• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    France claims 'foreign interference' in ferry malware case

    France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    CVE-2025-20393

    Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

    Askul cyberattack

    Askul Restarts Logistics as Ransomware Attack Exposes 740,000 Records

    French Interior Ministry cyberattack

    France Arrests 22-Year-Old Suspect in Ministry of the Interior Cyberattack

    KT Cyberattack

    State-Level Cyber Espionage Suspected in KT Telecom Breach

    DPDP rules

    How DPDP Rules Are Quietly Reducing Deepfake and Synthetic Identity Risks

    PDVSA cyberattack

    PDVSA Cyberattack Disrupts Administrative Systems, Oil Cargo Deliveries Suspended

    Cyber AI Profile

    NIST Releases Draft AI Cybersecurity Guidance to Address Risks of Enterprise AI Adoption

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    Digital Arrest, CBI, Digital Arrest Fraud, Cyber Fraud

    CBI Files Charges Against 13 in Digital Arrest Fraud Case Linked to Myanmar Cyber Slave Compounds

    Government Contractor Fraud

    Federal Grand Jury Charges Former Manager with Government Contractor Fraud

    ban on social media

    Australia’s Social Media Ban for Kids: Protection, Overreach or the Start of a Global Shift?

    CBI, Cyber Fraud Network, Chakra-V, Operation Chakra, Covid-19, Fraud

    CBI Files Chargesheet Against 30 Including Two Chinese Nationals in ₹1,000 Cr Cyber Fraud Network

    React2Shell, China

    ‘React2Shell’ Flaw Exploited by China-Nexus Groups Within Hours of Disclosure, AWS Warns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    Vinomofo, Privacy Commissioner

    Vinomofo Failed to Protect Customer Data, Australian Privacy Commissioner Rules

    Andrew Morton, Third-Party Risk Management, third-party risk management, TPRM best practices, vendor risk management, ISO 27001 auditor, SOC 2 validation, vendor tiering strategy, fourth-party risk visibility, risk-based vendor assessment, TPRM metrics, vendor onboarding process, sub-processor management, DPA clauses, adaptive questionnaires, vendor security assessment, GRC automation, supply chain risk management, procurement security alignment, independent assurance reports, vendor control validation, critical vendor management, TPRM stakeholder engagement, security questionnaire alternatives, vendor posture scanning, risk classification criteria, TPRM scalability

    From Spreadsheets to Strategic Defense: Andrew Morton Walks Us Through TPRM Transformation

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    France claims 'foreign interference' in ferry malware case

    France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    CVE-2025-20393

    Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

    Askul cyberattack

    Askul Restarts Logistics as Ransomware Attack Exposes 740,000 Records

    French Interior Ministry cyberattack

    France Arrests 22-Year-Old Suspect in Ministry of the Interior Cyberattack

    KT Cyberattack

    State-Level Cyber Espionage Suspected in KT Telecom Breach

    DPDP rules

    How DPDP Rules Are Quietly Reducing Deepfake and Synthetic Identity Risks

    PDVSA cyberattack

    PDVSA Cyberattack Disrupts Administrative Systems, Oil Cargo Deliveries Suspended

    Cyber AI Profile

    NIST Releases Draft AI Cybersecurity Guidance to Address Risks of Enterprise AI Adoption

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    FBI Seizes E-Note Crypto Exchange

    FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

    DPDP Act

    8 Ways the DPDP Act Will Change How Indian Companies Handle Data in 2026 

    FBI Warns

    FBI Cautions Alaskans Against Phone Scams Using Fake Arrest Threats

    City of Cambridge

    City of Cambridge Advises Password Reset After Nationwide CodeRED Data Breach

    Digital Arrest, CBI, Digital Arrest Fraud, Cyber Fraud

    CBI Files Charges Against 13 in Digital Arrest Fraud Case Linked to Myanmar Cyber Slave Compounds

    Government Contractor Fraud

    Federal Grand Jury Charges Former Manager with Government Contractor Fraud

    ban on social media

    Australia’s Social Media Ban for Kids: Protection, Overreach or the Start of a Global Shift?

    CBI, Cyber Fraud Network, Chakra-V, Operation Chakra, Covid-19, Fraud

    CBI Files Chargesheet Against 30 Including Two Chinese Nationals in ₹1,000 Cr Cyber Fraud Network

    React2Shell, China

    ‘React2Shell’ Flaw Exploited by China-Nexus Groups Within Hours of Disclosure, AWS Warns

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    NYT, ChatGPT, The New York Times, Voice Mode, OpenAI Voice Mode

    OpenAI Battles Court Order to Indefinitely Retain User Chat Data in NYT Copyright Dispute

    Telegram Bots, HTML phishing attack, Telegram bot credential theft, self-contained phishing malware, JavaScript credential harvesting, email security bypass techniques, RFQ phishing scams, invoice phishing attacks, Adobe login phishing, Microsoft credential theft, FedEx phishing campaign, DHL impersonation attack, Central Europe phishing 2025, Eastern Europe cyber threats, Cyble threat intelligence, CryptoJS AES obfuscation, anti-forensics phishing, F12 developer tools blocking, Telegram Bot API abuse, api.telegram.org malicious traffic, credential phishing 2025, HTML attachment malware, business email compromise, targeted phishing campaign, Czech Republic cyber threats, Slovakia phishing attacks, Hungary cybersecurity threats, Germany phishing campaign, Telekom Deutschland phishing, manufacturing sector attacks, automotive industry phishing, government agency phishing, energy utility cyber threats, telecommunications phishing, professional services attacks, garclogtools_bot, v8one_bot, dollsman_bot, dual-capture credential theft, fake login error messages, IP address harvesting, api.ipify.org abuse, ip-api.com malicious use, YARA phishing detection, phishing IOCs 2025, HTML file security risks, RFC-compliant filename spoofing, blurred document phishing, modal login phishing, brand impersonation attacks, CryptoJS malware obfuscation, right-click blocking malware, keyboard shortcut interception, multi-stage credential theft, decentralized phishing infrastructure, phishing toolkit generators, modular phishing templates, German language phishing, Spanish phishing variants

    Cyble Detects Phishing Campaign Using Telegram Bots to Siphon Corporate Credentials

    Vinomofo, Privacy Commissioner

    Vinomofo Failed to Protect Customer Data, Australian Privacy Commissioner Rules

    Andrew Morton, Third-Party Risk Management, third-party risk management, TPRM best practices, vendor risk management, ISO 27001 auditor, SOC 2 validation, vendor tiering strategy, fourth-party risk visibility, risk-based vendor assessment, TPRM metrics, vendor onboarding process, sub-processor management, DPA clauses, adaptive questionnaires, vendor security assessment, GRC automation, supply chain risk management, procurement security alignment, independent assurance reports, vendor control validation, critical vendor management, TPRM stakeholder engagement, security questionnaire alternatives, vendor posture scanning, risk classification criteria, TPRM scalability

    From Spreadsheets to Strategic Defense: Andrew Morton Walks Us Through TPRM Transformation

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Celebrating Republic Day: Honoring Top 26 Indian CISOs and Their Pioneering Cybersecurity Leadership

These 26 Indian Chief Information Security Officers (CISOs) stand as visionary leaders, diligently shaping the future of digital defense.

Ashish Khaitan by Ashish Khaitan
March 15, 2024
in Features, Firewall Daily
0
Indian CISOs
1.1k
SHARES
5.8k
VIEWS
Share on LinkedInShare on Twitter

In an era where cybersecurity has become an integral part of organizations, the role of Chief Information Security Officers (CISOs) has become pivotal to protect organizations against cyberattacks and data breaches.

India, a hub of technological innovation, boasts a cadre of exceptional leaders at the forefront of cyber defenses. As India celebrates its Republic Day today, it’s an opportune moment to honor the Top 26 Indian CISOs in cybersecurity, acknowledging their pivotal role in fortifying the nation’s digital infrastructure.

Their expertise in safeguarding digital frontiers is crucial for national security and technological progress, reflecting the resilience and innovation that this day symbolizes.

From seasoned veterans to visionary leaders shaping the future, this article unveils the diverse expertise and accomplishments of these CISOs, offering insights into their journeys, strategies, and the critical role they play in securing our digital future. Their work exemplifies the spirit of innovation and vigilance, mirroring the values of Republic Day in the context of our digital era.

Top 26 Indian CISOs to Watch Out in 2024

At the forefront of the cyber threats, these 26 Indian Chief Information Security Officers (CISOs) stand as visionary leaders, diligently shaping the future of digital defense with their unparalleled expertise and innovative approaches, showcasing an unwavering commitment to safeguarding organizations in an era of dynamic technological challenges.

Ashish Khanna, Global CISO and Head IT at Evalueserve

Ashish Khanna, Global CISO and Head IT at Evalueserve

Ashish Khanna, Global CISO at Evalueserve, boasts 20 years of diverse experience and global recognition, including “CISO 100 and Top Influencer” in 2022. A strategic leader, he excels in IT operations, security, and compliance, managing initiatives across 32 locations. Recognized for his managerial potential and workplace competencies, Ashish’s awards and committee roles highlight his impact in the industry.

report-ad-banner

Subhajit Deb, CISO & Head at Envoy Global Inc.

Subhajit Deb, CISO & Head at Envoy Global Inc.

Subhajit Deb, CISO & Head at Envoy Global Inc., is a cybersecurity leader with over two decades of experience. Specializing in enterprise cybersecurity and regulatory compliance, he has led global teams, creating agile and cost-conscious security programs.

With certifications like CISM and CRISC, Subhajit holds US Patents and Trade Secrets. Recognized with industry awards, including Top 100 CISOs, he serves on advisory boards, mentors startups, and is a regular speaker at conferences.

Subhajit’s expertise spans CISO leadership, GDPR, Risk Management, Business Continuity, and Six Sigma methodologies, contributing to key cyber risk reduction at Envoy Global Inc.

Vikas M, Vice President & CISO at American Red Cross

Vikas M is the Vice President & Chief Information Security Officer (CISO) at the American Red Cross, bringing extensive experience as an IT leader and certified security professional. Vikas is adept at integrating innovation, operations, security, and strategy to address business challenges.

His proficiency in managing teams and consulting is highlighted by the ability to influence, encourage, and lead towards successful outcomes. An accomplished speaker, presenter, and writer, Vikas specializes in security, identity management, IT strategy & planning, cloud computing, vendor management, and ERP. With a CISSP certification, he is dedicated to ensuring robust information security at the American Red Cross.

Vikram Dhanda, CISO at Virtusa

Vikram Dhanda, CISO at Virtusa

Vikram Dhanda, CISO at Virtusa, is a veteran cybersecurity leader with hands-on expertise in IT/ITeS, MRO, and telecom domains. With a track record of transforming IT Shared Services into a profit center, managing real-time telecom applications for a massive subscriber base, and leading large IT operations teams, Vikram excels in delivering business outcomes and maintaining robust security postures.

Over two decades, he has demonstrated lateral synthesis, ingenuity, and operational excellence, emphasizing problem elimination and continual process refinement.

Rishi Mehta, SVP & CISO at HCLTech

Rishi Mehta, SVP & CISO at HCLTech

Meet Rishi Mehta is the Senior Vice President and Chief Information Security Officer (CISO) at HCLTech. With a philosophy centered around simplicity, Rishi leads the security transformation journey, emphasizing full-stack engineering capabilities and innovation. His approach focuses on balancing cybersecurity with user experience for both internal and external customers.

Motivated by continual improvement, openness to change, and meaningful connections, Rishi brings a dynamic perspective to information security leadership. His commitment to simplicity has enabled him and his teams to find practical and user-friendly solutions, making a significant impact on the cybersecurity landscape at HCLTech.

Aman Raheja, CISO at Humana Indian CISOs to Watch Out in 2024

Aman Raheja, CISO at Humana, brings over two decades of security and technology expertise. Starting as a software developer and progressing through roles like Level-2 IT support and penetration testing, Aman’s diverse background culminated in leadership positions. 

He has successfully led enterprise-scale security strategies, collaborating with business and IT leaders, regulators, and boards to effectively manage security risks. Aman’s journey reflects his commitment to continuous learning and leadership in the dynamic field of cybersecurity.

Mathan Babu Kasilingam, CISO at Vodafone Idea Limited

Mathan Babu Kasilingam, CISO at Vodafone Idea Limited

Mathan Babu Kasilingam, a cybersecurity veteran with 20+ years, is the Chief Technology Security Officer & Data Privacy Officer at Vi Ltd. Recognized for industry contributions, he’s received awards like the CSO 100 and Security Leader of the Year.

From system integration to OEM leadership, Mathan has navigated diverse roles. Known for coining ESSB (now SOAR) and serving as guest faculty at top institutions, his impact spans safeguarding banks, payment systems, and telcos.

A dedicated team builder, Mathan ensures security is a critical differentiator. His journey reflects growth, innovation, and a commitment to creating a safer world.

Jagdish Asodekar, CISO at WhiteOak Capital Asset Management Ltd.

Jagdish Asodekar, CISO at WhiteOak Capital Asset Management Ltd.

Jagdish Asodekar, VP & CISO at WhiteOak Capital Asset Management Ltd., is a seasoned cybersecurity professional with over a decade of experience. His expertise spans information security, IT risk management, and cybersecurity operations.

Jagdish has held prominent roles as CISO at Metropolitan Stock Exchange and Multi Commodity Exchange of India, excelling in regulatory compliance and cybersecurity tools implementation. With a background in managing IT services at Financial Technologies, he brings a wealth of experience to his current role. Jagdish holds certifications, including ITIL Foundation, showcasing his commitment to professional development.

Ramesh Kumar, CISO at Biocon Group of Companies

Ramesh Kumar is the CISO at Biocon Group of Companies and is a seasoned IT professional with over 20 years of experience. Ramesh has demonstrated expertise in driving initiatives across IT & ICS Security, IT Operation & Business Support, and Enterprise IT Architecture. His focus extends to Information Security Risk Management, Managed Security Services, Information Security Policy & Governance, and DR & Business Continuity planning.

In his role, Ramesh is accountable for the integrated IT-OT Cyber Security Posture for utility businesses. He collaborates extensively with Group Cyber Security to implement mature cybersecurity across various business units of Adani Enterprises. Additionally, he plays an active role as a member of the Enterprise Architecture Review Board and Change Advisory Board, contributing to the strategic decisions of the organization.

Sunil Seshadri, CISO at Wells Fargo

Sunil Seshadri, CISO at Wells Fargo

Sunil Seshadri, CISO at Wells Fargo, brings over 20 years of cybersecurity leadership. With a proven track record, he excels in designing and operating large-scale security platforms, particularly in the financial sector.

Beyond his operational prowess, Sunil actively engages with the industry as an advisory board member, conference speaker, and contributor. In summary, Sunil Seshadri is a seasoned professional focused on strategy, technology risk management, and cyber defense at Wells Fargo.

Ravi Mani, CISO at Quest Diagnostics

Ravi Mani, CISO at Quest Diagnostics

Ravi Mani, the Chief Information Security Officer (CISO) at Quest Diagnostics, is a distinguished leader in information technology and services. With a strong background in cybersecurity, cloud, AI, and IT strategy, Ravi is recognized globally. He’s not only a key figure at Quest Diagnostics but also serves on advisory boards for various cybersecurity and technology companies. 

Ravi’s accolades include the 2022 Top Global CISO’s in the World award from Cyber Defense Magazine and being selected among the TOP 100 CISOs by CISOs Connect in 2023. Mani brings exceptional expertise and recognition to his role at Quest Diagnostics.

Gurdeep Kaur, Managing Director & CISO at PSEG

Gurdeep Kaur, Managing Director & CISO at PSEG

Gurdeep Kaur, Managing Director & CISO at PSEG, is a seasoned cybersecurity leader with 20 years of experience. Recognized for enabling innovation while mitigating security risks, Gurdeep excels in strategic planning, industry-standard security architecture, and audit management. 

A trusted partner with a clear communication style, she is also the co-founder of StepUpSkill and an active member of the (ISC)2 New Jersey chapter. Gurdeep is driving cybersecurity excellence at PSEG and beyond.

Medha Bhalodkar, CISO at Columbia University

Medha Bhalodkar, CISO at Columbia University

Medha Bhalodkar is the Chief Information Security Officer at Columbia University, where she leads teams overseeing IT policies, data protection, cybersecurity, and enterprise IT risk management. 

With nearly two decades in the financial industry, Medha has received prestigious awards, including the 2020 Wasserman Award and the 2022 Top Global CISO by Cyber Defense Magazine. 

At Columbia, she chairs the IT Security Council, co-chairs the IT Leadership Council, and is involved in various governance roles. Holding multiple security certifications, Medha is not only a trailblazer in information security but also actively mentors women in technology. 

Priya Sirwani, CISO at Fiera Capital

Priya Sirwani, CISO at Fiera Capital

Priya Sirwani, CISO at Fiera Capital, is a seasoned cybersecurity and IT risk executive renowned for transforming global enterprise security programs. Known for her risk-based approach, Priya delivers pragmatic strategies, reducing business risk and fostering a culture of creativity and high engagement within her teams. 

With expertise in cybersecurity, information risk management, data privacy, and fraud, she actively contributes to the Toronto CISO community. Priya is a dynamic leader championing security and risk at Fiera Capital, emphasizing continuous learning and high standards of personal integrity and work ethics.

Sujeet Bambawale, CISO at 7-Eleven

Sujeet Bambawale, CISO at 7-Eleven

Sujeet Bambawale is the Chief Information Security Officer at 7-Eleven, leading a customer-obsessed Information Security organization. With a rich background at Symantec, NetApp, and Intuit, Sujeet focuses on maturing 7-Eleven’s security posture through strategic execution and cross-organizational relationship building. 

Certified as a C|CISO, CISM, and CGEIT, he holds a master’s degree in electronics engineering and has studied organizational leadership at UC Berkeley’s Haas Business School.

Outside his role, Sujeet actively supports the security community through non-profit contributions, mentorship, and executive sponsorship for initiatives like Women in Technology and online safety programs for youth.

Rajendra Bhalerao, CISO at Scotiabank

Rajendra Bhalerao, CISO at Scotiabank 

Rajendra Bhalerao is the Chief Information Security Officer (CISO) at Scotiabank. With a postgraduate degree from Mumbai University and CISM certification, Rajendra brings over two decades of experience in banking, consulting, telecom, ISP, and data center environments.

Specializing in BCP/DRP consulting, vulnerability testing, and data center management, he holds certifications in ISO27001, ITILv3, RedhatLinux, and CCNA. Rajendra’s expertise ensures robust information security measures at Scotiabank, making him an invaluable asset to the organization.

Niju Mohan Kumbalaparambil, CISO at SBM Bank Niju Mohan Kumbalaparambil, CISO at SBM Bank

Niju Mohan Kumbalaparambil is the Chief Information Security Officer at SBM Bank (India), a prominent banking and BFSI company under Sbmgroup.mu. With headquarters in Port Louis, SBM Bank operates with 501 employees and was founded in 1973. In his role as CISO, Niju Mohan Kumbalaparambil plays a crucial role in safeguarding the information security of SBM Bank, contributing to the organization’s continued success and reliability.

Ravinder Arora, CISO at Infogain

Ravinder Arora, CISO at Infogain 

Ravinder Arora is the Vice President and Global Chief Information Security Officer (CISO) at Infogain, with 20 years of expertise in Global Cyber Security Program Management. Renowned for his insightful excellence, Ravinder has successfully implemented and managed SOC, utilizing diverse cybersecurity tools such as DLP, SIEM, WAF, and more. 

His certifications include CRISC, CISM, ISO 27001 Lead Auditor, ITIL V.3, and others. At Infogain, Ravinder leads information and cyber security initiatives, ensuring the highest standards of protection and compliance across various domains.

Kumar Ravi, CISO at Teleperformance

Kumar Ravi, CISO at Teleperformance

Kumar Ravi, the Chief Information Security Officer (CISO) at Teleperformance, brings over 22 years of leadership, consulting, and implementation experience in Information & Cyber Security, Data Privacy, and Risk & Compliance. In his current role, Kumar leads Teleperformance’s Information Security and Cyber Security strategy, as well as the Business Continuity Management program. 

With a diverse background in IT/ITeS, BPM, and insurance organizations, he has a wealth of experience in global enterprise-wide strategy, risk management, and cyber defense. Kumar is a certified CISSP, CISA, CISM, CRISC, CEH, DCPLA, ISO 27001LA, CCNP, CCNA, and MCSE.

Ankush Chowdhary, Vice President & CISO at Hewlett Packard Enterprise

Ankush Chowdhary, Vice President & CISO at Hewlett Packard Enterprise

Ankush Chowdhary is the Vice President & CISO at Hewlett Packard Enterprise, bringing 20+ years of cybersecurity leadership. Leading the cloud security transformation for HPE GreenLake Cloud Platform, Ankush’s expertise spans roles at Google, Microsoft, and AWS, covering engineering, advisory, strategy, and compliance. 

Certified as a CISO with credentials from Google, AWS, and Microsoft, Ankush is a recognized author and speaker. His mission is to guide organizations to secure and compliant cloud environments with cutting-edge technologies. 

Ratan Jyoti, CISO Ujjivan Small Finance Bank Limited

Ratan Jyoti, CISO Ujjivan Small Finance Bank Limited

Ratan Jyoti, CISO at Ujjivan Small Finance Bank Limited, brings over 22 years of financial sector experience, overseeing enterprise security for 20+ departments and 16000+ employees. Known for developing robust security frameworks and leveraging next-gen technologies, Ratan is a tech influencer, cybercrime investigator, and published author. His mission is to drive digital innovation and security, delivering value to stakeholders and enhancing the information security workforce.

Parimala Rao, Deputy CISO at GSA

Parimala Rao, Deputy CISO at GSA

Parimala Rao, Deputy CISO at GSA, is an award-winning cybersecurity professional with Stanford and MIT certifications. With a focus on driving cybersecurity and technology efforts, she excels in large-scale applications, vendor management, and big data analytics.

Parimala specializes in protecting core systems and confidential data. As a dynamic leader, she contributes significantly to GSA’s success.

Satish K. Dwibhashi, CISO at KreditBee

Satish K. Dwibhashi, CISO at KreditBee

Satish K. Dwibhashi is the CISO at KreditBee, bringing over 30 years of expertise in IT & Information Security. A proven leader and subject matter expert in Cyber Security, GRC, and BCM, Satish has a comprehensive understanding of Information Security Standards/Frameworks. 

He has worked across various industry verticals, including IT/ITES, BFSI/FinTech, AdTech, Retail, Manufacturing, and Health Care. As a PLATINUM member of ISACA and Past President, Satish is also an Accredited Trainer for CISA, CISM, CRISC, and CGEIT at the ISACA Bangalore Chapter. He is a regular speaker at industry forums, showcasing his passion for teaching, coaching, and mentoring. 

Varun Singla, SVP & CISO at Airtel

Varun Singla, SVP & CISO at Airtel

Varun Singla, SVP & CISO at Airtel, is a customer-focused business executive and CISO. With a deep expertise in building effective security organizations, he collaborates with business, IT, and engineering teams to address enterprise risks.

Varun has a track record of managing client partnerships, driving business growth, and mentoring global teams across the U.S., Europe, and India. His passion lies in creating a culture of innovation and empowering future leaders for continued success.

Anuprita Daga, Group CISO at Angel One

Anuprita Daga, Group CISO at Angel One

Anuprita Daga, Group CISO at Angel One, boasts 25 years of leadership experience in data privacy, security, and risk quantification. With a background in spearheading security transformation and ensuring compliance with regulatory standards, she is committed to enhancing information security, cybersecurity, and data privacy frameworks. Anuprita focuses on developing and enforcing robust security policies to safeguard sensitive information across the organization.

Kanupriya Vazandar, CISO at DIAGEO India

Kanupriya Vazandar, CISO at DIAGEO India

Kanupriya Vazandar, CISO at DIAGEO India, brings over 14 years of expertise in IT and Information Security Management. Leading the IT Governance Controls, Cybersecurity, PMO, Data Privacy, and Compliance domains, she has spearheaded diverse projects encompassing risk management, cybersecurity, digital innovation, SOX/CCAR/IFCR, governance, and strategy execution for technology and business controls.

Conclusion

On India’s Republic Day, we take a moment to applaud the exceptional work of the top 26 Indian CISOs, who have not just fortified their own organizations but have also helped raise India’s profile on the world’s cybersecurity stage.

Their dedication to innovating and strategically managing digital risks embodies the essence of Republic Day, showcasing India’s commitment to growth and safety in our increasingly digital world.

These CISOs’ impressive journeys and achievements are a beacon of leadership and dedication, perfectly mirroring the strength and resilience that we celebrate on this important day.

In conclusion, the inspiring journeys of these 26 Indian CISOs serve as a testament to their dedication, leadership, and invaluable contributions to the field of cybersecurity.

Share this:

  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • More
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Chief Information Security OfficersCISOcybersecurityIndian CISOsThe Cyber Express
Previous Post

Unveiling the Latest Threat: A MacOS Stealer Emerges on the Dark Web

Next Post

Guard Your Wallet: Security Tips for Republic Day Sale Shoppers

Next Post
republic day sales

Guard Your Wallet: Security Tips for Republic Day Sale Shoppers

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

France claims 'foreign interference' in ferry malware case
Cyber News

France Alleges ‘Foreign Interference’ After RAT Malware Found on Ferry

December 18, 2025
FBI Seizes E-Note Crypto Exchange
Cyber News

FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Laundering

December 18, 2025
CVE-2025-20393
Firewall Daily

Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerability

December 18, 2025
Fraudulent Call Centres in Ukraine
Cyber News

EU Authorities Dismantle Fraudulent Call Centres in Ukraine Behind €10M Scam Network

December 18, 2025

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2025 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2025 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information