Biji Scaria
  • Male
  • Dubai
  • United Arab Emirates
Share on Facebook
Share

Biji Scaria's Friends

  • Ater Mawut Mayen
  • SYED Manzar Imam Mehdi
  • Cinthia Pilar
  • Boris Agranovich

Gifts Received

Gift

Biji Scaria has not received any gifts yet

Give a Gift

 

Biji Scaria's Page

Start Contributing Now!

Biji Scaria and Ater Mawut Mayen are now friends
Nov 17
Biji Scaria and SYED Manzar Imam Mehdi are now friends
Apr 6
Biji Scaria posted a blog post

New Age Firewall - Identity and Data Driven Security

Introduction In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is protected by firewalls with access…See More
Feb 25
GlobalRiskCommunity liked Biji Scaria's blog post 'United Arab Emirates (UAE) Data Protection and Privacy Laws & Regulations'
Nov 5, 2017
Biji Scaria posted a blog post

United Arab Emirates (UAE) Data Protection and Privacy Laws & Regulations

IntroductionIn simple words ‘Data Protection’ can be defined as the law and/or regulation designed to protect your Personal Data or Personally Identifiable Information (PII), which is collected, processed and stored by companies, institutions etc. In this era where data security breaches happen almost daily, it is essential that data protection laws and regulations restrain and shape the activities of companies and other institutions.The objective of this article is to give an overview of key…See More
Oct 20, 2017

Profile Information

Tell us more about who you are, what you do and where you want to be. What are your main business challenges? (Tip: provide your current Job Title, Industry, company or/and paste your Linkedin profile here). Use as many relevant keywords as possible. Tell us what you can offer the community. What sorts of discussions, events, and activities you can participate in.
Biji is a senior Information Security and Risk Management Professional with a wealth of business, managerial and technical experience gleaned over a 16+ year professional career. He got extensive experience in ICT Security, Security Risk Management, Identity & Access Management (IAM), Data Security, Telecom Security, Cloud Computing, Cloud Security, Security Operation Centre (SOC) and Managed Security Services.

In his current role at du Telecom, Biji provides leadership for: 'Strategy definition and Implementation' of overall du ICT Security, IAM Program, Data Security and Privacy Program and du Cloud & Mobile Security. Biji has successfully managed multinational and multi-location teams in large security programs, governance and delivery.

His research interests include Attribute Based Access Control (ABAC), Borderless Security, Cloud Computing Models and Security, Cloud Auditing, Regulations, Standards and Cloud based Authentication & Authorization Abstraction. He Coauthored Amazon Kindle eBook 'Cyber Crime and IT Risks'

Key Experience includes
- IT and Security Programs, Risk Management, Security Architecture and GRC.
- CTO/CXO Level engagement & stakeholder management.
- Data Protection Regulation, Standards & Strategy.
- Very good knowledge of international and local standards like PCI DSS, NESA, ADSIC and ISO 27001.
- Cloud leader, Cloud Security Strategy, promoting / evangelizing secured cloud computing.
- Very good knowledge and experience in Identity & Access Management/SSO (IAM) domains
- Very good experience in handling multimillion dollar projects and budgets (CAPEX & OPEX)

He has successfully managed and build a large federal Security Operations Center (SOC) including people, process and technology (SIEM). Further he was instrumental in strategizing and developing du Identity and Access Management (IAM) overall vision, strategy and implementation road map. Currently hes leading du’s multiyear ‘Data Security & Privacy Program’.
I am interested in
Speaking engagements, Consulting offers, Job inquiries, Career opportunities, Expertise requests

Biji Scaria's Blog

New Age Firewall - Identity and Data Driven Security

Posted on February 25, 2018 at 5:53pm 0 Comments

Introduction

 

In a conventional security thinking, IT Security at most of the enterprises follow old ‘Industrial Security Model’ where its considered that assets are held within a perimeter and users must enter the perimeter physically or logically (LAN/VPN) to access the assets and the perimeter is guarded by a gatehouse / guard. In other words, this model is called perimeterised computer network where data and applications is attached to the network and is…

Continue

United Arab Emirates (UAE) Data Protection and Privacy Laws & Regulations

Posted on October 20, 2017 at 11:21am 0 Comments

Introduction

In simple words ‘Data Protection’ can be defined as the law and/or regulation designed to protect your Personal Data or Personally Identifiable Information (PII), which is collected, processed and stored by companies, institutions etc. In this era where data security breaches happen almost daily, it is essential that data protection laws and regulations restrain and…

Continue

Importance of Patch Management in effective IT Risk Management

Posted on February 20, 2011 at 5:00pm 0 Comments

Introduction

The classic text book definition of risk is, “the probability of a threat agent exploiting vulnerability and the resulting business impact”. Vulnerability can be from applications, software’s, firewalls, people, process, location etc and what we're trying to see here is the vulnerability from software’s or applications and importance of patch management which in turn will result in effective risk management .

Effective Patch Management =…

Continue

Security Risks of Web 2.0

Posted on January 30, 2011 at 1:20pm 0 Comments

Introduction

Let’s start with what’s Web 2.0 before getting in to the risks.

The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

For some of you still not clear of what’s Web 2.0 let me put it down in a different way. Web 2.0 is Facebook or MySpace or Linkedin or Twitter or the blogs or the Wikis or any web site which…

Continue

Comment Wall

You need to be a member of GlobalRisk community to add comments!

Join GlobalRisk community

 
 
 

Our Sponsors

Would you like to reach over 70,000 + Risk Professionals? 

REQUEST OUR MEDIA KIT

______________________

Current Partners Include:

    

 

Join GRC Inner Circle - Get Top Risk Resources, Member Support PLUS become our patron

Business Exchange

If your organization delivers products and services that bring value to our members, you are welcome to join our partnership program.

Companies are welcome to setup a business profile page in our Multimedia Business Directory. You will get full control of the page and can include cutting edge possibilities – videos, adverts, presentations, white papers, job offers, Press Releases, product information, company blog, news feeds and more.

CLICK HERE TO APPLY

Our Knowledge Partners

Request our MEDIA KIT

Our Twitter feed

© 2018   Created by Boris Agranovich.   Powered by

Badges  |  Report an Issue  |  Terms of Service