Maj Preeti is a seasoned professional in the Cybersecurity space for 17 plus years with proficiency in multiple domains, performed multiple roles, and have led strategic & complex cybersecurity engagements for cross-industry clients (Defense, Government Sector, Healthcare, Finance, Aviation, and travel) across all the domains, security strategy risk & compliance (SSRC), Data & Application Security (DAS), Identity & access management (IAM), Infrastructure & Endpoint Security (IES), Security Incident & Operations management (SIOC) and Operational Technology (OT) security.
She is an Indian Army veteran, IIM Alumni, and brings a collective perspective on Cybersecurity from both consulting and architect standpoint. In her current role as Security Architect, she works closely with clients and stakeholders to support presales and design the Security solutions for the ANZ market.
She is an active speaker & moderator at IBM events and external communities. She is an IBM Diversity & Inclusion Ambassador, the face of IBM India, and an advocate of Cyber Security career driving STEM initiatives like Cyberday4girls. She is a Board Member of Women in Cybersecurity (WiCyS) India Affiliate, Leading IBM Women in Security Excelling (WISE) Global Mentoring Program, IBM India WISE Industry Outreach program, and Bangalore WISE chapter. She is also a GHCI-2020 committee member for the Security & cloud computing track.
TOPIC- Deciphering Container World Security
TOPIC DESCRIPTION- There is a paradigm shift in the way applications are delivered with container technology. Reduction in development costs, efficiency, and agility are the key drivers attracting organizations to modernize their process by adopting container technology and orchestration platforms. This new technological shift - such as containers, Kubernetes, and cloud technologies are opening a new world of dynamic risks, compliance requirements, tools, architectural changes, and unique security concerns, that the traditional model may not have considered. The traditional security checklist with many manual processes is not adequate for this new world. This session will focus on how to address container security concerns and provide perspective on 1. Challenges of securing container world 2. Considering security throughout the container environment lifecycle: “Build-Ship-Run” 3. Insights on securing container environment ? a. Defense in depth- model ? b. Security controls ? c. Best practices to secure container world 4. What’s coming next? ? a. Software-defined encryption in a containerized environment.