Skip to main content
Top 9 women in cyber security in India


The gender gap and in the field of cybersecurity has been a chronic problem for a long time. The idea of diversity incorporates acceptance and regard. It implies understanding that every individual is one of a kind, thus perceiving our individual differences. Inclusion on the other hand is the degree to which different voices of a diverse workforce are respected and heard. It is the environment in which an employee perceives that he or she is an esteemed member of the work group through experiencing treatment that satisfies his or her needs for belongingness and uniqueness.  The two aspects need to work hand-in-hand to imbibe new ideas and innovation amongst the employees.

It is required today that every organization in the industry encourage females to work in this sector by creating role-models and mentorship programs like the initiatives of companies like Google, IBM, and Facebook. National Initiative for Cybersecurity Career and Studies (NICCS) wrote, “Diversity encourages a culture where divergent opinions can be brought together to develop innovative solutions to solve some of the toughest problems our nation faces today.”
various sectors based out of India:


Advocate Puneet Bhasin
Specialising in Technology laws, Blockchain Laws, Cyber Crime Cases, GDPR Legal Compliance, Artificial Intelligence & IoT Laws, E-commerce Laws, Fintech Laws , Smart City Laws, Digital Healthcare Laws and its application in the Indian scenario and in the International perspective, Puneet is a pioneer in Cyber Laws in India and has been awarded as the Best Cyber Lawyer. She is one of the firsts in India to conduct Information Technology Law Compliance Audits. She is an advisor and consultant for Information Technology Law compliance and Data theft cases in leading Indian Companies along with drafting the Privacy Policies, Terms & Conditions, etc. for E-Commerce Companies, major Nationalised banks and regularly assists them in being compliant with Cyber laws. With a postgraduate degree in Cyber Laws and studies Cyber Security Risk mitigation from Harvard University, she is constantly evangelising in the field of cybersecurity for corporates and school children as well. In addition to the above, Puneet also assists the Rajya Sabha Committee on reforms in Cyber Pornography Laws in India and is also a member of the Cyber Security Task Force Working Group on Skills and Policy Development for the Digital India Movement, an initiative by Data Security Council of with NASSCOM.


Satyavati Divadhari
Satyavathi Divadari is working as Director – Cyber Security at Cognizant Technology Solutions . Prior to that, she worked in Wells Fargo, Capgemini, IBM and Tata Communications Ltd.
Satya is an information security leader with more than 20 years of experience in Banking, Telecom and IT/ITES industries.  She has formulated and led the execution of strategic enterprise wide transformations and improved security posture with higher return of investment. A distinguished information security professional with expertise in Cloud Security, Cyber Security, Application Security, Enterprise Security Architecture, Third Party Security, Network Security, Risk Management and Data Privacy, Satya holds variety of certifications, key ones to quote are: AWS Cloud Solution Architect Associate, CFE, CIPT, TOGAF, PMP and CISSP*. She constantly evangelises on cybersecurity and is a noted speaker in national and international forums and an innovator with paper pending for patent.


Vandana Verma
Vandana Verma is a Security Solution Architect at IBM, India with over 12 years of experience specializing in application, Infrastructure/network, Mobile and Cloud security domain which includes manual and automated code review, vulnerability assessment, pentesting and remediation support.
Vandana comes from strong application security background and has been working on Cloud Security, Application security, Vulnerability assessment, secure code review, threat profiling and remediation support for web/client server applications on different technologies based on Secure Design/Development guidelines and OWASP standards/guidelines. She is part of security communities such as Volunteer Coordinator – Asia Pacific for OWASP Women in Appsec (WIA) & OWASP WIA Secretary, OWASP Chapter Leader and Heading InfoSecGirls.
She has given talks and workshops at many colleges and security conferences including AppSec Europe, AppSec USA, BSides Delhi, NullCon and cocon.


Kalpana Maniar
President and CIO at Edelweiss Financial Services Ltd., Kalpana is a senior professional with over 20 years experience in financial securities industry with an ability to envision, lead and implement strategic business initiatives. Result oriented strategic thinker with leadership and communication skills, natural team builder and hands-on team leader with a consistent track record of corporate goal achievement she has demonstrated ability to build business on a global scale.  Kalpana with her proven skills in analysis of Securities Market Domain & Systems from Operational, Techno- Functional and Regulatory perspective has recognised achievements in new products launch and Project Management of multi-disciplinary functional and technical Projects teams.
Kalpana is a great example and an able leader in this sphere.


Dr. Puneet Kaur Kohli
Puneet, an IT Leader with 22 years of global experience having extensive knowledge on developing and implementing strategic plans and end user services by addressing company needs and promotion of growth. She has worked with leading companies like Motorola, Reliance, Duncans, Carrier Aircon, UK Land Investments, Bharti Airtel Limited, Soma Networks and Motoricity (AT&T) across the globe and in countries namely, Dubai, US, UK, Canada & across APAC especially on projects, and thus brings in table a symbiotic association of various corporate and international culture in the technology sphere. Her role at Mannapuram Finance Limited involves creation of strategic IT annual and long term roadmap with focus towards generating new revenue streams through innovation and intelligence. She is a striking example of a leading lady in the technology sphere.


Dr. Lopa Mudraa Basuu  
Lopa Mudraa, a leading Security Evangelist with 17+ years of rich, versatile experience in Information Security, Data Privacy, Risk Management & Governance with a proven performance record of delivering value as business enabler by transforming Security & Privacy to business USP thereby boosting the business confidence by providing secure platform to operate & explore new avenues of revenue generation to achieve intended business goal safely. She also authors articles and is a regular speaker & panelist in the professional public domain on the same.
Adding to her technical & domain skills, she has expertise in – Diverse, Multicultural Global Team Building, Talent Management & Motivation to Deliver Under pressure, Strong Networking, Client, Stakeholders & Partner Relationship Management, Contract Management, Vendor Negotiation & Management, Business RFP & Pre-sales, Functional Budgeting.  She has been honored with top 100 CISO Award, Infosec Maestro Award and C|CISO Of The Year Awards.


Priya James  
Priya is presently working with GBHackers, an Advanced Persistent Cyber Security Online platform which includes CyberSecurity Research, Web Application and Network Penetration Testing, Hacking Tutorials, Live Security Updates  and Security Investigations.
Experienced with analyzing cyber threats, providing incident response and malware analysis, creating high fidelity IOCs, conducting forensic investigations, pentesting, vulnerability assessment, Priya’s specialities include Malware Analysis, Security,Web application and network pentesting, Virtualization, Antivirus, WAF, IPS/IDS, Troubleshooting, Network Administration and she has experience in security assessment of online banking, Payment Gateway (PCI-DSS compliance) and stock trading systems.
Priya is one of the role models among the white hat security researchers and a lady.




Harmeen Mehta
Harmeen Mehta, the Global CIO of Bharti Airtel is responsible for providing the overall strategy and leadership to the IT and Engineering function. Harmeen Mehta started her career as a consultant with British Airways and Qantas. With a diverse experience in various continents and companies like HSBC London, Merrill Lynch India Technology Services, which later on merged with Bank of America and BBVA she is a great example of a women in the technology sphere leading large scale business transformation projects across Europe, US and Latin America.
She has successfully worked globally across locations such as UK, US, Germany, Spain, Hong Kong, Singapore, Japan, Australia, India and Spain and consistently works and speaks for diversity in the technology sphere.


Shalini Sriram
An experienced sales leader of 14+ years, Shalini is the Security Sales Specialists for IBM. Shalini is someone, who consistently drives teams to over-achieve and exceed their goals/objectives, and their numbers. With a proven track record in leading high performance sales teams to drive revenue and market share growth in complex technology sales, Shalini is an apt example of Women in Cybersecurity at large.

Comments

  1. πŸ‘πŸΌπŸ‘πŸΌ

    ReplyDelete
  2. Title of this blog is Saying everything top 9 women in India represent Women empowerment and Showing that women are doing good in every sector.

    ReplyDelete
  3. THIS SHOW HOW WOMEN ARE WORKING AMAZING IN TECHNOLOGICAL FIELD TOO.. IT HIGHLY SHOW WOMEN EMPOWERMENT.. AMAZING WORK

    ReplyDelete

Post a Comment

Popular posts from this blog

TOP 10 CYBERSECURITY COURSES IN INDIA 1. Master Certificate in Cyber Security (Red Team) – Jigsaw Academy with HackerU Jigsaw_Cyber-Securit Jigsaw Academy is a global award-winning training provider headquartered in Bengaluru, India. Founded by the duo of Gaurav Vohra and Sarita Digumarti, Jigsaw Academy has been instrumental in shaping the careers of over 50,000 learners in 30+ countries by helping them build a successful career in emerging technologies with specialised industry oriented courses. The domain experts and educators at Jigsaw Academy offer meticulously structured courses with industry-relevant curricula. Jigsaw Academy trains professionals in the areas of analytics, data science, big data, machine learning, business analytics, and more recently, cybersecurity and cloud computing. W3Schools Flagship Cybersecurity Program: Jigsaw Academy’s Master Certificate in Cyber Security (Red Team) in association with HackerU Duration Of The Program: 600 Hours (20 Hours of
Ways to secure yourself from cyber crime  1) Education - Hackers aren’t the only ones who can gain power from information. By educating yourself about the types of scams that exist on the Internet and how to avert them, you are putting yourself one step ahead of the cybercriminals. Since phishing is prevalent, read up on the latest phishing scams and learn how to recognize a phishing attempt. Remember, phishing is when hackers attempt to lure you into revealing personal information by pretending to be a legitimate organization or person. These scams often play off major new stories, so keep informed on the latest news-related scams. 2) Use a firewall - Firewalls monitor traffic between your computer or network and the Internet and serve as a great first line of defense when it comes to keeping intruders out. Make sure to use the firewall that comes with your security software. And if you have a home wireless network, enable the firewall that comes with your router. 3) Cli
Who are cyber criminals and why do they do it?  We talk a great length about cyber crime. From trends in phishing to exploits to cyber security threats and so much in between. But we don’t often think about who is committing the cyber crime and what motivates them. The motivations for cyber criminals can be quite simple. The two that make up the huge majority are money and information. According to a Verizon Enterprise report, financial and espionage-driven motivation make up a full 93% of motivation for attacks. Aside from that, the less-frequent but broader set of motives is often categorized as  “FIG” (Fun, Ideology, and Grudges). The core motives can vary depending on what the cyber criminal is after, whether they are executing the attacks of their own initiative or if they’ve been contracted to do so, and who might benefit in what way from a successful cyber crime. This variety can be illustrated as follows: Money This can be the motive for many types of attacks,