Sign in to view Mohit’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Mohit’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Singapore
Sign in to view Mohit’s full profile
Mohit can introduce you to 10+ people at Mediacorp Pte Ltd
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
3K followers
500+ connections
Sign in to view Mohit’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Mohit
Mohit can introduce you to 10+ people at Mediacorp Pte Ltd
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Mohit
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Mohit’s full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Articles by Mohit
-
Best Practices for Secure Code Review
Best Practices for Secure Code Review
To prevent our designed application from security threats we must focus more on the underlying code. When an…
1
Activity
3K followers
-
Mohit Kumar posted thisMcKinsey charges substantial fees to guide companies on digital transformation. And yet, their own AI platform was reportedly compromised using vulnerabilities like SQL Injection and broken access control, issues that have been around for decades. This wasn’t some sophisticated zero-day attack. It was basic security hygiene… missed. What’s more interesting (and concerning) is how it happened. The attacker wasn’t a human manually probing systems. It was an AI agent, able to identify and chain vulnerabilities on its own. That’s the real shift. The attack surface is evolving rapidly with AI. But in many cases, the fundamentals of security still aren’t keeping up. No matter how advanced the technology gets, ignoring the basics can still bring everything down. And now, with AI accelerating both innovation and attacks, those gaps can be exploited faster than ever. So the question is: Who’s assessing your AI systems today?
-
Mohit Kumar reposted thisMohit Kumar reposted thisGoogle released massive learning resources for AI Agents 10+ Code Samples, Whitepapers, Hands-on Projects and much more... Google recently finished wrapping up their latest 5-Days intensive Kaggle AI Agent course where they gave us bunch of resources to learn and practise building AI Agents. Day 1: Introduction to Agents Understand AI agent fundamentals: core architecture, taxonomy of capabilities, and how agents differ from LLMs. Learn to build agents that perceive, plan, act autonomously. Whitepaper: https://lnkd.in/grYivvCW Code Resource 1: https://lnkd.in/gcDruAx7 Code Resource 2: https://lnkd.in/gmYMFkDX Day 2: Agent Tools & Interoperability with MCP Learn how agents interact with external systems through tools and APIs. Understand MCP architecture, tool design best practices, and human-in-loop approval workflows. Whitepaper: https://lnkd.in/gnU9yqqW Code Resource 1: https://lnkd.in/g5ZQHGzg Code Resource 2: https://lnkd.in/gPsBR3k7 Day 3: Context Engineering: Sessions & Memory Discover how agents maintain context across conversations. Understand Sessions for immediate state and Memory for persistent learning across interactions. Whitepaper: https://lnkd.in/g9WztfuP Code Resource 1: https://lnkd.in/g4mQEtPE Code Resource 2: https://lnkd.in/gRtJFvi5 Day 4: Agent Quality Master observability foundations: Logs, Traces, Metrics. Learn evaluation frameworks including LLM-as-a-Judge and Human-in-the-Loop for production reliability. Whitepaper: https://lnkd.in/g-SAMSpV Code Resource 1: https://lnkd.in/gJxMN46g Code Resource 2: https://lnkd.in/gR_QKbrS Day 5: Prototype to Production Understand deployment lifecycle and scaling strategies. Learn Agent2Agent Protocol for system-wide coordination and production readiness on Vertex AI. Whitepaper: https://lnkd.in/gnUAscjM Code Resource 1: https://lnkd.in/gnikixYA Code Resource 2: https://lnkd.in/gUBBWhxS Note: Learn the prerequisites before running these solutions as they require a few unique configs and API keys. (Check comments) If you want to understand AI agent concepts deeper, my free newsletter breaks down everything you need to know: https://lnkd.in/g5-QgaX4 💾 Save ➞ 👍 React ➞ ♻️ Share & follow for everything AI Agents
-
Mohit Kumar reposted thisMohit Kumar reposted thisMoving from "Can we build it?" to "Is it safe?" 🛡️ Everyone has seen the RAG Developer's Stack, but as we move from POC to production, the conversation must shift to security. You can't just deploy and pray. I’ve mapped out the AI Security Stack—the essential layers needed to protect your LLM architecture. Here is the breakdown of the defense layers: 🔹 Model Supply Chain: Scanning proprietary and open models (Hidden Layer, Protect AI). 🔹 Hardening & Guardrails: preventing jailbreaks and hallucinations (NeMo, Lakera). 🔹 Adversarial Testing: Red teaming before you ship (Red Team Toolkit, Robust Intelligence). 🔹 Real-Time Monitoring: Catching anomalies in the wild (Splunk, Datadog). 🔹 Data Governance: Ensuring privacy compliance (Privacera, BigID). Building the AI is only half the battle. Securing it is the war. Which layer is your team prioritizing right now? 👇 #AISecurity #LLMOps #DevSecOps #GenerativeAI #Cybersecurity #RAG
-
Mohit Kumar shared thisA great opportunity to get hands-on experience architecting AI agents using Gemini and Antigravity. My experience using Antigravity has been nothing short of amazing.Mohit Kumar shared thisI’m excited to share that #GoogleCloud Labs is returning to Singapore! 🇸🇬 On 25 March, we’re hosting a full day of technical workshops at the Google Developer Space. This year, we’re moving beyond chatbots to the next era of Autonomous Agents. Here is what I’m most looking forward to: 🚀 Gemini 3.0 & ADK: Building autonomous agents with real business logic. 📚 Knowledge-Driven RAG: Ensuring hallucination-free results. ⚡ AntiGravity: Next-gen #GenAI developer tools. 🛠️ Gemini Enterprise: Scaling AI with a no-code approach. Seats are strictly limited for this hands-on experience. Secure your spot here: https://lnkd.in/gHYvdRFZ #GoogleCloudLabs
-
Mohit Kumar shared thisApplication security just took a major leap in shifting towards “Secure by AI” dev cycles. Anthropic dropped “Claude Code Security” yesterday, and it's already sending shockwaves through the trillion-dollar software & cybersecurity ecosystem. Built on the freshly-released Claude Opus 4.6, it scans entire codebases with deep contextual reasoning. It uncovers novel, high-severity vulnerabilities that traditional SAST, SCA, and even seasoned human reviewers miss for years. -Its testing revealed over 500 long-hidden bugs in mature open-source projects that had endured decades of expert audits. It goes further: assigns severity + confidence scores, proposes precise patch suggestions, and runs multi-stage verification to slash false positives. On the flip side, it gives power to the bad actors too. As this model democratizes the vuln discovery by lowering the barriers for good and bad actors. This feels like the moment "secure by design" evolving into "secure by AI." Anthropic article: https://lnkd.in/gUaVUaP9 #AISecurity #Cybersecurity #DevSecOps #Anthropic #SecureByAI #ApplicationSecurity #BusinessRisk #InnovationMaking frontier cybersecurity capabilities available to defendersMaking frontier cybersecurity capabilities available to defenders
-
Mohit Kumar reposted thisMohit Kumar reposted thisIf you’re the kind of cybersecurity professional who thrives on leading security operations, driving incident response, outsmarting attackers, shaping detections, and mentoring analysts — this role has your name on it. Mediacorp is hiring an Assistant Lead for Cyber Defence & Resilience to guide analysts, turn threat intelligence into action, and safeguard platforms that millions rely on every single day. This is more than just protecting systems — it’s about protecting trust. Click the link to apply or happy to pass along referrals.. #cybersecurity #SOC #incidentresponse #threatintelligence #detectionengineering #mediasecurity
-
Mohit Kumar shared this37% of global cloud Infra using AI GPU is vulnerable to this CVE. NVIDIAScape (CVE-2025-23266) is more than a vulnerability - it’s a reminder and precaution to Cyber leaders and Boardroom. We’ve all been talking about AI risks in terms of model integrity, adversarial inputs, and data misuse. But the disclosure of NVIDIAScape is a reminder that the real fragility often lies underneath the AI stack, in the infrastructure we assume is safe. A three-line exploit can break out of NVIDIA AI containers and compromise entire GPU hosts. In a multi-tenant cloud world, that means cross-tenant breaches, leaked models, and disrupted AI services at scale. The key takeaway: AI risk is not new risk — it’s amplified risk. Speed matters: Patching and mitigating is urgent so that window for attackers is short. Board conversations must evolve. Securing AI is not only about the algorithm rather it’s about the ecosystem it runs on. Our role is to safeguard not just innovation, but the infrastructure that makes it possible. #AI #RiskManagement #CloudSecurity #CVE202523266 https://lnkd.in/g4Ybk7eNNVIDIAScape - NVIDIA AI Vulnerability (CVE-2025-23266) | Wiz BlogNVIDIAScape - NVIDIA AI Vulnerability (CVE-2025-23266) | Wiz Blog
-
Mohit Kumar shared this🌟Ranked as the 2nd highest scorer in Singapore! 🌟I'm thrilled to announce that I've successfully earned my Certified Information Security Manager (CISM) certification! 🎓💼 Throughout this journey, I've delved deep into critical domains such as information security governance, risk management, and incident management, equipping myself with the knowledge and skills necessary to navigate today's complex cybersecurity landscape. I want to express my sincere gratitude to my mentors, colleagues, and the vibrant cybersecurity community for their unwavering support and guidance. If you're considering pursuing the CISM certification or have any questions about my experience, feel free to reach out. #CISM #Cybersecurity #Certification #ProfessionalDevelopment #InfoSec https://lnkd.in/gkR8s3wnCertified Information Security Manager® (CISM) was issued by ISACA to Mohit Kumar.Certified Information Security Manager® (CISM) was issued by ISACA to Mohit Kumar.
-
Mohit Kumar posted thisHard selling vs Endorsements- Opting for hard selling can be effective for early career professionals or companies. However, it is endorsements that truly amplify one's career or brand. Therefore, the focus should lean towards garnering multiple endorsements, even if it requires an investment of time, effort, and a steadfast commitment to long-term goals. Capitalise on awards and accolades as it gives people who do not know us an idea of where we stand compared to others. #career #endorsement #hardselling
-
Mohit Kumar liked thisMohit Kumar liked thisAfter all the noise around Project Glasswing and the usual “this is the end of cybersecurity” takes flying around, I wanted to take a real step back. I have read a lot of doom, a lot of fear and a lot of people acting like the only conclusion here is panic. Yes, Anthropic’s Mythos capability is a genuine powerful shift. Finding vulnerabilities at that scale, including bugs hiding in production code for decades, is a big deal. The discovery side of the problem has clearly moved on. But the real story for me is what comes next. This does not kill cybersecurity. It exposes where the real work has always been. Prioritisation. Ownership. Software QA. Remediation capacity. Change velocity. Engineering discipline. That is where most organisations still struggle. Not because nobody cares, but because real estates are messy, old and full of systems nobody wants to touch on a late Friday afternoon. So rather than add to the doom spiral, I wrote my take on the more optimistic side of this. Where I disagree with some of the commentary. What this actually changes. What it does not change. And where I think the industry has a real opportunity to get better. Better QA before code ships. Smarter release discipline. AI assisted remediation where it genuinely helps. And more honest, intelligence led prioritisation instead of pretending every red dot is the same fire. There is still a lot of good work to do. There are still good people doing it. And there is a credible path forward here if we stop admiring the problem and start fixing the pipeline around it. That is my view on the state of play and what to do next. Link in the comments. #CyberSecurity #CISO #VulnerabilityManagement #AI #ProjectGlasswing #SecurityLeadership
-
Mohit Kumar liked thisMohit Kumar liked thisWhat most people get wrong about organizational politics and the security program. Creating and running an enterprise wide security program requires you to navigate, and benefit from, organization politics. This takes influencing skill and executive presence. These aren’t simply innate skills. They can be developed like any other skill. Navigate the organization. https://lnkd.in/eCEfhz2s
-
Mohit Kumar liked thisMohit Kumar liked thisGoogle released massive learning resources for AI Agents 10+ Code Samples, Whitepapers, Hands-on Projects and much more... Google recently finished wrapping up their latest 5-Days intensive Kaggle AI Agent course where they gave us bunch of resources to learn and practise building AI Agents. Day 1: Introduction to Agents Understand AI agent fundamentals: core architecture, taxonomy of capabilities, and how agents differ from LLMs. Learn to build agents that perceive, plan, act autonomously. Whitepaper: https://lnkd.in/grYivvCW Code Resource 1: https://lnkd.in/gcDruAx7 Code Resource 2: https://lnkd.in/gmYMFkDX Day 2: Agent Tools & Interoperability with MCP Learn how agents interact with external systems through tools and APIs. Understand MCP architecture, tool design best practices, and human-in-loop approval workflows. Whitepaper: https://lnkd.in/gnU9yqqW Code Resource 1: https://lnkd.in/g5ZQHGzg Code Resource 2: https://lnkd.in/gPsBR3k7 Day 3: Context Engineering: Sessions & Memory Discover how agents maintain context across conversations. Understand Sessions for immediate state and Memory for persistent learning across interactions. Whitepaper: https://lnkd.in/g9WztfuP Code Resource 1: https://lnkd.in/g4mQEtPE Code Resource 2: https://lnkd.in/gRtJFvi5 Day 4: Agent Quality Master observability foundations: Logs, Traces, Metrics. Learn evaluation frameworks including LLM-as-a-Judge and Human-in-the-Loop for production reliability. Whitepaper: https://lnkd.in/g-SAMSpV Code Resource 1: https://lnkd.in/gJxMN46g Code Resource 2: https://lnkd.in/gR_QKbrS Day 5: Prototype to Production Understand deployment lifecycle and scaling strategies. Learn Agent2Agent Protocol for system-wide coordination and production readiness on Vertex AI. Whitepaper: https://lnkd.in/gnUAscjM Code Resource 1: https://lnkd.in/gnikixYA Code Resource 2: https://lnkd.in/gUBBWhxS Note: Learn the prerequisites before running these solutions as they require a few unique configs and API keys. (Check comments) If you want to understand AI agent concepts deeper, my free newsletter breaks down everything you need to know: https://lnkd.in/g5-QgaX4 💾 Save ➞ 👍 React ➞ ♻️ Share & follow for everything AI Agents
Experience & Education
-
Mediacorp Pte Ltd
**** ***** ******** *********
-
*** ******** ******
*** ** ********** **** * **** ******* ******* * *** ***
-
**
********* **********
-
******** ********** ** *********
****** ** ******** ************** * *** *********** undefined undefined
-
-
******* ********* ** **********
******** ** ********** * ***** *********** *** ************** ***********
-
View Mohit’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Licenses & Certifications
Volunteer Experience
Languages
-
English
-
-
German
-
-
Hindi
-
Recommendations received
View Mohit’s full profile
-
See who you know in common
-
Get introduced
-
Contact Mohit directly
Other similar profiles
-
Joel Platek
Joel Platek
As a Senior Compromise Recovery Cybersecurity Consultant at Microsoft, I have over six years of experience in planning and executing the eviction of adversaries from compromised environments. I work with a global team of experts who collaborate with the DaRT IR team to deliver effective and efficient solutions for our clients. I am certified in MCSE, MCSA, and MCPS, and have a master's degree in cybersecurity.<br><br>My mission is to help customers adopt and integrate Microsoft solutions with a security-focused mindset, aligning them with business processes and compliance requirements. I am passionate about leveraging cloud technologies such as Azure and O365, and facilitating the transition to a DevOps framework and a continuous delivery approach. I also focus on educating C-level executives, board members, and key stakeholders about the threats and opportunities in the cyber landscape, and how to mitigate and capitalize on them.
2K followersSingapore
Explore more posts
-
Cybersecurity Advisors Network (CyAN)
6K followers
💡 India’s Cyber Tsunami: A Strategic Roadmap for Business Resilience We’re proud to share this insightful research report by Pathan Humam, a current mentee in CyAN’s Global Cybersecurity Mentorship Program, under the guidance of Mohammed Shakil Khan. Titled “India’s Cyber Threat Landscape 2025: The ₹20,000 Crore Cyber Tsunami,” this paper explores India’s escalating cyber risks, the regulatory implications of the DPDP Act and CERT-In mandates, and the urgent call for Zero Trust and AI-driven defense strategies to strengthen national cyber resilience. Pathan’s work reflects the depth of learning and collaboration that define our Global Mentorship Program, where experienced cybersecurity professionals like Mr. Khan guide emerging talents from around the world and help transform knowledge into actionable insights. Congratulations to both mentor and mentee for this outstanding contribution to our growing CyAN knowledge community. 📖 Read the full report on our website https://lnkd.in/gKNDASpQ
15
-
Data Security Council of India
71K followers
The inaugural address at #AISS2025 set an inspiring tone for the summit as Vinayak Godse, CEO, DSCI, welcomed participants from industries and stakeholders, acknowledging the steadily growing and deeply committed cybersecurity community. In his address, Mr. Vinayak spoke about the rapidly evolving security landscape shaped by advancements in AI and emerging technologies, noting that these shifts bring not only new opportunities but also greater responsibilities for the entire ecosystem. He highlighted that this year’s AISS represents a major leap forward, with an expanded agenda, richer thematic tracks, and dedicated sub-summits focused on critical sectors including healthcare, operational technology, and insurance. This growth, he emphasized, reflects the maturity, ambition, and collective strength of the community coming together to address the challenges of a digital future. Mr. Vinayak also extended heartfelt gratitude to partners, contributors, and attendees, acknowledging that the scale and depth of the three-day summit are made possible through industry-wide collaboration and continuous support. He closed the address by drawing attention to the packed and promising schedule ahead, featuring workshops, track sessions, and sector-specific discussions designed to shape the future of cybersecurity in the country. #AISS2025 #DSCI #Cybersecurity
1
-
Australian Security Industry Association Limited (ASIAL)
18K followers
ASIAL Security Conference 2025 Featured Speaker: Siddharth Rajanna, Head of Cyber Security, BINGO INDUSTRIES Topic: Advanced Threat Intelligence and Cyber Security Strategies The presentation aims to address current complexities and also some unique strategies against using CTI (Strategic, Tactical & Operational) information for uplifting the overall security posture. Including using CTI data in Security Risk Assessments, Threat modelling, Uplift of Cyber Maturity capability, Uplift of Security Incident Response plans, etc. Siddharth is a seasoned Cyber Security Leader with over 13 years of experience in IT security. He specialises in leading and implementing cybersecurity initiatives, offering strategic consultation on complex projects, and driving compliance, risk, and governance in line with industry standards. Find more information & secure your tickets here: https://ow.ly/jSKz50Wavc9 #asial #asialmember #security #securityindustry #securityaustralia #security2025
5
-
Cyber Warriors Middle East
558 followers
New Delhi | MSHTML Framework Vulnerability: A Rising Cyber Threat Cybersecurity experts are raising alarms regarding a newly identified vulnerability in the MSHTML framework, designated as CVE-2026-21513. This high-severity security flaw, which has a CVSS score of 8.8, is reported to be capable of bypassing security controls within the MSHTML framework. The implications could be […] https://lnkd.in/d-KzbH93 Cyber Warriors Middle East #CyberWarriorsMiddleEast #CyberWarriorsConclave #CWME #CWC #Cybersecurity #CyberThreats #MitigatingCyberAttacks #MiddleEast #UAE #Dubai
-
Raksha Technologies
5K followers
Raksha Cyber Snapshot Brief | 11 January 2026 Today’s briefing covers critical vulnerabilities, active exploit campaigns, and key India-focused cyber risk updates every security leader should track. Stay informed. Stay resilient. 🔐 #CyberSecurity #ThreatIntelligence #InfoSec #RakshaTechnologies
3
-
CyberFoundHer Initiative
108 followers
🎯 A Day in the Life of a Penetration Tester | Meet Our Guests We're bringing our mentees an intimate conversation with two exceptional cybersecurity professionals who will share the unfiltered reality of working in offensive security. Feat : Tata Derek and Gaspard Baye, Ph.D Tata Derek is a Lead Red Team Engineer and Penetration Tester who specializes in offensive security, threat detection, and digital forensics. Beyond his technical work, Derek is deeply committed to mentoring the next generation of cybersecurity professionals, particularly women in the field. He co-leads Cyber Defenz and actively drives Red Shielders Africa, organizing events and training across the continent. Derek also works with law enforcement on cybercrime investigations and prosecutions, bringing a unique perspective on the legal side of offensive security. Gaspard Baye, Ph.D is a Security AI Scientist with a PhD, who has spent over five years developing AI-driven offensive and defensive security applications. His research has been published in prestigious conferences like NeurIPS, HASP, and IEEE Access, and he's a recognized CVE holder who has discovered over 20 critical vulnerabilities, earning Hall of Fame recognition from Nokia and Ford Motors. Gaspard has shared his expertise at DEFCON, OWASP, and BSides, and holds certifications including OSCP, PNPT, CEH Practical, and AI Security and Governance. In this session, our mentees will discover what the day-to-day life of a penetration tester really looks like, the skills and certifications needed to break in, and honest insights about work-life balance, stress, and rewards. Most importantly, they'll get actionable advice on how to start their journey today.
54
8 Comments -
IPMPlus - Intelligent Power Management End Points | Buildings | Data Centers
2K followers
In the present intricate digital workplace, every unseen device is a risk waiting to surface. India’s Indian Computer Emergency Response Team (CERT-In) now mandates baseline cyber defence controls for MSMEs—including endpoint visibility and monitoring. With IPM+ by Vigyanlabs, you don’t just check a box — you gain real-time insight across every endpoint, instant anomaly detection, and full audit-readiness aligned with those controls. Stop looking for risks. Start seeing the safety and productivity of every asset. Visit www.ipmplus.com for a free MSME asset and compliance assessment. #CERTIn #EndpointVisibility #ITAssetSecurity #MSMEIndia #Cybersecurity #CyberCompliance #DigitalTrust #IPMPlus #Vigyanlabs #ZeroBlindSpots #AuditReady #CyberResilience #TechForMSMEs #InfosecIndia
20
-
CISO Marketplace | Offensive Security & Ai Services
676 followers
🚨 The Hunter Becomes the Hunted: North Korean APT Group Kimsuky Faces Unprecedented Data Breach! 🚨 Discover the evolving tactics of cyber espionage and how even the most notorious groups are vulnerable. This incident sheds light on the importance of robust cyber defenses and constant vigilance. Dive into the details of this significant breach and what it means for global cybersecurity. #Cybersecurity #Kimsuky #DataBreach #ThreatIntelligence #APT #Infosec https://lnkd.in/e_GJFHgE
1
-
Suvabrata Sinha
Zscaler • 7K followers
Our ThreatLabz' 2025 OT, IOT and Mobile Threat Report is published (https://lnkd.in/gsB74QTB ). Some key facts should be of interest to the security and tech community in India. 1️⃣ The Manufacturing and Transportation sectors jointly bear the brunt of IoT attacks, with a combined 40% of all IoT malware attacks and equal 20% shares. This marks a shift from Manufacturing’s standalone dominance last year. Additionally, attacks surged in the Arts & Entertainment and Education sectors, signaling a widening threat landscape as attackers increasingly target industries with growing IoT adoption. 2️⃣ India is the global top target for mobile malware, experiencing 26% of all attacks, a 38% year-over-year increase in detected attacks. 3️⃣ Attackers target Indian users with sophisticated phishing via WhatsApp and fake banking/government apps, using advanced malware that automates credential theft and bypasses verification controls. 4️⃣ Almost 7% of all compromised IoT devices were located in India, considerably fewer than the U.S. (54.1%), but concerning given the expected growth in the number of IoT devices in the region (estimated 427 million in 2025, estimated 1.5 billion by 2034). Zscaler Zero Trust Architecture offers the most flexible, scalable and "future proof" security architecture for Manufacturing and Transport companies. Please ping me on Linkedin or elsewhere, I will be happy to help . Chandini Rai Hemant Dabke Abhoy Kumar Sarkar Karthik Kishore Kedar Amonkar Nitin Paranjape kanchan Singh Anurup Singhal
41
-
Information Security Media Group (ISMG)
123K followers
The Government of India has appointed Navin Kumar Singh, former NCIIPC India (A unit of NTRO) Director General, as the 4th National Cybersecurity Coordinator and the first IPS officer to hold the position. Singh has led initiatives including: - National cyber war-gaming simulations to strengthen IT & OT resilience in energy, telecom & banking. - India’s updated national cybersecurity strategy aligning governance, response & recovery. - NCIIPC–AICTE Pentathon 2024, promoting indigenous cybersecurity innovation. In his new role, Singh aims to: - Strengthen public–private partnerships against emerging threats. - Enhance India’s Global Cyber Power Index standing. - Advance cyber defense diplomacy and stakeholder coordination. 📌 A defining moment for India’s cybersecurity leadership.
33
4 Comments -
ExecPulse
32K followers
Deepti Mishra took helm as Director of Product Marketing at Cyware, a leading force in Operational Threat Intelligence and Collective Defense. Cyware empowers security teams to transform fragmented threat data into real-time, actionable intelligence by unifying threat intelligence management, collaboration, and hyper-orchestration, enabling organizations to outmaneuver cyber adversaries with speed and precision. A seasoned product marketing leader, Deepti brings a rich cross-industry journey shaped by strategic roles at Cyware, Innovaccer, and Wipro. Prior to her current role, she served as Principal Product Marketing Manager at Cyware and held key leadership positions at Innovaccer, where she drove market expansion, GTM strategy, growth marketing, and sales enablement. Her early career foundations in product marketing consulting and presales further strengthened her ability to align product vision with market demand. Deepti holds a Post Graduate Diploma in Management (Marketing) from T A Pai Management Institute, Manipal, where she also served as Vice President of the Student Executive Council. She earned her bachelor’s degree in Economics, Political Science, and English from Isabella Thoburn P.G. College, reflecting a strong blend of analytical thinking and communication excellence. With this appointment, Deepti Mishra is set to sharpen Cyware’s product narrative, accelerate market impact, and strengthen its leadership in the global cybersecurity landscape. Her strategic mindset and customer-centric approach will play a pivotal role in advancing Cyware’s mission of enabling smarter, faster, and more unified cyber defense. #execpulse #EXECPULSE #Leadership #CorporateNews #CLevelMoves #BusinessUpdate #CareerMilestone #IndustryInsights
268
34 Comments -
63SATS Cybertech
5K followers
Mr. Ajit Pillai, Chief Business Officer at 63SATS Cybertech, shared valuable insights at ETCISO SecuFest 2026 on navigating today’s rapidly evolving cybersecurity landscape. He emphasized that organizations must move beyond the traditional mindset of treating cybersecurity as a back-end IT function. Instead, cybersecurity should be recognized as a business-critical capability, one that safeguards operations, protects customer trust, and ensures long-term resilience. Neehar Pathare Srinivas L Lt Gen Madhavan Unnikrishnan Nair Lt Gen Kamal Jit Singh Shirin Pathare Koustubh Patil Nisha S. #63sats #cybersecurity #etsecufest2026 #cyberresilience
30
1 Comment -
ETCISO
24K followers
Live from ETCISO SecuFest, Ajit Pillai, CBO, 63SATS Cybertech shares insights on navigating today’s rapidly evolving cybersecurity landscape. From strengthening cyber resilience to building proactive defense strategies, the conversation highlights how organisations must rethink security as a business priority and not just a technical function. Know More: https://lnkd.in/grwAMhDU #ETCISO #ETCISOSecuFest #CyberSecurity #CISOLeadership #Infosec #CyberResilience #SecurityLeadership
14
-
Veloxx Media
2K followers
Cyber risk is no longer an IT issue. It is a matter of national resilience. In the latest episode of CyberSuraksha Dialogues, we speak with Alok Shankar Pandey, GGM (IT) & CISO, Dedicated Freight Corridor Corporation of India Limited (DFCCIL), on how cyber threats impact railways, healthcare, power systems, and critical public infrastructure. From legacy systems to 5G, IoT, and state-sponsored attacks, this conversation examines why cybersecurity failures can trigger real-world disruption without a single physical strike. 🎥 Full episode now live on our YouTube channel (Link in comments) #CyberSurakshaDialogues #CriticalInfrastructure #CyberSecurityIndia #NationalResilience #PSUSecurity #CyberGovernance #DigitalInfrastructure #PublicSector #Railways #DFCCIL
7
1 Comment -
Ardent Privacy
Ardent Privacy • 4K followers
At AISS 2025, Air Vice Marshal (Dr) Devesh Vatsa VSM, Advisor at Data Security Council of India, shared key insights on emerging trends from a DPDPA perspective in a conversation with Mr. Sameer A., Founder & CEO, Ardent Privacy. With the DPDPA rules now notified and penalties going up to ₹250 crore, organisations are beginning to take privacy compliance far more seriously. This creates a strong opportunity for the privacy ecosystem, where practical and scalable solutions will play a critical role. 🎥 Watch the conversation for expert insights on India’s privacy journey. #AISS2025 #DPDPA #DataProtection #Privacy #DSCI #ArdentPrivacy #CyberSecurity Ardent Privacy - India (Bharat) Shivraj Jadhav Sakshi Agrawal Suraj Thakare Tejas Joshi
13
2 Comments -
CyberDisti
11K followers
A big thank you to everyone who joined Cybersecurity in Focus: Reinventing EDR, MDR with Sangfor Athena — an insightful session hosted by CyberDisti! Together, we explored how modern EDR, MDR solutions are evolving to meet today’s complex threat landscape with next-gen innovation from Sangfor Technologies. 👏 Special thanks to Mohsin Khan, Sales Manager – Sangfor and Ahamadali Ansari – Presales Manager, Sangfor Middle East for walking us through Sangfor's : 🔸 Advanced EDR & MDR strategies 🔸 Real-world threat scenarios 🔸 Proactive cyber defense with Athena Your engagement and curiosity made this session truly impactful. 🔔 Stay connected with CyberDisti for more expert-led sessions and cutting-edge cybersecurity solutions from global technology leaders. Finn Yang, Shiron Xie, Aaron Yang, Imran Ahmed, Vignesh Kumar, Ganesh Malpute, sudhir saini, Prasanth Prema Sethumadhavan, Gazali Aga, Sabahath Yar Khan, Sangfor Technologies Middle East, Jisha Thajudeen, Shilpa S.. Jibu John #CyberDisti #SangforTechnologies #CybersecurityWebinar #EDR #MDR #SangforAthena #EndpointSecurity #ThreatDetection #CyberDefense #AIinCybersecurity #NetworkSecurity #InfoSec #CyberAwareness #ThinkCyberSecurity #CyberDistiEvents #NextGenSecurity #CyberResilience #CyberThreats #CyberDistiXSecurity #CyberTechInsights
25
-
Dataquest
10K followers
The Global Cybersecurity Outlook 2026 warns that AI-powered attacks, cyber fraud and geopolitical risks will redefine cybersecurity in India and demand stronger digital defence strategies. Read this article by Preeti Anand: https://lnkd.in/g3AbUCcr #Dataquest #AI #Cybersecurity #Geopolitics #technology
3
-
Rahul Kumar
Howell Protection Systems… • 2K followers
🚨 A Major Regulatory Shift Is Just Around the Corner for India's Surveillance Industry. #Cybersecurity #CCTV #Surveillance #MeitY #STQC #BISCertification #EssentialRequirements #IndiaCompliance #SmartSecurity #NationalSecurity #MakeInIndia #PhysicalSecurity #DataProtection #SecurityTechnology #RegulatoryCompliance #April2026 #SurveillanceTechnology #InfoSec #IoTSecurity #DigitalIndia
23
-
OHS - Office of Homeland Security Council
589 followers
Introducing the ISRDO Suraksha Framework (iSF) 🇮🇳🛡️ India’s first unified, sovereign-ready cybersecurity strategy designed to protect digital Bharat from ground up. Built by ISRDO, the iSF aligns global innovation with India's national security needs across 5 strategic shields. 🌐 Policy | 🏗️ Infrastructure | 🤖 Threat Intel | 🔐 Privacy | 🔄 Response Stay protected. Stay sovereign. #iSF #SurakshaFramework #CyberSuraksha #ISRDO #CyberSecurityIndia #DigitalIndia #NationalSecurity #CyberDefense #MakeInIndia #SecureIndia #GovTech #BharatNet #IndiaStack #AI #CyberResilience
2 Comments
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More