Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Ratan Jyoti

Chief Information Security Officer at Ujjivan Small Finance Bank

Bengaluru, India

A social Media Influencer in CyberSecurity , a Global Advisory Board Member of EC-Council and a Process-oriented, seasoned Information Security Leader, having around 18 years of rich and insightful experience in Information Technology & functions. Track record of improving risk resiliency through secure architecture design, information risk management, business requirements development, and security policy life-cycle management. Believe in engendering trust in customers through multi-layered technology control. Give high importance to continual skilling of our people, actionable intelligence of threats, and converging security models and processes.

Leadership:
Organizational Leadership,Team Builder and Cybersecurity Strategist
Budget Planning & Management
Cybersecurity Evangelist
Project / Program Management
Digital Transformation
Business Process Improvement

Specialties:
Enterprise Security Architecture and Strategy
Information Risk Management
Security Governance
Security Incident Management
Business Resumption and Continuity
Application Security Life cycle management
Data Protection
Payment Systems Security
Vulnerability Assessment & Penetration Testing
Regulatory Compliance
Training & Awareness
ISO 27001, COBIT, PCI DSS
Outsourcing Risk Management
Network Integrity
Security Log Management
Data Leak Prevention
Privilege Identity Management
Security Incident and Event Management
Security Operation Center
Threat Hunting
Threat Intelligence
Cyber Security KPI and KRI determination
Red Teaming
Operational Risk Management
Cloud Security
Data Privacy
Author
Cyber researcher

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Bengaluru
Speaking Topics: Cybersecurity Blockchain

Ratan Jyoti Points
Academic 45
Author 25
Influencer 452
Speaker 4
Entrepreneur 0
Total 526

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Cyber Security
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: N/A
Company Founded Date: Undisclosed
Media Experience: 10 Years
Last Media Interview: 11/01/2019

Areas of Expertise

Agile
AI 30.14
Analytics 30.21
Big Data 30.04
Blockchain 37.55
Business Strategy 30.04
Change Management
Cloud 30.30
Cryptocurrency 30.76
Customer Experience 30.06
Cybersecurity 35.68
Data Center
Digital Disruption
Digital Transformation 30.40
Emerging Technology 30.05
FinTech 30.49
Innovation
IoT 30.03
Leadership 30.09
Management
Mobility
Predictive Analytics 30.03
Privacy 36.67
Risk Management 34.09

Industry Experience

Financial Services & Banking
Higher Education & Research

Publications

2 Academic Fellow / Scholars
A Structured Approach to Using Threat Intelligence
https://www.bankinfosecurity.in
November 22, 2017
A Structured Approach to Using Threat Intelligence

See publication

Tags: Blockchain, Cybersecurity, Privacy

Information system on National Pusa Insect Collection ISNPIC
Shashpa Journal 9(2): 127-132
September 01, 2002
Information system on National Pusa Insect Collection ISNPIC

publication date Sep 1, 2002 publication description Shashpa Journal 9(2): 127-132

publication description This is the web based information system for insect
collections is developed at Indian Agricultural Research Institute, New
Delhi by Ratan Jyoti et al., 2002. It is known as Information System on
National Pusa Insect Collection (ISNPIC), which is one of the biggest
insect collections in Asia with more than half a million specimens
comprising of approximately 17,000 identified species.

See publication

Tags: Cybersecurity, Digital Transformation, Privacy

25 Article/Blogs
Challanges for Cybersecurity
https://www.linkedin.com/pulse/idea-4-part-one-challenges-cybersecurity-reuben-dreiblatt/?trackingId=8%2BR40z9qRNKek6btFxA5SA%3D%3D
December 26, 2019
The features and techniques of Cybersecurity are continuously improving and becoming more complex as white-hat hackers try to keep up with black-hat hackers and vice versa. The power of the internet is changing the Cybersecurity landscape and we will start to see the effects of that rapid acceleration this decade. Here are some guiding questions and predictions to consider.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Will Blockchain Replace Banks?
CPO Magazine
November 06, 2019
Is that the end of world for Banks or banks will be constrained to use Tokenized Cheques and Decentralized Ledger? And if yes, whether this transition will be easier for Banks or Banks will feel disoriented.

See publication

Tags: Blockchain, Business Strategy, Cybersecurity

Will the Self-Securing Cloud Replace Security Professionals?
CPO Innovation
October 17, 2019
With these innovations whether self-securing clouds could replace security professionals? I do not think so but this will certainly transform the security professional in a very big way and they will have to change.

See publication

Tags: Blockchain, Cloud, Cybersecurity

How cyberthieves found blockchain’s weak link
https://www.bai.org/
July 03, 2019
How cyberthieves found blockchain’s weak link

See publication

Tags: Blockchain, Customer Experience, Cybersecurity

Are Human necessary to Cyber Threat Intelligence?
https://www.csoforum.in
January 10, 2019
Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence

See publication

Tags: AI, Blockchain, Cybersecurity

Why Cyber-attacks can cause next Financial Crisis?
linkedin
September 15, 2018
Reported cyber-attacks against financial services rose by 80-90% in the last year and growing further at an exponential rate. A major cyber-attack can cause substantial damage to financial ecosystem. Assume If ATM networks across the nations are infected, online banking systems are inaccessible, Payment systems are frozen and if this results into ‘no cash and no payments’, then the banking system and economy will be broken and there will be panic and chaos across.

See publication

Tags: Analytics, Cybersecurity, Digital Transformation, FinTech

Will Blockchain replace Banks?
linkedin
September 05, 2018
Blockchain is today most discussed technology and will remain so for more time. Crypto Society most often criticize banks for being over centralized and many times being overpriced and monopolistic. In contrast Blockchain can be a viable option as it is decentralized and a cost effective solution.

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity, FinTech

Can Blockchain Fight Hackers?
linkedin
July 03, 2018
The very high level of dependence on the technology and rising influence of internet on technology today has resulted in innovative business models for enterprises, but with this ascends new fissures and thus opportunities for hackers to exploit even more.

See publication

Tags: Blockchain, Cybersecurity

Are Employees still at the root of most cyber breaches?
Linkedin
December 17, 2017
The biggest strength for company is their Human Capital and it is usually seen that most of their employee at least once did something that could have left their company at cyber risk. It is commonly seen that when it comes to transferring and storing of data, dealing with user credentials, backup of files employees prioritize personal convenience over security protocols.

See publication

Tags: Blockchain, Cybersecurity, Digital Transformation

Is wannacry attack over?
https://www.linkedin.com/pulse/wannacry-attack-over-ratan-jyoti/
May 15, 2017
“Is the game over?” in the battle between cyber terrorists and security professionals. Answer is not ‘YES’. Microsoft has just said that the wannacry attack is a wake-up call for the IT industry, governments & organizations and warned not to stockpile knowledge of software vulnerabilities which can be exploited in even worst forms.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Is true Privacy online viable?
https://www.linkedin.com/pulse/true-privacy-online-viable-ratan-jyoti/
February 25, 2017
Digital Life is all about staying connected, but have you ever imagined how much your private information is at risk? Do you think, your privacy is preserved when you go online or stay connected? If ‘yes’, probably you are perhaps wrong. Your browsing pattern and preferences may be collected by Government agencies, advertisers and sometimes even by people with malicious intent.

See publication

Tags: Customer Experience, Cybersecurity, Privacy

https://www.linkedin.com/pulse/riot-right-your-iot-devices-ratan-jyoti/
https://www.linkedin.com/pulse/riot-right-your-iot-devices-ratan-jyoti/
February 12, 2017
The Internet of Things (IoT) is a pool of diverse and varied types of devices. These devices ranges from small Micro controller units to a more capable high end processors and hence traditional Operating Systems (OS) does not suite them and they require special Operating systems to support their varied needs. Such Operating Systems should also require minimal resources and be light weighted. RIOT OS is one such Operating System which has real-time capabilities, and needs only a minimum of 1.5 kB of RAM and 5 KB of ROM.

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Big Data - Big Security
https://www.linkedin.com/pulse/big-data-analytics-security-ratan-jyoti/
February 05, 2017
Big Data Analytics is and can be most effective fortifications against cyber intrusions. Accurate, speedy and effective information can help us in lessening of critical time from detection to remediation and thus proactively defend and protect your information and infrastructure.

See publication

Tags: Big Data, Cybersecurity, Privacy

10 Ransomware trends to watch for in 2017
https://www.linkedin.com/pulse/10-ransomware-trends-watch-2017-ratan-jyoti/
January 29, 2017
10 Ransomware trends to watch for in 2017

See publication

Tags: AI, Cybersecurity, Privacy

Cyber Security – is machine the answer?
https://www.linkedin.com/pulse/cyber-security-machine-answer-ratan-jyoti/
January 14, 2017
Artificial Intelligence has already been part of many security solutions today. Is Artificial Intelligence ready to replace humans and all other security solutions? Answer to this question will tell if machine learning will detect advance breaches with utmost accuracy. IT environment today has become very complex and huge and complex data sets are being generated. Is the hidden malicious pattern can be uncovered without too many false positive?

See publication

Tags: AI, Cybersecurity, Privacy

Banking on Thin
https://www.linkedin.com/pulse/banking-thin-ratan-jyoti/
January 08, 2017
Banking means ‘Confidentiality and Integrity’ which has to be preserved all the time. Banking requires access to banking applications which is mainly carried out using thick clients which are mostly desktops and sometimes laptops. The fat computer or the thick client are always attractive from the user standpoint but has its own risk. Alternative is thin client which helps in centralized processing and increased efficiency. Thin Client works as part of a network, with the client acting as an interface and the network server undertaking centralized processing of data and controlling the clients which helps in efficient management and can also protect from the use of unauthorized software or malicious agents.

See publication

Tags: AI, Cybersecurity, Privacy

10 things to evaluate while selecting Web Application Firewalls (WAFs)
https://www.linkedin.com/pulse/10-things-evaluate-while-selecting-web-application-firewalls-jyoti/
June 15, 2016
10 things to evaluate while selecting Web Application Firewalls (WAFs)

See publication

Tags: AI, Cybersecurity, Privacy

Integrating BCP with InfoSec Program – Simple two ways
https://www.linkedin.com/pulse/integrating-bcp-infosec-program-simple-two-steps-ratan-jyoti/
June 02, 2016
Integrating BCP with InfoSec Program – Simple two ways

See publication

Tags: Cybersecurity, Leadership, Privacy

Automated Incident Response System (AIRS)
https://www.linkedin.com/pulse/automated-incident-response-system-airs-ratan-jyoti/
April 09, 2015
In Cyber security Management System, an event like cyber-attack needs to be investigated to find out the remedial measures. The investigation process requires:

Time depending upon complexity of the attack
Skilled Man Power to carry out the investigation and remediation

See publication

Tags: Analytics, Cybersecurity, Predictive Analytics

Insider Threat & Profiling Analytics
https://www.linkedin.com/pulse/insider-threat-profiling-analytics-ratan-jyoti/
April 06, 2015
External cyber thefts and attacks are not always the biggest threats, many a times enemy within can be a bigger risk. This enemy within is none other than some of our most valuable assets – our employee.

Placing the sophisticated Firewalls, IDS/IPS to get protection from outside attack is very important but what is equally important is a mechanism to profile the digital activities of employee to make the security resilient. Profiling Analytics can predict the possible data theft early.

See publication

Tags: Analytics, Cybersecurity, Leadership

Privacy Impact Analysis – a Risk Management Tool
https://www.linkedin.com/pulse/privacy-impact-analysis-risk-management-tool-ratan-jyoti/
April 01, 2015
Privacy Impact Analysis is the Risk Management tool which helps Privacy implementer to identify, assess and respond to the risk related to the Privacy in any information system or organization. PIA can be carried out for IT as well as Non IT system.

Privacy Preservation necessarily means the process of identification, detection and mitigation by suitably handling the Personal Identifiable Information (PII). Safeguarding the PII evaluated through a chain of process is the basic aim of Privacy Impact Analysis (PIA).

See publication

Tags: Cybersecurity, Privacy, Risk Management

Insider Threats & Options available
https://www.linkedin.com/pulse/insider-threats-options-available-ratan-jyoti/
January 19, 2015
Employees are pivotal in enterprise information security management. The way they use the IT System is key to the enterprise information security. Theoretically any threat originated from within the organization is an insider threat.

Who can be the source of insider threat?

See publication

Tags: Cybersecurity, Predictive Analytics, Privacy

Do Cyber crimes continue to be costly?
https://www.linkedin.com/pulse/do-cyber-crimes-continue-costly-ratan-jyoti/
January 12, 2015
Many institutions tend to invest less in cyber security as they take a chance for being attacked against spending to prevent the cyber-attacks. Many things that cannot be calculated in this cost benefits analysis are:

opportunity costs
trust reduction for company’s online services
reputational damage

See publication

Tags: Analytics, Cybersecurity, Privacy

Computing Everywhere and Security
https://www.linkedin.com/pulse/computing-everywhere-security-ratan-jyoti/
January 06, 2015
The new era is said to be the era of Computing Everywhere wherein the mobile and smartphone technology will further advance where traditional and new generation devices and screens will seamlessly be interconnected. The contents on all interconnected traditional devices and smart devices will be managed without much efforts of the users. Technology like Google Glass indicates what would be the shape of the next generation smart devices. Intelligent screens in multiple forms and shapes will replace the current day screens. The capability of interconnection of intelligent screens and smart devices can just be imagined which will provide a supreme user experience. These devices and screens will work without fatigue and with much faster speed as compared to all modern day devices. The capabilities and intelligence of such system can only be imagined at present. Integration of varied vendor products and platforms should also be possible.

See publication

Tags: Analytics, Cybersecurity, Leadership

Are smart devices threatening your privacy?
https://www.linkedin.com/pulse/smart-devices-threatening-your-privacy-ratan-jyoti/
January 22, 2007
s your smart device spying on you? Does your smartphone track your whereabouts? Can your mobile service provider access all your confidential information that you have stored on your mobile device? Whether Siri knows many things about you? Is Google Maps tracking your location? Are your apps eavesdropping your conversations?

See publication

Tags: Cybersecurity, IoT, Privacy

10 Influencer Awards
Infosec Maestro Award 2019
Infosec Maestro Award 2019
November 22, 2019
Infosec Maestro Award 2019

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Champion CISO Award 2018
Champion CISO Award 2018
February 20, 2019
Champion CISO Award 2018

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Top Influencer 2018
Top Influencer 2018
February 20, 2019
Top Influencer 2018

See publication

Tags: Blockchain, Cybersecurity, Risk Management

CSO 100 Award 2018
CSO 100 Award 100
January 09, 2019
CSO 100 Award 2018

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Infosec Maestro Award 2018
Infosec Maestro Award 2018
January 01, 2019
Infosec Maestro Award 2018

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Infosec Maestro Award 2017
Infosec Maestro Award 2017
January 01, 2018
Infosec Maestro Award 2017

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Top 7 CISO Award
Top 7 CISO Award
February 20, 2017
Top 7 CISO Award

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Top Influencer 2017
Top Influencer 2017
February 20, 2017
Top Influencer 2017

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Infosec Maestro Award 2016
Infosec Maestro Award 2016
January 01, 2017
Infosec Maestro Award 2016

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Infosec Maestro Award 2015
Infosec Maestro Award 2015
January 01, 2016
Infosec Maestro Award 2015

See publication

Tags: Blockchain, Cybersecurity, Risk Management

1 Journal Publication
Ransomware attack: Why do hackers want payments through bitcoins?
https://www.business-standard.com
May 17, 2017
Ransomware attack: Why do hackers want payments through bitcoins?

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

18 Media Interviews
Rise of the DPO in wake of India’s Data Protection Bill
https://www.csoonline.com/article/3513459/rise-of-the-dpo-in-wake-of-india-s-data-protection-bill.html
January 10, 2020
In today’s cyber world data is the focal point and appointing a dedicated Data Protection Officer will help not just in protecting the data but it will facilitate efficient use of data and the better customer service leading to organizational growth.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Keep Your Data Secure On and Off the Cloud: Defense In-Depth
https://blogs.oracle.com/cloudsecurity/keep-your-data-secure-on-and-off-the-cloud-defense-in-depth
October 28, 2019
In our recent Cloud Threat Report, we asked respondents how concerned they were with 13 different types of threats over the next 12 months. All 13 different types of attacks had at least half of all respondents highly concerned. That shows that external threats are highly varied, damaging, and keeping security experts awake at night.”

See publication

Tags: Cloud, Cybersecurity, Risk Management

https://www.bankinfosecurity.in/vendor-risk-management-urgent-issue-for-small-finance-banks-a-12922
https://www.bankinfosecurity.in
August 16, 2019
https://www.bankinfosecurity.in/vendor-risk-management-urgent-issue-for-small-finance-banks-a-12922

See publication

Tags: Blockchain, Cybersecurity, Privacy

CISO Can Help Innovate and Not Just Fight Cyber Threats: Ratan Jyoti, Ujjivan Small Finance Bank
https://www.dynamicciso.com/
March 27, 2019
“It is said that learning is the superpower of superpowers and continuous learning motivates and inspires me more than anything else and helps me carrying out my own research,” quips Jyoti as he recalls the starting point of his learning process – his first job, which a data warehouse project that involved work related to databases and programming. He was too particular about exception handling and validation in his programming and gradually realized that absence of validation could provide him access to websites and databases within. Slowly he started analyzing websites for their robustness and the process became a puzzle solving exercise for him and he started learning by himself. At that time there were not many tools available and each website taught him a unique way to penetrate. While he failed many a times, he became successful some of the times and could access what he calls the treasure, i.e. the data.

See publication

Tags: Blockchain, Cybersecurity, Digital Transformation

Fileless Malware: What Mitigation Strategies Are Effective?
https://www.bankinfosecurity.com
January 28, 2019
Fileless Malware: What Mitigation Strategies Are Effective?

See publication

Tags: Blockchain, Cybersecurity, Leadership

In cybersecurity, no solution is a long term solution
https://www.expresscomputer.in
July 25, 2018
We have not faced any security risks recently. The banking system, in general, is facing many security challenges. New technologies like the Internet of Things (IoT) or IIoT are giving cybercriminals ample opportunities and platforms to launch more sophisticated attacks on banks. Banks and Financial sector firms intertwine services from multiple vendors and other third parties and these pose significant cyber risks. International cyber-attacks are another area of concern. The emergence of mobile banking is bringing new threats. With BYOD and mobile devices, the opportunity for infected devices to connect to a network has dramatically increased.

See publication

Tags: Blockchain, Cybersecurity, Digital Transformation

Applying Blockchain Technology for Securing the Enterprise
https://www.bankinfosecurity.in
July 04, 2018
Applying Blockchain Technology for Securing the Enterprise

See publication

Tags: Blockchain, Cybersecurity, Risk Management

Reserve Bank of India Issues ATM Edict: Upgrade, or Else
https://www.bankinfosecurity.in/
June 28, 2018
Reserve Bank of India Issues ATM Edict: Upgrade, or Else

See publication

Tags: Blockchain, Cybersecurity, Privacy

Future Of Artificial Intelligence – Expert Opinions
https://www.beencrypted.com
May 07, 2018
Future Of Artificial Intelligence – Expert Opinions

See publication

Tags: AI, Blockchain, Cybersecurity

Using Blockchain for Securing IoT Devices
https://www.bankinfosecurity.in
April 10, 2018
Using Blockchain for Securing IoT Devices

See publication

Tags: Blockchain, Cybersecurity, Privacy

WhatsApp's New Payment Service Leverages NPCI's UPI
ISMG
February 16, 2018
WhatsApp's New Payment Service Leverages NPCI's UPI

See publication

Tags: Blockchain, Cybersecurity, FinTech

Indian Budget 2018: A Push for Blockchain and Cyber Tech
https://www.bankinfosecurity.in/indian-budget-2018-push-for-blockchain-cyber-tech-a-10624
February 01, 2018
Indian Budget 2018: A Push for Blockchain and Cyber Tech

See publication

Tags: Blockchain, Cybersecurity, Privacy

As ATM 'Jackpotting' Spreads, India Sizes Up Security
https://www.bankinfosecurity.in/as-atm-jackpotting-spreads-india-sizes-up-security-a-10617
January 31, 2018
As ATM 'Jackpotting' Spreads, India Sizes Up Security

See publication

Tags: Blockchain, Cybersecurity, Privacy

Banks Take Precautionary Measures Against App Malware
https://www.bankinfosecurity.in/banks-take-precautionary-measures-against-app-malware-a-10579
January 12, 2018
Banks Take Precautionary Measures Against App Malware

See publication

Tags: Blockchain, Cybersecurity, Privacy

Aadhaar Virtual ID System is Operational
https://www.bankinfosecurity.in
July 13, 2017
Aadhaar Virtual ID System is Operational

See publication

Tags: Blockchain, Cybersecurity, Privacy

Amidst the evolving new technology where is the CIO’s role heading ?
https://cio.economictimes.indiatimes.com
January 28, 2016
Amidst the evolving new technology where is the CIO’s role heading ?

See publication

Tags: Blockchain, Cybersecurity, FinTech

Securing The Cloud To Drive Business
https://cio.siliconindia.com/enterpriseinsights/ratan-jyoti-catid-10-iid-141.html
January 13, 2016
The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
• No upfront capital costs and reduced technology costs
• Faster implementation • High flexibility and scalability
• Multi-channel reach

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Data Security and Privacy Concerns for Indian Banking Industry
https://revenue-management.apacciooutlook.com/cxoinsights/data-security-and-privacy-concerns-for-the-indian-banking-industry-nwid-44.html
January 01, 2016
Data Security and Privacy Concerns for Indian Banking Industry

See publication

Tags: Cybersecurity, Privacy, Risk Management

1 Panel
Fraud and Breach Prevention
ISMG
June 12, 2018
Fraud and Breach Prevention - Cybersecurity

See publication

Tags: Blockchain, Cybersecurity

1 Speaking Engagement
Financial Crime Management and Banking Modernization
https://www.dnb.co.in
October 26, 2018

See publication

Tags: AI, Blockchain, Cybersecurity

Thinkers360 Credentials

7 Badges

Blog

Opportunities

Contact Ratan Jyoti

Book Ratan Jyoti for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Ratan Jyoti