Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Rasool Irfan

Trusted Cyber Security Adviser at Cognizant Technology Solutions

Bangalore, India

Trusted cyber security advisor. Working for 16 billion dollars company. Blogger, Learner, Explorer, Critical Thinker, Storyteller.

Providing solutions to customers, that helps them attain
1. Security operations capability maturity,
2. Reduce operational expenditure,
3. Enhance security controls adoption based on industry standards,
4. Achieve regulatory compliance and
5. Reduce cyber risk exposure.

Cyber security require constant learning and collaboration to stay relevant in the market. Checkout my blog @ https://rasoolirfan.com/

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Bangalore
Speaking Topics: Cyber Security

Rasool Irfan Points
Academic 0
Author 24
Influencer 0
Speaker 3
Entrepreneur 0
Total 27

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Enterprise
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed

Areas of Expertise

Cloud 30.04
Cybersecurity 31.04
Design Thinking
Privacy 30.41
Risk Management 30.12
COVID19 30.27
Emerging Technology 30.05
Business Continuity 30.37
Security 30.07
AI 30.01
Analytics 30.04

Industry Experience

Financial Services & Banking
Healthcare
Insurance
Professional Services
Retail
Telecommunications

Publications

18 Article/Blogs
ARTIFICIAL INTELLIGENCE – GUIDANCE TO CYBER SECURITY LEADERS
www.rasoolirfan.com
August 19, 2023
Consumption of GenAI applications, such as large language models (LLMs), from business experiments and unmanaged, ad hoc employee adoption creates new attack surfaces and risks on individual privacy, sensitive data and organizational intellectual property (IP). This article aims to provide guidance’s to CISOs, security teams on handling GenAI Cybersecurity concerns

See publication

Tags: AI, Analytics, Cybersecurity

Critical Incident Reporting for Critical Infrastructure Act
www.rasoolirfan.com
April 08, 2022
Critical infrastructure organizations in the United states, now require focus to adhere the ‘Critical Incident Reporting for Critical Infrastructure Act‘ (CIRCIA). Managed security service providers has opportunities to support organizations to adhere this act.

See publication

Tags: Business Continuity, Cybersecurity, Security

CSPM ENGINEER – DAY IN A LIFE
www.rasoolirfan.com
July 26, 2021
CSPM engineer ‘day in a life’ will be packed with energy and determination to discover, provide visibility, analyze the context, respond to threats and manage governance.

See publication

Tags: Cybersecurity, Risk Management

MANAGE CONTAINER SECURITY ASSESSMENT SERVICES
www.rasoolirfan.com
June 21, 2021
Cybercriminals are using Docker containers to distribute malware due to its scale of operations. Overall, Docker, Inc. reports that 13 billion image pulls per month from nearly 8 million repositories residing on Docker Hub are being made by more than 13 million developers.

See publication

Tags: Cloud, Cybersecurity, Emerging Technology

ASSESS VULNERABILITY MGMT. PROGRAM MATURITY
Rasool Irfan
February 01, 2021
The health of digital business depends on effective vulnerability and patch management program that keeps the environment immune from cyber attacks and data breaches. IT security leaders must have focus and vision to reduce the attack surface with vulnerability management program.

See publication

Tags: Cybersecurity

CYBER SECURITY TABLE TOP EXERCISE – JUST DO IT
Rasool Irfan
January 16, 2021
The focus of corporate cyber security risks are now being shifted from prevention to enhance detection and incident response readiness – as you can’t stop attacks. Organizational business continuity program should mandate CISO or CIO business units to have TTX periodically to rehearse the cyber security incident response plans.

See publication

Tags: Cybersecurity, COVID19, Business Continuity

Azure Information Protection, Where do I start?
Import from wordpress feed
September 22, 2020
Data classification and protection are today’s biggest challenges Enterprise today face data protection challenges to secure sensitive information across its life cycle and exploring solutions that helps to enforce protection policies when in file is created or being changed, enable DLP policies t

See publication

Tags: Cybersecurity, Privacy

Multi cloud SIEM deployment cost considerations with IBM QRadar and Splunk
Import from wordpress feed
September 11, 2020
Cloud infrastructure and platform (CIPS) is the combination of both IaaS and PaaS segments into single platform. According to Gartner, The worldwide CIPS market grew 42.3% in 2019 to total $63.4 billion, up from $44.6 billion in 2018. Amazon, Microsoft and Alibaba secured the top three positions in

See publication

Tags: Cybersecurity, Privacy

Microsoft E5 can replace 16 Security vendors
Import from wordpress feed
September 09, 2020
Organizations exploring options to reduce the cost of IT security investments while maintaining the confidentiality, integrity and availability of IT resources. Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendo

See publication

Tags: Cybersecurity, Privacy

Simplify network security with SASE
Import from wordpress feed
September 07, 2020
Gartner predicts, Over the next five years, the market for secure access service edge (SASE) will grow at a CAGR of 42%, reaching almost $11 billion by 2024. Organizations today invested on multiple point network and security products and services across their remote offices, corporate backbone netw

See publication

Tags: Cybersecurity, Privacy

People is the most critical vulnerability in any organization
Import from wordpress feed
July 13, 2020
In this digital era, organizations do have world-class cyber security tools and certified experienced professionals to manage the technology to safeguard from any data breaches. Despite having adequate security controls and enforcement of IT security policies and procedures – we are still witn

See publication

Tags: Cybersecurity, Privacy

Cost effective programs to enhance cyber security immune system
Import from medium.com
July 01, 2020
Organizations are enduring cost reduction initiatives in uncertain times, however security leaders have challenges to keep the business secure from growing cyber breaches. IT security leaders are looking for cost effective security programs that enhance their cyber security immune systems. This arti

See publication

Tags: Cybersecurity

CISO should redefine corporate security strategy
Import from medium.com
June 28, 2020
Evolution of the CISOThe role for CISO has evolved in last two decades, In early year 2000 — organizations require security information officer to focus on regulatory compliance and interaction with external auditors and business stakeholders to define IT security requirements. They coordinat

See publication

Tags: Cybersecurity

Adoption of cloud makes SIEM investments expensive to use, as their cost is driven by the amount of…
Import from medium.com
June 11, 2020
Adoption of cloud makes SIEM investments expensive to use, as their cost is driven by the amount of data that is ingested. What do you think 'Cloud Heavy' customers should rely on for cost effective security event monitoring solution (as alternative to SIEM)

See publication

Tags: Cybersecurity

Social media addiction is injurious to mental health
Import from medium.com
May 10, 2020
In mobile first generations, the global youth population are born connected. According to Reuters Institute India Digital News Report, 68% of smartphone consumers devices to access online news. The traditional forms of news via broadcast media and print media are becoming outpaced by digital platfor

See publication

Tags: Cybersecurity

Mobile applications require self-defensing capabilities
Import from medium.com
May 03, 2020
Software problems begin with errors made by codersDevelopers often lack security expertise and provide weight-age to the business process while developing client side applications such as mobile apps. With increased usage of smart phones and access to wireless internet keeps the application develop

See publication

Tags: Cybersecurity

Zero Trust Assessment tool now live!
LinkedIn
April 03, 2020
Zero-trust principles are an emerging category that has arisen to address the need for organizations to enable secure remote access to applications for employees, partners, and contractors, regardless of where the application resides (on premises or in private or public cloud environments). As more applications migrate to the cloud, this requirement is growing, highlighting the shortcomings of VPN technology in terms of efficient usage of network bandwidth (the issue of traffic “tromboning” through a concentrator in the corporate data center) and, as a result of this tromboning, of user experience

See publication

Tags: Cybersecurity

Digital Businesses Need Tailored Security Solutions and Services
ISACA
June 10, 2019
Many enterprises prefer to outsource their IT security and believe their cyber security operations will be managed well. Security leaders need visibility on what they’re buying and should ask the questions to their MSSPs

See publication

Tags: Cybersecurity

2 Podcasts
Microsoft E5 can replace 16 Security vendors
Future Of Cybersecurity
September 28, 2020
Microsoft clients with E5 license can evaluate the below 16 functional domains to utilize the security use-cases and replace security vendors. However, if customer’s have unique requirements that are achievable only with marketplace security products should continue to leverage other security solutions.

See publication

Tags: Cybersecurity

People is the most critical vulnerability in any organization
Anchor
July 25, 2020
Every organization will have opportunity to learn from their security incidents. While performing root cause analysis, often organization fail to analyze deeper to figure-out the human element associated with it.

See publication

Tags: Cybersecurity

1 Webinar
Ethical Hacking
Techgig
August 21, 2015
Ethical hacking is the process of checking and testing the organization network for the possible loopholes and vulnerabilities. The individuals or experts who perform ethical hacking are called whitehats. They perform hacking in ethical ways, without causing any damage to the computer system, thereby increasing the security perimeter of an organization.

Ethical hackers help organizations to better understand their security systems and identify the risks, highlight the remedial actions, and also reduce ICT costs by resolving those vulnerabilities.

See publication

Tags: Cybersecurity

Thinkers360 Credentials

2 Badges

Blog

Opportunities

Contact Rasool Irfan

Book Rasool Irfan for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Rasool Irfan


Latest Activity