Sign in to view Indus’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Indus’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
San Francisco Bay Area
Sign in to view Indus’ full profile
Indus can introduce you to 10+ people at Redblock
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
27K followers
500+ connections
Sign in to view Indus’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Indus
Indus can introduce you to 10+ people at Redblock
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
View mutual connections with Indus
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Sign in to view Indus’ full profile
or
New to LinkedIn? Join now
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Articles by Indus
-
Why Identity Has a Machine Now
Why Identity Has a Machine Now
If you walk into almost any enterprise today, identity security still runs on tickets and spreadsheets. Not because the…
25
4 Comments -
AGI and Identity Security: Why “Figure Things Out” Isn’t EnoughJan 27, 2026
AGI and Identity Security: Why “Figure Things Out” Isn’t Enough
Sequoia’s Pat Grady and Sonya Huang recently offered a clean functional definition: AGI is the ability to figure things…
14
-
Identity’s Real Problem Isn’t Tools. It’s the Semi-Async Middle Layer.Dec 6, 2025
Identity’s Real Problem Isn’t Tools. It’s the Semi-Async Middle Layer.
Every year, identity gets more tools, more standards, more “platforms,” more pretty diagrams. And yet, inside most…
24
2 Comments -
The Rise of Open Source LLMs: A Trip Down Memory Lane of Open Source WebserversMar 28, 2023
The Rise of Open Source LLMs: A Trip Down Memory Lane of Open Source Webservers
Elad Gil asked the question of open source LLMs (and indirectly, the destiny of commercial LLMs). The answer lies in…
31
2 Comments -
What does a great board look like for a tech startup?Oct 16, 2018
What does a great board look like for a tech startup?
Building a startup is an iterative, learning process, sprinkled with feedback from people who have a perspective on…
66
3 Comments -
Always close loop — Irrespective of the outcomeOct 3, 2017
Always close loop — Irrespective of the outcome
In summer of 2010, Sameer, Nandini and I, along with Shashank, and Abhinav caught up and mulled Practo’s seed round…
48
5 Comments -
Error Log — Decision Journal for exceptionsSep 28, 2017
Error Log — Decision Journal for exceptions
I started reading Ray Dalio’s new book Principles, where he beautifully chronicles his work, life, his decision making…
14
-
Internal scorecard of a ProductJun 5, 2017
Internal scorecard of a Product
A product’s success hinges on both, the happy engineers who write code, and the customers whose one or more pain points…
70
3 Comments -
Systems of Intelligence--The new enterprise software moatApr 26, 2017
Systems of Intelligence--The new enterprise software moat
Jerry Chen of Greylock wrote a fantastic piece on moats. He gave a refresher on traditional defensible moats used by…
16
-
SaaS: Where are you in this 2×2?Mar 16, 2017
SaaS: Where are you in this 2×2?
Some SaaS ventures lead to category leadership while some lead to imaginary frozen quadrants. Here’s a little 2X2 to…
54
12 Comments
Activity
27K followers
-
Indus Khaitan shared thisListening to Vinod Khosla live is like getting that energy, vibe, and charging your batteries directly from a turbine. You walk out thinking a little bigger. A few more dots connect. And slightly more okay with being uncomfortable while doing it. Left thinking less about what’s realistic and more about what’s worth attempting. Thanks Anand Chandrasekaran for hosting this.
-
Indus Khaitan shared this⚡ 🎉 I’m proud to announce the formation of the 𝗚𝗹𝗼𝗯𝗮𝗹 𝗦𝗽𝗿𝗲𝗮𝗱𝘀𝗵𝗲𝗲𝘁 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗔𝗹𝗹𝗶𝗮𝗻𝗰𝗲 (𝗚𝗦𝗜𝗔). For years, the identity industry has talked about APIs, SCIM, automation, and governance. And yet, in more organizations than anyone wants to admit, the workflow still looks like this: 1. Export the file 2. Edit the file 3. Email the file 4. Upload the file 5. Confirm whether latest version 𝗦𝗼 𝘁𝗼𝗱𝗮𝘆, 𝘄𝗲 𝗮𝗿𝗲 𝗱𝗼𝗻𝗲 𝗽𝗿𝗲𝘁𝗲𝗻𝗱𝗶𝗻𝗴. The GSIA is publishing CSV 2.0, a proposed standard for identity operations. Key features include: • Semicolon compatibility for European deployments • Human-readable schema drift • Formal file lineage (final.csv, final_v2.csv, and final_FINAL_use_this_one.csv) • A standardized 7-layer spreadsheet stack • Out-of-band credential obfuscation through formatting controls We’ve also published the core specification, supporting technical materials. A short launch video will be posted when we are done moving the files. I’ll be participating in this effort as 𝗖𝗵𝗶𝗲𝗳 𝗗𝗲𝗹𝗶𝗺𝗶𝘁𝗲𝗿, alongside 𝗥𝗼𝘄𝗮𝗻 𝗦𝗮𝗿𝘄𝗮𝗷𝗶𝘁, as we work to formalize one of the most widely deployed identity exchange formats in enterprise history. 𝗪𝗵𝘆 𝗳𝗶𝗴𝗵𝘁 𝘁𝗵𝗲 𝘀𝗽𝗿𝗲𝗮𝗱𝘀𝗵𝗲𝗲𝘁 𝘄𝗵𝗲𝗻 𝘆𝗼𝘂 𝗰𝗮𝗻 𝘀𝘁𝗮𝗻𝗱𝗮𝗿𝗱𝗶𝘇𝗲 𝗿𝗲𝗮𝗹𝗶𝘁𝘆? 📅 Launch website went live at 1:23 AM HAST/HST. Link in comments. 👇 👀 Know an IAM/IGA visionary who still believes CSV is the most resilient protocol in enterprise identity? #Identity #IAM #Standards #Long_Live_CSV #GSIA
-
Indus Khaitan shared this"Hotmail used to allow 3 character passwords." Yesterday at RSAC, I bumped into someone who was part of the early days of this fabled webmail. And this is not a dunk on Hotmail. This is how simple life was. There is an amazing amount of destruction of simple UX for web apps in the last 30 years. We went from rawdogging the internet with one short password…to juggling 2FA apps, backup codes, rotating credentials, and security questions we never answer the same way twice. Security improved. No doubt. But somewhere along the way, usability became collateral damage. cc Sabeer Bhatia
-
Indus Khaitan reposted thisIndus Khaitan reposted thisDay 3. RSAC Early stage quick hits: - Biscoff (airline size!) at our booth - Dirty soda bar by Capsule Security
-
Indus Khaitan shared thisApparently we’ve rebranded. Pulled up to my RSAC session and found the change. Roadblock Security. Honestly… not entirely wrong. Stopping bad things in identity from going where they shouldn’t. Accidental brand clarity courtesy of RSAC. 🚧 Anamitra Banerji Gaurav Jain Mendy Yang Amit Chadha Steve Zalewski Gopi Ramamoorthy
-
Indus Khaitan shared thisRock and roll at RSA!Indus Khaitan shared thisBooth is done. Team is ready to go! 🚀🚀🚀 Early stage expo. Moscone South. Room 207. #RSAC
-
Indus Khaitan posted thisSuddenly offers to acquire and do M&A increase a few days before RSA. I wish these came during Christmas holidays, when I’m better dressed and my t-shirt is ironed, and hair is gelled. 😅 Right now it’s peak founder mode. Half coffee, half chaos, fully unprepared for “let’s talk numbers.” Timing is everything in M&A. Apparently, so is dry cleaning. #RSAC2026
-
Indus Khaitan shared thisWe’re not bringing socks or pens with logos to RSAC. We’re bringing a machine. A 150-year-old Morse telegraph you can actually assemble and use. I’ve always liked old machines like this. Everything is visible. You press a key, a signal goes through, something happens on the other side. No guessing. Somewhere along the way, modern systems stopped working like that. Today, automation in software means: • Tickets assigned to humans • Data moving around in CSV files This thing on the table looks archaic, but in some ways it feels more honest. There’s a direct line between intent and action. Humans are not carrying the signal to the other side. Anyway, we’ll have a limited number of these at our booth at the Early Stage Expo (Moscone South Level 2, Room 207). Come by and grab one. #RSAC2026 #Cybersecurity #Identity
-
Indus Khaitan shared thisMost of the 25,000 people at #RSAC2026 will never leave the Main Expo. But the ones who look for brand new signal make the trek to the Early Stage Expo. The people who make the walk to Level 2 aren't just passing through. They do because they are curious. They are innovative. They care. They want to discover what is next before the rest of the market catches up. The Early Stage Expo at #RSAC2026 is tucked away from the noise. And it feels exactly right. Every company in that room starts with conviction. A small team. A big belief. A willingness to build before the outcome is obvious. There is something deeply energizing about being around that kind of ambition. It is a reminder that the future is not built in the most crowded halls. It is often built in the quieter corners, by founders and teams who simply cannot help but keep going. If you’re heading to Moscone next week, do not miss the builders. 📅 March 25th & 26th 📍 Find us: Moscone South, Level 2, Room 207. 👇 Check the PDF below for the easiest route. Who else is hunting for the "next big thing" at RSAC this year? I know Steve Zalewski, Puneet Thapliyal, Puneet Bhatnagar, Pramod Gosavi, Rohan Singla are! 😊 Tagging a few founders who are going to be there: Apurv Garg, Abhay Kulkarni, Ankur Shah, Piyush Sharrma
-
Indus Khaitan liked thisIndus Khaitan liked thisI wrote something personal this week. It starts with a black and white television and ends with building an AI lending agent. In between: a begged entry into a computer lab, four years of sleeping under my desk, a Panasonic phone from a South Delhi basement, and a chat room handle called mouse_potato. Every shift in my career started the same way, playing with something before I understood it. This one is no different. Link in comments If you've ever felt the pull of the next thing before you could explain why, this might resonate.
-
Indus Khaitan reacted on thisIndus Khaitan reacted on thisServiceNow's security business crossed $1B in ACV last year and grew roughly 100% YoY. I don't think these disclosures have been talked about enough. These were the most comprehensive set of disclosures yet for their security business unit. (Remember, they don't have to disclose BU-level revenue figures, so all of this was voluntary.) The numbers are super impressive: – Security and Risk appeared in 19 of their top 20 deals. – Net new ACV grew nearly 40% YoY. – They had their largest OT quarter ever. ...and then they went and spent ~$8.75B acquiring Armis and Veza in rapid succession. That's on top of $2.85B for Moveworks (not security, but relevant to the strategy). I saw some discussion about framing this as ServiceNow trying to compete with the security platforms. That's directionally correct, but the strategy is a lot more nuanced. They're not becoming a cybersecurity company. They're becoming the *workflow layer* where security-related workflows (and agents, ofc) run. At a very pedantic level, ServiceNow does workflows. They just happen to be more well known for other types of workflows (mostly in IT). They've been building a nice collection of native products (and revenue) across SecOps, GRC, VM, and several other security-adjacent domains. Gradually, then suddenly, all of this became a fast-growing billion dollar business. As the saying goes, time to pour gas on the fire and do more of what's clearly working: – Armis brings OT and asset visibility that goes with their existing patch orchestration capabilities. – Veza adds identity governance workflows for humans and agents. – Moveworks (adjacent, but relevant here) adds the AI interface layer on top. Each one plugs into a platform and distribution machine that already has the enterprise relationships and the process automation muscle. After the Armis deal, ServiceNow made some relatively subtle references that these strategic moves will more than triple their TAM for security and risk solutions. TAM is a fuzzy number, of course – but you can crudely interpret that as "we're shooting for a lot higher than a billion dollars of revenue." Revenue aspirations aside, the strategic direction is pretty clear: they're building a consolidation story around visibility, identity, and orchestration. They're in for intense competition, but they've set themselves up to take advantage of multiple strengths they've been building over time.
-
Indus Khaitan liked thisExcited to share I’ve joined the Forbes Technology Council. I’m looking forward to contributing practical insights on #AI, #Cybersecurity, #product innovation, #digital transformation and connecting with leaders shaping what’s next.Indus Khaitan liked thisWelcome Kapil Bareja, CyberRisk Leader of Deloitte, to the Forbes Technology Council! With a strong background in innovation, digital strategy, and tech leadership, Kapil brings valuable insights that will enrich our community. Forbes Technology Council is an invitation-only organization for world-class technology leaders and innovators. https://hubs.li/Q046pdRZ0
-
Indus Khaitan liked thisIndus Khaitan liked thisControlled Chaos: The Art and Discipline of Modern IAM Roadmaps If you have ever led an IAM team in any capacity, you would have been asked to create a clean roadmap. Yet after years of reviewing these maps, what’s promised and what’s get done are very different. Folks in IAM know that IAM is structurally chaotic. It’s downstream of every bold strategy slide, every new regulation, and every fresh threat actor earning street creds. My advise is to not pretend that the chaos will go away, rather embrace it and master the art of controlled chaos. For me, that means few foundational moves: Name the flood Put the noise on the table: digital initiatives, audit findings, SaaS sprawl, AI agents, legacy directories, and privilege debt. Chaos feels less political when everyone can see its sources. Design a control system, not a project list. Group work into a few stable streams: • Foundational plumbing • Risk & compliance • Business enablement • Strategic bets Give each stream 2–3 outcomes and KPIs, then plan in horizons (0–6, 6–18, 18–36 months) instead of pretending every dependency will behave. Wire in feedback loops by design Threat retros, audit cycles, and strategy shifts should move the roadmap, not derail it. If identity really is the control plane, it must be allowed to respond at the same speed as the environment it protects. IAM will never be neat. Don’t try to domesticate it into a static plan. Use it as an instrument of continuous change. We’re not shepherds out in a quiet pasture; we’re bull riders hanging on for 8 seconds at a time and still expected to smile for the team photo. One common anti‑pattern is using “chaos” as an excuse to duck accountability, instead of doing the hard work of bringing just enough order to it. #TheIdentityNavigator
-
Indus Khaitan reacted on thisIndus Khaitan reacted on thisOn this World Autism Awareness Day, I am reminded of an old Japanese proverb: fall seven times, rise eight. It is a simple line, but it carries within it the weight of lived wisdom - a quiet insistence that no matter how often life brings us to our knees, we must find a way to rise again. Rooted in the spirit of gaman, it speaks of enduring hardship with dignity, patience, and grace. As parents, Deepali and I often reflect on how blessed we are to have Vivaan in our lives. I do not wish to romanticize the journey - because it has demanded of us more than we ever imagined. And yet, in ways both subtle and profound, Vivaan has reshaped us. He has taught us to see the world through gentler eyes - to respond with empathy where there was once impatience, with compassion where there was once certainty, and with love that asks for nothing in return. In his presence, we have discovered what it means to live not in scarcity, but in abundance. I often return to Man’s Search for Meaning by Viktor Frankl, a book that has stayed with me through the years. Frankl writes that meaning in life can be found in three ways: through purposeful work, through loving someone deeply, and through finding courage in the face of suffering. In Vivaan, we have been gifted all three. To everyone living with autism, and to every parent, caregiver, and loved one walking this path each day - know this: your journey, though often unseen, is filled with quiet acts of courage. And within it lies a rare and profound gift - the ability to experience the world with a depth of love that transforms not just lives, but hearts.
Experience & Education
-
Redblock
******* *** ***
-
******
*** *** *******
-
*********
***** ** ******
-
***** ********* ** *********** *****
** undefined undefined
View Indus’s full experience
See their title, tenure and more.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Volunteer Experience
-
Mentor, Guest Lecturer
University of California, Berkeley, Haas School of Business
- 3 years
Education
-
Mentor
Project Aldus
- 3 years
Children
Project Aldus is a non-profit movement, and an attempt to provide families with tools and awareness to live a healthy digital life.
-
-
Program co-chair / Black-shirt
nasscom
- 2 years 1 month
Science and Technology
Co-chaired NASSCOM Product Conclave, an annual melee of 1500 entrepreneurs, VCs and product professionals in Bangalore. Worked in a team which created the event, curated the program and played host to hundreds of speakers including Guy Kawasaki, Naveen Jain, Ram Shriram, Vinod Khosla and others.
Publications
-
Building a Web directory & a Search engine using Open Directory and Java
Session at JavaOne
Recommendations received
14 people have recommended Indus
Join now to viewView Indus’ full profile
-
See who you know in common
-
Get introduced
-
Contact Indus directly
Other similar profiles
Explore more posts
-
Justin Endres
RackWare • 15K followers
𝐀 𝐓𝐢𝐞𝐫 1 𝐚𝐮𝐭𝐨 𝐦𝐚𝐧𝐮𝐟𝐚𝐜𝐭𝐮𝐫𝐞𝐫. 𝐄𝐧𝐠𝐢𝐧𝐞𝐞𝐫𝐢𝐧𝐠 𝐬𝐩𝐞𝐜𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬 𝐬𝐡𝐚𝐫𝐞𝐝 𝐰𝐢𝐭𝐡 40 𝐬𝐮𝐩𝐩𝐥𝐢𝐞𝐫 𝐩𝐚𝐫𝐭𝐧𝐞𝐫𝐬. Design files, quality audit reports, and worker data flowing across six countries. Under DPDP, the manufacturer is the Data Fiduciary for every Indian individual whose personal data is in those files, employees, contractors, supplier contacts. The obligation doesn't transfer to the supplier when the file does. T𝐃𝐚𝐭𝐚-𝐜𝐞𝐧𝐭𝐫𝐢𝐜 𝐩𝐫𝐨𝐭𝐞𝐜𝐭𝐢𝐨𝐧, 𝐜𝐨𝐧𝐭𝐫𝐨𝐥𝐬 𝐭𝐡𝐚𝐭 𝐭𝐫𝐚𝐯𝐞𝐥 𝐰𝐢𝐭𝐡 𝐫𝐚𝐝𝐢𝐭𝐢𝐨𝐧𝐚𝐥 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐭𝐨𝐩𝐬 𝐚𝐭 𝐭𝐡𝐞 𝐩𝐞𝐫𝐢𝐦𝐞𝐭𝐞𝐫. 𝐎𝐧𝐜𝐞 𝐚 𝐟𝐢𝐥𝐞 𝐥𝐞𝐚𝐯𝐞𝐬 𝐲𝐨𝐮𝐫 𝐞𝐧𝐯𝐢𝐫𝐨𝐧𝐦𝐞𝐧𝐭, 𝐲𝐨𝐮𝐫 𝐜𝐨𝐧𝐭𝐫𝐨𝐥 𝐞𝐧𝐝𝐬. 𝐃𝐚𝐭𝐚-𝐜𝐞𝐧𝐭𝐫𝐢𝐜 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐜𝐡𝐚𝐧𝐠𝐞𝐬 𝐭𝐡𝐢𝐬 𝐚𝐫𝐜𝐡𝐢𝐭𝐞𝐜𝐭𝐮𝐫𝐞 𝐟𝐮𝐧𝐝𝐚𝐦𝐞𝐧𝐭𝐚𝐥𝐥𝐲. 𝐖𝐢𝐭𝐡 𝐩𝐞𝐫𝐬𝐢𝐬𝐭𝐞𝐧𝐭 𝐫𝐢𝐠𝐡𝐭𝐬 𝐦𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭: • A file carries its access controls regardless of where it goes • The manufacturer can revoke access to a supplier's copy, even after it's been downloaded • Every access event generates an audit log, traceable to an individual • When a supplier's contract ends, their access to all shared data ends automatically For Manufacturing CISOs managing DPDP obligations across complex supply chains, persistent protection is not just a security control. 𝐈𝐭'𝐬 𝐭𝐡𝐞 𝐭𝐞𝐜𝐡𝐧𝐢𝐜𝐚𝐥 𝐦𝐞𝐜𝐡𝐚𝐧𝐢𝐬𝐦 𝐭𝐡𝐚𝐭 𝐦𝐚𝐤𝐞𝐬 𝐃𝐏𝐃𝐏 𝐚𝐜𝐜𝐨𝐮𝐧𝐭𝐚𝐛𝐢𝐥𝐢𝐭𝐲 𝐨𝐩𝐞𝐫𝐚𝐭𝐢𝐨𝐧𝐚𝐥𝐥𝐲 𝐟𝐞𝐚𝐬𝐢𝐛𝐥𝐞. #DPDP #Manufacturing #DataProtection #SupplyChain #PersistentProtection #CISO Mohd Masood Amrish Sanghvi Chandan Tiwari Apoorve Jain Tanmay Rajendra Gupta Akash Garg Anshu Mishra Sumeet Kumar Dey
28
-
Jonathan Reid 🎙️
Reidentify • 7K followers
Spray-and-pray doesn’t work at enterprise level. Winning complex deals takes more than outreach, it takes orchestration. Seceon gets this. Their partner-first GTM has already unlocked: ✅ 650+ MSSP partners ✅ 9,000+ customers ✅ Trusted by security teams using Splunk & CrowdStrike And their 2025 plan is clear: → Expand the platform’s capabilities → Build mindshare in a crowded market → Help partners win bigger, faster And achieving those goals requires more than just partner scale. It takes narrative ownership, buyer group trust, and a brand presence that cuts through the market noise. That’s where Account-Based Podcasting (ABP) comes in. Because ABP isn’t just content. It’s a revenue engine that earns trust across the entire buying group, and aligns every episode with your Go-To-Market strategy. Here’s what ABP unlocks for Seceon: → Strategic Positioning Amplified: Their “Unified by Design” edge becomes the core story repeated across every partner, buyer group, and analyst interaction, building brand memory and competitive differentiation. → Multi-threaded Trust: Podcast guests = CISOs, SOC leaders, compliance officers, the buying group. Each episode = clips, sales assets, blogs, and FAQs that move deals forward. → Partner Co-marketing: Top MSSPs and vendors like CrowdStrike join as guests. Episodes double as co-branded content they share, expanding reach and credibility. → Category Leadership: The show educates the market and positions Seceon as the voice in unified threat management. → Executive Visibility: Their CEO, CTO, and internal experts become the faces of trust in a noisy, skeptical industry. And this is aligned with their 2025 roadmap too! Shout out to the Seceon Inc. team Tarun Chhetri Chandra Shekhar Pandey Shikha Pandey Aishwarya Pratap Singh Pushpendra Mishra 🇮🇳 Kriti Tripathi Jui Shah This is Episode 10 of my 10-part ABP series on how B2B tech companies can use podcasts to win accounts, grow pipeline, and own their niche 🥳 p.s. want to see the rest of the episodes? Tap “visit my website” under my name ☝️
41
1 Comment -
Dr. Lalit Mohan Sanagavarapu
Quick Heal • 6K followers
It was great taking to you Kavita (IDENTITY1ST) to discuss the evolution of India’s cybersecurity landscape. We take a strong pride in building products for India in India and taking to a global stage. We covered a lot of ground—from market shares and global expansion strategies to why India needs its own homegrown cybersecurity champions. Specifically, in the importance of cyber security products in the current geopolitical realm. I liked your probing questions to get insights on growth and marketshare :) Seqrite Quick Heal
107
1 Comment -
Swarna Latha Madalla
Proteccio Data • 2K followers
I’ll never forget when a potential client told me their entire “data privacy strategy” was… a single spreadsheet they updated once a year. That was my wait, what? moment. Because in 2025, privacy isn’t a one-and-done checklist it’s a living system that changes as fast as the laws do (GDPR, CPRA, India’s DPDPA… the list keeps growing). That’s why we started Proteccio Data. Not to add more paperwork, but to give businesses a smarter way to stay compliant every day simple dashboards, and zero guesswork. We’re not just building soft For the privacy professionals and business leaders out there, I'd love to hear your thoughts on this. What's the biggest challenge you face with modern data privacy?
8
-
Baker Johnson
ujet.cx • 5K followers
🔐 SOC 2. HIPAA. PCI-DSS. We’ve all seen the acronyms. But behind the compliance slide decks? Some seriously sketchy stuff still happens. 🕳️ A virtual agent mishandling personal health data? → HIPAA violation 🛒 An agent writing down card info on a sticky note? → PCI-DSS breach 💬 Support interactions stored without audit trails? → SOC 2 risk Still asking customers to read their card number out loud? Still emailing PII without secure links? Still relying on screenshots for documentation? It’s wild how often “security” relies on agent memory, sticky notes, or duct tape workarounds. That’s why we built UJET with security at the core — no workarounds, no weird gaps; security built in, not bolted on. From “say your card number slowly” to “we don’t record that part of the chat”… what’s the most questionable security moment you’ve witnessed in CX? Drop your horror stories 👇 (I’ll go first.) #SecurityInCX #CXHorrorStories #ModernSupport #HIPAA #PCI #SOC2
2
-
Aditya Anand
Sentrinus - Endpoint… • 8K followers
DPDP Act isn’t about policies. It’s about proof of consent logs, access trails, encryption, and response readiness. And that’s where most businesses will slip. Not because they don’t care about privacy…but because they assume good intentions = compliance. It doesn’t. India’s new privacy law requires evidence - trackable, auditable, reproducible. If you’re an SMB, these are the bare-minimum systems you need running, not in theory, but in production: 1. Precise data map - not a guess. Track: • Data types (name, email, phone, PAN, address…) • Storage locations (SaaS, drives, cloud buckets) • Retention & purpose for each field If you don’t know where data lives → you can’t secure it. 2. Consent that leaves a trail. • Explicit opt-in (no pre-ticked boxes) • Timestamps stored securely • Versioning of consent terms • Ability to revoke and reflect that in systems Verifiable consent > assumed consent. 3. User rights workflow, not a PDF. • Access/correction/deletion portal or email workflow • Identity verification step • SLA for response time If someone requests their data tomorrow - can you deliver it? 4. Security that’s demonstrable. At minimum: ✔ MFA enforced org-wide ✔ Device storage encryption (Windows BitLocker / macOS FileVault) ✔ Password manager + RBAC ✔ Backups tested monthly ✔ Documented security policy + version-controlled Reasonable security ≠ vibe. It’s configuration + logs. 5. Vendor compliance checks. Look for: • Data Processing Agreement • Breach notification clause • Encryption at rest + in transit If your vendor leaks data - you answer for it. 6. A breach response plan that fits on one page. It must state: • Who investigates • Who contains • Who reports • What happens within the first 6 hours Because “we’ll figure it out” is not an incident plan. Privacy needs to become part of the infrastructure. Real-time, traceable, enforceable!
18
2 Comments -
Alon Gal
Hudson Rock • 20K followers
Mandiant (part of Google Cloud) opens its M-Trends 2025 report with a paragraph discussing Infostealers. Infostealers are mentioned 72 times and are a key focus of the report. I’m glad to see Infostealers being recognized as an industry-wide problem by every major cybersecurity company now. When I first started talking about Infostealers, companies had no idea what they were. M-Trends 2025 report available here - https://lnkd.in/d-kNvuxh
68
4 Comments -
Pat Clawson
CheckRed • 5K followers
Trust is becoming architectural — not just procedural. The RBI’s new “bank.in” mandate is a strong signal that regulators are moving closer to infrastructure-level controls. For financial institutions, this is bigger than a domain change. It’s a shift toward continuous trust validation. Worth the read. 👇
7
-
Archie Jackson
TedSHARK Labs • 33K followers
Hospitals are no longer just places of care. They are digital critical infrastructure. In the latest episode of "Unscripted with Archie Jackson", I had the privilege of hosting Dr sushil meher, Head IT & CISO at AIIMS (All India Institute of Medical Sciences, New Delhi), one of India’s most respected leaders in Health IT, AI-driven healthcare, and medical cybersecurity. This conversation goes far beyond technology. We discuss what happens when AI, robotics, genomics, automation, and cybersecurity come together inside a hospital, where system failure is not an inconvenience, but a risk to human life. A few moments from the conversation: • Cybersecurity in hospitals is not about data. It is about patient safety. • AI is already helping diagnose diseases earlier than humans, but bad data can harm patients. • Robotic labs now run thousands of tests per hour, changing how healthcare scales. • Doctors must remain in control, AI should assist, not replace clinical judgment. • Healthcare data may be one of the most sensitive national assets we possess. Dr. Meher brings three decades of real-world experience, from building paperless, filmless hospitals to securing mission-critical healthcare systems that operate 24x7. If you work in healthcare IT, cybersecurity, AI, data governance, or digital transformation, this episode is essential viewing. 🎧 Watch the full conversation here: https://lnkd.in/gaenQVGd I would love to hear your thoughts, Do you see hospitals today as part of a nation’s critical infrastructure? #AIHealthcare #HealthcareIT #CyberSecurity #DigitalHospital #PatientSafety #MedicalAI #HealthData #DataPrivacy #PrecisionMedicine #CIO #CISO #HealthTech #FutureOfHealthcare #UnscriptedPodcast #ArchieJackson #DrSushilMeher
19
-
Alexandre BLANC Cyber Security
All my content is sponsored :… • 82K followers
Is security enough for data protection ? Or do we need a little more ? ISMS, or information security management systems are designed to protect information, confidentiality, integrity, availability. Now, when using SFTP, the files are perfectly secure from a transfer standpoint, but, what about governance ? Audit capability ? Access control ? That's where the gap is. And yes, having an authentication bringing audit capability is also a factor in data governance. 👉 https://gag.gl/2ZxYDE #cybersecurity Kiteworks #governance #SSH #SFTP
17
5 Comments -
Saurabh Agrawal
Data Security Council of India • 5K followers
⚖️ Cybersecurity vs Business Downtime — The Real Battle Inside Large Captive Corporates In large enterprises, VAPT, patching, and remediation are rarely technical problems. They are business alignment problems. Everyone agrees security is important — until downtime is required. Here’s a practical + innovative way to balance business continuity with cybersecurity urgency, without forcing either side to lose 👇 ⸻ 🔹 1️⃣ Reframe Security Findings in Business Language Stop saying: “Critical vulnerability – CVSS 9.8” Start saying: “This vulnerability can halt invoicing, expose customer data, or stop plant operations.” 👉 Map every critical/high finding to: • Revenue impact • Regulatory exposure • Safety / plant disruption • Brand risk Security risk must be seen as BUSINESS risk, not IT noise. ⸻ 🔹 2️⃣ Risk-Based Remediation Windows (Not One-Size-Fits-All) Instead of blanket SLAs, adopt: • Critical (Internet-facing / Crown jewels): 7–14 days • High: Next planned business downtime • Medium: Quarterly release cycle • Low: Risk-accepted with compensating controls 📌 This gives business predictability without weakening security posture. ⸻ 🔹 3️⃣ “Patch Once, Break Nothing” Strategy Business owners fear post-patch failures, not patches. Best practices: • Maintain golden images • Pre-patch testing in production-like environments • Rollback scripts approved upfront • Change windows aligned with business calendar 👉 When failures reduce, resistance automatically drops. ⸻ 🔹 4️⃣ Cyber Risk Acceptance — With Ownership If downtime is truly impossible: • Formal Risk Acceptance signed by Business Head • Defined expiry date • Mandatory compensating controls (WAF, EDR rules, IPS) 📌 This shifts accountability without confrontation. ⸻ 🔹 5️⃣ Tie Remediation to Governance, Not Fear Effective enterprises link remediation to: • Internal Audit observations • ISO 27001 / SOC / SSAE18 controls • Board-level cyber dashboards • Regulatory readiness (CERT-In, DPDP, sectoral norms) 👉 What audit tracks, business prioritizes. ⸻ 🔹 6️⃣ Make Cyber Downtime Predictable (Not Ad-Hoc) Introduce: • Quarterly Cyber Maintenance Windows • Pre-approved by leadership • Known to all application owners 📌 Predictability beats emergency patching every time. ⸻ 🔹 7️⃣ Leadership-Driven Cyber Mandate The strongest lever: “Cyber remediation is not optional — it is part of business resilience.” When CXOs communicate this clearly, silos disappear. ⸻ 🔹 Final Thought 💡 Cybersecurity is not anti-business. Unpatched systems are. The winning model is: Risk-based security + predictable downtime + shared accountability This is how mature organisations protect both revenue and resilience. ⸻ 📌 Cyber maturity is not about tools — it’s about alignment. PS : Not my thoughts. Found it good, so sharing Cyber Soldiers | CISO Whisperer | CISO FORUM | CISO Global | ETCISO | Intelligent CISO |
20
9 Comments -
David Nosibor
Red Alert Labs • 4K followers
In IT security compliance, we’ve seen the rise of “trust centers”: companies like Vanta or Drata helping SaaS vendors centralize their SOC 2, ISO 27001, HIPAA proofs and make them easily shareable. But what about the world of connected products? A product security evaluation today gives you a report and a potential certificate. You can even go for a self assessment and self declare for #EN18031 and the upcoming #CRA depending on your product specs. To me, that’s like getting a visa for one country or region: it lets you in, but it only covers that one area. What’s missing is the passport. A #CyberPassport would be a single place where manufacturers and component suppliers gather all their product security certifications, evaluations, self-declarations, and even product parameters. In other words: all the cyber visas + the key identity of the product itself. With that, they could prove product trust and reuse it everywhere with buyers, retailers, or regulators. This is the idea I want to explore. Does the CyberPassport resonate with you? Would it solve the problem of scattered proofs and repeated due diligence? #ProductSecurity #DigitalTrust
13
2 Comments -
Katy Nelson
NYU Stern School of Business • 8K followers
Most enterprise breaches today start with compromised identity. Attackers no longer break in — they log in. In today’s threat landscape, identity has become the primary attack surface. Gartner has warned that by 2026, 30% of enterprises will no longer consider traditional identity verification and multi-factor authentication sufficient on their own. AI-driven impersonation and social engineering are outpacing legacy defenses. This isn’t a future concern. It’s an operating reality, now. Deepfakes have moved beyond novelty. They’re being used to impersonate executives, authorize transactions, and gain access to systems — faster and more convincingly than many defenses can reliably detect. For governments and regulated industries, the risk is even higher. At home, I see how early our digital trust models are formed. When my kids want something online, they don’t think about accounts or authentication — a familiar voice is enough. Identity and trust are assumed. That model works… until it doesn’t. In the enterprise and public sector, we’re watching the same assumption fail at scale. AI has fundamentally changed authentication: • Voices can be cloned • Faces can be generated • Even biometric signals once considered strong can be replicated Deepfakes aren’t just fooling people — they’re increasingly bypassing systems designed to verify identity. This feels less like a traditional security issue and more like a foundational risk. If identity can’t be reliably proven, everything built on trust begins to crack. Digital identity has to move beyond convenience. It must be provable, resilient, and designed for an AI-native world — not one where seeing and hearing were enough. (Link to Newsweek article on this topic in comments below) #DigitalIdentity #Trust #Cybersecurity #AI #Authentication #FutureOfSecurity
57
4 Comments -
Murat Guvenc
BeamSec • 28K followers
Expectations for MSPs are shifting. It’s no longer enough to claim security, you need to demonstrate it. · Insurers now require detailed posture data · CISOs expect clean, audit-ready trails · Boards want to see risk translated into ROI BeamSec and ApexaiQ help MSPs meet these evolving demands with: · Real-time insights across people and technology · Unified dashboards for complete visibility and rapid response · Streamlined reporting that can support premium discounts and reduce claims friction This isn’t just another toolset. It’s a strategic advantage for MSPs focused on growth and differentiation. Ready to deliver outcomes, not just overhead? Let’s connect to explore how you can pilot this approach for your clients. #MSSP #MSP #CyberPosture #ApexaiQ #BeamSec #CyberInsurance #InsurTech #Compliance
17
-
Ashish Tandon
Icertis • 5K followers
Every mistake should be learning opportunity Learn about IDOR and other attacks and how to mitigate them in your environment on your OffSec Learn Enterprise or Learn Unlimited subscription https://lnkd.in/dj2d4NRP Or just ask OffSec Knowledge Artificial Intelligence (KAI) OffSec KAI Insecure Direct Object References (IDOR) attacks are a type of access control vulnerability that occurs when an application exposes a reference to an internal implementation object. This allows an attacker to manipulate the reference to access unauthorized data or perform actions they shouldn't be able to. Key Concepts of IDOR Attacks: Direct Object Reference: This refers to a way of accessing objects (like files, database records, etc.) directly through a URL or API endpoint. For example, if a URL contains a user ID, an attacker might change that ID to access another user's data. Lack of Access Control: IDOR vulnerabilities arise when the application does not properly validate whether the user has permission to access the requested object. This can lead to unauthorized data exposure. Exploitation: An attacker can exploit IDOR by simply changing the parameter in the request. For instance, if a user accesses their profile with a URL like example.com/profile?id=123, an attacker might try example.com/profile?id=124 to access another user's profile. Prevention Strategies: Implement Proper Access Controls: Always check if the user has the right permissions to access the requested resource. Use Indirect References: Instead of exposing direct references, use indirect references (like tokens) that map to the actual objects on the server side. Regular Security Testing: Conduct regular security assessments and penetration testing to identify and fix IDOR vulnerabilities. For a deeper understanding of input validation concepts, including IDOR, you can refer to the OffSec module on Accepting User Input. If you're looking to enhance your skills further, consider exploring the OffSec courses related to web application security and penetration testing, such as the Web Application Penetration Testing course. This will provide you with practical skills to identify and exploit various vulnerabilities, including IDOR. #continuouslearning #offsec #oscp #oswe https://lnkd.in/dYW2_-Eu
2
-
Benjamin Hosack
5K followers
When a hacked ecommerce site finds a digital skimmer stealing their customer data, this is the “visible” part of the hack. The symptom of the deeper infection. File Integrity Monitoring (FIM) helps the hacked site quickly find deeper malicious changes. Without this detailed change management and visibility, finding the deeper compromise - the backdoors/webshells - is a bit like hunting for the needle in the haystack. Time consuming, expensive. And hard to know if “you found it all”. ThreatView Advanced Edition puts this forensic level visibility & capability in place for all of our clients. And this helps them to meet PCI requirement 11.5.2. How do you manage/track changes on your website? #ecommerce #cyber #malware
9
-
Mar Hershenson
28K followers
Meet Keygraph from our PearX S25 cohort 🚀 Founder Varun Sivamani saw too many security teams juggling too many tools, from identity management and device management to application security and compliance. This result is complexity and busywork instead of real security. Keygraph is simplifying all of it. It’s an AI-native security and compliance platform that unifies the security stack around the identity and device graph. Excited to see Varun build the single platform for compliance, identity, device management, and compliance.
43
6 Comments -
Parthasarathi Chakraborty
Broadridge • 4K followers
Battleground SSE(Secure Service Edge) is an interesting dilemma for enterprise security teams. Confused after attending marketing sessions from our friends at Zscaler, Palo Alto or Netskope? You are not alone 😄. Here is my take and will be curious to get thoughts from fellow practitioners. Proxy-Based SSE(Zscaler/Netskope) is best for securing SaaS, web apps, and remote users. Easy to deploy, delivers fast performance via global PoPs, and excels at browser-based Zero Trust — but offers limited visibility into non-web and internal traffic. NGFW-Based SSE (Palo Alto) is ideal for hybrid environments with complex protocols and internal segmentation. Offers full L3–L7 traffic inspection, strong east-west visibility, and seamless SD-WAN integration — but may require more tuning and can add performance overhead. Performance-wise: Proxy SSE is faster for web. NGFW SSE gives deeper control across all traffic, but might trade off some speed. Should we go with Proxy SSE when speed, SaaS, and simplicity matter most or NGFW SSE when your architecture needs deep visibility, hybrid support, and tighter control? No one-size-fits-all. Curious to get more viewpoints. #SSEBattle #ProxyVsFirewall #SecureServiceEdge #SSEArchitecture #ZeroTrustSecurity
6
-
Vida Vidyangi Patil
Ctrl Alt Podcast with Vida… • 12K followers
New Podcast Alert! With #DataPioneer Nishant Doshi "80% of data theft happens in small snippets... and you can't see it." Traditional data loss prevention (DLP) is officially a #legacy solution. If you’re still trying to protect data by looking at snapshots, you’re already behind the breach. In our latest episode of Ctrl Alt Podcast with Vida Patil, I sit down with Nishant Doshi, CEO of the $1B unicorn Cyberhaven, to discuss the shift from "protecting data" to "protecting knowledge. Listen to the full podcast episode with Nishant Doshi https://lnkd.in/gj-EQjxe Most founders dream of one successful exit. Nishant Doshi has clocked two, and he’s currently scaling his third - a unicorn that grew its valuation 7x in just 12 months. Nishant’s track record is a masterclass in Silicon Valley timing: The Discovery: Uncovering the OAuth leak affecting 100k apps. The Exits: Two successful acquisitions by Palo Alto Networks and Harness. The Mission: Building the "Google Maps for Data" through Data Lineage. In the podcast he shares about working with legends like Jyoti Bansal at Harness, Varun Badhwar [currently CEO Endor Labs], Nir Z., Lee Klarich at Palo Alto Networks, and much more about what it takes to sell great technology. We have also touched upon the context graph related predictions and the paper by Jaya Gupta and Ashu Garg of Foundation Capital https://lnkd.in/girs_NgQ . The "API Economy" Prophecy: Why predicting tech shifts 15 years early is the only way to build a moat. Beyond the Perimeter: Why your most productive employees are often your biggest unintentional "Insider Risks" when using ChatGPT and Claude. The Pitch Playbook: The 4 specific secrets Nishant used to scale Cyberhaven’s valuation 7x in just 12 months. Listen to Nishant's pioneering work in #datalineage: If you are a C-Suite executive or a founder, this isn't just about security - it’s about the strategic narrative of how your company’s "crown jewels" move in an AI-driven world. It was great working with you Samantha Rotbart Erik B. Cameron Galbraith on this project #Cybersecurity #DataLineage #VentureCapital #GenerativeAI #Leadership #SiliconValley #CtrlAltPodcast
58
6 Comments -
Viveik Kumar "Build a Robust InfoSec Tech Team"
Sovvren • 6K followers
McDonald’s “hack” story is being framed around 861GB and screenshots. That’s noise. The contrarian takeaway for CIOs and CISOs in India and GCC: most ransomware wins are not “advanced”. They are supply chain and identity failures across franchise ops, vendors, and the shadow IT that runs day to day. Even in this case, the claim surfaced on Jan 20, 2026 and is still not publicly confirmed by McDonald’s India, but the pattern is repeatable across brands. Framework: Seam Map in 60 minutes 1. List top 10 third parties touching customer or store data 2. For each: admin portals, SSO trusts, remote access, exposed APIs 3. Enforce MFA for every privileged path, kill shared creds, log all admin actions 4. Run a restore drill for one crown jewel app in 7 days If you had to bet today, which vendor seam will break first in your environment? #CyberSecurity #Ransomware #ThirdPartyRisk #IdentitySecurity #CISO #CIO #India #GCC #IncidentResponse #SecurityOperations
5
1 Comment
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top contentAdd new skills with these courses
-
3h 39m
Machine Learning for Red Team Hackers by Infosec
-
13m
A Standalone Project: Build a Program to Encrypt and Decrypt Text Messages Using an Encryption Algorithm to Protect Data from Unauthorized Access
-
2h 3m
Threat Hunting Deep Dive: Intelligence-Based Detection and Response Strategies