Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Aditya Mukherjee

Vice President at Synchrony Financial

Hyderabad, India

Aditya Mukherjee is an Information Security Leader & an *Aspiring CISO* with 14+ years of experience in Leadership roles across Info. Sec. domains such as Defence & Law Enforcement, Financial Services, Health & Public Service, Products, Resources, Communications, Media & Technology.

His core expertise includes Cyber Security Strategy, Strategic Risk & Cyber Resilience Assessment, Tactical Leadership & Development, GRC & Security Audit, Security Operations, Architecture & Engineering, Threat Management, Security Investigation, and Forensics.

Disclaimer: All comments, endorsements, view & opinions expressed on this platform are that of my own and do not reflect the official policy or position of any organization or employer.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Hyderabad, India
Speaking Topics: CISO Advisory, Security Leadership, Next Gen SOC, Threat Intelligence & Threat Hunting, Enterprise Risk Management.

Aditya MukherjeePoints
Academic0
Author215
Influencer11
Speaker0
Entrepreneur20
Total246

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Business Unit: Information Security
Theatre: Global
Media Experience: 14

Areas of Expertise

Agile
Analytics
Business Continuity
Business Strategy
Change Management
Cloud
COVID19 30.70
Culture
Customer Experience
Cybersecurity 52.88
Digital Disruption
Digital Transformation
Diversity and Inclusion
Emerging Technology
Entrepreneurship 30.26
Fintech
Future of Work 32.70
Govtech 30.77
Innovation
IoT
Leadership 36.23
Lean Startup
Management
Mergers and Acquisitions
Open Innovation
Predictive Analytics 32.36
Privacy 30.15
Public Relations
Risk Management 66.78
Startups
Smart Cities 31.94

Industry Experience

Aerospace & Defense
Agriculture & Mining
Automotive
Building Materials, Clay & Glass
Chemicals
Consumer Products
Engineering & Construction
Federal & Public Sector
Financial Services & Banking
Forest Products & Paper
Furniture
Healthcare
High Tech & Electronics
Higher Education & Research
Hospitality
Industrial Machinery & Components
Insurance
Manufacturing
Media
Metal Products
Oil & Gas
Other
Pharmaceuticals
Primary Metal & Steel
Professional Services
Retail
Telecommunications
Textiles Production
Travel & Transportation
Utilities
Wholesale Distribution

Please signin or signup to view publication section.

Publications

9 Article/Blogs
Awareness on New Coronavirus Phishing and Ransomware Attacks
DynamicCISO
March 27, 2020
To help individuals and organizations, we have reached out to cybersecurity experts who have shared their views need to be followed vigilantly.


Here are a few pieces of advice from Dr. Aditya Mukherjee, Vice President at Synchrony.

See publication

Tags: Cybersecurity, Privacy, Risk Management

Security Preparedness for Work From Home
DynamicCISO
March 23, 2020
The spread of coronavirus (aka COVID-19) has compelled many businesses to shift their office-based workforces to remote ones. This has quickly changed the game from a security perspective: an evolving attack surface, proliferating endpoints, new network behaviors, and more.

Due to the pandemic, CISOs are facing an increase in work-pressure and dwindling resources, which can rapidly lead to unmanageable pressure and stress, severely affecting health, happiness and productivity. In turn, this can lead to major security and regulatory compliance issues.

Dr Aditya Mukherjee, Vice President at Synchrony was happy to offer his perspective intended to benefit security teams adapting to the changing landscape.

See publication

Tags: Cybersecurity, Risk Management, COVID19

Enriching thoughts unfolded at the panel discussion on ‘Cybersecurity enabling businesses in COVID-19 situation’
CyberFrat
March 22, 2020
Enriching thoughts unfolded at the panel discussion on ‘Cybersecurity enabling businesses in COVID-19 situation’

See publication

Tags: Cybersecurity, Leadership, Risk Management

Iran - A Worthy Cyber Adversary?
Digital 4n6 Journal
November 01, 2019
Iran - A Worthy Cyber Adversary?

See publication

Tags: Cybersecurity, Leadership, Risk Management

Smart City and related Cyber Security Concerns In India
Dynamic CISO
August 28, 2019
Smart City and related Cyber Security Concerns In India - Quoted. on my views regarding Smart City and related Cyber Security Concerns In India.

See publication

Tags: Cybersecurity, Leadership, Smart Cities

Iranian Cyber Threat Operations - A view from the CISO's & CIO's Perspective
InfoQuest - A Journal on Internet Security by Enterprise It World
July 01, 2019
Iranian Cyber Threat Operations - A view from the CISO's & CIO's Perspective

See publication

Tags: Cybersecurity, Leadership, Risk Management

The World of State Surveillance
PenTest Magazine
March 01, 2017
I still remember the day when one of my close friends watched Mr. Robot for the first time and went into a paranoid frenzy to set up security measures in her mobile, laptop and hard disk. To be honest, I was always aware of these techniques in the back of my mind but somehow watching it on the show made me reconsider my lax, too.

See publication

Tags: Cybersecurity, Leadership, Risk Management

Countering Malware Evasion
Digital 4n6 Journal
November 01, 2016
Malware are becoming more sophisticated (especially the ones associated with APT’s) with the implementation of advance evasive behavior. Gone are the days when ollyDbg use to be a comprehensive utility alone. Today using sandboxes and various automation techniques, the game has changed. But that’s not good enough, automaton is great as it eliminates the need for the analyst to go through each line of the code manually, provide for greater scalability and handle unexplored variants that are not tied to a single signature for detection. But even they have their own shortcomings like the supported structure, efficiency in classification of malicious behaviors, and how evasions are identified and mitigated.

See publication

Tags: Cybersecurity, Leadership, Risk Management

Are you Mr. Robot - The State Surveillance
Indian Cyber Security E-Magazine by National Cyber Defense Research Centre (NCDRC)
October 01, 2016
Today, No digital communication is secure by the virtue that any communication is susceptible to government interception as it happens but far beyond that: all digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.

See publication

Tags: Cybersecurity, Leadership, Risk Management

3 Books
Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
Packt
November 06, 2020
With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats.

See publication

Tags: Cybersecurity, Leadership, Risk Management

The Phoenix of Hacking
Self Published
March 01, 2011
At the time when computers have taken family position in every family and with that level of interception and involvement, Cyber crime and Cyber frauds have also made a noticeable place in cyber world and to have face to face with such criminals we need equally equipped, technocrats and their come the role of an Ethical Hacker.
Ethical hacking ,Information Security, Network security, Penetration testing are among the most echoing among all the computer fields at present time and are interlinked with each other.
The technology that exploded like a nuclear bomb and whose radiations have transacted in every single persons mind, which has now become the backbone of each single industry in the whole world, is none other than “Internet” the magic of World Wide Web, and that is the reason why its security is so much important and this could be possible only through mass awareness programs.

This book will be very much valuable for all those who want to have something new, exciting and fascinating facts in computer fields. It will cover all the basic to advanced features of hacking.

See publication

Tags: Cybersecurity, Leadership, Risk Management

HaX - A Beginners Guide to the World of Ethical Hacking
Self Published
March 01, 2008
In today’s GenX, Computer Security has evolved to be one of the most promising fields as career prospect. Hacking in particular is the mark of the century where geeks are no more just making programs and coding them to optimization but also cracking them for exploiting loopholes in networks, websites and databases across the globe. Ethical hacking puts emphasis on the bright side of hacking and the use of such knowledge for Advancements in the field of Cyber Security.
For all those who have always been keen to dive into this Fascinating world of hacking “HAX” will bring you alive to various techniques such as Information Gathering, Scanning, Penetration, Phishing, Keylogger and many more tools and techniques used by hackers in the real world scenario.
This book will guide you from the basics to the expert level of hacking and also shed light on the various mechanisms that can be used to constantly update your knowledge and also develop your own tools and scripts.

See publication

Tags: Cybersecurity, Leadership, Risk Management

3 Book Forewords
Mastering Machine Learning for Penetration Testing
Packt
September 01, 2017
Mastering Machine Learning for Penetration Testing - Technical Reviewer.

See publication

Tags: Cybersecurity, Predictive Analytics, Risk Management

Hands-On Cybersecurity for Finance
Packt
September 01, 2017
Hands-On Cybersecurity for Finance - Technical Reviewer.

See publication

Tags: Cybersecurity, Predictive Analytics, Risk Management

Hands-On Machine Learning for Cybersecurity
Packt
September 01, 2017
Hands-On Machine Learning for Cybersecurity - Technical Reviewer.

See publication

Tags: Cybersecurity, Future of Work, Risk Management

1 Courseware
Peerlyst Community eBook: Intrusion Detection Guide
Peerlyst
July 01, 2018
This book guides readers through the entire spectrum of tasks associated with incident response, starting with the basic fundamentals to the leading experts best practices. By the end of the book, readers will have mastered the tactical steps to follow when preparing for, working through and recovering from a Cyber Security Incident.

See publication

Tags: Cybersecurity, Leadership, Risk Management

1 Founder
Fraternity Technologies - Conducted more than 150 Workshops Technical Information Security Workshops
Self Published
September 03, 2007
As a CTO & Cyber Security Trainer of Fraternity Technologies, I had provided 150+ Technical hands-on training to various clients & institutions covering over 18K participants from across the globe.

See publication

Tags: Cybersecurity, Future of Work, Risk Management

1 Journal Publication
Iran - A Worthy Cyber Adversary?
Digital 4n6 Journal
November 01, 2019
Iran - A Worthy Cyber Adversary?

See publication

Tags: Cybersecurity, Leadership, Risk Management

2 Media Interviews
Times of India - Coverage on Lok Sabha Election 2019
Times of India
May 10, 2019
Times of India - Coverage on Lok Sabha Election 2019

See publication

Tags: Entrepreneurship, Govtech, Leadership

Ethical buddies vs Online baddies - Hacking shop in capital to beat virtual villains, e-policing MIA in East Singhbhum for months
Telegraph India
August 05, 2013
Ranchi now has an ethical hacking company, Gray Hat Private Limited, with corporate offices around 500m from Argora police station on Birsa Munda Rajpath.

In its first event on August 20, a three-hour meet on ethical hacking at the Federation of Jharkhand Chambers of Commerce and Industries (FJCCI) conference hall, Gray Hat will make people aware of what it stands for.

An ethical hacker is a computer expert, who attacks a security system using the methods of a malicious one, but with two major differences.

One, he does so on behalf of an owner to test the security system. Two, he finds out threats that a malicious hacker can exploit and reports the problems instead of taking advantage of them.

Public relations officer of the company Rituraj Pandit said they had taken the services of two ethical hackers, Atul Tiwari of Ranchi and Aditya Mukherjee of Mumbai.

See publication

Tags: Cybersecurity, Future of Work, Risk Management

1 Whitepaper
The Paramount Importance Of Threat Intelligence & Threat Hunting For Indian Enterprises
VARINDIA
October 15, 2019
The Paramount Importance Of Threat Intelligence & Threat Hunting For Indian Enterprises

See publication

Tags: Cybersecurity, Leadership, Risk Management

Blog

Opportunities

Contact Aditya Mukherjee

Media Kit

Share Profile

Contact Info

  Profile

Aditya Mukherjee