P

Puneet S.

CEO

Dallas, Texas, United States21 yrs 9 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • 20+ years of experience in Data Protection and Privacy
  • Expert in Applied Cryptography and PKI solutions
  • Proven track record in leading cybersecurity initiatives
Stackforce AI infers this person is a Cybersecurity Expert specializing in Data Protection and Applied Cryptography.

Contact

Skills

Core Skills

Data Security StrategyApplied CryptographyData ProtectionCybersecurity LeadershipInformation Security ManagementInformation Security ArchitectureCryptographyData Loss PreventionInformation Security ConsultingInformation SecurityRegulatory ComplianceSoftware DevelopmentNetwork Security

Other Skills

PKIEncryptionHardware Security Module (HSM)ConsultingcodesignPost-Quantum CryptographyPublic Key Infrastructure (PKI)Hardware Security Modules (HSM)Certificate Lifecycle ManagementEncryption SolutionsData MaskingTokenizationCloud SecurityGovernance FrameworksCloud Encryption

About

* Principal at Encryption Consulting LLC focusing on providing consulting to customers in the Applied Cryptography space. * Puneet has worked in Data Protection and Privacy with 20+ years progressive experience in Data protection technologies such as Data Classification, Encryption, Masking, Tokenization, Public Key Infrastructure (PKI), Cloud Access Security Brokers, Data Access Governance, DLP, Hashicorp Vault. * Skilled in Data Protection & Privacy *Skilled in Privacy laws regulating the private sector including GDPR,FCRA,GLBA, PCI-DSS,HIPAA,HITRUST,FERPA,CAN-SPAM,NIST800-57, NIST800-53. * I enable stakeholders, and their teams, to better understand some of the most significant challenges around Data Security and preventing data loss; 1.) Where a company's sensitive data is. 2.) Who is accessing that data? 3.) How it is being used inside and outside of a company. 4.) I advise on best practices to protect and prevent exposure or breach of sensitive data. * Performed a variety of risk assessments and POCs for fortune 500 companies. * Interested in gaining exposure to new technologies *He has extensive experience with complete life-cycle project/product development. . *Practical experience in the definition, development, and direction of information security strategy, policy, and programs guiding processes and people. * Self-starting performer with excellent written, verbal and collaborative communication skills. *Outstanding leadership abilities; able to coordinate and direct all phases of project-based efforts while managing, motivating, and leading project teams. Specialties: • Client Relationship Management, • Project Mgt. Planning, execution and risk mgt. • Consulting, architecture, and development of information security solutions across industry segments such as retail, telecom, insurance, finance & banking services. •Assessment, gap analysis, developing and implementing solutions in Data Protection and Privacy

Experience

21 yrs 9 mos
Total Experience
2 yrs 5 mos
Average Tenure
6 yrs 10 mos
Current Experience

Encryption consulting llc

Principal

Jul 2019Present · 6 yrs 10 mos · Dallas-Fort Worth Metroplex

  • As a Principal Consultant, I specialize in developing and implementing comprehensive Enterprise Data Security Strategies, with a specific focus on Post-Quantum Cryptography, Public Key Infrastructure (PKI), Hardware Security Modules (HSM), Certificate Lifecycle Management (CLM), and Applied Cryptography. My expertise encompasses the entire consulting process, from assessment and requirements development to product selection, solution design, and implementation of various Data Protection technologies.
  • I have successfully led or supported enterprise-wide rollouts of the following technologies:
  • ### Key Areas of Focus:
  • Post-Quantum Cryptography**: Developing strategies for transitioning to quantum-resistant encryption algorithms to secure data against future threats posed by quantum computing.
  • Public Key Infrastructure (PKI)**: Implementing robust PKI solutions for secure digital communication and identity verification, ensuring integrity and confidentiality of data.
  • Hardware Security Modules (HSM)**: Utilizing HSMs from leading providers like Thales, nCipher, and Gemalto for secure key management and cryptographic operations, enhancing the overall security posture of the enterprise.
  • Certificate Lifecycle Management (CLM)**: Streamlining the management of digital certificates throughout their lifecycle—from issuance and renewal to revocation—ensuring compliance with security policies and reducing the risk of certificate-related vulnerabilities.
  • Applied Cryptography**: Leveraging advanced cryptographic techniques and protocols to protect sensitive data in transit and at rest while ensuring regulatory compliance with standards like GDPR, HIPAA/HITECH, and HITRUST.
  • By focusing on these core areas, I ensure that organizations are well-equipped to address current and emergent security threats while maintaining compliance with relevant regulations.
PKIEncryptionHardware Security Module (HSM)ConsultingCryptographycodesign+2

Deloitte

Senior Manager - Data Protection and Privacy

Jul 2017Jun 2019 · 1 yr 11 mos · Chicago, Illinois, United States

  • Cybersecurity Leader for Data Protection and Privacy Practice**
  • I’m passionate about helping clients in healthcare, banking, capital markets, and fintech enhance their cybersecurity posture through strategic initiatives in governance and architecture. My recent work has focused on crafting comprehensive strategies, policies, and governance frameworks that empower organizations to safeguard their data effectively.
  • I’m proud to lead exciting initiatives aimed at implementing robust data protection security controls, particularly for financial institutions managing data lakes. My consulting services encompass evaluation, strategy, and remediation across various cutting-edge data protection technologies, including:
  • Encryption Solutions**: Expertise with Ciphertrust Manager advanced cryptography systems, including PKI and key management.
  • Data Masking and Tokenization**: Proficient in technologies like IBM Optim, Informatica TDM and Protegrity, to ensure that sensitive information remains secure.
  • Cloud Security**: Strong knowledge of Cloud Access Security Brokers (Netskope, SkyHigh) and cloud encryption strategies, especially with AWS and Azure Key Management.
  • Cloud Expertise**:
  • I have a deep understanding of AWS data security practices and have successfully developed and implemented strategies for AWS Key Management and Microsoft Azure Key Vault, along with public cloud HSM strategies.
  • Privacy Specialization**:
  • With a solid grasp of regulations such as GDPR, HIPAA/HITECH, and HITRUST, I also focus on data flow mapping, requirement rationalization, and policy development to ensure compliance.
  • Professional Milestones**:
  • I’ve had the honor of sharing my insights at events such as the Thales eSecurity gathering, addressing critical topics like "Encryption and GDPR." These experiences fuel my commitment to driving high standards in data protection and privacy. Let’s collaborate to enhance your cybersecurity goals!
Encryption SolutionsData MaskingTokenizationCloud SecurityGovernance FrameworksData Protection+1

Ey

Manager- Data Protection and Privacy

Oct 2015Jul 2017 · 1 yr 9 mos · Atlanta, Georgia, United States

  • I am excited to share my experience leading teams of up to 10 professionals in information technology, privacy, and security. I’ve participated in every phase of the engagement lifecycle, achieving over $10 million in sales annually in 2015 and 2016 while meeting my billable goals.
  • I’m passionate about coaching colleagues at all levels, fostering a supportive environment for growth and innovation. I lead diverse information security programs, focusing on consulting, assessment, strategy, and remediation in data protection technologies, including:
  • Encryption**: Proficient with Vormetric, HP Voltage, and Gemalto KeySecure.
  • Cloud Encryption**: Familiar with AWS and Azure Key Management.
  • Data Management**: Skilled in data masking and tokenization for PCI compliance.
  • I also implement best-practice policies for governance and business continuity while overseeing engagement-level economics, including profitability and staffing. I’m eager to continue making a meaningful impact in information security!
EncryptionCloud EncryptionData ManagementGovernance PoliciesInformation Security ManagementData Protection

Thales e-security

Sr Information Security Solutions Architect

Oct 2012Oct 2015 · 3 yrs · Plantation, Florida

  • I have had the opportunity to share my expertise in cryptography, Public Key Infrastructure (PKI), PCI Compliance, security architecture, and application design. Working with Thales e-Security clients, I engage directly with CxO-level executives and manage stakeholder expectations to align with strategic objectives.
  • Specialties:** My expertise includes Microsoft PKI, Hardware Security Modules (HSMs), Cryptography, Key Management, Bring Your Own Key (BYOK), Code Signing, Time Stamping Server, and CyberArk.
  • Focus Areas Include:**
  • 1. **Microsoft PKI Design and Deployment:** I help customers deploy Microsoft PKI, providing documentation and step-by-step guidance.
  • 2. **Microsoft PKI Migration:** I assist with smooth migrations from ADCS 2003 to 2008 and 2012.
  • 3. **Policy Authoring:** I support customers in creating effective PKI policy documents.
  • 4. **Code Signing Support:** I ensure code signing and key protection with HSMs.
  • 5. **CyberArk Implementation:** I aid in implementing CyberArk solutions and securing keys for the Enterprise Password Vault (EPV).
  • 6. **Voltage SecureData Assistance:** I guide in implementing Voltage SecureData and securing keys with various encryption types.
  • Together, we can elevate security standards and achieve great results!
CryptographyPKIPCI ComplianceSecurity ArchitectureInformation Security Architecture

Rsa, the security division of emc

Sr Information Security Solutions Consultant

May 2011Oct 2012 · 1 yr 5 mos · Bedford Massachusetts

  • Led the architecture definition and implementation of RSA DLP solutions, ensuring robust data protection for clients.
  • Provided expert training and support for clients on RSA DLP, RSA Data Protection Manager, and RSA Access Manager.
  • Collaborated with cross-functional teams to troubleshoot complex security issues, enhancing overall system performance.- Led the design and implementation of RSA Data Loss Prevention (DLP) solutions, ensuring strong data protection for clients.
  • Delivered expert training and support to clients on RSA DLP, RSA Data Protection Manager, and RSA Access Manager.
  • Collaborated with cross-functional teams to troubleshoot complex security issues, improving overall system performance.
RSA DLPData Protection ManagerAccess ManagerData Loss PreventionInformation Security Consulting

Walmart

Cyber Security Lead

Jan 2011May 2011 · 4 mos · Fayetteville, Arkansas Area

  • As the lead for Applied Cryptography at Walmart, I’m excited to share how I've integrated key cryptographic principles into our security framework, focusing on Public Key Infrastructure (PKI), Hardware Security Modules (HSM), and certificate lifecycle management.
  • In my role as a Cryptography Architect, I provide technical guidance on cryptographic practices to safeguard sensitive data through effective PKI implementation. I facilitated the integration of HSMs to secure cryptographic keys, enhancing the integrity and confidentiality of our information.
  • I also manage the entire certificate lifecycle, ensuring all certificates are valid and well-configured, which upholds our security standards. Strengthening code signing practices is crucial for protecting our software from tampering, and I’m dedicated to applying best practices in applied cryptography to align with Walmart's security objectives. I'm enthusiastic about the future of our cryptographic initiatives and their positive impact!
Applied CryptographyPKIHSMCryptographyInformation Security

Wipro technologies

Information Security Consultant ( PAM - CyberArK,PKI ,PCI-DSS , OWSAP, DLP,Encryption )

Nov 2006Jan 2011 · 4 yrs 2 mos · Greater Atlanta Area

  • Information Security Solution consultant with the Enterprise Security Services (ESS) group at Wipro Technologies.
  • Have provided consulting services on regulatory compliance, customer data privacy and other information security areas at Fortune 500 organizations across the globe and spanning diverse industry segments - telecom, retail and energy & utilities and transportation
  • Focus areas include
  • 1.Specialist knowledge of Payment Card Industry Data Security Standard. A personal drive for achieving results and motivating teams to exceed customer expectation. Excellent written and oral communication skills.
  • 2.Specialist knowledge of Public Key Infrastructure (Certificate authority , Smart cards )
  • 3.Specialist knowledge of following products
  • Safesign Management Server
  • OpenTrust PKI
  • Syfact
  • Encase
  • RSA DLP (Data Loss Prevention)
  • Symantec Vontu DLP (Data Loss Prevention)
  • RSA DPM/key Manager
  • Voltage SecureData
  • nCipher/Safenet Hardware Security modules (HSM)
  • Splunk
  • CyberArk (PAM)
  • Responsibilities have also included
  • Pre-sales support and practice development initiatives.
  • Functioned as an Information security Consultant ,Architect and Programmer.
PAMPKIPCI-DSSDLPEncryptionInformation Security Consulting+1

Ipolicy networks

Software Engineer

Jul 2006Feb 2007 · 7 mos · Bangalore,India

  • This position was mainly based out of the engineering center at Delhi India.
  • Responsible for design, development and deployment of an extensible Network security product supporting Intrusion detection, prevention and firewall.
  • Translating specifications into technical design and code.
  • Worked as a programmer of C, C++ using Visual studio as compiler.
Network SecurityIntrusion DetectionFirewallSoftware Development

Honeywell

Software Engineer

Jun 2004Jun 2006 · 2 yrs · Bangalore,India

  • Functioned as part of the information security framework developement team.
  • Worked as a C,C++ programmer using GCC and Visual Studio as Compiler
CC++Software Development

Education

DIT UNIVERSITY

Bachelor of Engineering - BE — Computer Science

Jun 2000Jun 2004

Stackforce found 100+ more professionals with Data Security Strategy & Applied Cryptography

Explore similar profiles based on matching skills and experience