Product Management

Top 10 Use Cases for Data Posture Security Management


Vamsi Koduru, director of product management at Normalyze, and independent cyber researcher Abhinav Singh join Dark Reading’s Terry Sweeney at News Desk during RSA Conference to discuss why you should be using data posture security management (DPSM) to reduce risk and build resilience for your organization. Jointly, they address how DPSM impacts AI applications, enhances zero-trust frameworks, and simplifies cloud migration projects, to name a few. They also point to DPSM’s ability to perform risk quantification to get a better handle on what various security incidents can cost an organization.

Vamsi Koduru is the Director of Product Management at Normalyze, where he applies his passion for disruptive innovation to drive product development and scale solutions that are game-changers in the data security space. With a rich background in AML/KYC, virtual assistants, conversational design, and identities, Vamsi is known for his out-of-the-box thinking and leadership in navigating complex product ecosystems.

A proven leader, Vamsi is known for his entrepreneurial mindset, data-driven insights, roadmap development, and go-to-market strategies. Before joining Normalyze, Vamsi co-managed Stealth Vc and directed product management at Basis Technology. He also co-founded Quantiply Corporation, where he was pivotal in guiding product strategy and innovation.

Abhinav Singh is a cybersecurity researcher with a decade long experience working for global leaders in security technology, financial institutions, and as an independent trainer/consultant. He is the author of Metasploit Penetration Testing Cookbook (first, second, and third editions) and Instant Wireshark Starter by Packt.

He is an active contributor to the security community in the form of patents, open-source tools, paper publications, articles, and blogs. His work has been quoted in several security and privacy magazines and digital portals. He is a frequent speaker and trainer at eminent international conferences like Black Hat, RSAC and Defcon. His areas of expertise include malware research, reverse engineering, enterprise security, forensics, and cloud security.





Source

Related Articles

Back to top button