S

Surinder Kumar

CEO

Noida, Uttar Pradesh, India20 yrs 7 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • 22 years of leadership in cybersecurity.
  • Expert in aligning security with business goals.
  • Proficient in regulatory compliance and risk management.
Stackforce AI infers this person is a Cybersecurity Leader with expertise in Fintech and Retail sectors.

Contact

Skills

Core Skills

Information SecurityRisk ManagementData PrivacyCompliance Management

Other Skills

COBITCalifornia Consumer Privacy Act (CCPA)Cloud SecurityComplianceConsumer LawCybersecurity StrategyFirewallsGovernanceIT AuditITILIncident ManagementInformation TechnologyManagementMicrosoft PowerPointProject Management

About

Experienced and visionary Information and Cybersecurity Leader with 22 years of leadership expertise in driving comprehensive security strategies for organizations across diverse geographies, including USA,UK,UAE and beyond. As CISO, I specialize in aligning cybersecurity initiatives with business goals, ensuring compliance with regulatory standards such as ISO 27001, ISO 27701, NIST CSF, PCI DSS, and privacy standards like GDPR,DPDPA etc. My expertise spans multiple domains within Information Security, including: - Information Security and Risk Management - Governance, Risk, and Compliance (GRC) & Cyber Audits - Information Security And Regulatory Audits (PCI DSS, ISO 27001, IT-GRC, Data Localization - SAR) - ISMS Governance and Implementation, Cyber Maturity Assessment - Privacy and Data Protection - PCI DSS Assessments and Compliance - Security Operations, Incident Response & Digital Forensics - Security Architecture and Vulnerability Management - Disaster Recovery and Business Continuity Planning - Network Security and Endpoint Protection - Third-Party Risk Management - Application Security Posture Management (ASPM) - Cloud Security Posture Management (CSPM)

Experience

Paytm payments services limited

Chief Information Security Officer/Director

Nov 2022Present · 3 yrs 4 mos · Noida, Uttar Pradesh, India · On-site

  • Cybersecurity Strategy & Leadership: Responsible for driving cybersecurity excellence through the design and execution of strategic roadmaps .
  • IS Security Governance: Responsible for Monitoring & assessing the implementation and compliance to Information security policies, procedure, regulatory requirements, and industry standards e.g., GRC Committee recommendations, Master circulars/ guidance from RBI, NPCI Guidelines, IRDAI Guidelines and ISO 27701/22301.
  • Risk Management: Expert in leading Information security governance, risk management, and audit frameworks at PPSL.
  • Data Privacy: Conducting assessments and driving remediation to ensure strong security posture and compliance with standards like GDPR and India's Digital Personal Data Protection Bill, 2022.
  • Application Security, Cloud Security and Infrastructure: Providing leadership support in Vulnerability Assessment (VA) and Penetration Testing (PT) across enterprise IT, cloud platforms AWS, web and mobile applications environments.
  • Audit Management & Remediation :leads comprehensive audit discussions for RBI Data Localization/System Audit Reports (DL/SAR) and IT/IS audits from clients and partners.
  • SOC/Incident Response & Crisis Management: Responsible for the day-to-day management and effectiveness of Security Operations Center (SOC) activities.
  • Third-Party & Supply Chain Security: Responsible to drives the implementation of robust Third-Party Risk Assessment and vendor governance frameworks
  • Data Protection & DLP implementation: Implementing data loss prevention (DLP) tools and processes to guarantee data integrity, confidentiality, and availability
  • Board & CXO Communication: Driving clear and impactful communication of cybersecurity risks, performance indicators, and strategic objectives to boards and executive leadership teams.
  • Strong Cybersecurity Culture: Drives security awareness through targeted phishing simulations, awareness campaigns, workshops and direct C-level engagement
Compliance ManagementRisk ManagementGovernanceData PrivacyInformation Security

Walmart | retail and e-commerce

Senior Manager-Cyber Security

Dec 2017Oct 2022 · 4 yrs 10 mos · Bangalore

  • Information Security Risk Management:
  • o Partnering with global business and technology stakeholders to assess risks associated with internally developed Applications/solutions and third-party technologies.
  • o Performing security assessments for cloud infrastructure (Azure, AWS) to validate security related controls.
  • o Formalizing Risk review report on risks identified and remediation plan status for CISO, Legal, PCI, and Privacy review.
  • o Consolidating vulnerability reports and presenting risk management process to VP for Risk acceptance.
  • o Collaborate with Team members to develop risk assessment Peer Review process for scoping, Risk Lead review, and reporting requirements.
  • Security Architecture Review:
  • o Identifying and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
  • o Identifying security design gaps in existing and proposed architectures and recommend changes or enhancements
  • o Providing product best fit analysis to ensure end to end security covering different faucets of architecture e.g., Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance, and regulations. Performing security assessment against NIST Frameworks, SANS, CIS, etc.
  • Data Privacy:
  • o Collaborate with Customer delivery teams to understand the privacy risks of business processes, systems specific to accounts and provides guidance to ensure privacy controls are embedded into the design of these processes / systems.
  • o Performing Data Privacy Impact Assessments taking into consideration client mandated privacy regulatory requirements for California data privacy law an GDPR.
Compliance ManagementRisk ManagementGovernanceData PrivacyInformation Security

Moody's corporation

Assistant Vice President- Information Security

Mar 2015Nov 2017 · 2 yrs 8 mos · Gurgaon, India

  • My primary responsibility was to support Moody's senior IT/IS management in the successful implementation and ongoing management of IT Governance and Risk Management initiatives at Moody's Analytics Knowledge Services (MAKS). This included providing strategic oversight for information security governance across MAKS locations, and maintaining comprehensive security policies, procedures, and standards. I also served as a key point of contact for Moody's Information Security management and Third-Party Risk management, collaborating with MAKS leadership to identify security requirements and deliver technical solutions, demonstrations of security services, and strategic security discussions. A core aspect of the role involved implementing enterprise information security and IT risk management programs.

Ibm

Information Security Consultant

Oct 2013Mar 2015 · 1 yr 5 mos · Gurgaon, India

  • Responsible for implementing information security/data Privacy within IBM’s client accounts, participating in discussion related to IS strategy/ account information security/data privacy plans with senior management. job also includes responding to Client’s Information Security management related proposal/ Information Security RFPs/RFI, Preparation of Costing engagement notes and proposals, Interfacing with Clients to identify Information Security requirements and providing technical solutions, demonstrations of IBM’s Security Service Offerings with clients, security Strategy discussions, Proof of Concept Creation, Prepare and maintain documents of SOW.

Accenture technology consulting

Consultant-Security and Risk Management

Mar 2010Sep 2013 · 3 yrs 6 mos · United Kingdom

  • Managing Client Data Protection/Security architect portfolio for more than 20 clients in different geographies including various European countries, Middle East and African regions.
  • Identifying security risks by conducting Risk Assessments, performing various security assessments on business critical applications/infrastructure and articulate technical findings into comprehensive reports with corresponding mitigation or remediation recommendations to minimize business impact.
  • Assisting clients to effectively identifying, measuring, monitoring Compliance requirements and helping them for implementing controls in compliance with various European data processing laws including EU directive 95/46,German,Italian and Spanish laws over client data.
  • Reviewing of implementation of security practices, access controls over program and data, Incident management & Physical and environmental security controls.
  • Develop remediation reports which detailed the required actions to bring security controls in line with industry best practices and other applicable regulations

Wipro

Associate Consultant (Application Security/SOX compliance)

Aug 2008Feb 2010 · 1 yr 6 mos · Banglore

  • Primary duties includes performing IT Risk Assessment on application/systems, handling regulatory & internal security Policy/Process Compliance requirements, review application design for security vulnerabilities & Coordinate to mitigate application risk, coordination of Disaster Recovery for the enterprise, Policy authoring, security awareness training, handling various internal and external audits and assessments.

Igate

Security consultant

Feb 2008Aug 2008 · 6 mos · Mumbai Area, India

  • Responsible for assessing application security, conducting application security review to address security requirements with application development teams/project manager at every stage of SDLC.
  • Conducted Risk Assessment, control analysis and Compliance requirement review with IS/IT, business teams to ensure appropriate controls and safeguards are in place for the protection of information and regulatory requirements in all new & existing applications.
  • Facilitating risk assessment for all applications,software,hardware and services in various LOB

Ericsson

Engineer-Audit and Security

Jan 2006Jan 2008 · 2 yrs · Gurgaon, India

  • ISO 27001 Implementation,Risk management,information and network security operations

Wipro infotech

Telecommunications Engineer

Apr 2005Jun 2006 · 1 yr 2 mos · New Delhi Area, India

  •  Providing level-1 technical support for Cisco MGX (8850)/IGX (8430) ATM technology switches.
  •  Monitoring and resolving issues for End to End WAN connectivity for all WBPO sites.
  •  Co-ordination with domestic and International ISPs for all Wipro BPO Sites WAN Connectivity.
  •  Configuring Virtual LAN, (VLANS) and VTP modes on LAN Switches.
  •  Monitoring Router and switch bandwidth using MRTG and what’s up gold monitoring tool.
  •  Providing level-1 support for voice using AYAYA Site Administration.
  •  Performed configuration management, change management, documentation for various changes in configuration based on ITIL requirements

Education

Kurukshetra University

B.Tech(IT) — Information Technology

Jan 1999Jan 2003

Certified Information Security Manager (CISM)

Certifications — ISACA (Information Systems Audit and Control Association)

Jan 2015Jan 2018

Certified Information Privacy Professional (CIPP)

International association of Privacy professionals (IAPP) — Information Privacy

Jan 2012Jan 2015

Certified Information Privacy Professional- Information Technology(CIPP-IT)

Certifications — International Association of Privacy professionals

Jan 2012Jan 2015

AWS

AWS Solution Architect (Training)

Jan 2017Jan 2019

ISO 22301 Business Continuity Management

Certifications — Business Continuity Management System (BCMS)

Jan 2013Jan 2018

CPISI (Certified Payments Cards Industry Security Implementer)

Certifications — PCI-DSS (Payment Cards Industry Data Security Standards)

Jan 2014Jan 2017

Information Technology Infrastructure Library (ITIL V3)

Certification — IT Service Management (ITSM)

Jan 2012Jan 2015

Archer Certified Consultant

RSA- Archer

Jan 2010Jan 2013

Vaish Technical Institute,Rohtak

Diploma — Computer Engineering

Jan 1995Jan 1999

SISA

CPISI (Certified Payments Cards Industry Security Implementer — Payments Card industry

International association of privacy professional

Certified information Privacy Professional — Data privacy and protection

Jan 2012Jan 2012

IAPP

Certification in Privacy Protection

Kurukshetra University

Bachelor's degree — Information Technology

Jun 1999Jun 2003

Stackforce found 100+ more professionals with Information Security & Risk Management

Explore similar profiles based on matching skills and experience