Sandesh Jadhav

CEO

India23 yrs 2 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over four years of leadership in data protection and AI governance.
  • Expert in regulatory compliance with GDPR and EU AI Act.
  • Public speaker on Cyber Security and Data Privacy.
Stackforce AI infers this person is a Cyber Security and Data Privacy expert with a focus on AI governance.

Contact

Skills

Core Skills

Data PrivacyAi GovernanceCyber Security

Other Skills

LeadershipCustomer Relationship Management (CRM)CEHData Privacy LawAuditingRisk AssessmentApplication SecurityThreat & Vulnerability ManagementCyber Threat Intelligence (CTI)CyberlawVendor ManagementArtificial Intelligence (AI)Lean Six SigmaCyber Security RiskRegulatory Compliance

About

Wipro's Global Data Privacy portfolio benefits from over four years of leadership in data protection, AI governance, and compliance. The team oversees vendor risk assessments, DPIAs, and AI impact assessments, ensuring adherence to evolving global regulations, including GDPR and the EU AI Act. Measures such as OWASP Top 10 assessments for generative AI applications mitigate risks like prompt injection and sensitive data exposure. With a focus on cutting-edge legal and technological frameworks, the organization integrates privacy by design into AI systems, addressing discrimination and security vulnerabilities. This role reflects a mission to align strategic privacy initiatives with global business goals, fostering collaboration and compliance in a rapidly advancing landscape.

Experience

School of law - dhirubhai ambani university

Honorary professor and Chairman of the advisory committee

May 2025Present · 10 mos · Remote

  • Chairman of committee for AI, Data Privacy & Technology Laws program at the Dhirubhai Ambani University

Wipro

Global Data Privacy Officer

May 2021Present · 4 yrs 10 mos

  • Leading Wipro's Global Customers' , Vendors' and Business partners' Data Protection portfolio. Conducting Third Party Vendor risk assessments, Data Protection Impact Assessment (DPIA). AI Impact assessment ensuring the AI system adheres to relevant laws and regulations, including data protection, intellectual property, data privacy and anti-discrimination laws.
  • Key Responsibilities:
  • 1. The OWASP Top 10 for Large Language Model (LLM) and Generative AI applications includes: Prompt Injection, Sensitive Information Disclosure, Data and Model Poisoning. Assessing potential AI risks including hallucination, discrimination and AI security vulnerabilities. Implementing measures to mitigate these risks, such as data validation, model monitoring, Promoting transparency in AI systems by making their decision-making processes understandable. Providing explanations for AI-driven decisions.
  • 2. Regulatory Compliance : GDPR, EU AI Act, India's DPDP (Digital Personal Data Protection ), CCPA, PIPL, LGPD .China Data Security Law (DSL) , The EU Cyber Solidarity Act, Digital Operational Resilience Act (DORA), Cyber Resilience Act (CRA), Victorian Protective Data Security Framework (VPDSF) etc. Primary point of contact for privacy audits and regulatory inquiries.
  • 2. End-to-End CLM contract lifecycle management (CLM) Oversight: Spearheaded renewal/termination, negotiations, ensuring alignment with privacy, cyber security, and legal requirements across multiple business units and geographies.
  • 3. Privacy-preserving AI techniques designed to protect sensitive information while still enabling data analysis and machine learning like Homomorphic Encryption, Differential Privacy, Anonymization, Secure Multi-Party Computation (SMPC, Adversarial Training Federated Learning
  • 4. Technology Integration: Led the implementation of CLM and data mapping tools integrated with privacy compliance solutions (e.g., OneTrust, TrustArc), enhancing visibility, autoation, and risk tracking.
LeadershipCustomer Relationship Management (CRM)CEHData Privacy LawAuditingRisk Assessment+12

Ramrao adik institute of technology

Member of Board of Studies - Dept. of Computer Science and Engineering

Jan 2021Present · 5 yrs 2 mos

Saint-gobain aviation and aerospace ltd

Cyber Security and Data Privacy ISSO

Oct 2018May 2021 · 2 yrs 7 mos

ISO 27001Customer Relationship Management (CRM)GeopoliticsEthical HackerData Privacy LawProject Management+13

Father agnel technical education complex

Member of Boad of Studies

Aug 2018Present · 7 yrs 7 mos

Moore stephens international

Associate Director - Cyber Security & AI Governance

Nov 2015Oct 2018 · 2 yrs 11 mos

  • Leading IT service line Working as IT head for all Cyber security, Internal and Statutory audits
  • Application Security and Penetration Testing using OWASP and CVE standards
  • Vulnerability Assessment, Web server Configuration audit.
  • Security Code review, Black box, White box testing
  • IFC/ ICOFR IT audits, Hyperion audits, HIPPA compliance.
  • SSAE 16, SSAE 18 using SOC type 1, type 2 reports
  • PLC, SCADA, Industrial control system security using IEC 62443
  • Oracle Master data management audit.
  • Honeywell, ABB Industrial control security system, IIoT. Industry 4.0.
  • Software Licensing Gap Analysis, Cyber threat management
  • Supporting domain like BFSI sector, Aviation, Shipping, Media, Manufacturing, NBFC etc.
LeadershipISO 27001Customer Relationship Management (CRM)AvionicsEthical HackerWireless Security+21

Capgemini

Sr, Manager - Information Security and Network Security

Nov 2012Nov 2015 · 3 yrs

  • Design and implement of Secured Network architecture.
  • Amazon AWS and Microsoft Azure Cloud Security
  • IT Delivery and Security operations for CG owned data centers globally
  • SOC (Security operation Centre)- Arc Sight and Qradar SIEM tool
  • Managing NOC with F5 WAF (Web application firewall), IPS, Bluecoat, Citrix Netscaler.
  • ISO 27000 Audit, GDPR, Data Privacy and Data protection standards
  • SAP Security with ONAPSIS, Virtual forge.
  • Manufacturing Execution Systems (MES)
  • Take participation in discussion with client’s CISO, CIO & Business Heads
  • IT processes in full compliance with Agile, A3/ Lean framework
Customer Relationship Management (CRM)Project ManagementSolution ArchitectureThreat & Vulnerability ManagementCompliance Management

J.p. morgan

Associate Vice President - Network & Cyber Security, GRC , Global SOC

May 2010Nov 2012 · 2 yrs 6 mos

  • Enforce well-integrated application structures in compliance with Payment Card Industry – Data Security Standards (PCI DSS) . ISO 27001, SOC 2 TYPE II standard
  • Review secured Network architecture, Vulnerability assessment, Penetration testing, Application security test using ethical hacking.
  • Cyber security , Cyber threat management.
  • Code reviews , OWASP standards for AppSec.
  • Carrying out Third party ISO Audits & giving solution to mitigate risk.
  • Review BCP plan ,Crisis Management process and recovery Plan
  • Risk assessment & provide solutions to mitigate them
  • Conducted security offerings and awareness programs for clients’ Top Management
  • Implementation work for new clients in secured network architecture.
Project ManagementSolution ArchitectureCyber Threat Intelligence (CTI)Compliance Management

Oman air

Cyber Security Manager

Dec 2008Jun 2010 · 1 yr 6 mos · Muscat Governorate, Oman

  • Geo political risk management.
  • Ensure information assurance by transmitting data securely between all international airports.
  • Designing and configuring Data center, Secured network infrastructure.
  • Managing VA/AppSec/Penetration testing
  • Implementation & maintenance for Global network infrastructure at all international airports.
  • ArcSight SIEM tool correlating security events to identify and respond to threats.
  • Integration of Checkpoint NGX R62-A with remote sites & Juniper, PIX interoperable devices.
  • Network Firewalls, WAF, IPS, Routers and Switches.
  • Avionics with Boeing 737 , Boeing 777, Airbus 320 cockpit AIMS
Project ManagementSolution ArchitectureCyber Threat Intelligence (CTI)Compliance Management

Jet airways

AIRCRAFT COMMUNICATION ENGINEER

Jan 2005Dec 2008 · 3 yrs 11 mos

  • Information Security using ISO 27K standards , Cyber Security in avionics for Boeing and Airbus
  • SIEM implementation for critical security alerts
  • Creation & implementation of security policies for organization in conjunction with domestic and international airport authorities , Government civil aviation departments.
  • Configuring ,Troubleshooting on Cisco 7200, 3845 series routers
  • Firewall: Configuration, implementation on Check point R55, PIX 515E
  • IBM-Tivoli integrated with GSM SMS application gateways for various events management
  • Implementation & troubleshooting Cisco 6549 core switch ,Nortel ,HP Procurve L3 Switches
  • Configuring & Implementing Cisco Wi-Fi Routers for wireless check-in counters on Airports all over the India& All across the globe
  • Using VoIP ALCATEL AUXO for connecting Airports all across globe
  • Firewall & IPS: Sonic wall, Fortigate
Customer Relationship Management (CRM)Project ManagementSolution ArchitectureAuditingCyber Threat Intelligence (CTI)Compliance Management

Tata consultancy services

Network Security Consultant

Feb 2003Jun 2006 · 3 yrs 4 mos

  • Enforce IT processes to ensure well-integrated application structures in full compliance with Payment Card Industry – Data Security Standards (PCI DSS) .
  • Review secured Network architecture, Vulnerability assessment, Penetration testing, Application security test using ethical hacking.
  • Cyber security , Cyber threat management.
  • Code reviews , OWASP standards for AppSec.
  • Carrying out Third party ISO Audits & giving solution to mitigate risk.
  • Review BCP plan ,Crisis Management process and recovery Plan
  • Risk assessment & provide solutions to mitigate them
  • Nessus scan , Network scan.
  • Conducted security offerings and awareness programs for clients’ Top Management
  • Implementation work for new clients in secured network architecture.
Project ManagementSolution ArchitectureAuditingThreat & Vulnerability ManagementCyber Threat Intelligence (CTI)Compliance Management

Education

Indian Institute of Technology, Bombay

Aeronautics/Aviation/Aerospace Science and Technology

SYMBIOSIS INTERNATIONAL UNIVERSITY

Research Scholar — Data Privacy and AI law

K.J.Somaiya College Of engineering

Bachelor of Engineering - BE

University of Mumbai

Master of Laws - LLM — IPR and Information Technology

Symbiosis Institute of Management Studies

Master of Business Administration (MBA) — Computer Systems Networking and Telecommunications

VPM LAW COLLEGE

Bachelor of Laws - LLB

University of Mumbai

Master's degree — Economics

Stackforce found 100+ more professionals with Data Privacy & Ai Governance

Explore similar profiles based on matching skills and experience