Atif Ghauri

Atif Ghauri

Philadelphia, Pennsylvania, United States
8K followers 500+ connections

About

I am a driven and business savvy technologist with 20 years of experience.

I'm a…

Activity

8K followers

See all activities

Education

Licenses & Certifications

Volunteer Experience

  • Rutgers University Graphic

    Advisory Board Member

    Rutgers University

    - 3 years

    Science and Technology

    The Cybersecurity Advisory Board performs strategic reviews of the Rutgers Cyber Security Certificate Program's credit and noncredit offerings and builds visibility and value for them within the business community. In addition to board participation, members share their industry experience with faculty.

  • Foundation for Free Enterprise Education (Pennsylvania Free Enterprise Week -- PFEW) Graphic

    Distinguished Lecturer

    Foundation for Free Enterprise Education (Pennsylvania Free Enterprise Week -- PFEW)

    - 12 years

    Science and Technology

    Speak annually and mentor 300 of PA's top High School Students

  • Alphatec Graphic

    Board Member

    Alphatec

    - 2 years

    Science and Technology

    Mission - Educate, grow and facilitate outstanding networking opportunities for CEOs at emerging growth companies in the cybersecurity and data analytics industry.

Publications

  • Channeling Security: Customers Want Outcomes, Not Noise

    Channel Partners

    At last week’s Splunk.conf, I sat down with Atif Ghauri, CTO of Splunk partner and cybersecurity provider Herjavec Group, to talk challenges and opportunities for channel partners.

    Ghauri, who spent four years as CISO for Comcast’s advanced engineering group and did stints at IBM and Unisys, warned at last year’s conference that we’re losing the cybersecurity arms race. That assessment hasn’t changed.

    “The temperature is still going up," Ghauri says. “It's hotter than…

    At last week’s Splunk.conf, I sat down with Atif Ghauri, CTO of Splunk partner and cybersecurity provider Herjavec Group, to talk challenges and opportunities for channel partners.

    Ghauri, who spent four years as CISO for Comcast’s advanced engineering group and did stints at IBM and Unisys, warned at last year’s conference that we’re losing the cybersecurity arms race. That assessment hasn’t changed.

    “The temperature is still going up," Ghauri says. “It's hotter than ever."

    Still, the news isn’t all bad. Machine learning is reducing false positives and alleviating the skills shortage, and cyberwarfare being raised in the presidential debate illustrates growing awareness.

    See publication
  • Is big data analytics big enough for everyone?

    Channelnomic

    Big data and analytics may be considered an emerging technology, but that doesn't mean the channel is waiting to jump in. There are players like Splunk that were born around this space, but with the market growing, more old school vendors are getting involved, and channel partners have their fair share of competition as well, begging the question, is there enough room in the analytics market for everyone?

    See publication
  • MSSPs challenged to use machine learning to solve IoT 'noise problem'​

    Channelnomic

    Big data is all the rage right now, and with the Internet of Things (IoT) continuing to grow, it seems data is going to get even bigger. According to MSSP Herjavec Group, this is and will continue creating a bit of a "noise problem" for the channel, which machine learning can help answer - if further developed.

    See publication
  • Hackerpocalypse: A Cybercrime Revelation.

    Cybersecurity Ventures

    In the report, Cybersecurity Ventures predicts global cybercrime costs will grow from $3 trillion annually to $6 trillion annually by 2021. This report offers an overview of the cybercrime epidemic impacting governments and enterprises globally.

    See publication
  • Disruptive Security Trends for 2016

    Infotech Research Group

    Executive Summary
    • The security landscape is rapidly evolving with new technology trends,
    security threats, and new mitigation controls emerging every day.
    • IT and security professionals are expected to be aware of these new
    trends and be prepared for them – whether it is securing a new technology
    or having security controls in place for the latest attack type.
    • Most IT and security professionals are too busy dealing with current
    security issues to be looking to the…

    Executive Summary
    • The security landscape is rapidly evolving with new technology trends,
    security threats, and new mitigation controls emerging every day.
    • IT and security professionals are expected to be aware of these new
    trends and be prepared for them – whether it is securing a new technology
    or having security controls in place for the latest attack type.
    • Most IT and security professionals are too busy dealing with current
    security issues to be looking to the future for new security trends. There is
    not enough time to dedicate to researching new trends.
    • In addition, there is security news coming from many different sources and
    it can be challenging to understand which are relevant trends that will have
    a notable impact.
    • Use Info-Tech’s research in order to understand what are the upcoming security trends within technology, threats, and
    new mitigation tactics that organizations should be concerning themselves with.
    • The trends in this report are all ones that will have a major impact in the near future whether it’s currently influencing
    change today, or it is something that organizations will need to prepare for.
    • Become a trusted advisor that is recognized for his/her foresight to new security trends which can help to enable the larger organization.

  • Online security – the weakest link

    Fraud Intelligence

    Online Security – The Weakest Link

    As cyber-attacks on online banking become advance in sophistication, anti-fraud experts are advising firms to defend themselves not only with the latest technology, but through more careful due diligence.

    See publication
  • Exploit Disruptive Trends for 2015

    Info Tech Research Group

    Security leaders must proactively monitor and evaluate major IT trends, the threat landscape, and the security market to identify input for strategic business initiatives and to become trusted advisors to the board.
    Security leaders are short on resources to fight existing fires, let alone to allocate resources to develop forward-looking insights into what may happen to their organization.
    They will need to be able to present a strong security perspective on the latest security trends if…

    Security leaders must proactively monitor and evaluate major IT trends, the threat landscape, and the security market to identify input for strategic business initiatives and to become trusted advisors to the board.
    Security leaders are short on resources to fight existing fires, let alone to allocate resources to develop forward-looking insights into what may happen to their organization.
    They will need to be able to present a strong security perspective on the latest security trends if they are to be taken seriously and earn a seat at the C-suite table.

    See publication
  • Never neglect security during product development

    B2B News Network

    Consistent cadence of interviews and quotes on multiple cyber security blogs and periodicals

    See publication
  • SOA Security 101: Patching the Firewall Hole

    InformIT

    Service-oriented architectures have opened and connected "black box" software implementations across enterprises, resulting in a new set of interoperable heterogeneous solutions with the common thread of standard protocols. While this level of integration is unprecedented for enterprise systems, it further muddies the water for application security. The objective of this article is to first introduce the new threats associated with service-oriented solutions, and then provide fundamental design…

    Service-oriented architectures have opened and connected "black box" software implementations across enterprises, resulting in a new set of interoperable heterogeneous solutions with the common thread of standard protocols. While this level of integration is unprecedented for enterprise systems, it further muddies the water for application security. The objective of this article is to first introduce the new threats associated with service-oriented solutions, and then provide fundamental design considerations to mitigate the risks resulting from these threats.

    See publication
  • Analytics key for security MSPs

    Channelnomics

    Consistent cadence of interviews and quotes on multiple cyber security blogs and periodicals

    See publication
Join now to see all publications

Patents

  • Fraud Detection Using Anomaly Detection

    US 20130269043

    System and Method for Analyzing A Device
    Publication number: 20130269043

Honors & Awards

  • Quoted in Science Magazine

    Science Magazine

    Network vulnerabilities are everywhere — to find them you simply have to keep your eyes open. But vulnerabilities don’t live in a vacuum, they often occur in conjunction with some other IT security policy or procedure violation, creating a multilayer challenge for the security team.

    https://cam.scmagazine.com/building-a-better-asset-management-program/

  • Electronic Voting - Cybersecurity

    Computerworld

    https://www.computerworld.com/article/3519217/iowa-caucus-chaos-likely-to-set-back-mobile-voting.html

  • Cybersecurity Expert Panelist - NYSSCPA

    New York State Society of Certified Public Accountants

    New York State Society of CPA Conference in New York City

  • Cybersecurity Expert Panelist - Trends in Cybersecurity

    Institute of International Bankers

    Presentation to IIB

  • Guest Lecturer at Wharton - Data Privacy

    University of Pennsylvania - Wharton School

    Spoke to a distinguished group of student/alumni in Philadelphia

  • Motivational Speaker - Mazars Partner Summit

    Mazars

    Addressed the topic of being more resourceful to drive business and personal lives

  • Cybersecurity Expert Panelist - Next Generation of Cybersecurity

    Rutgers University

    Spoke to a large group of students, faculty, and alumni about Cybersecurity

  • Managed Services - Wedding Planning and Couples Counseling

    McAfee

    Panel Talk on Best Practices for Managed Security Services at McAfee MPOWER Global Conference

  • Motivational Speaker - Resilience in Times of Uncertainty

    Bristol Myers Squibb

    Guest speaker at the Diversity and Inclusion Mentoring Forum

  • Guest Lecturer at (ISC)2 Security Congress (20,000 Security Practitioners)

    ISC2

    Next Generation Endpoint Security for Dummies

    http://www.slideshare.net/AtifGhauri/nextgen-endpoint-security-for-dummies

  • Guest Speaker at Cloud Security Alliance Congress

    Cloud Security Alliance

    http://www.slideshare.net/AtifGhauri/security-outsourcing-couples-counseling-atif-ghauri

  • Guest Speaker at GDS International Summit (300 C-Level Security Executives)

    GDS International

  • Guest Lecturer at (ISC)2 Security Congress (20,000 Security Practitioners)

    (ISC)2

    Presented "Its Not You Its Me - MSSP Couples Counseling" in Anaheim, CA

  • Interviewed on theCube Siliconangle Media for Security Industry Insights

    theCube

    Expert Interview on Cyber Security

    https://www.youtube.com/watch?v=4SlVKZDjeQM

  • Expert Interview - Tech Times - Cyber Security

    http://www.techtimes.com/articles/61085/20150617/herjavec-group-cyber-security-shows-ways-houston-astros-prevented-st.htm

    Consistent cadence of interviews and quotes on multiple cyber security blogs and periodicals

  • Distinguished Guest CXO Study Summit

    Infotech Research Group

  • Distinguished Guest Speaker - InfoTech Startup Week

    Penn State University

    http://startupweek.weebly.com/2015-startup-week.html

Organizations

  • Cloud Security Alliance

    -

    - Present
  • ISACA

    -

    - Present
  • ISC2

    -

    - Present

Recommendations received

View Atif’s full profile

  • See who you know in common
  • Get introduced
  • Contact Atif directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses