Recommend an influencer whom we might have missed: We have chosen 82 and look forward to remaining 18 nominations. Now you can suggest us names with their contribution.

----> Just reply to the discussion and add your favourite influencer!

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Votes: 0
Email me when people reply –

Replies

  • Hello wonderful team, I would like to nominate myself -

    https://www.linkedin.com/in/shamane/

    Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:

    Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business strategy for sustainable growth. She is the author of the book Cyber Risk Leaders: Global C-Suite Insights – Leadership and Influence in the Cyber Age, a business handbook containing rich insights from 70+ CxOs across industries, exploring the art of communication with executives. As a podcaster and founder of an international Cyber Risk meetup which has 3,000 members across six different cities, her Mega C-Suite Stories conversations with top industry C-level leaders offer a platform for security enthusiasts and executives to impart and exchange innovative insights. Shamane is a sought-after international speaker in the fields of cyber security, leadership and the human connection. 

    2020 Finalist of the Australian Women in Security Awards of multiple categories across 'Unsung Hero', 'Best Volunteer' and 'One to Watch'.

    Thank you very much.


    Cheers,
    Shamane

  • Hello All,

    I would like to Nominate myself.

    Reference Link: https://www.linkedin.com/in/adityaitsecurityconsultant/

    Aditya Mukherjee is an Information Security Leader & an *Aspiring CISO* with 12+ years of experience in Leadership roles across Info. Sec. domains such as Defence & Law Enforcement, Financial Services, Health & Public Service, Products, Resources, Communications, Media & Technology.

    His core expertise includes Cyber Security Strategy, Strategic Risk & Cyber Resilience Assessment, Tactical Leadership & Development, GRC & Security Audit, Security Operations, Architecture & Engineering, Threat Management, Security Investigation, and Forensics.

    I have attained several Certifications, Industry Recognitions, and Awards, which are mentioned in details on my LinkedIn profile.

    Regards,
    Aditya

  • Hi, would like to nominate Nitin Kathuria (KPMG) for influencing a major change in the organization to curtail data leakage preventions. Below is the summary of the activity :
    Data leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks may include losing clients and stakeholders confidence, loss of reputation and potential legal implications.To prevent from all these from happening, Data leakage prevention(DLP) is the category of solutions which we implemented in our organization to apply relevant controls for preventing such leakage of sensitive or confidential information to unauthorized parties within or outside our organization.
    We implemented policies to prevent and monitor for all common device typs and ports: USB devices, Internet uploads/ web browsers, network printers, cloud/file sharing, instant messaging and emails. This helped us tremendously to prevent any sensitive or confidential information being uploaded onto the internet or sent outside our domain without our knowledge. We also conducted awareness sessions with colleagues to make them understand the importance of protecting the information. With successful implementation, we were able to track number of violations happening within the environment and took appropriate measures including disciplinary actions to adhere to our contractual obligations with clients etc. With tool implementation,our organization has controlled number of data transfers or uploads that were happening to external domains which has reduced the number of potential data leakage incidents for us.We have put stringent monitoring in place to ensure all alerts are investigated with appropriate messaging.We have seen reduction of incidents for over an year after putting the control and Senior Management is very content with relevant controls / measures that are in place.
  • I want to nominate Biswajit Mohapatra as top 100 Global IT Influencers 2020 , his visiting card attached.

    Biswajit Mohapatra Visiting Crad.jpg

  • https://www.linkedin.com/in/jasonciso/

    https://www.rsaconference.com/experts/professor-jason-lau

    -- Award Winning in Cybersecurity & Privacy --

    Over 18 years in consulting experience for Fortune 200 companies in Management Consulting, Cybersecurity, Data Privacy, Risk, Compliance and IT Governance. Traveled extensively and worked closely with organizations in Australia, Switzerland, Singapore, USA and HK.

    *International Association of Privacy Professionals (IAPP) Regional Lead and Co-Chair, Adjunct Professor at HKBU School of Business (Cybersecurity and Privacy), Centre for Information Policy Leadership (CIPL) Global Security and Privacy Think Tank Member.

    *Cybersecurity Professional Award: Cyber Security and Technology Crime Bureau of the HK Police Force, the Government Computer Emergency Response Team and the HK Computer Emergency Response Team Coordination Centre. Awarded for sharing / thought-leadership in cyber security and best practices in combating cyber threats

    *Outstanding Financial Technologist of the Year": FinTech Development Leader in the area of Data Privacy, by the Institute of Financial Technologists of Asia (IFTA).

    *Global Top 20 Influencers List, “Cybersecurity Thought Leadership” by Thinkers360; RSA Conference Speaker on Artificial Intelligence (AI) and Data Ethics.

    *Cyber Security / Data Privacy / Risk / Governance: Certified Information Systems Security Professional (CISSP®), Certified Information Privacy Professional/Europe (CIPP/E®), Certified Information Privacy Manager (CIPM®), Certified in the Governance of Enterprise IT (CGEIT®), Certified in Risk and Information Systems Control (CRISC®), (Certified Information Systems Auditor (CISA®), Certified Information Security Manager (CISM®), Certified Ethical Hacker (CEH®) and Certified Network Defence Architect (CNDA®), ITILv3, Certified Scrum Master (CSM®) and ISO27001:2013 Lead Auditor. Jason has also been inducted as a Fellow of Information Privacy (FIP®) by IAPP.

    *Strategy: Working with CXX / Board Level strategic planning on cyber security, privacy and governance.

    *Cybersecurity Operations: ISO27001, NIST, PCI, DevSecOps, SOC, Network Management, Systems Management and Monitoring

This reply was deleted.