[Nominate] Suggest Your Favourites For Top 100 Global IT Influencers 2020

Recommend an influencer whom we might have missed: We have chosen 82 and look forward to remaining 18 nominations. Now you can suggest us names with their contribution.

----> Just reply to the discussion and add your favourite influencer!

Views: 280

Reply to This

Replies to This Discussion



-- Award Winning in Cybersecurity & Privacy --

Over 18 years in consulting experience for Fortune 200 companies in Management Consulting, Cybersecurity, Data Privacy, Risk, Compliance and IT Governance. Traveled extensively and worked closely with organizations in Australia, Switzerland, Singapore, USA and HK.

*International Association of Privacy Professionals (IAPP) Regional Lead and Co-Chair, Adjunct Professor at HKBU School of Business (Cybersecurity and Privacy), Centre for Information Policy Leadership (CIPL) Global Security and Privacy Think Tank Member.

*Cybersecurity Professional Award: Cyber Security and Technology Crime Bureau of the HK Police Force, the Government Computer Emergency Response Team and the HK Computer Emergency Response Team Coordination Centre. Awarded for sharing / thought-leadership in cyber security and best practices in combating cyber threats

*Outstanding Financial Technologist of the Year": FinTech Development Leader in the area of Data Privacy, by the Institute of Financial Technologists of Asia (IFTA).

*Global Top 20 Influencers List, “Cybersecurity Thought Leadership” by Thinkers360; RSA Conference Speaker on Artificial Intelligence (AI) and Data Ethics.

*Cyber Security / Data Privacy / Risk / Governance: Certified Information Systems Security Professional (CISSP®), Certified Information Privacy Professional/Europe (CIPP/E®), Certified Information Privacy Manager (CIPM®), Certified in the Governance of Enterprise IT (CGEIT®), Certified in Risk and Information Systems Control (CRISC®), (Certified Information Systems Auditor (CISA®), Certified Information Security Manager (CISM®), Certified Ethical Hacker (CEH®) and Certified Network Defence Architect (CNDA®), ITILv3, Certified Scrum Master (CSM®) and ISO27001:2013 Lead Auditor. Jason has also been inducted as a Fellow of Information Privacy (FIP®) by IAPP.

*Strategy: Working with CXX / Board Level strategic planning on cyber security, privacy and governance.

*Cybersecurity Operations: ISO27001, NIST, PCI, DevSecOps, SOC, Network Management, Systems Management and Monitoring

I want to nominate Biswajit Mohapatra as top 100 Global IT Influencers 2020 , his visiting card attached.

Hi, would like to nominate Nitin Kathuria (KPMG) for influencing a major change in the organization to curtail data leakage preventions. Below is the summary of the activity :
Data leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks may include losing clients and stakeholders confidence, loss of reputation and potential legal implications.To prevent from all these from happening, Data leakage prevention(DLP) is the category of solutions which we implemented in our organization to apply relevant controls for preventing such leakage of sensitive or confidential information to unauthorized parties within or outside our organization.
We implemented policies to prevent and monitor for all common device typs and ports: USB devices, Internet uploads/ web browsers, network printers, cloud/file sharing, instant messaging and emails. This helped us tremendously to prevent any sensitive or confidential information being uploaded onto the internet or sent outside our domain without our knowledge. We also conducted awareness sessions with colleagues to make them understand the importance of protecting the information. With successful implementation, we were able to track number of violations happening within the environment and took appropriate measures including disciplinary actions to adhere to our contractual obligations with clients etc. With tool implementation,our organization has controlled number of data transfers or uploads that were happening to external domains which has reduced the number of potential data leakage incidents for us.We have put stringent monitoring in place to ensure all alerts are investigated with appropriate messaging.We have seen reduction of incidents for over an year after putting the control and Senior Management is very content with relevant controls / measures that are in place.

Hello All,

I would like to Nominate myself.

Reference Link: https://www.linkedin.com/in/adityaitsecurityconsultant/

Aditya Mukherjee is an Information Security Leader & an *Aspiring CISO* with 12+ years of experience in Leadership roles across Info. Sec. domains such as Defence & Law Enforcement, Financial Services, Health & Public Service, Products, Resources, Communications, Media & Technology.

His core expertise includes Cyber Security Strategy, Strategic Risk & Cyber Resilience Assessment, Tactical Leadership & Development, GRC & Security Audit, Security Operations, Architecture & Engineering, Threat Management, Security Investigation, and Forensics.

I have attained several Certifications, Industry Recognitions, and Awards, which are mentioned in details on my LinkedIn profile.


Hello wonderful team, I would like to nominate myself -


Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:

Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business strategy for sustainable growth. She is the author of the book Cyber Risk Leaders: Global C-Suite Insights – Leadership and Influence in the Cyber Age, a business handbook containing rich insights from 70+ CxOs across industries, exploring the art of communication with executives. As a podcaster and founder of an international Cyber Risk meetup which has 3,000 members across six different cities, her Mega C-Suite Stories conversations with top industry C-level leaders offer a platform for security enthusiasts and executives to impart and exchange innovative insights. Shamane is a sought-after international speaker in the fields of cyber security, leadership and the human connection. 

2020 Finalist of the Australian Women in Security Awards of multiple categories across 'Unsung Hero', 'Best Volunteer' and 'One to Watch'.

Thank you very much.




Security Trends and Emerging Technologies That A CISO Should Adopt In 2021

Started by Priyanka Aash Mar 3. 0 Replies

What are the challenges you as a CISO have been facing since the last year and share some security trends that are catching up? Help the community by sharing your knowledge and personal views on this subject. Or if you have any specific questions…Continue

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30, 2020. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by Yogesh Nov 19, 2020. 2 Replies

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20, 2020. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2021   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service

/* */