About
I am a driven and business savvy technologist with 20 years of experience.
I'm a…
Activity
8K followers
Education
Licenses & Certifications
Volunteer Experience
-
Advisory Board Member
Rutgers University
- 3 years
Science and Technology
The Cybersecurity Advisory Board performs strategic reviews of the Rutgers Cyber Security Certificate Program's credit and noncredit offerings and builds visibility and value for them within the business community. In addition to board participation, members share their industry experience with faculty.
-
Distinguished Lecturer
Foundation for Free Enterprise Education (Pennsylvania Free Enterprise Week -- PFEW)
- 12 years
Science and Technology
Speak annually and mentor 300 of PA's top High School Students
-
Board Member
Alphatec
- 2 years
Science and Technology
Mission - Educate, grow and facilitate outstanding networking opportunities for CEOs at emerging growth companies in the cybersecurity and data analytics industry.
Publications
-
Channeling Security: Customers Want Outcomes, Not Noise
Channel Partners
See publicationAt last week’s Splunk.conf, I sat down with Atif Ghauri, CTO of Splunk partner and cybersecurity provider Herjavec Group, to talk challenges and opportunities for channel partners.
Ghauri, who spent four years as CISO for Comcast’s advanced engineering group and did stints at IBM and Unisys, warned at last year’s conference that we’re losing the cybersecurity arms race. That assessment hasn’t changed.
“The temperature is still going up," Ghauri says. “It's hotter than…At last week’s Splunk.conf, I sat down with Atif Ghauri, CTO of Splunk partner and cybersecurity provider Herjavec Group, to talk challenges and opportunities for channel partners.
Ghauri, who spent four years as CISO for Comcast’s advanced engineering group and did stints at IBM and Unisys, warned at last year’s conference that we’re losing the cybersecurity arms race. That assessment hasn’t changed.
“The temperature is still going up," Ghauri says. “It's hotter than ever."
Still, the news isn’t all bad. Machine learning is reducing false positives and alleviating the skills shortage, and cyberwarfare being raised in the presidential debate illustrates growing awareness. -
Is big data analytics big enough for everyone?
Channelnomic
See publicationBig data and analytics may be considered an emerging technology, but that doesn't mean the channel is waiting to jump in. There are players like Splunk that were born around this space, but with the market growing, more old school vendors are getting involved, and channel partners have their fair share of competition as well, begging the question, is there enough room in the analytics market for everyone?
-
MSSPs challenged to use machine learning to solve IoT 'noise problem'
Channelnomic
See publicationBig data is all the rage right now, and with the Internet of Things (IoT) continuing to grow, it seems data is going to get even bigger. According to MSSP Herjavec Group, this is and will continue creating a bit of a "noise problem" for the channel, which machine learning can help answer - if further developed.
-
Hackerpocalypse: A Cybercrime Revelation.
Cybersecurity Ventures
See publicationIn the report, Cybersecurity Ventures predicts global cybercrime costs will grow from $3 trillion annually to $6 trillion annually by 2021. This report offers an overview of the cybercrime epidemic impacting governments and enterprises globally.
-
Disruptive Security Trends for 2016
Infotech Research Group
Executive Summary
• The security landscape is rapidly evolving with new technology trends,
security threats, and new mitigation controls emerging every day.
• IT and security professionals are expected to be aware of these new
trends and be prepared for them – whether it is securing a new technology
or having security controls in place for the latest attack type.
• Most IT and security professionals are too busy dealing with current
security issues to be looking to the…Executive Summary
• The security landscape is rapidly evolving with new technology trends,
security threats, and new mitigation controls emerging every day.
• IT and security professionals are expected to be aware of these new
trends and be prepared for them – whether it is securing a new technology
or having security controls in place for the latest attack type.
• Most IT and security professionals are too busy dealing with current
security issues to be looking to the future for new security trends. There is
not enough time to dedicate to researching new trends.
• In addition, there is security news coming from many different sources and
it can be challenging to understand which are relevant trends that will have
a notable impact.
• Use Info-Tech’s research in order to understand what are the upcoming security trends within technology, threats, and
new mitigation tactics that organizations should be concerning themselves with.
• The trends in this report are all ones that will have a major impact in the near future whether it’s currently influencing
change today, or it is something that organizations will need to prepare for.
• Become a trusted advisor that is recognized for his/her foresight to new security trends which can help to enable the larger organization. -
Online security – the weakest link
Fraud Intelligence
See publicationOnline Security – The Weakest Link
As cyber-attacks on online banking become advance in sophistication, anti-fraud experts are advising firms to defend themselves not only with the latest technology, but through more careful due diligence. -
Exploit Disruptive Trends for 2015
Info Tech Research Group
See publicationSecurity leaders must proactively monitor and evaluate major IT trends, the threat landscape, and the security market to identify input for strategic business initiatives and to become trusted advisors to the board.
Security leaders are short on resources to fight existing fires, let alone to allocate resources to develop forward-looking insights into what may happen to their organization.
They will need to be able to present a strong security perspective on the latest security trends if…Security leaders must proactively monitor and evaluate major IT trends, the threat landscape, and the security market to identify input for strategic business initiatives and to become trusted advisors to the board.
Security leaders are short on resources to fight existing fires, let alone to allocate resources to develop forward-looking insights into what may happen to their organization.
They will need to be able to present a strong security perspective on the latest security trends if they are to be taken seriously and earn a seat at the C-suite table. -
Never neglect security during product development
B2B News Network
See publicationConsistent cadence of interviews and quotes on multiple cyber security blogs and periodicals
-
SOA Security 101: Patching the Firewall Hole
InformIT
See publicationService-oriented architectures have opened and connected "black box" software implementations across enterprises, resulting in a new set of interoperable heterogeneous solutions with the common thread of standard protocols. While this level of integration is unprecedented for enterprise systems, it further muddies the water for application security. The objective of this article is to first introduce the new threats associated with service-oriented solutions, and then provide fundamental design…
Service-oriented architectures have opened and connected "black box" software implementations across enterprises, resulting in a new set of interoperable heterogeneous solutions with the common thread of standard protocols. While this level of integration is unprecedented for enterprise systems, it further muddies the water for application security. The objective of this article is to first introduce the new threats associated with service-oriented solutions, and then provide fundamental design considerations to mitigate the risks resulting from these threats.
-
Analytics key for security MSPs
Channelnomics
See publicationConsistent cadence of interviews and quotes on multiple cyber security blogs and periodicals
Patents
-
Fraud Detection Using Anomaly Detection
US 20130269043
System and Method for Analyzing A Device
Publication number: 20130269043
Honors & Awards
-
Quoted in Science Magazine
Science Magazine
Network vulnerabilities are everywhere — to find them you simply have to keep your eyes open. But vulnerabilities don’t live in a vacuum, they often occur in conjunction with some other IT security policy or procedure violation, creating a multilayer challenge for the security team.
https://cam.scmagazine.com/building-a-better-asset-management-program/ -
Electronic Voting - Cybersecurity
Computerworld
https://www.computerworld.com/article/3519217/iowa-caucus-chaos-likely-to-set-back-mobile-voting.html
-
Cybersecurity Expert Panelist - NYSSCPA
New York State Society of Certified Public Accountants
New York State Society of CPA Conference in New York City
-
Cybersecurity Expert Panelist - Trends in Cybersecurity
Institute of International Bankers
Presentation to IIB
-
Guest Lecturer at Wharton - Data Privacy
University of Pennsylvania - Wharton School
Spoke to a distinguished group of student/alumni in Philadelphia
-
Motivational Speaker - Mazars Partner Summit
Mazars
Addressed the topic of being more resourceful to drive business and personal lives
-
Cybersecurity Expert Panelist - Next Generation of Cybersecurity
Rutgers University
Spoke to a large group of students, faculty, and alumni about Cybersecurity
-
Managed Services - Wedding Planning and Couples Counseling
McAfee
Panel Talk on Best Practices for Managed Security Services at McAfee MPOWER Global Conference
-
Motivational Speaker - Resilience in Times of Uncertainty
Bristol Myers Squibb
Guest speaker at the Diversity and Inclusion Mentoring Forum
-
Guest Lecturer at (ISC)2 Security Congress (20,000 Security Practitioners)
ISC2
Next Generation Endpoint Security for Dummies
http://www.slideshare.net/AtifGhauri/nextgen-endpoint-security-for-dummies
-
Guest Speaker at Cloud Security Alliance Congress
Cloud Security Alliance
http://www.slideshare.net/AtifGhauri/security-outsourcing-couples-counseling-atif-ghauri
-
Guest Speaker at GDS International Summit (300 C-Level Security Executives)
GDS International
-
Guest Lecturer at (ISC)2 Security Congress (20,000 Security Practitioners)
(ISC)2
Presented "Its Not You Its Me - MSSP Couples Counseling" in Anaheim, CA
-
Interviewed on theCube Siliconangle Media for Security Industry Insights
theCube
Expert Interview on Cyber Security
https://www.youtube.com/watch?v=4SlVKZDjeQM -
Expert Interview - Tech Times - Cyber Security
http://www.techtimes.com/articles/61085/20150617/herjavec-group-cyber-security-shows-ways-houston-astros-prevented-st.htm
Consistent cadence of interviews and quotes on multiple cyber security blogs and periodicals
-
Distinguished Guest CXO Study Summit
Infotech Research Group
-
Distinguished Guest Speaker - InfoTech Startup Week
Penn State University
http://startupweek.weebly.com/2015-startup-week.html
Organizations
-
Cloud Security Alliance
-
- Present -
ISACA
-
- Present -
ISC2
-
- Present
Recommendations received
3 people have recommended Atif
Join now to viewOther similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content