S

Sarba Roy, CISSP, CIPT, AIGP, CCSK

Technical Program Manager

Bhubaneswar, Odisha, India12 yrs 10 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over a decade of experience in Cybersecurity.
  • Expert in AI Governance and Privacy Risk Management.
  • Recognized for contributions to AI Risk Management Framework.
Stackforce AI infers this person is a Cybersecurity and Privacy Governance expert with a focus on AI and Risk Management.

Contact

Skills

Core Skills

CybersecurityPrivacy GovernanceRisk ManagementTechnical Program ManagementInformation Security

Other Skills

AI GovernancePrivacy Impact AssessmentsAI AssessmentsSecurity Risk ManagementCompliancePrivacy ManagementRisk AssessmentData Protection LawsPrivacy Best PracticesSecurity GovernanceSecurity AuditsProduct Security StrategySecurity AdvisoryProduct SecurityIT Risk Management

About

Sarba has had over a decade long experience in Cybersecurity specializing in Security assessments and Security Governance Risk and Compliance across India and Europe before transitioning to the Privacy and AI Governance domain. In her current role, Sarba is a Senior Cyber Risk and Privacy Specialist at Intel Corporation with a focus on AI Governance, Privacy Impact Assessments and AI Assessments. She has contributed to the development of AI Risk Management Framework at Intel and continues to work on program maturity improvements in AI Governance to identify risks and controls for AI systems aligned to global AI regulatory/privacy requirements. In her previous role at Intel, she worked as a Security Researcher specializing in Product Security Governance focusing on Security Technical program management, Security Exceptions, Software Supply Chain Security (Third-party & Open-source), Secure Development Lifecycle, Security Policy/Standards, Security Audits, Reporting and Product Security Strategy. Awards and Recognitions Intel Division level Recognitions for AI Risk Management Framework, Open source security audits and Security exceptions Google Scholarship for vGHC 2021 WiCyS RSA Conference Scholarship 2021 Women In Security Scholarship — Black Hat Europe 2020 2021 cohort of Empow(HER) Elevate U program Volunteer and Leadership Roles Social Media Chair for Women In Cybersecurity (WiCyS) Oregon Affiliate - 2020-2021 Chapter Lead for Infosec Girls - Oregon - 2020-2021 Founding member of WomenH2H, a global community for women leaders and changemakers - 2020 Speaking Engagements RSA 365 Forum ISC2 Security Congress Women in Cybersecurity Conference TechKNOW Day Infosec Girls WiCyS OWASP Portland Chapter CREST UK WomenH2H Advocacy and Mentorship Sarba is a passionate volunteer and advocate for women’s empowerment, a writer, folk artist, and mentor dedicated to helping individuals and organizations become more compassionate, curious, and cybersmart. Collaboration and Training Sarba has conducted and participated in over 100+ hours of presentations, trainings, and discussions on a wide range of technical topics with an underlying theme of "Incorporating Security culture and mindset" with diverse stakeholders including C-Suite Executives, Business Owners, IT Management, DevOps teams, and the student community.

Experience

12 yrs 10 mos
Total Experience
2 yrs 9 mos
Average Tenure
4 yrs 3 mos
Current Experience

Intel corporation

3 roles

Senior Cyber Risk and Privacy Specialist

Promoted

Jul 2025Present · 9 mos

  • Drives the development and/or compliance of enterprise and business group information security and privacy policies to protect Intel's information assets, intellectual property, and privacy data.
  • Documents security procedures, maintains the cyber risk registry and reports on continual improvement efforts.
  • Participates in the planning and conducts security and privacy risk assessments to examine and verify security capabilities, behaviors, and controls for authentication, authorization, integrity, availability, assurance, audit, and disposal of Intel's information assets including determining exposure and compliance levels.
  • Contributes to security and privacy risk assessments which identify threats, consequences, and vulnerabilities to business unit key assets, products, and services.
  • Ensures adequate security processes and solutions are in place to mitigate or remediate identified risks sufficiently to meet business objectives, contractual, and/or regulatory requirements.
  • Drives incident response activities ensuring security incidents are properly contained, eradicated, and recovered. Participates in internal security privacy assessments and compliance reviews, conducts risk analysis of business processes and technology solutions to evaluate whether they comply with internal security, privacy policies and standards as well as regulatory/industry requirements and best practices.
  • Works with security teams to perform tests and uncover network vulnerabilities.
  • Supports the assessment of all security and privacy risks across the enterprise including but not limited to, security operations, vulnerability lifecycle management, identity and access management, cryptography, forensics, regulatory compliance, governance risk and controls, internal counterespionage, threat detection and mitigation, system compliance, physical security analysis and security management.
AI GovernancePrivacy Impact AssessmentsAI AssessmentsSecurity Risk ManagementComplianceCybersecurity+1

Senior Privacy Specialist - AI Governance and Products

Nov 2023Jul 2025 · 1 yr 8 mos

  • Responsible for evaluating privacy impacts, driving mitigation strategies and decisions to ensure Intel complies with applicable data protection laws, regulations and associated Intel policies.
  • Encouraged privacy best practices and privacybydesign through consistent analysis, feedback, and follow through with product and engineering teams.
  • In-depth understanding of core privacy concepts and the specific behaviors required to demonstrate the ethical handling of personal information.
  • Performed privacy risk assessments of Intel's products, services, and enterprise capabilities.
  • Advised on privacy management, noncompliance escalations and waiver exceptions. In case of mergers and acquisitions.
  • PSs will be engaged in privacyrelated special projects, as needed. PSs proactively identify potential privacy risks and recommend appropriate mitigation options.
  • Interacted with a wide array of personnel within Intel: management and project teams worldwide, business unit privacy champions, and corporate groups and suppliers (e.g. Legal, Human Resources, Information Technology, Internal Audit, Corporate Services and Corporate Security).
  • As privacy subject matter experts (SMEs), kept track of legal, regulatory, policy and industry developments impacting the privacy and data protection domain.
  • Influenced respective partners to ensure that policies and procedures are implemented and well documented.
Privacy ManagementRisk AssessmentData Protection LawsPrivacy Best PracticesPrivacy GovernanceRisk Management

Security Researcher | Technical Program Management - Product Security Governance

Jan 2022Nov 2023 · 1 yr 10 mos

  • Collaboration with cross-functional teams for driving Security governance programs:
  • Security Exceptions,
  • Compliance and Regulatory Alignment with applicable laws, regulations, and industry standards.
  • SW Supply chain security (Third-party and Open-source),
  • Secure development lifecycle,
  • Security policy/standards development,
  • Security Audits,
  • Security Metrics and Reporting,
  • Product security strategy.
Security GovernanceComplianceSecurity AuditsProduct Security StrategyCybersecurityTechnical Program Management

University of portland

Substitute Lecturer

Jan 2023Mar 2023 · 2 mos

  • -Served as a substitute part-time faculty member at University of Portland in spring of 2023 and delivered lectures on Ethics, Cybersecurity laws and privacy, IAM, OSINT and Social Engineering.

Women in cybersecurity (wicys)

Voluntary Program committee member

Oct 2021Oct 2022 · 1 yr

Umpqua bank

Product Security Consultant

May 2021Dec 2021 · 7 mos

  • Collaborating and acting as a security advisor to the Product teams when new digital technologies and/or business needs are identified.
  • Establishing product security roadmap of deliverables and milestones including incremental onboarding of in scope online banking products and services.
  • Evaluating product security (posture) against emerging security threats and industry trends.
  • Conducting user experience, product security modernization and enhancement reviews.
  • Managing security risks through contract reviews and negotiations (e.g., data breach notification, damage reparation, data ownership, access controls and safeguarding requirements).
  • Advisory and Consulting support on First Line Governance, Risk and Compliance Strategy, Threat Modeling, Azure Security Compliance and Microsoft 365 Security Compliance.
  • Educating and providing transparency to key stakeholders through distributing regular communications about online banking product management practices, security control status and maturity improvements.
  • Collaborating and working with the relevant team(s) to identify solutions to security control gaps (breakdowns), process improvements (control automation) and/or facilitating the risk acceptance process as needed.
  • Tracking, coordinating and monitoring bug fixes and garnering support for security feature enhancements including active participation in vendor feature roadmap discussions.
  • Understanding the interactions between systems, applications, and services within the environment, and evaluating the impact of security changes or additions.
  • KPI/KRI Reporting to Senior Management and Key Stakeholders.
Security AdvisoryRisk ManagementProduct SecurityCybersecurity

Ing nederland

IT Risk and Security Consultant (On deputation from TCS)

Apr 2017Mar 2020 · 2 yrs 11 mos · The Randstad, Netherlands

  • Contributed in maintaining IT Risk within the Overall Risk Appetite with a focus on risk mitigation and prevention to achieve sustainable IT risk measurement score for the IT assets.
  • Advisory and Consulting support on Business Impact Assessments, Threat Modeling, Security Architecture Review, Cloud security, Business Continuity, Security Operations, Vulnerability Management, Security Assessments, GDPR Compliance, Security Event Monitoring, Identity and
  • Access Management, Change Management and Vendor Risk Governance with a focus on “Security and Privacy by design” to minimize risks.
  • Managed the expectations of diverse stakeholders including Business Owners, Data Owners, IT Management, Risk Managers, Third party suppliers, Internal/External Auditors and DevOps teams.
  • Facilitated “Advanced Persistent Threat” Analysis with a diverse set of stakeholders for mission-critical applications to proactively identify and document potential fraudulent activities and business logic vulnerabilities and to mitigate them before actual occurrence.
  • Balanced the themes of "Compliance" and "Security" in the overall risk strategy and spearheaded training for diverse set of stakeholders including DevOps teams and management in collaboration with Bank CISO to promote the culture of "Security is everyone's priority and responsibility".
  • Supported the DevOps teams on Secure Architecture & Design Review, Secure Code Review and integrating Security in the CI/CD pipeline.
  • Conducted Vulnerability Assessment & Penetration Testing for Applications, Infrastructure, APIs.
  • Presented IT Risk and Security business proposals to clients in Belgium, Spain and Netherlands.
  • Winner of two major hackathons focused on Automating IT Risk Processes and minimizing manual effort for repetitive tasks.
IT Risk ManagementSecurity ArchitectureVulnerability ManagementCybersecurityRisk Management

Tata consultancy services

Information Security Analyst | Security Solutions Consultant

Jan 2012Jan 2017 · 5 yrs · India

  • Penetration testing, Secure Code Review and Security Consulting and Advisory support for clients across Banking and Financial Services, Retail, Telecom and Health Care domains in India, Indonesia and Europe.
  • Alignment with customer/business for security strategy definition and adoption of “Shift left” approach. Adherence to required regulatory requirements.
  • Identifying and Exploiting network and application level vulnerabilities in order to illustrate risks and provide prioritized recommendations to clients.
  • Conducted 100+ hours of Information Security Awareness sessions on OWASP Top 10 and Security Programming with specialized topics on Authentication, Authorization , Session Management, Data Security , Client Side Attacks , Data Validation.
  • Presented 10+ TCS – Security presales and expertise sessions to CXO’s, Director, Senior Technical Manager, Senior Executive members of companies
  • Alignment with customer/business in order to define the requirements for the websites, requirement analysis and design approach definition and security strategy definition.
  • Testing, Identifying and Exploiting network and application level vulnerabilities in order to illustrate risks and provide prioritized recommendations to clients.
  • Handling the Request For Proposals, Estimation and Resource Loading for Security test assessments.
  • Business requirements gathering and translation into sales and marketing collaterals.
  • Creating brand visibility and customer touch points through integrated brand campaigns, account based marketing, media relations, industry partnerships and thought leadership.
  • Designing Process, Roadmaps, Strategy, Plans, RACI for Application Security Programs.
Penetration TestingSecurity ConsultingVulnerability AssessmentCybersecurityInformation Security

Iiit bangalore

Summer Intern

Jun 2011Aug 2011 · 2 mos

  • Worked on the project titled "RSA Encryption and its Acceleration Using Random Precalculation" which compared the algorithmic complexity of RSA & Random Precaculation model of encryption in real time.

Education

Rochester Institute of Technology

Micromasters in Cybersecurity

Jan 2020Jan 2020

University of Cambridge

Business English Certificate Vantage Level — Business/Corporate Communications

Odisha University of Technology and Research

Bachelor of Technology (B.Tech.) — Computer Science & Engineering

Jan 2008Jan 2012

The English and Foreign Languages University

Master's degree

Jan 2015Jan 2017

Stackforce found 100+ more professionals with Cybersecurity & Privacy Governance

Explore similar profiles based on matching skills and experience