About
Articles by Jon Gagan
-
Generative AI and NLP for Healthcare environments
Generative AI and NLP for Healthcare environments
By Jon Gagan Shende
-
What is D & O Insurance and the importance of coverage for a company's CISO
What is D & O Insurance and the importance of coverage for a company's CISO
By Jon Gagan Shende
-
Kubernetes Admission Controllers and Threat Prevention
Kubernetes Admission Controllers and Threat Prevention
By Jon Gagan Shende
Contributions
Activity
-
𝐒𝐮𝐧𝐧𝐲 𝐃𝐚𝐲 𝐅𝐮𝐧𝐝 𝐖𝐞𝐥𝐜𝐨𝐦𝐞𝐬 𝐌𝐚𝐡𝐞𝐬𝐡 𝐍𝐚𝐭𝐚𝐫𝐚𝐣𝐚𝐧 𝐭𝐨 𝐎𝐮𝐫 𝐀𝐝𝐯𝐢𝐬𝐨𝐫𝐲 𝐁𝐨𝐚𝐫𝐝! We’re excited to welcome Mahesh…
𝐒𝐮𝐧𝐧𝐲 𝐃𝐚𝐲 𝐅𝐮𝐧𝐝 𝐖𝐞𝐥𝐜𝐨𝐦𝐞𝐬 𝐌𝐚𝐡𝐞𝐬𝐡 𝐍𝐚𝐭𝐚𝐫𝐚𝐣𝐚𝐧 𝐭𝐨 𝐎𝐮𝐫 𝐀𝐝𝐯𝐢𝐬𝐨𝐫𝐲 𝐁𝐨𝐚𝐫𝐝! We’re excited to welcome Mahesh…
Liked by Jon Gagan Shende
-
I am proud to be on a panel to discuss the path to becoming a CISO! I will be joined by two very distinguished CISOs - Sue Bergamo and Andrew…
I am proud to be on a panel to discuss the path to becoming a CISO! I will be joined by two very distinguished CISOs - Sue Bergamo and Andrew…
Liked by Jon Gagan Shende
-
#cybersecurityproducts #newdirection #executivechange
#cybersecurityproducts #newdirection #executivechange
Posted by Jon Gagan Shende
Experience & Education
Licenses & Certifications
-
Certified in Risk and Information Systems Control (CRISC)
ISACA
Issued ExpiresCredential ID 1109835
Volunteer Experience
-
Volunteer
Junior Achievement
- 1 year 5 months
Education
-
Volunteer
Clara White Mission
- 1 year 4 months
Poverty Alleviation
Volunteered in kitchen, serving set up and clean up after homeless meals
Publications
-
Navigating the IoT enablement world -Strategy Risk and Rewards
Cyber World February 2018
-
IoT Security and Privacy: Exploring Technology Solutions Aligned to Regulatory Needs
ISACA
When we talk about IoT, we think about the process we implement as we migrate to sensor-driven infrastructure for automated processes.
Looking at economies and technology ramp-up trends from a financial perspective, we will expect that there with be standardization around policies and processes, as well as implementing interfaces that are expected to connect sensors to networks, platforms, and application systems, or a combination of services.
It can all appear to be complex and…When we talk about IoT, we think about the process we implement as we migrate to sensor-driven infrastructure for automated processes.
Looking at economies and technology ramp-up trends from a financial perspective, we will expect that there with be standardization around policies and processes, as well as implementing interfaces that are expected to connect sensors to networks, platforms, and application systems, or a combination of services.
It can all appear to be complex and large scale, especially in the borderless world of IoT. However, if as security and privacy professionals we ask ourselves, “What are the major areas we should focus on?,” my perspective is that we will have to look at:
Device security and settings
Security device and system physical access (IAM)
Securing our communication network systems
Dealing with the large volume of data we will have to process, leveraging big data analytics, risk scoring and criticality metrics aligned to a system, user privilege, and the business functionality. -
IoT Security Programs Must Leverage Trust
ISACA
If we look at IoT through a security lens, then we have to consider the integration of network, sensors, human machine interactions, virtualized systems and other endpoints that must be able to provide actionable security intelligence in near real time, and which can align to a security framework or model. This model should identify and mitigate environmental risk, ensure data privacy and drive threat mitigation around:
Weaknesses within web interfaces
Challenges with authentication…If we look at IoT through a security lens, then we have to consider the integration of network, sensors, human machine interactions, virtualized systems and other endpoints that must be able to provide actionable security intelligence in near real time, and which can align to a security framework or model. This model should identify and mitigate environmental risk, ensure data privacy and drive threat mitigation around:
Weaknesses within web interfaces
Challenges with authentication and authorization
Challenges with encryption
Data privacy across borders
Inconsistencies within network security
Challenges with physical security of devices -
Healthcare IT and the Cloud
SysCon Media
An introductory thought piece on Healthcare and Cloud Computing and how it can be managed
-
Software as a Service (SaaS), Security and Risk Management: Part 1
SysCon Media
As cloud computing technologies and offerings mature and evolve in its services to customers, one common consumer use will be that of the Software as a Service (SaaS) model.
This article will focus on aspects of security that impact the SaaS environment.
It is at the SaaS layer that we can perceive additional challenges with cloud security. One critical area of concern stems from the potential risk that a client's data can be exposed to as it is stored within the storage system…As cloud computing technologies and offerings mature and evolve in its services to customers, one common consumer use will be that of the Software as a Service (SaaS) model.
This article will focus on aspects of security that impact the SaaS environment.
It is at the SaaS layer that we can perceive additional challenges with cloud security. One critical area of concern stems from the potential risk that a client's data can be exposed to as it is stored within the storage system of its SaaS provider. This risk can potentially increase in the event of the SaaS provider in turn utilizing the services of a third party IaaS provider. -
Risk and Its Impact on Security Within the Cloud - Part 2
Sys Con Media
A practical look at a Private Cloud and hypervisor security
-
Virtualization and the Cloud Computing Ecosystem
It is generally accepted that the concept of cloud computing or, at least the amalgamation of services that infer the cloud ecosystem, lends to the premise of improvements in managing deployed services. This due to an assumed increase in efficiencies resulting from the sharing of hardware resources at one end of the spectrum
-
Digital Forensic Challenges within Cloud Computing
Proponents of the cloud ecosystem touts its "vastness, flexibility and scalability as advantages for the implementation of cloud services. However, from a digital point of view this can be a veritable forensic challenge as we view the cloud in terms of its scope and diversity.
-
Standards Acceleration to Jump-Start Adoption of Cloud Computing
One major concern with the adoption of cloud computing is the lack of a defined standard or standards that are specific to operations impacting security, interoperability & mobility within the Cloud ecosystem.
As most managers of security departments will attest to, there is a fine line between security and operations. -
Live Forensics and the Cloud
According to Simpson Garfinkil, a major challenge to any digital forensics investigator investigating data within the cloud; can be an inability to locate or identify data or code that is lost when single data structures are split into elements.
This in effect directly impacts forensic visibility.
Patents
-
FORENSICS
Issued US 61/799/535
-
Cloud Forensics as a Service
20140317681
Cloud Forensics model for instance and cloud investigation
Projects
-
Event Driven SaaS architecture Platform development and integration
-
-
IT Security Overview
-
-
American Express BPOS to Cloud
-
Honors & Awards
-
National Security Practice Management
Ernst and Young
In the Spotlight Award for performance above and beyond on tier 1 account
Languages
-
French
-
-
Spanish
-
Organizations
-
British Computer Society
Fellow
- Present
Recommendations received
33 people have recommended Jon Gagan
Join now to viewMore activity by Jon Gagan
-
CI/CD Pipeline Explained in Simple Terms SDLC with CI/CD The software development life cycle (SDLC) includes stages like development, testing…
CI/CD Pipeline Explained in Simple Terms SDLC with CI/CD The software development life cycle (SDLC) includes stages like development, testing…
Liked by Jon Gagan Shende
-
Do you have a good sales deck? If you're a startup, chances are you're pitching non-stop. Over the years, I've delivered hundreds of presentations…
Do you have a good sales deck? If you're a startup, chances are you're pitching non-stop. Over the years, I've delivered hundreds of presentations…
Liked by Jon Gagan Shende
-
This is literally why I love running IT in the D. I met Andrew Newbill at this past Meetup, he came to Michigan for a job, and was recently laid off.…
This is literally why I love running IT in the D. I met Andrew Newbill at this past Meetup, he came to Michigan for a job, and was recently laid off.…
Liked by Jon Gagan Shende
-
Why should you attend hashtag #TaniumConverge 2024?
Why should you attend hashtag #TaniumConverge 2024?
Shared by Jon Gagan Shende
-
I am thrilled to celebrate my yellow badge AND an AWSome 5 years at AWS! 🎉 🎉 During this time, I've experienced unparalleled growth as a…
I am thrilled to celebrate my yellow badge AND an AWSome 5 years at AWS! 🎉 🎉 During this time, I've experienced unparalleled growth as a…
Liked by Jon Gagan Shende
-
I recently had the opportunity to sit down with Debarati Banerjee (Discern Security). We discussed some interesting topics including key challenges…
I recently had the opportunity to sit down with Debarati Banerjee (Discern Security). We discussed some interesting topics including key challenges…
Liked by Jon Gagan Shende
-
With today’s launch of our Llama 3.1 collection of models we’re making history with the release of the largest and most capable open source AI model…
With today’s launch of our Llama 3.1 collection of models we’re making history with the release of the largest and most capable open source AI model…
Liked by Jon Gagan Shende
-
While we are all dealing with the Friday aftermath, don`t forget to celebrate this big win for the CISO community... Most U.S. Securities and…
While we are all dealing with the Friday aftermath, don`t forget to celebrate this big win for the CISO community... Most U.S. Securities and…
Liked by Jon Gagan Shende
Other similar profiles
-
David B. Cross
Senior Vice President, Chief Information Security Officer (CISO) of Oracle SaaS Cloud | Gartner Peer Community Ambassador
Connect -
Reet K.
Connect -
Mark Berthiaume
Connect -
Jaymin Shah
VP, Chief Security Architect | Technology Office
Connect -
Varsha Agarwal
Connect -
Michalis Kamprianis
Connect -
Gautam Dev
Connect -
Sreenivas R.
Connect -
Chris Kenworthy
Connect -
Yogesh Badwe
Connect
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More