
Rahil is a trusted, responsible and knowledgeable cyberspace veteran with more than 10 years of experience in operational security domains such as Security Operations Centre (SOC), Threat Intelligence (TI), Threat Hunting (TH), and Incident Response (IR). He is currently leading Threat Intelligence, Security Intelligence, and Security Advisory services.
He has assisted corporate, government, and defense customers from diverse industries (Banking & Finance, Healthcare & Insurance, FinTech & Biotech, Oil & Gas, Power Grid & Nuclear Facility, Government & Foreign Affairs, Aerospace & Defense, Surveillance & Investigation, etc.), for effectively managing the Cyber Security workforce by providing clear visibility on their cyber risk profile and exposure to the cyber threats. He is currently serving EC-Council’s Global Advisory Board for CTIA and has jointly authored a Cyber Research whitepaper on “Role of a Pen Tester in Ethical Hacking” with EC-Council.
Rahil is also focused on terrorism & cyber terrorism, CBRN terrorism, and human trafficking & migrant smuggling issues. He has jointly collaborated with the US Army, US Army TRADOC, and CSFI on four projects related to cyber intelligence, operational security, and telecommunication & internet surveillance.
Rahil’s key aim is to assist and enable organizations in taking intelligence-driven decisions and actions in cybersecurity operations and management.
Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Dubai, UAE
Speaking Topics: Threat Intelligence, Security Operations Centre (SOC), Threat Hunting, Terrorism, Human Trafficking
| Rahil Karedia | Points |
|---|---|
| Academic | 200 |
| Author | 198 |
| Influencer | 44 |
| Speaker | 0 |
| Entrepreneur | 63 |
| Total | 505 |
Points based upon Thinkers360 patent-pending algorithm.
Fighting Modern Slavery and Human Trafficking - Part 1
Tags: Blockchain, Cryptocurrency, National Security
Fighting Modern Slavery and Human Trafficking - Part 2
Tags: Blockchain, Cryptocurrency, National Security
Tags: Blockchain, Cryptocurrency, National Security
Human Trafficking 101
Tags: Blockchain, Cryptocurrency, National Security
Tags: National Security, Security
Tags: Cybersecurity, Privacy, Security
Tags: Cybersecurity, Privacy, Security
Tags: National Security, Security
Tags: National Security, Security
Preparing and Responding to Active Shooter Incidents
Tags: Cybersecurity, Risk Management, Business Continuity
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Cybersecurity, Data Center
Tags: Cybersecurity, Data Center
Tags: Cybersecurity, Data Center, Emerging Technology
Tags: Emerging Technology, Data Center
ICT Executive Program
Tags: Analytics, Cybersecurity, Sustainability
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Cybersecurity, Leadership, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
New Wave of Targeted Hacking Campaigns and Ransomware Attacks Exploiting Microsoft Exchange Server Vulnerabilities
Tags: Cybersecurity, Risk Management, Business Continuity
What is the security feature bypass vulnerability & update affecting Windows customers worldwide?
Tags: Cybersecurity, Risk Management, Business Continuity
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Cybersecurity, Ecosystems
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Business Continuity, Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity
Tags: Cybersecurity, Leadership, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity
Tags: Blockchain, Cryptocurrency, Cybersecurity
Tags: Business Continuity, Cybersecurity, Risk Management
COVID-19 CTI League Volunteer
Tags: Cybersecurity, Sustainability, Risk Management, COVID19
Tags: Cybersecurity, Risk Management
Tags: Cybersecurity, Risk Management
Global Advisory Board Member - Penetration Testing (IMEA Region)