Social Network For Security Executives: Network, Learn & Collaborate
Sharat M. AIRANI
B.Sc, DCA, PGDBM, MDP (IIM-A), MCSE, OCP, CCM, C|EH, LA (TuV-NORD), CISA, Dip in Cyber Law. (Mum Uni)
Chief-IT (Systems & Security), Forbes Marshall Group of Companies.
Earlier, handling Customer Care in DaRTMAIL (A DSJ Group Venture), IcNET and Archana Telecom Services (Mekaster, Delhi Group). Adding to 21 years of experience in IT.
Key focus on strategy, creating business value with Business IT Strategy, Customer Satisfaction, and IT lead business innovation and transformation. Lead team focusing on results and execution. Focus on driving technology and enabling business with improved customer satisfaction while reducing operational IT budgets. Experience in leading teams across diverse technologies and systems ensuring effective adoption and benefit.
Voted "The Most Respected CIO in India" by peer CIOs, conducted by CIO Association of India, 2012.
Winner and recipient of many awards and accolades for pioneering Business IT implementations.
Co-Convener of CII - IT in Manufacturing
Jt. Treasurer of CIO KLUB, Pune Council
Speaker on varied topics on IT
Creating business value supported by technology,
Aligning IT with business,
IT Transformation, turn around IT organization and improve effectiveness,
Managing teams with focus on outcomes,
Strategic Outsourcing and cost management,
Domain expert: IT/ITES and Manufacturing.
Sharat has designed and facilitated many sessions for various educational institutes. Presented papers on different forums.
He desires to explore more in IT Security, Communication and new growing trends in IT Field. He loves to trouble-shoot problems and explore new ideas which is on-going.
Travelling, Music, Photography and reading are of interest.
Now pursuing his PhD on APT.
The 2012 Cost of Data Breach Study conducted provides some valuable information about the average cost of an enterprise data breach. The study, released in March’13, also recognized that organizations with a chief information security officer (CISO) in place experienced reduced costs for data breaches, which is right on target from my experience.
I am right in suspecting that an organization without a CISO is more prone to a security fault.
The role of a…Continue
I have seen many blogs, articles and most of them stated as, CISO need the ability to adopt the business. The role of the CISO in any organisation is to protect the business and bring the operations under secured mode, under the policy defined, governance so on and so forth. So obviously he has to aware of the business, competition and more than that the risk to the organisation and compliance matter.
Here I am putting this in other side of the context. Does business also need to…Continue
If you start off blowing the whistle too quickly, too early on — and believe me, early in my career, I did — I didn't make any friends, didn't get any further with the program of work I was trying to do.
You are going to discover some very, very ugly things. The secret that I have personally found is when you find the ugly stuff, don't go trumpet it to everybody and say, 'Hey, I've found all these flaws’.
Instead, what you need to do is to sit with the IT operations staff,…Continue
On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide distribution of information and communication technology (ICT) devices and networks".
Enterprise information security is more than just protecting against viruses. The collaborative and diverse nature of modern business means that…