Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Santosh Kamane

CO-founder and CEO at CyberFIT Solutions Pvt Ltd

Pune, India

CyberSecurity Leader | Advisor | CISO | Data Privacy | RIsk Management | GRC | Business resilience


Cyber Security Leader, Advisor and CISO with over 18 years of progressive experience in building Cyber security and Risk management Programs, design and architect security solutions for enterprises, business continuity mgmt. Data privacy, Technology Audits, cloud and application security, third party risk mgmt,Incident management and SOC, DLP Programs, Privacy frameworks and data security in Banking domain.

Transparent, collaborative, and always work with the highest integrity,

My passion is creating secure and resilient environments where Information Security is a business enabler and a competitive differentiator.

- An accomplished Information Security leader experienced in communicating with C-level executives at a strategic level, understanding business risk appetite & aligning with & supporting the business Technology agenda
-Technically proficient, entrepreneurial, and genuinely understand the challenges facing organizations in securing their reputations and value, holistically
• Built high performance security teams & programs from the ground up

Over 14 yrs of Building Cybersecurity Programs and frameworks as CISO in Banking and FI industry in USA. (2004 - 2018)

Academics :
Bachelor of Engineering (Electronics& Telcomm)
International MBA ( Leadership & corporate governance)

Certifications : CISM , CEH, CHFI. CESA/LPT, ISO270001

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Pune, India
Speaking Topics: Cybersecurity, Risk management, data privacy, business continuity, Cyber awareness, auditing , Banking security

Santosh Kamane Points
Academic 0
Author 10
Influencer 4
Speaker 18
Entrepreneur 20
Total 52

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Information security
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed

Areas of Expertise

Business Continuity 30.56
Business Strategy 30.39
Change Management
Generative AI 30.20
Cloud
Customer Experience
Cybersecurity 31.96
Data Center
Digital Disruption
Diversity and Inclusion
Entrepreneurship 31.50
FinTech
Leadership
Lean Startup
Privacy 31.07
Risk Management 35.03
Security

Industry Experience

Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Insurance
Pharmaceuticals
Professional Services
Telecommunications

Publications

10 Article/Blogs
Building DevSecOps Culture in the organizations
Import from medium.com
May 25, 2023
DevSecOps is a systematic approach to integrate security practices throughout SDLC Lifecycle and mitigate software security risks.. While DevSecOps brings immense benefits, its adoption and integration is challenging for several reasons. For one, lack of understanding of objectives and alignment of

See publication

Tags: Cybersecurity, Privacy, Risk Management

Artificial Intelligence : A new dimension to traditional people, process and technology risk…
Import from medium.com
March 31, 2023
Artificial Intelligence : A new dimension to traditional people, process and technology risk framework.People, Process , Technology and Artificial intelligenceTraditional Risk Mgmt FrameworkTraditionally ,as we all have learnt, when it comes to Risk management, “People, Process, and Technology

See publication

Tags: Cybersecurity, Privacy, Risk Management

Web 3.0 : Revolutionary technology with significant security risks
Import from medium.com
February 27, 2023
Web 3.0 : Revolutionary technology with potential security risksWeb 3.0 EvolutionWeb 3.0 at its core, comes across as a natural evolution in terms of its concept and idea. Add blockchain, smart contracts, DAOs to the mix and now it sounds like a perfect package where security can’t be broken and

See publication

Tags: Cybersecurity, Privacy, Risk Management

Chat GPT — More risks than benefits?
Import from medium.com
January 30, 2023
Chat GPT — More risks than benefits?The Eureka momentIts no denying that ChatGPT has been talk of the town ever since it was enabled for public access and use. Artificial Intelligence has been a known topic to everyone now, especially in tech community. It has been part of school and universi

See publication

Tags: Cybersecurity, Risk Management, Generative AI

Data Disposal: Your sensitive data may be at risk.
Import from medium.com
December 22, 2022
Data DisposalData is the oxygen for digital world.Technology has evolved immensely in last 20 odd years. From large mainframes to desktop computers, laptops to smartphones, data centers to cloud, tablets to smart watches, google search to ChatGPT , we have really come a long way. These technologic

See publication

Tags: Cybersecurity, Risk Management, Generative AI

ChatGPT will create more jobs. And better ones !
Import from medium.com
December 16, 2022
ChatGPT will create more jobs. And better ones !Source: Internet / AtoZroboticsTechnology changes the way we workToday, I read a random LinkedIn post by a gentleman who wrote “ChatGPT is taking away all our jobs, it should be banned”Insecurity is very intrinsic and innate trait of humans. Our

See publication

Tags: Cybersecurity, Risk Management, Generative AI

Cybersecurity education can be organized and affordable
Import from medium.com
December 11, 2022
Image source: FreePikLast week, a new connection on LinkedIn messaged me. He is a fresh college graduate in computers, he loves reading cybersec and follow it religiously and now looking forward to start his career in this areaWe continued our conversation,“Great, so what you learnt so far on th

See publication

Tags: Cybersecurity, Privacy, Risk Management

Don’t start career into cybersecurity unless …
Import from medium.com
December 06, 2022
Don’t start career into cybersecurity unless …image by rawpixel.com on freepikOften, I am asked by young folks on how they can start or switch their careers into Cybersecurity and the kind of preparation they would require for this transition.Before divulging into that topic, you may have noti

See publication

Tags: Cybersecurity, Privacy, Risk Management

Elon Musk — A Great Manager, Best Task Master and a poor Leader !!
Import from medium.com
December 02, 2022
Elon Musk — A Great Manager, Best Task Master and a poor Leader !!Traditional LeadersThose who are not millennials, would probably relate well with the traditional definition of a Leader. Throughout history when we look at various leaders across the globe who made their mark with their achiev

See publication

Tags: Cybersecurity, Privacy, Risk Management

Cybercrimes — Technical Vulnerabilities Vs Human Morals
Import from medium.com
December 01, 2022
Cybercrimes — Technical Vulnerabilities Vs Human MoralsRising CybercrimesImage by <a href=”https://www.freepik.com/free-photo/medium-shot-man-with-hoodie-holding-laptop_20824740.htm#query=cybersecurity&position=13&from_view=search&track=sph">Freepik</a>Since the

See publication

Tags: Cybersecurity, Privacy, Risk Management

1 Founder
CyberFIT solutions Pvt Ltd
www.cyberfit.tech
November 07, 2022
Co-Founder of CyberFIT solutions Pvt Ltd India (www.cyberfit.tech)

See publication

Tags: Cybersecurity, Entrepreneurship, Risk Management

1 Keynote
Fortifying the Three Legged Stool Of Information Security, Risk & Business Continuity
Cyber Security Hub USA
November 18, 2020
Realizing that risk is the foundation of Cyber Security
Zeroing in on the information Security focus of controls and mitigation
Establishing business continuity with cyber security matching tenants: confidentially, availability and integrity
Blending requirements to ensure business needs are met, compliance is accomplished and safety is secured

See publication

Tags: Business Strategy, Cybersecurity, Risk Management

1 Media Interview
ISMG CyberEdBoard : Leadership interview
ISMG, CyberEdBoard
December 21, 2022
"A well-defined privacy framework helps in building additional security controls because when your customers know they have the right to take legal action when their data is breached, the enterprise will automatically have additional liabilities in terms of reputation and penalties," says Kamane.

In an interview with Information Security Media Group as part of the CyberEdBoard's ongoing Profile in Leadership series, Kamane discusses:

The highlights of his career;
The importance of collaboration between risk, compliance and business continuity teams;
His cybersecurity goals for 2022;
Kamane has more than 18 years of progressive experience in cybersecurity, risk and resilience. His passion is building secure and resilient environments and information security programs with cybersecurity as a business enabler as well as a competitive differentiator.

See publication

Tags: Business Continuity, Cybersecurity, Privacy

1 Speaker Award
Sinhgad University - Student Induction program
Sinhgad University, Pune India
December 02, 2019
Chief guest and speaker at Sinhgad University Pune (MBA Students ) to speak about current cybersecurity trends and inclusion on cybersecurity in academic institutions

See publication

Tags: Cybersecurity

1 Speaking Engagement
Future Sec Summit 2019, Riyadh Saudi Arabia
FutureTech Summit 2019
April 17, 2019
Guest speaker at Future Tech summit 17-18 April 2019 for a session to Banking stalwarts and Executives. The Topic was "Cloud Security, CASB and new generation firewalls"

Panel - Panel for insightful discussion on Vendor due diligence and third party risks

See publication

Tags: Cybersecurity, Privacy, Risk Management

Thinkers360 Credentials

4 Badges

Blog

Opportunities

1 Product
CyberFIT - Secure Data Erasure and policy compliance (WipeOut)

Location: Virtual    Date Available: December 04th, 2022     Fees: 1

Submission Date: December 03rd, 2022     Service Type: Service Offered

WipeOut is a patented electronics shredder and data sanitization policy compliance solution for individuals and organizations. It prevents data breaches arising from inadequate data disposal methods, ensure privacy compliance and mitigates and regulator risks.

Organizations prefer WipeOut as
1. It allows centralized solution data erasure of files/folders/drives using secure algorithms
2. It includes data discovery and WipeOut scheduler to automate data Sanitization processes
3. Generation of data destruction certificate
4. Remote WipeOut
5. WipeOut for lost/stolen assets
6. Rescue Me - Unique feature that allows WipeOut of pre-defined set of data with one Click

Website
https://wipeoutinc.us

Respond to this opportunity

Contact Santosh Kamane

Book Santosh Kamane for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Santosh Kamane


Latest Activity

Latest Opportunities