Sakshi Porwal

Head of Design

Irvine, California, United States17 yrs experience
Highly Stable

Key Highlights

  • Over 17 years in Cyber Security leadership roles.
  • Expertise in Data Access Governance and Compliance.
  • Proven track record in managing global cyber security operations.
Stackforce AI infers this person is a Cyber Security expert with extensive experience in data governance and compliance.

Contact

Skills

Core Skills

Cyber SecurityData ManagementRegulatory ComplianceData Access GovernanceCyber Security OperationsSales Leadership

Other Skills

Business ContinuityClient EngagementCloud SecurityCustomer ExperienceData AnalysisData AnalyticsData ClassificationData GovernanceData Leakage PreventionData PrivacyData StrategiesDisaster RiskEnablementEncryptionEndpoint Security

About

Sakshi has over 17 years of experience in the Information Security/Cyber Security area such as Data Access Governance, Data Classification, Data Leakage Prevention, Data Privacy, Cloud Security, Encryption, Public Key Infrastructure, Identity and Access Management, Incident Management, Governance, Risk and Compliance, Business Continuity, Disaster Risk, Cyber Security Operations and Vendor Management.

Experience

Ians

Faculty

Nov 2024Present · 1 yr 4 mos

Compunnel inc.

Global Chief Information Security Officer & Cybersecurity Consulting Practice Head

Sep 2024Present · 1 yr 6 mos · Orange County, California, United States

cyber securityData AnalysisGo-to-Market StrategySecurity Architecture DesignVulnerability ManagementSales Excellence+22

Deloitte

2 roles

Global Cyber Security and Policy Management Leader

Promoted

Mar 2020Aug 2024 · 4 yrs 5 mos · Orange County, California, United States

  • Led a global team responsible for managing and operating various cyber security technologies used to protect organizational assets, such as laptops and servers, for over 400,000 Deloitte employees spread across 100 plus countries. These technologies include Advanced Threat Prevention, Admin Rights Management, Web Protection/CASB, Data Classification, Data Loss Prevention, Removable Media Protection, Firewall, Web Application Firewall, Intrusion Detection and Prevention and Vulnerability Management.
  • Established a Global Data Security Posture Management (DSPM) service that aligns with country specific privacy and compliance regulations and encompasses data discovery, classification, access analytics, data minimization and overall data governance.
Data AnalysisGo-to-Market StrategySecurity Architecture DesignSales ExcellenceStrategyData Strategies+13

Senior Manager

Mar 2016Mar 2020 · 4 yrs · Orange County, California, United States

  • Practice lead for the Data Access Governance service line and responsible for expanding it through sales and client awareness workshops, providing oversight on existing engagements, recruiting talent, training employees on the management of unstructured data using appropriate technologies and managing alliance relationships with various DAG technology vendors
  • Led a multi-million dollar engagement that involved design, implementation and management of all cyber security operations including Governance, Risk and Compliance, Identity and Access Management, Data Protection and Privacy, Cloud Security, Application Security, Cyber Security Operations Center and Secure Supply Chain
  • Assisted clients with the development and enhancement of their security program by conducting risk assessment and gap analysis, defining governance and security operations framework including roles and responsibility matrix, developing strategy and approach for program implementation, creating and reviewing policies, standards and guidelines, monitoring compliance with internal practices and external regulations, developing exception management process and proposing a continuous improvement plan based on industry leading practices and lessons learned from other client engagements
  • Advised clients on CCPA, GDPR, HIPAA and PCI/DSS compliance requirements
  • Assisted clients with development and implementation of controls and processes throughout the information lifecycle (from creation to destruction). This included controls and processes related to Data Classification, Encryption, Access Management, Information Rights Management, and Key and Certificate Management
  • Work with the Senior Executives and help them overcome risks associated with unstructured data. This involves setting up unstructured data management program in-line with industry standards and best practices and design and implementation of a DAG tool
Thought LeadershipSales LeadershipManagementCustomer Experience

Ey

2 roles

Manager

Promoted

Jun 2012Mar 2016 · 3 yrs 9 mos

  • Managed large scale IAM technology implementation that involve access provisioning, privileged account management, access governance, access control, and multi-factor authentication
  • Led multiple engagements across industries that involved assessment of existing IAM technology operations for any gaps and developing future state strategy, recommendations and roadmap
  • Managed projects that involved design, development and implementation of Identity, Entitlement and Risk Management System including data analytics and role management
  • Assisted in integrating client applications with Central Authentication platforms such as Enterprise Directory, Active Directory and Web Single Sign On
  • Led engagements that involved design and implementation of identity management provisioning solution in a cloud model
  • Handled Identity Analytics assessment for multiple US based organizations. This included Job Role Mining and Outlier Analysis
  • Managed multiple projects that involved development of security awareness and training material
  • Hands on experience in integrating enterprise infrastructure with security technologies such as identity management solutions used for secure email, internet banking and two factor-authentication
  • Experience with development of business continuity and disaster recovery plans along with conducting table top testing exercise
  • Assisted multiple clients in developing their future state Public Key Infrastructure (PKI) strategy and roadmap including technical architecture design, implementation plan, migration strategy and concept of operations
Sales LeadershipManagementCustomer Experience

Senior Consultant - IT Risk Transformation

Feb 2011May 2012 · 1 yr 3 mos

  • Conducted cyber security, network security and physical security assessments for multiple UK
  • based financial institution
  • Performed vendor security assessments (involving site visits) at UK based suppliers for multiple Global and Investment banks
  • Delivered audits of business continuity and IT disaster recovery strategy and plans
  • Conducted reviews of effectiveness of security processes for various financial service organizations. Processes included security policies and procedures, IT user security screening, training and awareness, security monitoring, incident detection and management system, vulnerability assessment, compliance and penetration testing

Bt group

Research Fellow

Jan 2010Jan 2011 · 1 yr · London Area, United Kingdom

  • Conducted research on various security issues like Identity and Access Management and Privacy associated with the cloud delivery and cloud brokerage models
  • Published multiple peer-reviewed papers in international conferences on Identity and Access Management and Data Privacy

Accenture

Associate Software Engineer

Jan 2008Jan 2009 · 1 yr · Mumbai, Maharashtra, India

  • SAP Security

Education

UCL

MSc — Information Security

Jan 2009Jan 2010

Rajasthan University

BE (Honours) — Computer Science

Jan 2004Jan 2008

Stackforce found 100+ more professionals with Cyber Security & Data Management

Explore similar profiles based on matching skills and experience