About
My expertise is in creating products that move the needle. I drive outcomes by building…
Articles by Dipto
Activity
-
I am honored that Genius at Scale, which I co-authored with Emily Tedards and Jason Wild, has been selected as one of the Thinkers50 Best New…
I am honored that Genius at Scale, which I co-authored with Emily Tedards and Jason Wild, has been selected as one of the Thinkers50 Best New…
Liked by Dipto Chakravarty
-
Just a reminder about the great service provided by SAS - Scandinavian Airlines when flying business class within Europe. - A high standard meal…
Just a reminder about the great service provided by SAS - Scandinavian Airlines when flying business class within Europe. - A high standard meal…
Liked by Dipto Chakravarty
-
Agentic AI can give CISOs leverage where security teams are most stretched, says Dom Glavach, CISSP, CISO at Black Duck. “It can reduce repetitive…
Agentic AI can give CISOs leverage where security teams are most stretched, says Dom Glavach, CISSP, CISO at Black Duck. “It can reduce repetitive…
Liked by Dipto Chakravarty
Experience
Education
Licenses & Certifications
Volunteer Experience
-
Mentor | Cyber Security | IoT | IIoT
MACH37 Cyber Accelerator
- Present 11 years 9 months
Economic Empowerment
I coach and mentor Founders and CXOs at MACH37 - a vertical accelerator focused on information security product companies. Since joining, I have trained, coached and launched 53 cyber security companies. 73% of our graduates are still in business and 60% have raised follow-on investment.
-
-
-
Publications
-
Security 2020: Reduce Risks This Decade
Wiley
ISBN 978-0-470-63955-9.
After all these years, we find that hackers are as active and effective as ever. This book gives application developers, networking professionals, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the hype and focuses on what you need to know to combat the actual risks of today and beyond. This book provides a vision for the next 10 years with input from over 50 industry…ISBN 978-0-470-63955-9.
After all these years, we find that hackers are as active and effective as ever. This book gives application developers, networking professionals, and CIOs a straightforward look at the reality of today’s IT security and a sobering forecast of what to expect in the next decade. It debunks the hype and focuses on what you need to know to combat the actual risks of today and beyond. This book provides a vision for the next 10 years with input from over 50 industry experts.
5 star review by Amazon readers.Other authorsSee publication -
Technology Influences on Security: The Movement toward Pervasive Identity Management -- Security 2020: Reduce Security Risks This Decade
Wiley
ISBN 978-0-470-63955-9, Howard, D., Prince, K., (ed.), chap. 3.
-
"Security and Compliance Incident Response"
Computer Measurement Group
-
Building Secure XML-based Architectures for Digital Asset Managers -- XML Handbook
Prentice Hall
ISBN 0-13-055068-X, Charles Goldfarb (ed.), chap.46.
-
Multi-tier Applications for Secure Rich-Media Repositories -- Oracle8i Application Developer’s Guide
Oracle Press
See publicationA86001-01, Shelly Higgins (ed.), chap.16.
http://docs.oracle.com/cd/A87860_01/doc/appdev.817/a86030.pdf -
Software Codecs and Microprocessors -- Thomson Multimedia Reference
Wadsworth
ISBN 0-534-50719-0, G. Becker (ed.), Integrated Media Group - an imprint of Wadsworth.
Other authors -
-
PowerPC: Concepts, Architecture and Design
McGraw-Hill
ISBN 0-07-011192-8, 360 pages. Translated and republished in Japanese, German, Spanish, Portuguese and Chinese,
Other authors -
-
POWER RISC System/6000 Concepts, Facilities & Architecture
McGraw-Hill
ISBN 0-07-011047-6, 422 pages
-
Automation in Clinical Biochemistry & Laboratory: Computer Applications in Medicine -- Procedure Manual for Routine Diagnostic Tests, Medical Laboratory Technology
Tata McGraw-Hill
ISBN 0-07-451880-1, K.L. Mukherjee (ed.), vol.3, chap.32.
Patents
-
Event-driven customizable automated workflows for Incident Remediation
Issued US 9,715,675
The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events for advanced persistent threat vectors. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to…
The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events for advanced persistent threat vectors. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking, automating, orchestrating and graphically displaying the status of the workflow process progress, among other things.
Other inventorsSee patent -
Techniques for secure debugging and monitoring
Issued US US9172701B2
See patentTechniques for secure debugging and monitoring are presented. An end user requests a secure token for logging information with a remote service. A secure monitoring and debugging token service provides the secure token. The remote service validates the secure token and configures itself for capturing information and reporting the captured information based on the secure token
-
System and Method for Correlating Events in a Pluggable Correlation Architecture
Issued US 8,185,488
See patentA system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events…
A system for pluggable event correlation may include an input manager that receives a plurality of events and converts the events into a format compatible with one or more of a plurality of correlation engines. The correlation engines may then evaluate the converted events using various rules and generate correlated events when the evaluated events trigger at least one of the rules. An action manager may execute remedial actions when the correlation engines generate the correlated events. Moreover, extensibility may be provided by enabling a user to define rules to be triggered when events occur in a predetermined pattern, and actions to be executed when a predetermined rule triggers a correlated event. Further, to plug a new correlation engine into the system, adapters may be deployed to handle input and output, while the user-defined rules may be validating according to semantic requirements of the new correlation engine.
-
Computer-Implemented Method and System For Security Event Transport Using a Message Bus
Issued US 7,926,099
[Cited by 2 patents.] A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport…
[Cited by 2 patents.] A computer-implemented device provides security events from publishers to subscribers. There is provided a message bus, configured to contain a plurality of security events. Also provided is a receiver unit, responsive to a plurality of publishers, to receive the plurality of security events from the publishers. There is also a queue unit, responsive to receipt of the security events, to queue the plurality of security events in the message bus. Also, there is a transport unit, responsive to the security events in the message bus, to transport the plurality of security events in the message bus to a plurality of subscribers.
Other inventorsSee patent -
Event Source Management Using a Metadata-Driven Framework
Issued US 7,984,452
See patent[Cited by 2 patents.] The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things…
[Cited by 2 patents.] The system and method described herein relates to managing multiple network device connections, collecting event source data from one or more network devices with one or more collectors, filtering the event source data, continuously monitoring the network device connections, controlling raw data collection from the one or more network devices, parsing the event source data into normalized data structures, and managing configurations for the collectors, among other things. Event sources may be physical or logical network devices distributed across a network, including but not limited to, firewalls, routers, biometric devices, mainframes, databases, and applications. The network devices may be sources from which the collectors may receive or request the event source data.
-
Techniques For Privileged Network Routing
Issued US 8,693,327
See patentTechniques for privileged network routing are provided. As traffic is received at a gateway of a network backbone provider environment it is interrogated for predefined criteria. If the traffic satisfies the predefined criteria, then the information is routed within the network backbone provider environment to use a set of reserved and restricted resources to provide premium service for the traffic being routed through the network backbone provider environment.
-
Event-Driven Customizable Automated Workflows For Incident Remediation
Issued US 11/643,773
See patent[Cited by 5 patents.] The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the…
[Cited by 5 patents.] The invention relates to a system and method for customizing and storing workflow processes for use in remediation incidents such as security events. One aspect of the invention relates to providing tools to enable creation of customized workflow processes for event driven incident remediation, monitoring and analyzing system activity to identify occurrence of incidents, assigning a workflow process to an incident, applying the assigned workflow process to remediate the incident, and tracking and graphically displaying the status of the workflow process, among other things.
-
Computer-Implemented Method and System for Security Event Correlation
Issued US 7,673,335
See patent[Cited by 4 patents.] A system and method for analyzing events from devices relating to network security, includes a device interface(s), for receiving events from devices. One or more processors, responsive to the event received pursuant to the device interfaces, evaluate the event in accordance with rules, wherein the rules define, inter alia, an operation the system is to take to evaluate the event and an action to be taken under specified conditions. Also, the processor can determine…
[Cited by 4 patents.] A system and method for analyzing events from devices relating to network security, includes a device interface(s), for receiving events from devices. One or more processors, responsive to the event received pursuant to the device interfaces, evaluate the event in accordance with rules, wherein the rules define, inter alia, an operation the system is to take to evaluate the event and an action to be taken under specified conditions. Also, the processor can determine, responsive to the received event, whether the event is of interest, and if not, discarding the event. The processor can provide a correlation corresponding to the at least one event, for the rules.
-
Method and System for Streaming Media Manager
Issued US US20020175917A1
See patent[Cited by 7 patents.] A computer-implemented or computer-enabled method and system is provided for working with streaming media, such as digital video clips and entire videos. Clips can be grouped together and snippets of video can be re-ordered into a rough cut assemblage of a video storyboard. Later, the video storyboard and the final video scene may be fine-tuned. The invention is not limited to digital video, and may also be used with other digital assets, including for example audio…
[Cited by 7 patents.] A computer-implemented or computer-enabled method and system is provided for working with streaming media, such as digital video clips and entire videos. Clips can be grouped together and snippets of video can be re-ordered into a rough cut assemblage of a video storyboard. Later, the video storyboard and the final video scene may be fine-tuned. The invention is not limited to digital video, and may also be used with other digital assets, including for example audio, animation, logos, text, etc. Accordingly, computer-enabled storyboarding of digital assets includes providing a storage having digital assets, the digital assets including at least one digital clip, and each digital clip having frames including a key frame corresponding to the digital clip. Digital clips are selected to be included in a storyboard. The storyboard is displayed, including an image for the key frame corresponding to each of the digital clips of the storyboard. Preferably, the image is a low-resolution image representing the key frame for the digital clips. The storyboard may be modified and saved, including adding parts of digital assets to the storyboard, deleting digital clips from the storyboard, and re-ordering the order of the clips in the storyboard. The digital clips can be edited/adjusted, including adjusted the in/or out time of each clip. The storyboard may be played, that is each digital clip in the storyboard is played in sequence.
-
Method and System for Plug-in Mapper
Issued US PCT/012,710
See patentSystems, methods and mediums are provided for dynamically determining the file type, determining the media format and the player, validating the file type combination, and picking the correct player for the combination. Information is provided representative of a set of candidate video file types corresponding to video files, including candidate media formats and candidate players corresponding to each candidate video file type. Also provided is information representative of a specific video…
Systems, methods and mediums are provided for dynamically determining the file type, determining the media format and the player, validating the file type combination, and picking the correct player for the combination. Information is provided representative of a set of candidate video file types corresponding to video files, including candidate media formats and candidate players corresponding to each candidate video file type. Also provided is information representative of a specific video file to be played. In connection with the video file to be played, a selection is made of at least one corresponding media format from the candidate media formats, and of at least one corresponding media player from the candidate players. Information representative of the selected media format and the selected media player is output, preferably in a HTML file. Optionally, the invention includes launching the selected player for the file.
-
Method and System for Link Management
Issued US PCT/018,784
See patentA method and system for digital asset link management. The system includes information on units of information UOI, information on link types and storage relating to the UOI links. Optionally included is an ancillary metadata lookup table. A source value and a destination value are provided from the UOIs to the UOI links. The link type is obtained from the link types file and provided to the UOI links. Optionally, the source type and destination type are obtained from the metadata lookup table.
Projects
-
Lumify OPEN SOURCE Big Data Visualization Engine
-
See projectLumify is a Big Data fusion, analysis, and visualization platform. Its UI and UX helps discover connections and explore relationships in the data looms via a suite of analytic - 2D / 3D graph visualizations, full-text faceted search, dynamic histograms, interactive geographic maps, and collaborative workspaces shared in real-time.
-
SUSE Linux OPEN SOURCE
-
SUSE's thought leadership and strategy framework consists of 4 pillars: credibility, profile, being prolific, and depth of ideas. The freedom to "innovate everywhere" started with the commitment of the team and the community. I spearheaded SUSE's global partner engineering that led to establishing partnerships with 2400+ ISV-s worldwide.
-
Web Services Architecture Committee - W3C Working Group 11
-
See projectI founded, co-authored and published the Version 1.0 specification of Web Services Architecture as a part of the W3C Working Group between 2002 and 2004. Our v1.0 specification serves as the foundation and basis of all the web services standards, which is today's industry standard for distributed computing.
-
Digital Repositories Interoperability
-
See projectImplementation guide for the specification of the IMS Digital Repositories Interoperability (DRI). Focus was on the core functional interactions between the Mediation and Provision layers of the functional architecture.
-
IEEE Std 1484.12.1 - IMS E-Learning Consortium
-
See projectChair of Digital Repository standards committee, IMS E-Learning Consortium, IEEE Std 1484.12.1. I served as the Chair of the standards committee and helped shape its business outcome and adoption worldwide.
Honors & Awards
-
Hot Products at RSA
RSA Conference
We created industry's first cloud-based threat remediation platform. It is an AI and ML-driven malware protection platform that uses random forest, boosting and bagging techniques to provide real-time detection and automated remediation signatures. The solution eliminates targeted attacks and Zero-Day threats.
-
HPC in the Cloud Innovator's Award
High Performance Computing (HPC)
High Performance Computing in the Cloud Editors Choice awards -- Novell and IBM tied for the #1 spot and were chosen as the winners. If there is one truism that's remained a constant for well over ten years, it is cloud security is and will be the biggest hurdle barring customers from adopting hybrid IT or cloud platforms.
-
Ranked #1 in 2011 Genius Awards for Patents and Innovation
State of Utah
I led our company to take the top place in innovation and number of patents issued among all the high-tech companies across the state.
https://www.microfocus.com/it-it/about/press-room/article/2011/novell-ranked-1-in-211-utah-genius-awards/
Organizations
-
American College of Corporate Directors
-
- Present -
IEEE
-
- Present -
Cloud Security Alliance
Member
- -
Scrum Alliance
Registered Member
-Certified Scrum Developer; Certified Scrum Master; Certified Product Owner
Recommendations received
-
LinkedIn User
13 people have recommended Dipto
Join now to viewMore activity by Dipto
-
Another great month of innovation at Harness. 71 features shipped by the team in 30 days, on the heels of 55 features in March. The AI velocity gain…
Another great month of innovation at Harness. 71 features shipped by the team in 30 days, on the heels of 55 features in March. The AI velocity gain…
Liked by Dipto Chakravarty
-
🦆 🇩🇰 Live from Copenhagen! We are at V2 Security 6-7 May. Stop by our stand B-064 and discover how we can help you scale up your Application…
🦆 🇩🇰 Live from Copenhagen! We are at V2 Security 6-7 May. Stop by our stand B-064 and discover how we can help you scale up your Application…
Liked by Dipto Chakravarty
-
Sharing our recent publication on wider implementation of MRCTs in East Asia https://lnkd.in/e_G_PURf
Sharing our recent publication on wider implementation of MRCTs in East Asia https://lnkd.in/e_G_PURf
Liked by Dipto Chakravarty
-
We’re pleased to announce Pavan Kumar Boggarapu, 𝗣𝗿𝗶𝗻𝗰𝗶𝗽𝗮𝗹 𝗦𝗮𝗹𝗲𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 at Black Duck, as a 𝗽𝗿𝗲𝘀𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻…
We’re pleased to announce Pavan Kumar Boggarapu, 𝗣𝗿𝗶𝗻𝗰𝗶𝗽𝗮𝗹 𝗦𝗮𝗹𝗲𝘀 𝗘𝗻𝗴𝗶𝗻𝗲𝗲𝗿 at Black Duck, as a 𝗽𝗿𝗲𝘀𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻…
Liked by Dipto Chakravarty
-
Services profitability dominates my client conversations right now. Most services teams don't have a utilization problem. They have a margin…
Services profitability dominates my client conversations right now. Most services teams don't have a utilization problem. They have a margin…
Liked by Dipto Chakravarty
-
Soon I’ll be back at university, this time from the other side of the lecture hall. This Thursday, I’ll be at UC Berkeley to talk about “Shaping…
Soon I’ll be back at university, this time from the other side of the lecture hall. This Thursday, I’ll be at UC Berkeley to talk about “Shaping…
Liked by Dipto Chakravarty
-
Agentic AI can give CISOs leverage where security teams are most stretched, says Dom Glavach, CISO at Black Duck. “It can reduce repetitive…
Agentic AI can give CISOs leverage where security teams are most stretched, says Dom Glavach, CISO at Black Duck. “It can reduce repetitive…
Liked by Dipto Chakravarty
-
What do the CEO of Snowflake, the CTO of Vercel, the VP of Cursor, and I have in common? We're all speaking at Snowflake Dev Day on June…
What do the CEO of Snowflake, the CTO of Vercel, the VP of Cursor, and I have in common? We're all speaking at Snowflake Dev Day on June…
Liked by Dipto Chakravarty
-
Thrilled to welcome Bill Koefoed as Harness's new CFO. Bill is one of the most respected finance leaders in tech, and we are lucky to have him. He…
Thrilled to welcome Bill Koefoed as Harness's new CFO. Bill is one of the most respected finance leaders in tech, and we are lucky to have him. He…
Liked by Dipto Chakravarty
-
A shift in email threats leaders can’t ignore.🔥 In our new blog, Usman Choudhary, General Manager of VIPRE Security Group, lays out a blunt…
A shift in email threats leaders can’t ignore.🔥 In our new blog, Usman Choudhary, General Manager of VIPRE Security Group, lays out a blunt…
Liked by Dipto Chakravarty
-
Europe has the talent, technology, and industrial depth to lead the next phase of global innovation. But leadership will not be decided by ambition…
Europe has the talent, technology, and industrial depth to lead the next phase of global innovation. But leadership will not be decided by ambition…
Liked by Dipto Chakravarty
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content