Pankaj Kamboj - CISSP, CISM

Pankaj Kamboj - CISSP, CISM

New York City Metropolitan Area
1K followers 500+ connections

About

Pankaj is a dynamic Leader and an astute strategic planner, and implementer and has the…

Articles by Pankaj

Contributions

Activity

Join now to see all activity

Experience

Education

  •  Graphic

    1st

  • 1st Grade

Licenses & Certifications

Publications

  • 7 effective way to secure your End Points

    Blog

    Gone are the days when organization think if they install and regularly update end user antivirus, they are secured. The cybercriminals and target attackers always find some or other ways to install Trojan into your network. What we have seen recently in one of the attacks where cyber espionage group install RAT( remote access Trojan) weaponizing malware payloads using the 0-day exploits. Nevertheless, this sort of APT( advanced persistent threats) has put the enterprises across globe to…

    Gone are the days when organization think if they install and regularly update end user antivirus, they are secured. The cybercriminals and target attackers always find some or other ways to install Trojan into your network. What we have seen recently in one of the attacks where cyber espionage group install RAT( remote access Trojan) weaponizing malware payloads using the 0-day exploits. Nevertheless, this sort of APT( advanced persistent threats) has put the enterprises across globe to revisit their border security and envisage the internal security. This has been proven that no organization is 100% secure and getting away from zero day attack is not possible as someone says it is like a cat-mouse race. Unfazed with reality, Organization should not feel that my security is tight and attacker are not smart enough to enter into my environment.

    See publication
  • INTERNATIONAL RESEARCH PAPER PUBLISHED IN INTERNATIONAL JOURNAL " CLOUD COMPUTING OPPORTUNITIES, EMERGING THREATS AND WAYS TO OVERCOME FUTURE CHALLENGES"

    IJARCSMS

    In last several decades, there is dramatic increment in computing power, networking and storage technology that have allowed the human race to generate, process, and share increasing amounts of information in dramatically new ways. As new applications of computing technology are developed and introduced which has lead to new demands for even more powerful computing infrastructure. To meet these computing-infrastructure demands, system designers are constantly looking for new system…

    In last several decades, there is dramatic increment in computing power, networking and storage technology that have allowed the human race to generate, process, and share increasing amounts of information in dramatically new ways. As new applications of computing technology are developed and introduced which has lead to new demands for even more powerful computing infrastructure. To meet these computing-infrastructure demands, system designers are constantly looking for new system architectures and algorithms to process larger collections of data more quickly than is feasible with today’s systems. Here, we refer to the hardware and software environment that implements this service-based environment as a cloud-computing environment. Some people use the terms Cloud Computing, Grid Computing, Utility Computing, or Application service providers to describe the same storage, computation, and data-management ideas that constitute Cloud computing.

    See publication
  • International Research Paper Published in International Conference "Current Status of Extent of Successful Implementation of TPM: A Study in Context of Developing Nation India"

    AU, Noida

  • International Research Paper Published in International Conference "Generalized Mechanism to Institute Energy Management System"

    AU, Noida

  • International Research Paper Published in International Conference "Impact of Six Sigma on improving Health, Safety and Environmental Health Protection: A Case Study of Manufacturing Industry of India

    CU Punjab

  • National Research Paper Published in National Conference "Current Status of Extent of Implementation of TPM: A Study in Context of Developing Nation India"

    NITTR

  • National Research Paper Published in National Conference "Recent Trend between Growth of Mobile Banking Users and Mobile Phone Subscriber: A Study in Context to India"

    University of Pune Sponsored Publication, Pune

Honors & Awards

  • CISM ( Certified Information Security Manager)

    ISACA

    Passed CISM

  • O3

    HCL Tech

    Best Employee for the consecutive 2 years

  • Most Progressive Employee of the year

    Alliance Prosys India Limited

    Felicitated with the “Most Progressive Employee” of the year in Annual Meet August’2008

  • Best Management Trainee

    HCL Infosystems Limited

    Got Preplacement offer and awarded with best management Trainee for west-2 region.

Languages

  • English, Hindi, Punjabi

    -

Recommendations received

17 people have recommended Pankaj Join now to view

View Pankaj’s full profile

  • See who you know in common
  • Get introduced
  • Contact Pankaj directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Pankaj Kamboj - CISSP, CISM

Add new skills with these courses