Jon Gagan Shende

Jon Gagan Shende

United States
4K followers 500+ connections

About

12+yrs building/leading Global Technology & Security Teams at Fortune 50-200 (Budgets $5M…

Articles by Jon Gagan

See all articles

Contributions

Activity

Join now to see all activity

Experience & Education

  • ForenSec Global Inc

View Jon Gagan’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Volunteer

    Junior Achievement

    - 1 year 5 months

    Education

  • Clara White Mission Graphic

    Volunteer

    Clara White Mission

    - 1 year 4 months

    Poverty Alleviation

    Volunteered in kitchen, serving set up and clean up after homeless meals

Publications

  • IoT Security and Privacy: Exploring Technology Solutions Aligned to Regulatory Needs

    ISACA

    When we talk about IoT, we think about the process we implement as we migrate to sensor-driven infrastructure for automated processes.

    Looking at economies and technology ramp-up trends from a financial perspective, we will expect that there with be standardization around policies and processes, as well as implementing interfaces that are expected to connect sensors to networks, platforms, and application systems, or a combination of services.

    It can all appear to be complex and…

    When we talk about IoT, we think about the process we implement as we migrate to sensor-driven infrastructure for automated processes.

    Looking at economies and technology ramp-up trends from a financial perspective, we will expect that there with be standardization around policies and processes, as well as implementing interfaces that are expected to connect sensors to networks, platforms, and application systems, or a combination of services.

    It can all appear to be complex and large scale, especially in the borderless world of IoT. However, if as security and privacy professionals we ask ourselves, “What are the major areas we should focus on?,” my perspective is that we will have to look at:

    Device security and settings
    Security device and system physical access (IAM)
    Securing our communication network systems
    Dealing with the large volume of data we will have to process, leveraging big data analytics, risk scoring and criticality metrics aligned to a system, user privilege, and the business functionality.

    See publication
  • IoT Security Programs Must Leverage Trust

    ISACA

    If we look at IoT through a security lens, then we have to consider the integration of network, sensors, human machine interactions, virtualized systems and other endpoints that must be able to provide actionable security intelligence in near real time, and which can align to a security framework or model. This model should identify and mitigate environmental risk, ensure data privacy and drive threat mitigation around:

    Weaknesses within web interfaces
    Challenges with authentication…

    If we look at IoT through a security lens, then we have to consider the integration of network, sensors, human machine interactions, virtualized systems and other endpoints that must be able to provide actionable security intelligence in near real time, and which can align to a security framework or model. This model should identify and mitigate environmental risk, ensure data privacy and drive threat mitigation around:

    Weaknesses within web interfaces
    Challenges with authentication and authorization
    Challenges with encryption
    Data privacy across borders
    Inconsistencies within network security
    Challenges with physical security of devices

    See publication
  • Healthcare IT and the Cloud

    SysCon Media

    An introductory thought piece on Healthcare and Cloud Computing and how it can be managed

    See publication
  • Software as a Service (SaaS), Security and Risk Management: Part 1

    SysCon Media

    As cloud computing technologies and offerings mature and evolve in its services to customers, one common consumer use will be that of the Software as a Service (SaaS) model.

    This article will focus on aspects of security that impact the SaaS environment.

    It is at the SaaS layer that we can perceive additional challenges with cloud security. One critical area of concern stems from the potential risk that a client's data can be exposed to as it is stored within the storage system…

    As cloud computing technologies and offerings mature and evolve in its services to customers, one common consumer use will be that of the Software as a Service (SaaS) model.

    This article will focus on aspects of security that impact the SaaS environment.

    It is at the SaaS layer that we can perceive additional challenges with cloud security. One critical area of concern stems from the potential risk that a client's data can be exposed to as it is stored within the storage system of its SaaS provider. This risk can potentially increase in the event of the SaaS provider in turn utilizing the services of a third party IaaS provider.

    See publication
  • Risk and Its Impact on Security Within the Cloud - Part 2

    Sys Con Media

    A practical look at a Private Cloud and hypervisor security

    See publication
  • Virtualization and the Cloud Computing Ecosystem

    It is generally accepted that the concept of cloud computing or, at least the amalgamation of services that infer the cloud ecosystem, lends to the premise of improvements in managing deployed services. This due to an assumed increase in efficiencies resulting from the sharing of hardware resources at one end of the spectrum

    See publication
  • Digital Forensic Challenges within Cloud Computing

    Proponents of the cloud ecosystem touts its "vastness, flexibility and scalability as advantages for the implementation of cloud services. However, from a digital point of view this can be a veritable forensic challenge as we view the cloud in terms of its scope and diversity.

    See publication
  • Standards Acceleration to Jump-Start Adoption of Cloud Computing

    One major concern with the adoption of cloud computing is the lack of a defined standard or standards that are specific to operations impacting security, interoperability & mobility within the Cloud ecosystem.

    As most managers of security departments will attest to, there is a fine line between security and operations.

    See publication
  • Live Forensics and the Cloud

    According to Simpson Garfinkil, a major challenge to any digital forensics investigator investigating data within the cloud; can be an inability to locate or identify data or code that is lost when single data structures are split into elements.

    This in effect directly impacts forensic visibility.

    See publication

Patents

  • FORENSICS

    Issued US 61/799/535

  • Cloud Forensics as a Service

    20140317681

    Cloud Forensics model for instance and cloud investigation

Projects

  • Identity Risk SaaS with ML

    In partnership with @BigML

    See project
  • Event Driven SaaS architecture Platform development and integration

    -

  • IT Security Overview

    -

  • American Express BPOS to Cloud

    -

Honors & Awards

  • National Security Practice Management

    Ernst and Young

    In the Spotlight Award for performance above and beyond on tier 1 account

Languages

  • French

    -

  • Spanish

    -

Organizations

  • British Computer Society

    Fellow

    - Present

Recommendations received

33 people have recommended Jon Gagan

Join now to view

More activity by Jon Gagan

View Jon Gagan’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jon Gagan directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More