Award winning Senior Cybersecurity Engineer SME with expertise in PAM, IAM administration, GRC compliance, and security analysis. Skilled in protecting systems and reducing risks with strategic security solutions.
$ ForgeRock Global Rollout
$ Tenant Hygiene & Lifecycle Automation
$ Risk-based Adaptive Auth Policies
$ JIT Elevation (PIM/PAM)
$ Ephemeral Credentials Strategy
$ Break-glass Auditing & Monitoring
$ SOX / HIPAA / ISO Frameworks
$ Role-Based Access Control (RBAC)
$ Privileged Risk Assessment
Pragmatic approaches to IAM/PAM excellence at enterprise scale, published by Gary Miliefsky.
Full-length video interview featuring KOUSHIK ANAND discussing IAM/PAM insights and enterprise-scale practices.
Listen on-the-go — the full audio from the CyberDefense Magazine interview.
Intelligent system optimizing water and fertilizer use for agricultural crops using fuzzy logic.
ERH-based sensor system developed to measure rice granule moisture content with error.
Extending Privileged Access Management (PAM) to web applications safeguards sensitive systems.
Strategies for enforcing least privilege in AWS, Azure, and GCP using continuous identity entitlement.
Discovery, federation, rotation, and developer experience strategies for large environments.
Hidden gotchas, identifiers, and migration strategies that avoid breaking end-users.
Scoped elevation, impersonation, and monitored break-glass patterns.
Explores how a humanoid robot mediates young children’s collaboration as they adapt to school.