Currently, he is researching on blockchain security and IoT security.Ĭarolyn Crandall Chief Security Advocate, Attivo NetworksĬarolyn Crandall is the Chief Security Advocate at Attivo Networks, the leader in preventing identity privilege escalation and detecting lateral movement attacks. He loves to be on a constant learning path, whether it be trying a CTF(Capture The Flag) or learning emerging technologies. Krishna has achieved professional success in multiple countries, including Singapore, Japan, US and India, in addition to maintaining a comprehensive understanding of the Singapore, Hong Kong and Australian ICT and finance sectors. ![]() Leveraging an astute understanding of multiple departments and industries. Throughout his career, Krishna has been well-regarded for his ability to dramatically improve operational efficiency and team productivity through the automation of previously manual processes. Recognised as an “Architect of excellence” by Microsoft. ![]() His professional capabilities span Enterprise risk management, Cyber security and enterprise architecture. Krishna Kasi is an IT Security enthusiast, working with BNP Paribas and has over 20+ years of professional experience in the ICT sector, primarily focussing on infrastructure, cyber security and governance, risk management and compliance (GRC). Krishna Mohan Kasi Vice President, BNP Paribas Podcasts, webinars, video, and text interviews. ![]() They contribute in either of the following ways: The Advisory Board members are “ active” participants and contribute to CISO MAG regularly. ![]() It includes shaping our editorial content, identifying important topics and special issues, moderating discussions, vetting technical content, and updating the magazine’s presence by creating and implementing different initiatives. Board members offer the CISO MAG editors advice regarding the magazine as well as suggest the strategic direction it should follow. CISO MAG established an Editorial Advisory Board with the foremost innovators and thought leaders in the cybersecurity space.
0 Comments
Leave a Reply. |