About
Services
Articles by Santosh
Contributions
Activity
-
I often find weird the posts about internal workshops on LI. … Awards are different though! … especially when you win it twice in a row!! … more so…
I often find weird the posts about internal workshops on LI. … Awards are different though! … especially when you win it twice in a row!! … more so…
Liked by Santosh Kumar FIP, CISSP, PMP, CISA, CHFI, AIGP
-
Tool calling in AI Agents will never be the same after MCP Here is how MCP has reinvented Tool calling for AI Agents... Since the beginning, LLMs…
Tool calling in AI Agents will never be the same after MCP Here is how MCP has reinvented Tool calling for AI Agents... Since the beginning, LLMs…
Liked by Santosh Kumar FIP, CISSP, PMP, CISA, CHFI, AIGP
-
Money isn't the #1 employee motivator. (The real one costs you nothing.) Negativity is bleeding $3 billion a year out of companies. And it’s 100%…
Money isn't the #1 employee motivator. (The real one costs you nothing.) Negativity is bleeding $3 billion a year out of companies. And it’s 100%…
Liked by Santosh Kumar FIP, CISSP, PMP, CISA, CHFI, AIGP
Experience & Education
Licenses & Certifications
Volunteer Experience
-
Volunteer
National Institute of Disaster Management
- Present 24 years 2 months
Disaster and Humanitarian Relief
🌍 Comprehensive Risk Mitigation: Actively contributed to a holistic approach in mitigating and managing risks associated with natural and human-made disasters, focusing on creating resilient communities.
🛡️ Advanced Strategies: Worked on integrating advanced risk assessment, preparedness, response, and recovery strategies to ensure resilience at every stage of disaster management.
🔧 Cutting-Edge Technology: Leveraged cutting-edge technology to address vulnerabilities, enhancing…🌍 Comprehensive Risk Mitigation: Actively contributed to a holistic approach in mitigating and managing risks associated with natural and human-made disasters, focusing on creating resilient communities.
🛡️ Advanced Strategies: Worked on integrating advanced risk assessment, preparedness, response, and recovery strategies to ensure resilience at every stage of disaster management.
🔧 Cutting-Edge Technology: Leveraged cutting-edge technology to address vulnerabilities, enhancing the capacity to respond to and recover from crises.
🤝 Community Engagement: Engaged with communities and collaborated across sectors to effectively safeguard lives, infrastructure, and livelihoods during disaster situations. -
Volunteer
Bureau of Energy Efficiency (ऊर्जा दक्षता ब्यूरो)
- Present 19 years
Education
🎓 Qualified Energy Manager: As a certified Energy Manager, I utilized my deep understanding of energy management principles and sustainable practices to educate others on the importance of energy conservation and efficiency.
🔧 Solar Systems Expertise: Provided hands-on training in setting up solar systems, imparting practical skills to students and communities on harnessing renewable energy sources.
🌱 Commitment to Sustainability: Through my volunteer efforts, I emphasized the…🎓 Qualified Energy Manager: As a certified Energy Manager, I utilized my deep understanding of energy management principles and sustainable practices to educate others on the importance of energy conservation and efficiency.
🔧 Solar Systems Expertise: Provided hands-on training in setting up solar systems, imparting practical skills to students and communities on harnessing renewable energy sources.
🌱 Commitment to Sustainability: Through my volunteer efforts, I emphasized the importance of reducing environmental impact and promoted energy efficiency as key components of a sustainable future.
🌍 Advancing Renewable Energy: Played a crucial role in advancing knowledge and awareness of renewable energy solutions, contributing to a greener and more sustainable future by educating the next generation on the significance of renewable energy. -
Volunteer
Cybersecurity Training
- Present 23 years
Education
🔐 Comprehensive Cybersecurity Training: Led and facilitated cybersecurity training sessions, focusing on equipping individuals and organizations with the knowledge and skills to protect against digital threats.
🛡️ Risk Mitigation Strategies: Developed and delivered training on advanced risk assessment, threat mitigation, and incident response strategies to enhance overall cybersecurity posture.
💻 Hands-On Learning: Provided hands-on experience with cybersecurity tools and…🔐 Comprehensive Cybersecurity Training: Led and facilitated cybersecurity training sessions, focusing on equipping individuals and organizations with the knowledge and skills to protect against digital threats.
🛡️ Risk Mitigation Strategies: Developed and delivered training on advanced risk assessment, threat mitigation, and incident response strategies to enhance overall cybersecurity posture.
💻 Hands-On Learning: Provided hands-on experience with cybersecurity tools and practices, helping participants understand and apply critical concepts in real-world scenarios.
🤝 Community Engagement: Engaged with diverse communities to raise awareness about cybersecurity best practices, fostering a culture of security and resilience in the digital landscape.
🌐 Cross-Sector Collaboration: Collaborated with various sectors to tailor training programs that address specific cybersecurity challenges, ensuring participants were well-prepared to manage potential threats.
Publications
-
"Security Risk Assessment & Mitigation Framework for Cloud-based IT Systems," 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), pp. 1-5, doi: 10.1109/ICAN56228.2022.10007263.
2022 3rd International Conference on Computing, Analytics and Networks (ICAN)
More often than not, the need for security is realized only after the system has been broken. Adding security afterwards is often difficult and much costlier and sometimes, nearly impossible. Hence, Security needs to be embedded into an IT system in order to develop secure IT systems which is possible only when a Security Engineering Framework is well defined for the entire lifecycle of an IT system. In this Paper, we have designed and developed an implementable Framework for Security…
More often than not, the need for security is realized only after the system has been broken. Adding security afterwards is often difficult and much costlier and sometimes, nearly impossible. Hence, Security needs to be embedded into an IT system in order to develop secure IT systems which is possible only when a Security Engineering Framework is well defined for the entire lifecycle of an IT system. In this Paper, we have designed and developed an implementable Framework for Security Engineering of Cloud-based IT Systems. Cloud-based IT Systems are vulnerable to a plethora of cyber-attacks because of their accessibility and their services exposed in a multi-tenant environment. The Cloud-based IT Systems Security Risk Assessment & Mitigation Framework (CISSRAMF) is agnostic to Cloud Service Providers (CSPs) as well as to the type of Services provided, i.e., Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). CISSRAMF encompasses the entire lifecycle of any Cloud-based IT System right from the conception phase till decommissioning of the system. CISSRAMF utilizes the Standards for Information Security and Cybersecurity like ISO/IEC 27001:2013, ISO/IEC 27002:2013, NIST SP 800-53 Rev. 5 and OWASP Application Security Verification Standard (ASVS) Project
Other authorsSee publication -
"Study on Smart Security Measures in Threat and Risk Assessment," 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), pp. 1-4, doi: 10.1109/ICAN56228.2022.10007166.
2022 3rd International Conference on Computing, Analytics and Networks (ICAN)
SEP, more specifically Security Engineering Process, forms a part of the modern assessment and evaluation of related threats and risks, whether it is an agile form of development or SSDLC (Secure Software Development Life Cycle). While in today’s era we deal with modern concepts like cloud computing, remote processing, etc. kinds of strategies which involve data at rest and data in motion, and data computation-intensive tasks. Threat and Risk Assessment are closely related to different attack…
SEP, more specifically Security Engineering Process, forms a part of the modern assessment and evaluation of related threats and risks, whether it is an agile form of development or SSDLC (Secure Software Development Life Cycle). While in today’s era we deal with modern concepts like cloud computing, remote processing, etc. kinds of strategies which involve data at rest and data in motion, and data computation-intensive tasks. Threat and Risk Assessment are closely related to different attack values in which an attacker can perform actions in order to gain additional privileges to your system, software, cloud etc. Threat and Risk Assessment of different projects including web applications development, cloud onboarding, requires accessing the project at the design level so that the product is more specifically secure in the terms of compliance and the coding techniques used are in accordance with the secure coding guidelines. This paper focuses on the comparison of various standardized threat and risk assessment techniques with respect to dynamic threats and possible risk mitigations.
Other authorsSee publication -
"Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks
" 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 2022, pp. 230-233, doi: 10.1109/ICFIRTP56122.2022.10063186.
The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several…
The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.
-
"An Analysis of Vulnerability Scanners in Web Applications for VAPT," 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), 2022, pp. 278-283, doi: 10.1109/CISES54857.2022.9844365.
IEEE -International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)
Though the development in cybersecurity for protecting the websites and applications are growing rapidly, the attacks on these crucial websites are still happening. Irrespective of the development of society, third-party attacks would always increase correspondingly. To protect these websites and web applications, the developers would always use defensive mechanisms to survive third party attacks. But the reliability of the website's strength against third party attacks depends on several…
Though the development in cybersecurity for protecting the websites and applications are growing rapidly, the attacks on these crucial websites are still happening. Irrespective of the development of society, third-party attacks would always increase correspondingly. To protect these websites and web applications, the developers would always use defensive mechanisms to survive third party attacks. But the reliability of the website's strength against third party attacks depends on several factors. Intruders are now using automated structures in form of BOTS, AI, ML, to perform these attacks.Need of security arises from the initial stages of planning and development. As part of SEP (Security Engineering Process) defined by individual vendors and companies for securing the system and performing risk analysis, Vulnerability Analysis are essential as part of standard procedures. Apart from SEP, VAPT (Vulnerability Analysis and Penetration Testing) now forms the standard operating measures for prevention of intrusion activities. We hereby focus on various vulnerability analysis tools forming basis for vulnerability analysis and Penetration testing (VAPT) for short and try to analyze the various impact with respect to stages of penetration testing.
Other authorsSee publication -
Modeling Real Time Object Identification Performance Evaluation with YOLO
YMER Digital 2022-06-10 | Journal article DOI: 10.37896/ymer21.06/23 Part of ISSN: 0044-0477
Object identification in pictures, videos, and signal processing is not a big frontier and has been around for a few years. Though object recognition in static pictures has proven highly promising in terms of specific items such as facial recognition systems, illness diagnosis, and so on, it has been tricky when it comes to video processing and real-time image processing. Traditional object identification techniques are coupled with machine learning methodologies to improve algorithms' speed…
Object identification in pictures, videos, and signal processing is not a big frontier and has been around for a few years. Though object recognition in static pictures has proven highly promising in terms of specific items such as facial recognition systems, illness diagnosis, and so on, it has been tricky when it comes to video processing and real-time image processing. Traditional object identification techniques are coupled with machine learning methodologies to improve algorithms' speed and accuracy. The paper focuses on real-time object recognition systems and how recent advances in the realm of object recognition and identification have been made while bearing in mind the real-time scenarios for recognizing varied objects.The paper discusses the current implementations illustrated by varied authors using far more widely used algorithms including YOLO for real-time visualizations. Keywords: Object recognition, YOLO, Machine learning, RCNN, faster RCNN
Other authorsSee publication -
DOS Attack mitigations: A study
IEEE OCIT Dec 2022
OITS International Conference on Information Technology 14th - 16th Dec 2022
-
HR Analytics to improve decision making process
Indian Navy HR Seminar
HR Analytics to improve decision making process and use case using machine learning algorithms to understand reliable ways to figure out, if and why the best and most experienced employees are leaving prematurely.
-
IDS IPS : A survey
IEEE INCITE Mar 2023 (Scopus)
International conference on information Technology INCITE 2023
-
Improved Privacy and Security in cloud Data Security and Privacy
Springer ANTIC Dec 2022
International Conference on Advanced Network Technologies and Intelligent Computing
Courses
-
Advanced Course in Digital Signal Processing, Defence Institute of Advanced Technology, Pune(2009)
-
-
Business Analytics using R (12 Weeks)
License NPTEL18MG11S463
-
Data Mining (08 Weeks)
Licence NPTEL18CS14S263
-
HR Analytics and Audit, Administrative Staff College of India, Hyderabad| 2018
-
-
Industrial Relations and Labour Laws, XLRI, Jamshedpur| 2018
-
-
Introduction to Machine Learning(12 Weeks)
License NPTEL18CS26S363
-
Pogramming, Data Structures and Algorithims using Python (08 Week)
License NPTEL17CS28S154
-
R Software(12 Weeks)
License NPTEL17MA17S254
-
Training Manager Certification Course,Naval Institute of Education & Training Technology, Cochin| 2008
51623
-
• Skill Development Program on ‘Renewable Energy’, National Institute of Solar Energy, Gurugram, Haryana|2017
-
Projects
-
Computerised Monitoring of DA(Diesel Alternator).
-
-
Data Mining For Automated Personality Classification
-
-
Designing NAS(Network Attached Storage System) using ARM9 processor on a GigaByte Ethernet
-
-
HR Analytics to improve decision making process and use case using machine learning algorithms to understand reliable ways to figure out, if and why the best and most experienced employees are leaving prematurely.
-
-
Human Rights issues in 21th Century
-
Honors & Awards
-
5 Years @ Bosch
Bosch
-
Star Performance and Leadership Award 2023
Bosch
🏆 Honored with the 'Performer Award': I am truly humbled to be recognized for my contributions and leadership. This accolade reflects the impact of my efforts and the collaborative spirit that drives our team. I am deeply grateful for the opportunity to work alongside an exceptional team, dedicated to shaping the future of automotive cybersecurity.
-
Performance Award 2019
Bosch
🏆 Awarded the 'Performer Award' in 2019 for my impactful contributions to Automotive Cybersecurity. This recognition underscores my commitment to excellence and the significant role I played in advancing cybersecurity within the automotive industry.
-
Commander-in-Chief Commendation
Indian Navy
🏅 Commendation by the C-in-C: Honored with a commendation by the Commander-in-Chief for my role in flood rescue operations, recognizing my dedication, bravery, and commitment to saving lives during a critical time.
-
Admiral Ramnath Trophy for Best All Round officer during Electrical Specialisation course
Government of India
🏆 Admiral Ramnath Trophy for Best All-Round Officer: Awarded the prestigious Admiral Ramnath Trophy for Best All-Rounder during the Electrical Specialisation course. This honor highlights my well-rounded skill set across various domains, recognizing my exceptional leadership abilities, unwavering dedication, and outstanding performance throughout the training.
-
Admiral Katari Trophy for Best All Rounder during Bachelor of Engineering course
IHQ MoD(N)/GOI
🏆 Admiral Katari Trophy for Best All-Rounder: Awarded the prestigious Admiral Katari Trophy for Best All-Rounder during my Bachelor of Engineering course. This accolade highlights my well-rounded skill set, recognizing my exceptional abilities and versatility across both academic and extracurricular domains.
-
Raksha Mantri Trophy for Most Promising Cadet during cadets training in Naval Academy
IHQ MoD(N)/GOI
🏆 Raksha Mantri Trophy for Most Promising Cadet: Awarded the prestigious Raksha Mantri Trophy for being the Most Promising Cadet during my training at the Naval Academy.
-
Best Instructor
Indian Navy
Awarded best Instructor at 2 occasions in Electrical Training School
Languages
-
English
Professional working proficiency
-
Hindi
Professional working proficiency
-
Russian
Elementary proficiency
Recommendations received
8 people have recommended Santosh
Join now to viewOther similar profiles
-
Abhrodeep Mukherjee
Connect -
Vijay Banda
Connect -
Akkaiah Janagaraj
Connect -
Rahul Joshi , CISM
Cyber Security Manager, India || ISO 27001:2022 LA
Connect -
Asraf Ali
Cybersecurity Architect focused on MSSP in SEA & HK region, Technical leadership & Consulting
Connect -
Anagat Pareek, CISM, PG Cybersecurity - MIT
Cloud and Cybersecurity at Newgen
Connect -
Go Secure Technologies, Inc.,
Creative Minds. Creative Intelligence
Connect -
Vignesh Venugopal
Global Manager - MDR Operations - Cyber Security
Connect -
Niranjan Singh
Connect -
Dhruv Gupta
Private Equity, Venture Capital, Cyber Security, AI/ML, Gen AI, Prompt Engineering, Deal Value Creation, M&A, Advisor (New York, New Jersey, Bay Area, Dubai, Mumbai), Portco Value Enhancement through Cyber, Tech and AI)
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More