Dipto Chakravarty

Dipto Chakravarty

Washington DC-Baltimore Area
12K followers 500+ connections

About

My expertise is in creating products that move the needle. I drive outcomes by building…

Articles by Dipto

Activity

Join now to see all activity

Experience

  • Black Duck Graphic
  • -

  • -

    Arlington, VA

  • -

    United States

  • -

    Toronto, Canada

  • -

    Virginia and London, UK

  • -

    California, Colorado, Mass., Virginia, Texas, Israel, India

  • -

    Virginia

  • -

    Florida, Virginia, Philippines, Spain

  • -

    Utah, Virginia, Mass., Texas, India

  • -

    Greater Boston Area

  • -

    Armonk, Austin, Dallas, Gaithersburg

  • -

    Virginia, Florida

  • -

    Maryland

  • -

    New York, Maryland

  • -

    Texas, Maryland

Education

Licenses & Certifications

Volunteer Experience

  • MACH37 Cyber Accelerator Graphic

    Mentor | Cyber Security | IoT | IIoT

    MACH37 Cyber Accelerator

    - Present 11 years 9 months

    Economic Empowerment

    I coach and mentor Founders and CXOs at MACH37 - a vertical accelerator focused on information security product companies. Since joining, I have trained, coached and launched 53 cyber security companies. 73% of our graduates are still in business and 60% have raised follow-on investment.

  • Baltimore County Graphic

    Swim Coach

    Baltimore County

    Children

  • Baltimore County Graphic

    Table Tennis Coach

    Baltimore County

    Education

  • University of Maryland Baltimore County Graphic

    Handicapped student aid

    University of Maryland Baltimore County

    Social Services

Publications

  • Security 2020: Reduce Risks This Decade

    Wiley

    ISBN 978-0-470-63955-9.
    After all these years, we find that hackers are as active and effective as ever. This book gives application developers, networking professionals, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the hype and focuses on what you need to know to combat the actual risks of today and beyond. This book provides a vision for the next 10 years with input from over 50 industry…

    ISBN 978-0-470-63955-9.
    After all these years, we find that hackers are as active and effective as ever. This book gives application developers, networking professionals, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the hype and focuses on what you need to know to combat the actual risks of today and beyond. This book provides a vision for the next 10 years with input from over 50 industry experts.

    5 star review by Amazon readers.

    Other authors
    See publication
  • Automation in Clinical Biochemistry: Medical Laboratory Technology -- Procedure Manual for Routine Diagnostic Tests

    McGraw-Hill

    ISBN-13: 978-0-07-007664-8, K.L. Mukherjee and S. Ghosh (ed.), vol.3, chap.32.

    Other authors
  • Technology Influences on Security: The Movement toward Pervasive Identity Management -- Security 2020: Reduce Security Risks This Decade

    Wiley

    ISBN 978-0-470-63955-9, Howard, D., Prince, K., (ed.), chap. 3.

  • "Security and Compliance Incident Response"

    Computer Measurement Group

    Other authors
    See publication
  • Building Secure XML-based Architectures for Digital Asset Managers -- XML Handbook

    Prentice Hall

    ISBN 0-13-055068-X, Charles Goldfarb (ed.), chap.46.

  • Multi-tier Applications for Secure Rich-Media Repositories -- Oracle8i Application Developer’s Guide

    Oracle Press

    A86001-01, Shelly Higgins (ed.), chap.16.
    http://docs.oracle.com/cd/A87860_01/doc/appdev.817/a86030.pdf

    See publication
  • Software Codecs and Microprocessors -- Thomson Multimedia Reference

    Wadsworth

    ISBN 0-534-50719-0, G. Becker (ed.), Integrated Media Group - an imprint of Wadsworth.

    Other authors
    • Camil Samaha
  • PowerPC: Concepts, Architecture and Design

    McGraw-Hill

    ISBN 0-07-011192-8, 360 pages. Translated and republished in Japanese, German, Spanish, Portuguese and Chinese,

    Other authors
    • Casey Cannon
  • POWER RISC System/6000 Concepts, Facilities & Architecture

    McGraw-Hill

    ISBN 0-07-011047-6, 422 pages

  • Automation in Clinical Biochemistry & Laboratory: Computer Applications in Medicine -- Procedure Manual for Routine Diagnostic Tests, Medical Laboratory Technology

    Tata McGraw-Hill

    ISBN 0-07-451880-1, K.L. Mukherjee (ed.), vol.3, chap.32.

Join now to see all publications

Patents

  • Event-driven customizable automated workflows for Incident Remediation

    Issued US 9,715,675

    The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events for advanced persistent threat vectors. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to…

    The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events for advanced persistent threat vectors. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking, automating, orchestrating and graphically displaying the status of the workflow process progress, among other things.

    Other inventors
    See patent
  • Techniques for secure debugging and monitoring

    Issued US US9172701B2

    Techniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token

    See patent
  • System and Method for Correlating Events in a Pluggable Correlation Architecture

    Issued US 8,185,488

    A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events…

    A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events. Moreover, extensibility may be provided by enabling a user to define rules to be triggered when events occur in a predetermined pattern, and actions to be executed when a predetermined rule triggers a correlated event. Further, to plug a new correlation engine into the system, adapters may be deployed to handle input and output, while the user-defined rules may be validating according to semantic requirements of the new correlation engine.

    See patent
  • Computer-Implemented Method and System For Security Event Transport Using a Message Bus

    Issued US 7,926,099

    [Cited by 2 patents.] A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport…

    [Cited by 2 patents.] A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport unit, responsive to the security events in the message bus, to transport the plurality of security events in the message bus to a plurality of subscribers.

    Other inventors
    See patent
  • Event Source Management Using a Metadata-Driven Framework

    Issued US 7,984,452

    [Cited by 2 patents.] The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things…

    [Cited by 2 patents.] The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.

    See patent
  • Techniques For Privileged Network Routing

    Issued US 8,693,327

    Techniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.

    See patent
  • Event-Driven Customizable Automated Workflows For Incident Remediation

    Issued US 11/643,773

    [Cited by 5 patents.] The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the…

    [Cited by 5 patents.] The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.

    See patent
  • Computer-Implemented Method and System for Security Event Correlation

    Issued US 7,673,335

    [Cited by 4 patents.] A system and method for analyzing events from devices relating to network security, includes a device interface(s), for receiving events from devices. One or more processors, responsive to the event received pursuant to the device interfaces, evaluate the event in accordance with rules, wherein the rules define, inter alia, an operation the system is to take to evaluate the event and an action to be taken under specified conditions. Also, the processor can determine…

    [Cited by 4 patents.] A system and method for analyzing events from devices relating to network security, includes a device interface(s), for receiving events from devices. One or more processors, responsive to the event received pursuant to the device interfaces, evaluate the event in accordance with rules, wherein the rules define, inter alia, an operation the system is to take to evaluate the event and an action to be taken under specified conditions. Also, the processor can determine, responsive to the received event, whether the event is of interest, and if not, discarding the event. The processor can provide a correlation corresponding to the at least one event, for the rules.

    See patent
  • Method and System for Streaming Media Manager

    Issued US US20020175917A1

    [Cited by 7 patents.] A computer-implemented or computer-enabled method and system is provided for working with streaming media, such as digital video clips and entire videos. Clips can be grouped together and snippets of video can be re-ordered into a rough cut assemblage of a video storyboard. Later, the video storyboard and the final video scene may be fine-tuned. The invention is not limited to digital video, and may also be used with other digital assets, including for example audio…

    [Cited by 7 patents.] A computer-implemented or computer-enabled method and system is provided for working with streaming media, such as digital video clips and entire videos. Clips can be grouped together and snippets of video can be re-ordered into a rough cut assemblage of a video storyboard. Later, the video storyboard and the final video scene may be fine-tuned. The invention is not limited to digital video, and may also be used with other digital assets, including for example audio, animation, logos, text, etc. Accordingly, computer-enabled storyboarding of digital assets includes providing a storage having digital assets, the digital assets including at least one digital clip, and each digital clip having frames including a key frame corresponding to the digital clip. Digital clips are selected to be included in a storyboard. The storyboard is displayed, including an image for the key frame corresponding to each of the digital clips of the storyboard. Preferably, the image is a low-resolution image representing the key frame for the digital clips. The storyboard may be modified and saved, including adding parts of digital assets to the storyboard, deleting digital clips from the storyboard, and re-ordering the order of the clips in the storyboard. The digital clips can be edited/adjusted, including adjusted the in/or out time of each clip. The storyboard may be played, that is each digital clip in the storyboard is played in sequence.

    See patent
  • Method and System for Plug-in Mapper

    Issued US PCT/012,710

    Systems, methods and mediums are provided for dynamically determining the file type, determining the media format and the player, validating the file type combination, and picking the correct player for the combination. Information is provided representative of a set of candidate video file types corresponding to video files, including candidate media formats and candidate players corresponding to each candidate video file type. Also provided is information representative of a specific video…

    Systems, methods and mediums are provided for dynamically determining the file type, determining the media format and the player, validating the file type combination, and picking the correct player for the combination. Information is provided representative of a set of candidate video file types corresponding to video files, including candidate media formats and candidate players corresponding to each candidate video file type. Also provided is information representative of a specific video file to be played. In connection with the video file to be played, a selection is made of at least one corresponding media format from the candidate media formats, and of at least one corresponding media player from the candidate players. Information representative of the selected media format and the selected media player is output, preferably in a HTML file. Optionally, the invention includes launching the selected player for the file.

    See patent
  • Method and System for Link Management

    Issued US PCT/018,784

    A method and system for digital asset link management. The system includes information on units of information UOI, information on link types and storage relating to the UOI links. Optionally included is an ancillary metadata lookup table. A source value and a destination value are provided from the UOIs to the UOI links. The link type is obtained from the link types file and provided to the UOI links. Optionally, the source type and destination type are obtained from the metadata lookup table.

    See patent

Projects

  • Lumify OPEN SOURCE Big Data Visualization Engine

    -

    Lumify is a Big Data fusion, analysis, and visualization platform. Its UI and UX helps discover connections and explore relationships in the data looms via a suite of analytic - 2D / 3D graph visualizations, full-text faceted search, dynamic histograms, interactive geographic maps, and collaborative workspaces shared in real-time.

    See project
  • SUSE Linux OPEN SOURCE

    -

    SUSE's thought leadership and strategy framework consists of 4 pillars: credibility, profile, being prolific, and depth of ideas. The freedom to "innovate everywhere" started with the commitment of the team and the community. I spearheaded SUSE's global partner engineering that led to establishing partnerships with 2400+ ISV-s worldwide.

  • Web Services Architecture Committee - W3C Working Group 11

    -

    I founded, co-authored and published the Version 1.0 specification of Web Services Architecture as a part of the W3C Working Group between 2002 and 2004. Our v1.0 specification serves as the foundation and basis of all the web services standards, which is today's industry standard for distributed computing.

    See project
  • Digital Repositories Interoperability

    -

    Implementation guide for the specification of the IMS Digital Repositories Interoperability (DRI). Focus was on the core functional interactions between the Mediation and Provision layers of the functional architecture.

    See project
  • IEEE Std 1484.12.1 - IMS E-Learning Consortium

    -

    Chair of Digital Repository standards committee, IMS E-Learning Consortium, IEEE Std 1484.12.1. I served as the Chair of the standards committee and helped shape its business outcome and adoption worldwide.

    See project

Honors & Awards

  • Hot Products at RSA

    RSA Conference

    We created industry's first cloud-based threat remediation platform. It is an AI and ML-driven malware protection platform that uses random forest, boosting and bagging techniques to provide real-time detection and automated remediation signatures. The solution eliminates targeted attacks and Zero-Day threats.

  • HPC in the Cloud Innovator's Award

    High Performance Computing (HPC)

    High Performance Computing in the Cloud Editors Choice awards -- Novell and IBM tied for the #1 spot and were chosen as the winners. If there is one truism that's remained a constant for well over ten years, it is cloud security is and will be the biggest hurdle barring customers from adopting hybrid IT or cloud platforms.

  • Ranked #1 in 2011 Genius Awards for Patents and Innovation

    State of Utah

    I led our company to take the top place in innovation and number of patents issued among all the high-tech companies across the state.
    https://www.microfocus.com/it-it/about/press-room/article/2011/novell-ranked-1-in-211-utah-genius-awards/

Organizations

  • American College of Corporate Directors

    -

    - Present
  • IEEE

    -

    - Present
  • Cloud Security Alliance

    Member

    -
  • Scrum Alliance

    Registered Member

    -

    Certified Scrum Developer; Certified Scrum Master; Certified Product Owner

Recommendations received

13 people have recommended Dipto

Join now to view

More activity by Dipto

View Dipto’s full profile

  • See who you know in common
  • Get introduced
  • Contact Dipto directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content