidyanath is
passionate about CISO as a Service, Cyber
Program / Threat Management, Identity as a
Service, Cyber Resilience, Privacy and Next-
generation Security Operations Center (SOC).
With over a decade of extensive experience
in the cybersecurity domain, Baidyanath has
played a crucial role in establishing information
security policies and objectives, evaluating
performance, and driving continuity in various
e-governance projects for GOI.
Cdr Suman Kumar Chakraborty
is a veteran of the Indian Navy,
an NDA alumnus where he’s
held various appointments which
have enabled contemporary
tech adoption at scale during his
over 20 years of service. He has
four Masters to his name and has
been a Gold Medallist in BTech
and MTech, awarded by Dr. APJ
Kalam for his project on Missile
Auto Pilot. In the recent past,
after pursuing his MBA in Strategy
and Marketing from ISB adjudged
Flag Bearer awardee, he has
been in tech leadership roles in
two successful start-ups. Firstly,
as a founding CTO in healthcare
and then as Head of Product
for a Blockchain-based portfolio
that included Web3 services and
was acclaimed as one of the top
3 in India.At LTIMindtree, he leads
the WEB3 incubation team with
close liaison with strategy teams
and other stakeholders toward
building a roadmap for service
offerings by spawning various
initiatives for GTO.
Any special project/work you would like to highlight: Zero
trust implementation across Organization
Any special project/work you
would like to highlight: Any
special project/work you would
liketohighlight:Ihavesuccessfully
Incubated WEB3 practise for
LTIMINDTREE and presently
Heading Customer Success for
CANVAS (AI/ML product) which
has this year won awards in 6th
Annual AI Breakthrough Awards
and 2023 Artificial Excellence
Awards in 3 categories.
Avinash Kumar Singh
Head Technology, Core Diagnostics
I bring over 13 years of experience as a
technology leader in diagnostics, hospitals,
andbiotechnology.I’mallaboutdrivingdigital
innovation and making big changes happen
in global healthcare companies. I’m certified
in Digital Innovation and Transformation
and have earned multiple top Global Tech
Certifications. I’ve also been recognized with
awards like CIO100, CSO100, Healthcare AI &
ML Innovation, INSIGHTS CXO, and CXO Tech
Champion
-JANUARY 2024 25
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
26. Prerna Sharma
Sr. Security Analyst III, Workato Inc.
Baljit Singh Dhillon
Head Cybersecurity Planning,
Strategy and Governance,
Digital Nasional Berhad,
Malaysia
Prerna Sharma is a cybersecurity
professional with 11 years of experience
in governance, risk and compliance. She
has a proven track record of architecting
and executing comprehensive GRC
strategies that safeguard assets, ensure
regulatory adherence, and optimise
internal processes—recognised for
Having spent 24 years across all layers
of technology and industries, Baljit has
focused time and effort in perfecting
an approach to help deliver business
results by using technology to its fullest
and safest potential.
Part of the initial team members who
started up Digital National Berhad (a
MYR 16.5B, 10 year Malaysian initiative
to enable rapid digitisation for the
economy by using 5G enablement),
Baljit was tasked to help kickstart and
run an approach to ensure adequate
cybersecurity monitoring, protection
and governance of the nations single
5G wholesale network that is meant
to service all 5 Telco operators and
enterprises.
Prior to that Baljit has had stints in
Axiata Group, Celcom, Experian,
Hewlett Packard and Shell focusing on
both cybersecurity and technology
solutions, governance and
management. He is a CISSP certified
professional with a Bachelor’s Degree
in Computer Science from University
Malaya and currently pursuing a
Masters in Computer Science in
Research from the same university.
Baljit spends he’s time outside work
with he’s wife and twin boys watching
movies, playing football and
traveling. He loves cybersecurity and
technology as a hobby and spends
time researching meaningful ways it
can be adopted better in businesses
and society.
Any special project/work you would
like to highlight: Starting up and
operationalising a secure wholesale
5g service for Malaysia
delivering tangible results, such as deploying
foundational processes for security governance,
data privacy and endpoint management. Adept
communicator and leader, consistently driving cross-
functional collaboration and fostering a commitment
to excellence.
Genie Sugene Gan
Head of Government Affairs and Public
Policy, Asia-Pacific, Japan, Middle
East, Turkey and Africa, Kaspersky
Genie heads up the Public Policy &
Government Affairs business functions
across multiple regions in Kaspersky
(including Asia-Pacific, Japan, Middle
East, Turkey & Africa).
Genie comes with an excellent
Any special project/work you would like to highlight:
Ms Genie Sugene Gan is an eminent leader in the
cybersecurity sector, who has actively contributed
to thought leadership on topics at the intersection
of law, technology and public policy. She is also a
passionate advocate for Women in Technology,
having spoken to international audiences to inspire
women to see their own futures in technology.
For her outstanding contributions in the field,
she had been awarded the Excellent Woman
in ICT Leadership Award by the United Nations’
International Telecommunication Union (ITU), and
the Telecom Equipment Manufacturers Association
of India (TEMA) – the only recipient from the
cybersecurity sector. She is also vice-chairperson of
the International Women’s Empowerment Forum.
Her effervescent presence in international events
has made her a sought-after speaker in the industry.
academic track record; she holds a Juris Doctor
in law, an honors degree in Accountancy, and
a Specialist Diploma in Counselling Psychology.
Called to the Singapore Bar and a qualified lawyer,
she is also a Mediation Coach and an International
Mediator amongst other things.
26 -JANUARY 2024
TOP 25 EMERGING WOMEN IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
27. Chi Wai HUI
Cybersecurity Solutions Consultant,
V-Key Pte Ltd
Chi Wai is an accomplished professional with
over two decades of experience in the fields
of cybersecurity. Currently he is serving at
V-Key as a Cybersecurity Solutions Consultant.
In this role, he focuses on advocating the
importance App Identity, Device Identity, and
User Identity. Chi Wai’s responsibilities include
recommending cybersecurity solutions to
clients, engaging partners and resellers to
expand market reach, all while promoting
mobile app security and authentication
awareness.
Chetna Rustagi
Technology Leader, TravClan
Any special project/work you
would like to highlight: Led The
Milestone Achievement Of Soc2
Certification At Allbound And
Led The Implementation Of Zero
Trust Architecture At Allbound
Chitij Chauhan
Director of Security,
Allbound Inc
Any special project/work you
would like to highlight: I have
a digital transformation project
going on. and a tech refresh
project as well.
David Pravinkumar
Head of IT, InfracoAsia
Development Pte Ltd
Betania Allo
Cybersecurity Innovation Manager, NEOM
Betania Allo is a cyber lawyer and policy
expert with a strong history of success
leveraging expert legal knowledge and
political experience across cybersecurity,
data privacy, compliance, and counter-
terrorism efforts. She has worked over
ten years in public policy, held global
executive positions in the private sector, is
an entrepreneur in Islamic finance, and has
Website: www.betaniaallo.com
succeeded as a program specialist in counter-terrorism
at the United Nations in projects involving technological
initiatives for criminal investigations and safeguarding
digital platforms from dangerous organizations, among
others. Ms. Allo graduated as a lawyer in Argentina, and
holds a Master of Laws (LL.M.) with an academic focus
on cyber law and policy from Syracuse University (USA).
In addition, she holds a Master’s in International Relations
with a Graduate Certificate in International Security from
Harvard University (USA), a Postgraduate in Cybersecurity
and Compliance from Universitat Internacional de
Catalunya (Spain), and is currently pursuing a Doctorate
(D. Eng.) in Cybersecurity Analytics at George Washington
University (USA). She’s fluent in English and Spanish and has
levels of working proficiency in French, Italian, Portuguese
and Arabic. Betania also lectures at several universities
worldwide and is a regular speaker at conferences about
cybersecurity, counter-terrorism, emerging technologies,
and leadership. She currently manages Cybersecurity
Innovation and Partnerships at NEOM, the first cognitive
city in the world.
-JANUARY 2024 27
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 EMERGING
WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT INFORMATION
TECHNOLOGY
CONFEX
2023
28. Dr. Tan Kian Hua
Chief Information Security Officer,
Lenovo PCCW Solutions Singapore
Harutyun Baghdasaryan
Vice President, Software Engineering, QLess
Assoc. Prof. Tan Kian Hua is a proven
solution leader in the field of cybersecurity
regionally with records of success and made
significant contributions. Well-versed with
security governance and policies, lead and
oversee to ensure all ICT security matters are
conducted according to the Government
Manual ICT Security Policy.
With over two decades of industry experience
and a decade in tech leadership, Harut
is a seasoned expert in product strategy
and people management. His innovative
approach and dedication to growth have
earned him a reputation as a driving force in
the industry. Harut’s track record of successfully
building and managing teams in both Armenia
Any special project/work
you would like to highlight:
Multi-national Digital Business
Transformation Strategy And
Operating Model
He is passionate about creating awareness of the
importance of cybersecurity in all companies and
continues to ensure a first-class standard for maintaining
cybersecurity procedures.
Any special project/work
you would like to highlight:
Digital Transformation / Cloud
Migration / ERP Implementation
/ Cybersecurity Enhancements
etc.
Any special project/work you would like to highlight :
I invest in my medium and LinkedIn pages, would be great
if you post them as well - medium, Instagram
Dr. Kobus Liebenberg
Chief Executive Officer and
Digital Leader, TMTDIGITAL
(PTY) LTD
Dr Mert ÖZARAR
Director of Cybersecurity
HAVELSAN
Gaurav Kole
Group Head Of IT, Leylaty Group
During his six years with an MNC, he was chosen as a
young leader and attended their leadership program. He
spearheaded a team to build from scratch the first world-
class defense cybersecurity infrastructure and rectified
a cyberattack within one day – the market average is
twenty-eight days.
Assoc. Prof. Tan holds multiple professional certifications
related to Cybersecurity and data privacy:
• FIP (International Association of Privacy Professionals)
• CIPP/US (Certified Information Privacy Professional/
United States)
• CIPM (Certified Information Privacy Manager)
• CISM (Certified Information Security Manager)
• CISA (Certified Information System Auditor)
• CDPSE (Certified Data Privacy Solution Engineer)
• CEH (Certified Ethical Hacker)
and overseas is a testament to his exceptional leadership
skills. He is deeply committed to developing and mentoring
top talent, and his passion for incorporating cutting-edge
technology into his product strategies is palpable.
28 -JANUARY 2024
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
29. Gaurav Mishra
Director of Information Technology, Digiplug
Technologies Pvt. Ltd.
Graeceinn Remiendo Mayos
Senior IT Software - ERP & CRM
Senoko Energy Pte Ltd, Singapore
• Innovative IT executive with 19+ years of
experience in all aspects of product
development, technology, marketing and
operation.
• I am a Self-driven and motivated person
with a proven track record of success and
extraordinary achievements in building
products from scratch..
Working as a Senior IT software in the areas of
CRM, Sales, Sales Operations, Point of Sales
and Billing.
Worked as a CRM Analyst Solution Developer
(Microsoft softwares), IT ERP Consultant and
Dev Business Analyst focusing on ERP softwares
Strong background in ERP softwares (Microsoft,
Infor, SAP) and HTML, COBOL, JavaScript and
Any special project/work you would like to highlight :
• Government projects under the Ministry of Trade and
Industry
• Central Provident Fund (CPF) a key pillar of Singapore’s
social security system that helps Singapore Citizens and
Permanent Residents set aside funds to build a strong
foundation for retirement
• World’s top banks, ranked ‘Aa1’ by Moody’s Investors
Service and ‘AA-’ by both S&P Global and Fitch Ratings.
• And currently working on projects with the largest
power generation company in Singapore, accounting
for approximately 20% of the nation’s electricity supply.
• Well-developed leadership/communication skills,
excellent time management skills, and great teamwork
abilities.
• I have done MBA in International Business and Engineering
in Computer Sc..
• Passion to innovate and explore new technologies which
can solve society problems using technology.
• Worked with Companies like AIG, Times Groups,
BookMyShow and Mentored many Startups.
• Currently associated with Digiplug Technologies as
Director - Information Technology.
• Member of Startup India Mentorship program, CXO
Cywayz Mentor, CIO Klub and PMI.
• Winner of Next100 CIO Award, 2023 by 9.9 Group
Automation.
Professional with a Bachelors of Science in Information
Technology major in Enterprise Resource Planning
Kazi Monirul Kabir
Founder & CEO, Spider Digital
Monirul is an influential, passionate,
entrepreneurial, innovative, and
objective-driven leader with
Global Perspective and strong
empathy for emerging market
realities. He possesses extensive
Marketing, Communication,
Innovation, Strategic Design,
and Business Development
experience across the Internet,
Telecoms, and Consumer Goods
Industries. Monirul has a successful
Track record of excelling across
Global Enterprises, multinationals,
Social Enterprise and Start-up
Environments. He is a great
believer the transformative power
of Strategic Innovation in driving
the growth and development
of emerging countries and has
chosen #Cybersecurity #Fintech
and #Sustaintech as his focus
areas.
Any special project/work you
would like to highlight :
National Sclale Telecom Data
Inspection and Analytics Platform
for a user base of 140 Mln user
Kapil Savaliya
Information Technology
Manager, Food Manufacturing
Group Co Ltd
-JANUARY 2024 29
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EMERGING WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
30. Gurpreet Singh
CTO/CISO, DiggFull
Gurpreet Singh: Pioneering
Leadership in IT
Ramkumar
Neelakandan
Head IT Operations
Noida International Airport
(Yamuna International
Airport Pvt Ltd – YIAPL)
Leadership in IT
Gurpreet Singh stands as a
paragon of leadership in the
ever-evolving landscape of
Information Technology. With
a career spanning over two
decades, he has consistently
Ramkumar Neelakandan is
an ambitious and seasoned
player in the field of
Any special project/work you would like to
highlight :
1. Scalable E-Learning Platforms for State
Education:
Gurpreet Singh has been at the forefront
of digital transformation in education,
architecting scalable e-learning platforms
for the Indian State Government. Catering
to millions, these platforms not only enhance
the learning experience but also streamline
assessments, making quality education
accessible and efficient for students across
the state.
2. Pioneering AgriTech Ecosystems:
With a keen understanding of the challenges
faced by Indian farmers, Gurpreet has
spearheaded the development of
integrated AgriTech ecosystems. These
platforms, encompassing e-commerce,
knowledge dissemination, and community
networking, have revolutionized the
agricultural sector, providing farmers with
holistic digital tools to enhance productivity
and market reac
Any special project/work you would like to
highlight :
Ram is grateful for being a part of many
prestigious and lauded projects across the
span of his two decades of successful career.
A few to name would be the:
• Successful transition of 06 airports in record
time to a PPP model.
• Deployment of “Critical Airport ICT Systems”
across 07 airports.
• Carried out various Digital Transformation
projects – a unique in Aviation Industry.
• Deployment of Smart Cities & Smart Building
systems & platform – For Corporates,
Universities and High-rise Buildings.
• Experienced in successful completion
of Mixed Development Projects across
countries.
• Hands on experience – in implementing
Data centres, Command & Control Centre.
• Specialist in OT (Operational Technology)
Systems, IT-OT Convergence.
demonstrated an innate ability to lead from
the front, guiding teams toward achieving
technological excellence.
A cornerstone of Gurpreet’s leadership
lies in his vision for scalable and secure
architectures. He understands the intricacies
of designing systems that meet the demands
of today and are future-ready. His expertise
in cloud computing and information
security ensures that deployments under his
guidance are robust, secure, and primed
for growth.
Beyond technical prowess, Gurpreet’s
true strength lies in his ability to inspire and
mentor. He fosters a culture of innovation,
encouraging his teams to push boundaries
and explore the uncharted territories of IT.
As he receives the “Top25 Exceptional
Leaders in IT” award from Digital Confex,
it’s a testament to Gurpreet’s unwavering
commitment to excellence and his
indomitable spirit of leadership in the realm
of IT.
Information Technology, holding more than
2 decades of global experience in multiple
industries and sectors such as Aviation, Mixed
Development projects, Smart Cities and
Buildings, Corporate Campus, Data centres,
Biomedical labs, Factories and Residences.
He earmarked his glorious career working with
brands such as Birla, Siemens, Reliance, L&T,
EDMI-Singapore & Adani. Presently Ram heads
IT operations for Noida International Airport
(NIA) and has been a part of multicultural
teams across nations. He believes that
perseverance and integrity as his assets and a
strong positive attitude is his main instrument at
the workplace. A nature lover by choice, Ram
travels to unique destinations to unwind in the
lap of mountains and waves of beaches. An
enthusiastic cricket player and a great chef
in his leisure time. Ram adores his teenage
daughter who is completing high school soon
and loves to have long talks with his spouse
who is a soft-skills trainer and a Chartered
Accountant
30 -JANUARY 2024
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
31. Keitumetsi Tsotetsi
Senior Specialist, Digital Security Designer,
MTN South Africa
Keitumetsi has been named one of Mail &
Guardian’s Top 200 South Africans in the
Science and Technology category for 2021
and has also been named one of South
Africa’s Top 50 most inspiring women in 2021.
She studied BCom IT Management at
the University of Johannesburg, holds a
Post Graduate Diploma in Management
Any special project/work you would like to highlight :
Lead the implementation of South Africa’s first student
focusedsecuritythemedhackathonin2017.Thehackathon
happens annually to date at one of the biggest security
conferences hosted by ITWeb in Africa. It continues to
provide opportunities for bursaries, internships and other
employment opportunities in South Africa.
specializing in Corporate Governance from Monash
University and is a BSI certified ISO27001 Lead auditor.
Prem Bhawnani
Head of IT, Standards Australia
Rahul Ananthanaraya-
na Reddiar
Development Manager –
Cybersecurity
Bulwark Distribution FZCO
Any special project/work
you would like to highlight:
Closed a Project in one of the
Government entity for DAST Tool
(Invicti Security) who is utilizing
the tool for scanning 1500 web
applications.
Shakthi Priya
Kathirvelu
VP and Head of Information
Security and IT,
Funding Societies | Modalku
Group
Pragya Varshney
Assistant Manager, Mashreq
With 7 years of work experience in the field of
information security, I have gained valuable
expertise and a deep understanding of the
industry. My role as an Assistant Manager
at Mashreq has allowed me to contribute
significantly to the organization’s security
initiatives. I have been involved in various
projects and have successfully implemented
robust security measures to safeguard sensitive
information.
Expertise:
My specialization lies in Vulnerability Assessment and
Penetration Testing (VAPT), Cloud Security, and Mobile
Pentesting. With my knowledge in these areas, I am skilled
at identifying vulnerabilities within systems and applications,
conducting comprehensive security assessments, and
recommending appropriate remediation measures. I
am well-versed in the tools and techniques required to
effectively analyze, exploit, and secure cloud-based
environments and mobile applications.
Skills:
In addition to my technical skills, I have developed
proficiency in vendor management and ISO auditing.
Managing relationships with external vendors is crucial
in ensuring that the organization’s security requirements
are met. Furthermore, my ISO auditing skills enable me to
assess and maintain compliance with international security
standards, ensuring that the organization adheres to best
practices.
-JANUARY 2024 31
TOP 25 EMERGING WOMEN IN IT
TOP 25 EMERGING WOMEN IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 CYBERSECURITY
STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
32. Moshe Weis
Chief Information Security Officer,
Aqua Security
Muhammad Razzaq Chishty
Head of Cybersecurity Audits,
Arab National Bank
Moshe is an accomplished
Cybersecurity leader and lecturer,
with more than16 years of extensive
experience in technology and
cybersecurity. He has a strong
educational foundation with a BSc in
Communications System Engineering
and an MBA in Technological
Entrepreneurship, both completed
Mr. Muhammad Razzaq Chishty, an
experienced IT and Cybersecurity
Audit Leader, brings to the table more
than 13 years of invaluable expertise.
His career has been defined by a
relentless commitment to safeguarding
organizations against evolving threats
and driving positive change in the ever-
Any special project/work you would like to highlight :
Innovative approach to Product & Application
Securiry
with excellence. In addition, Moshe holds numerous
prestigious global cybersecurity certifications.
With a rich history in hardware and software
development, Moshe has evolved his expertise
over the years to focus on pioneering innovative
methodologies within the realms of Application and
Cloud security. Notably, he currently serves as the
Chief Information Security Officer (CISO) at Aqua
Security, a renowned provider of cutting-edge
security solutions for cloud-native applications.
evolving landscape of cybersecurity.
Technical Mastery: With a deep understanding
of complex security programs and a knack for
implementing effective controls, Mr. Chishty has
consistently steered organizations toward greater
resilience. His experience spans a wide spectrum,
from introducing cutting-edge security technologies
to conducting meticulous risk assessments.
Results-Driven: Throughout his career, Mr. Chishty
has maintained a reputation for delivering tangible
results that align seamlessly with overarching business
objectives. Whether it’s enhancing cybersecurity
measures or leading compliance endeavors, he has
consistently achieved outcomes that matter.
Syed Missam Akhter
Cluster I.T Procurement Manager,
Emirates Stars Hospitality Group
Dubai & Sharjah
Kunal Malhotra
Founder & CEO, CYTERICO
Aseasonedprofessionalwithproficiency
in Cybersecurity & Technology Risk
and extensive leadership expertise.
10+ years of experience delivering
Risk Transformation projects in
Program Governance, Quality
Management, Industry Benchmarking,
Business Continuity Planning, Cyber
Resilience, IT Audit & Controls Testing.
Thrives in collaboration with clients
in diversified sectors, including
Financial Services (Banking &
Insurance), IT, Telecommunication,
Energy, Education, Government
& Pharmaceutical. In his recent
role, Kunal worked as an Executive
Director for a consulting firm, Kloudyy
Consulting Group (KCG), for which he
did contract work in the past known as
Ekloudyy Datamatics Private Limited,
setting and leading the Cybersecurity
and Technology Risk practice.
Any special project/work you would
like to highlight :
Cyber Strategy for Fotune 500, Setting
up the 3 LOD, Benchmarking against
the top tier banks in regards to TPRM.
32 -JANUARY 2024
TOP 25 CYBERSECURITY
STAR OF THE YEAR
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
33. Reaz shaheed
Educational Technology
Director,
Shattuck-St.Mary’s Forest
City International School,
JOHOR, Malaysia
Information Technology
Specialist since 1997 with
leadership roles at K-12
International Schools in
Bangladesh, Tanzania
and now at the Shattuck-
St. Mary’s Forest City
International School in
Malaysia, promoting
Digital Transformation in
learning and teaching with
21st Century Academic
Technologies.
A certified Technology
Director from the Texas
Computer Education
Association,USAand Trainer
in Google Workspace for
Education I believe in the
motto of lifelong learning to
help educators in building
global citizens beyond
the boundaries of cultural
differences.
Any special project/work
you would like to highlight :
Continued exploration
of integrating cloud
technology with productive
Business Systems to create
operational efficiencies
has made the transition to
remote learning during the
recent global pandemic
seamless, with ZERO
downtime.
Also Work in progress: Adopt
Industry standard Cyber
Security policies for Students
and Teachers.
Shariq Khan
VP, Head of IT, ERGO Insurance Pte Ltd.
Singapore
“I am Shariq Khan, VP and Head of IT at ERGO
Insurance Singapore.
A senior technology management leader with a
proven track record in driving IT transformation
and innovation in Insurance industry. I bring
expertise in strategic IT planning, organization-
wide change delivery, digital transformation,
IT operation management and IT Infrastructure
simplification/modernization. I am passionate about
leveraging my technical and leadership skills to help
organizations to achieve their business objectives.
I have also been recognized by IDG (Foundry) among top
100 CIO in South East Asia and HK region for year 2022
Runcy Oommen
Director, Software Engineering, SonicWall
Runcy is an accomplished professional in the
field of Software Engineering with strong SDLC
experience and a string of projects primarily in
the security domain. Runcy strives constantly
to build better software with extra focus on
data security that would be kept throughout
its life-cycle and not just as an after-thought.
Considers himself to be a perfectionist yet
remains practical, knowing where to draw the
line and stop. As he believes in giving back to the technical
community, he’s the organiser of Google Cloud chapter and
Cloud Native chapters of Bangalore
Steven Sim Kok Leong
Head Group Cybersecurity (CISO),
PSA International Pte Ltd
Steven Sim worked for more than 25 years in
cybersecurity with large end-user enterprises
and critical infrastructures, undertaken global
CISO role, driven award-winning security
governance and management initiatives and
headed incident response, security architecture,
technology and operations at local, regional and
global levels.
Any special project/work you would like to highlight :
PSA Cyber Security Master Plan
He currently leads cybersecurity across PSA Group,
heading the Group Cybersecurity Department and indirect
reports across regional offices and local business units in 42
countries and oversees both Group-wide IT and OT Security
Governance, Technology Management and Incident
Response as well as the Cyber Security Masterplan Office. He
also leads the Group Cybersecurity Centre of Expertise.
-JANUARY 2024 33
TOP 25 CYBERSECURITY STAR OF THE YEAR
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 EXCEPTIONAL
LEADER IN IT
INFORMATION
TECHNOLOGY
CONFEX
2023
34. Shariza Umira Puteri Binti
Kamarozzaman
Cybersecurity Lead,
Tune Insurance Malaysia Sdn. Bhd
Vibhor Bhatnagar
Technical Architect – Presales Google
EcoSystem, HCLTech
I have 12 years of experience, with 8 years in
a server environment and 4 years in Security
Operations and Infrastructure, working with
clients from diverse business backgrounds.I
possess strong analytical skills, am hardworking,
self-disciplined, highly motivated, energetic,
curious, and a team player. I am also creative,
responsible, capable of working under
18 years of extensive experience in business
development initiatives and formulation of
presales strategies. A keen planner, strategist
& implementer with demonstrated abilities in
devising marketing activities and accelerating
business growth spans across multiple
geographies, including the USA, Europe,
Any special project/work you would like to highlight :
I am currently working on setting up Security Operation
Center automation for blocking malicious IP addresses
and handling multiple login failures. We are planning to
execute an annual Cyberdrill and Penetration Test for Tune
Insurance Malaysia in Q4. I am working closely with the
Head of the Department to plan and execute the Tune
Insurance Malaysia Cybersecurity Framework roadmap for
the upcoming year, 2024.
Any special project/work you would like to highlight :
Received
Eminence & Excellence Award 2012 and an Outstanding
Contributor Award in IBM
Received Metlife Insurance application migration
programme -
• Name that you would like to have in the award plaque:
Vibhor Bhatnagar
• Video byte of 30 seconds to 1 minute to acknowledge
the award recognition and how it feels to be the
recipient of the award: Can we get sample.
• Your walk up song: Any list from their side to select from
pressure, and excel in interpersonal and communication,
as well as organizational skills.
Australia, and India.
Vibhor dedicated his expertise to HCLTech, IBM, where he
playedapivotalroleintransformingbusinessesacrossvarious
sectors such as Insurance, Travel, and Communication. As
a visionary leader, he spearheaded initiatives to migrate
and modernize application landscapes, paving the way
for cloud adoption
Vivek Singh
Engagement Director,
TCS Ltd.
VivekisaseasonedInformation
Technology professional with
over 20 years of experience
in the industry, boasting a rich
and diverse career that spans
across multiple geographies,
including the USA, Canada,
Singapore, and India.
For nearly two decades, Vivek
dedicated his expertise to IBM,
where he played a pivotal
role in transforming businesses
across various sectors such
as Insurance, Aviation, and
Pharma. As a visionary leader,
he spearheaded initiatives
to migrate and modernize
application landscapes,
paving the way for cloud
adoption. Vivek’s leadership
not only led to substantial
cost reductions, directly
contributing to improved
EBITA for his clients, but also
served as a catalyst for
revenue growth. He achieved
this by harnessing data-driven
strategies and implementing
innovative solutions to tackle
supply-chain challenges.
In addition to his remarkable
career achievements,
Vivek boasts an impressive
intellectual property portfolio
with over 10 IPs published
under his name on IP.com.
Beyond the world of
technology, Vivek enjoys the
complexities of chess and
finds solace in nature, using
it as a means to unwind and
rejuvenate.
34 -JANUARY 2024
TOP 25 EXCEPTIONAL
LEADER IN IT
TOP 25 EXCEPTIONAL LEADER IN IT
TOP 25 CYBERSECURITY STAR OF THE YEAR
INFORMATION
TECHNOLOGY
CONFEX
2023
35.
36. 36 -JANUARY 2024
CYBERSECURITY PRODUCT
MANAGER:
RAHUL ANANTHANARAYANA
REDDIAR
Rahul Ananthanarayana Reddiar, working as a Cybersecutiy
professional in a Value Added Distributor in UAE. He comes
with a 9+ years of middle east experience in Information
Technology. He currently handles Cybersecurity Product
manager role covering the GCC market & Channel
Development Manager role for Oman region.
37. -JANUARY 2024 37
R
ahul Ananthanarayana Reddiar, working as a
Cybersecutiy professional in a Value Added
Distributor in UAE. He comes with a 9+ years
of middle east experience in Information
Technology. He currently handles Cybersecurity
Product manager role covering the GCC market &
Channel Development Manager role for Oman region.
As a Cybersecurity Product Manager Rahul
Ananthanarayana Reddiar is responsible for the
development, implementation, and ongoing
management of security products and solutions. He
work diligently to stay one step ahead of malicious
actors by creating and maintaining cutting-edge
cybersecurity tools and systems.
Responsibilities as a product manager in
Cybersecurity:
• One of the primary responsibilities of Rahul
Ananthanarayana Reddiar is to identify market
needs and develop products that address them. This
entails conducting market research, understanding
evolving threats, and collaborating with cross-
functional teams to design and develop effective
cybersecurity solutions.
• Cybersecurity products are not static entities. They
require continuous monitoring, updates, and
improvements to stay effective. Rahul
Ananthanarayana Reddiar is responsible for the
entire product lifecycle, from inception to
retirement.
• Effective communication with stakeholders is
essential. Rahul Ananthanarayana Reddiar liaise
with customers, marketing teams, sales teams, and
internal developers to gather feedback, understand
user needs, and align product development with
business goals.
• Identifying vulnerabilities and potential threats is a
core function. Rahul Ananthanarayana Reddiar
assess cybersecurity risks and develop strategies to
mitigate them. This involves a deep understanding
of potential threats, regulatory compliance, and
industry standards.
• Keeping an eye on the competition is crucial Rahul
Ananthanarayana Reddiar continuously monitor
the competitive landscape to identify gaps in
security offerings and opportunities for
improvement.
• Educating end-users about best practices in
cybersecurity is another vital aspect of the job.
Rahul Ananthanarayana Reddiar ensure that users
understand how to use security products effectively,
thereby reducing the risk of human error in security
breaches.
Challenges facing as a Product Manager in
Cybersecurity:
Working in cybersecurity is not without its challenges.
Cyber threats evolve rapidly, requiring constant
adaptation and innovation in product development.
Some key challenges faced by Rahul Ananthanarayana
Reddiar:
• Cyber threats are continually changing. Rahul
Ananthanarayana Reddiar must keep up with the
latest attack techniques and vulnerabilities to design
products that can withstand new and emerging
threats.
• Striking the right balance between a user-friendly
interface and strong security features can be
challenging. A product that is too cumbersome to
use will discourage adoption, while one that is too
user-friendly may compromise security.
Staying compliant with evolving data protection
regulations and standards is a significant challenge.
Rahul Ananthanarayana Reddiar must ensure that
his products meet legal requirements and industry
standards.
• Rahul Ananthanarayana Reddiar often must work
within budgetary constraints and find innovative
ways to achieve their security goals.
The Significance of Product Manager in
Cybersecurity:
The role of a Rahul Ananthanarayana Reddiar is
significant for several reasons:
• Rahul Ananthanarayana Reddiar play a vital role in
protecting sensitive data from theft, ensuring the
privacyandsecurityofindividualsandorganizations.
• Cyberattacks can disrupt business operations.
Effective cybersecurity products ensure business
continuity by preventing or mitigating the impact of
attacks.
• A security breach can damage an organization’s
reputation. Cybersecurity Product Managers help
maintain trust and credibility by safeguarding
against breaches.
• In the case of government agencies and critical
infrastructure, the role of Cybersecurity Product
Managers is pivotal in protecting national security
interests.
• Cyberattacks cost organizations billions of dollars
annually. By preventing these attacks, Cybersecurity
Product Managers contribute to the economic well-
being of organizations and nations.
In conclusion, Cybersecurity Product Managers like
Rahul Ananthanarayana Reddiar are at the forefront of
the battle against cyber threats. His role is multifaceted,
involving product development, risk management, and