Santosh Kumar, PMP, CISSP, CISA, CHFI, CEH, CIPP/E, CIPM

Santosh Kumar, PMP, CISSP, CISA, CHFI, CEH, CIPP/E, CIPM

Bengaluru, Karnataka, India
4K followers 500+ connections

About

🔒 Cybersecurity & Privacy Leader | 25+ Years in CISO & Program Management Roles | AI &…

Services

Articles by Santosh

Contributions

Experience

  • Bosch Graphic

    Bosch

    Bengaluru

  • -

    Bengaluru, Karnataka, India

  • -

    Bengaluru, Karnataka, India

  • -

    Bengaluru, Karnataka, India

  • -

    Bengaluru Area, India

  • -

    India

Education

  • Indian Institute of Technology, Madras Graphic

    Indian Institute of Technology, Madras

    -

    Activities and Societies: 🌿 Member of Prakriti (Wildlife Club) Member of Amateur Radio Club

    Pursuing a 🎓 Master of Technology (MTech) in Communication Engineering from 🏛️ IIT Madras has been a transformative experience, offering deep insights into advanced communication systems and technologies. The program provided a 📚 rigorous curriculum, combining theoretical foundations with 🔬 hands-on research in areas such as 📡 digital signal processing, 📶 wireless communications, 💡 optical networks, and ℹ️ information theory. Being part of one of India’s premier institutions, I had the…

    Pursuing a 🎓 Master of Technology (MTech) in Communication Engineering from 🏛️ IIT Madras has been a transformative experience, offering deep insights into advanced communication systems and technologies. The program provided a 📚 rigorous curriculum, combining theoretical foundations with 🔬 hands-on research in areas such as 📡 digital signal processing, 📶 wireless communications, 💡 optical networks, and ℹ️ information theory. Being part of one of India’s premier institutions, I had the opportunity to work alongside 👨‍🏫 distinguished faculty and collaborate on 🚀 cutting-edge projects, which honed my 🧠 analytical and problem-solving skills. This academic journey at 🏛️ IIT Madras not only solidified my expertise in communication engineering but also prepared me to tackle complex challenges in the evolving field of communications with a strong foundation and 💡 innovative approach.

  • -

    🔒 Summary:
    Engaged in advanced studies and research at the prestigious Indian Institute of Technology, Jodhpur (IITJ), with a focus on cybersecurity and cryptography.

    🔍 Description:
    As a Research Scholar at IIT Jodhpur, I explore the complexities of cybersecurity and cryptography, seeking innovative solutions to modern security challenges. My research involves developing robust encryption algorithms, analyzing security protocols, and identifying emerging threats in cyberspace…

    🔒 Summary:
    Engaged in advanced studies and research at the prestigious Indian Institute of Technology, Jodhpur (IITJ), with a focus on cybersecurity and cryptography.

    🔍 Description:
    As a Research Scholar at IIT Jodhpur, I explore the complexities of cybersecurity and cryptography, seeking innovative solutions to modern security challenges. My research involves developing robust encryption algorithms, analyzing security protocols, and identifying emerging threats in cyberspace. Through rigorous investigation and experimentation, I aim to make significant contributions to the field of cybersecurity. By collaborating with esteemed faculty members and fellow researchers, I strive to push the boundaries of knowledge in these critical areas. My ultimate goal is to enhance the security posture of digital systems and safeguard sensitive information in an increasingly interconnected world.

  • -

    Activities and Societies: Projects: https://github.com/shub005/santoshkumar

    📊👥 Worked on wide array of real-world use cases:

    🔒Cybersecurity Anomaly Detection
    👥 User and Entity Behavior Analytics (UEBA)
    💳 Fraud Detection in Financial Services
    📈 Market Supply Demand Analysis
    👥 Employee Attrition Rate Prediction

    Overview of some of the key AI and ML technique worked on:
    ✔Supervised Learning 📈 Linear Regression 📊 Logistic Regression🌳 Decision Trees🌲 Random Forest ✂️ SVM 👥 KNN 🧮 Naive Bayes 🔗 Neural Networks
    ✔Unsupervised…

    📊👥 Worked on wide array of real-world use cases:

    🔒Cybersecurity Anomaly Detection
    👥 User and Entity Behavior Analytics (UEBA)
    💳 Fraud Detection in Financial Services
    📈 Market Supply Demand Analysis
    👥 Employee Attrition Rate Prediction

    Overview of some of the key AI and ML technique worked on:
    ✔Supervised Learning 📈 Linear Regression 📊 Logistic Regression🌳 Decision Trees🌲 Random Forest ✂️ SVM 👥 KNN 🧮 Naive Bayes 🔗 Neural Networks
    ✔Unsupervised Learning📍 K-Means Clustering 🏢 Hierarchical Clustering📉 PCA 🔄 Autoencoders 🛠️ Association Rules
    ✔Reinforcement Learning💡 Q-Learning🧠 DQN🏅 Policy Gradients
    ✔Deep Learning 🖼️ CNNs📜 RNNs⏳ LSTM🎭 GANs🔠 Transformers (GPT, BERT)
    ✔NLP Techniques ✂️ Tokenization 📜 Stemming/Lemmatization🔠 Word Embeddings🔄 Seq2Seq 📍 NER
    ✔Optimization Techniques⛰️ Gradient Descent🔄 SGD ⚙️ Adam Optimizer🧬 Genetic Algorithms
    ✔🛠️ Ensemble Methods (Bragging, Boosting, Stacking)
    ✔🌐 Federated Learning
    ✔📈 Bayesian Techniques.

  • -

    🎯 Real-World Focus: Excelled in a program designed to tackle real-world challenges in the corporate landscape, gaining innovative solutions and the necessary tools to navigate complexities effectively.

    🛠️ Comprehensive Management Areas: Mastered a broad spectrum of functional management areas, including ⚙️ Operations Management, 📈 Marketing, 📊 Strategy, 👥 Human Resource Management, 🏢 Organizational Behavior, and 💻 Information Technology and its advancements.

    💰 Business…

    🎯 Real-World Focus: Excelled in a program designed to tackle real-world challenges in the corporate landscape, gaining innovative solutions and the necessary tools to navigate complexities effectively.

    🛠️ Comprehensive Management Areas: Mastered a broad spectrum of functional management areas, including ⚙️ Operations Management, 📈 Marketing, 📊 Strategy, 👥 Human Resource Management, 🏢 Organizational Behavior, and 💻 Information Technology and its advancements.

    💰 Business Foundations: Achieved excellence in in-depth studies in 📉 Economics, 💼 Finance and Accounting, and 🚚 Supply Chain Management.

    🌍 Cultivating Well-Rounded Professionals: Developed into a well-rounded professional, equipped to tackle multifaceted challenges across various domains within the corporate environment.

  • -

    📚 Address cutting-edge issues in cyber law and forensics: Strong emphasis on policy formulation, law enforcement.

    ⚖️ Technology and Legal Frameworks: Understand complex relationship between emerging technologies like cryptocurrency, blockchain, and AI, and their intersection with existing legal frameworks.

    🔗 Convergence of Technology and Law: Convergence of emerging technologies with current laws, policy developments, and the practical applications of both international and…

    📚 Address cutting-edge issues in cyber law and forensics: Strong emphasis on policy formulation, law enforcement.

    ⚖️ Technology and Legal Frameworks: Understand complex relationship between emerging technologies like cryptocurrency, blockchain, and AI, and their intersection with existing legal frameworks.

    🔗 Convergence of Technology and Law: Convergence of emerging technologies with current laws, policy developments, and the practical applications of both international and Indian cyber laws and forensics.

    🔍 Efficacy of Legal Systems: Focused studies evaluating the effectiveness of contemporary legal systems in regulating evolving technologies.

    🌐 Impact Assessment: How citizens and businesses interact with emerging technologies and the implications of these interactions on legal frameworks.

    📈 Jurisprudence Development: Charted the developmental trajectory of jurisprudence in the rapidly evolving field of cyber law and forensics.

  • -

    Activities and Societies: 🎓 Qualified UGC NET for Assistant Professor in Labour Welfare/Personnel Management/Labour & Social Welfare/HRM (License/Roll No: 48010562) - November 2017

    🎓 Post Graduate Diploma in Human Resource Management (HRM)

    📚 Comprehensive Curriculum: Covered essential HRM areas such as 🎯 Talent Acquisition, 📈 Performance Management, and 🤝 Employee Relations.

    ⚖️ Labor Laws & Compliance: Gained in-depth understanding of 📜 Labor Laws, 🔍 Compliance, and 🛡️ Employee Rights to ensure legal and ethical HR practices.

    🌐 Organizational Development: Focused on 📊 Organizational Development, 💡 Change Management, and 🔄 Strategic HR…

    🎓 Post Graduate Diploma in Human Resource Management (HRM)

    📚 Comprehensive Curriculum: Covered essential HRM areas such as 🎯 Talent Acquisition, 📈 Performance Management, and 🤝 Employee Relations.

    ⚖️ Labor Laws & Compliance: Gained in-depth understanding of 📜 Labor Laws, 🔍 Compliance, and 🛡️ Employee Rights to ensure legal and ethical HR practices.

    🌐 Organizational Development: Focused on 📊 Organizational Development, 💡 Change Management, and 🔄 Strategic HR Planning to drive business success.

    🧠 Leadership & Communication: Developed strong 🗣️ Communication and 👥 Leadership Skills to manage teams and foster a positive workplace culture.

    📊 Data-Driven HR: Learned to leverage 📊 HR Analytics and 📉 Data-Driven Decision-Making for effective talent management.

    🌍 Global HRM Trends: Studied emerging trends in 🌐 Global HRM, focusing on 🤖 Technology Integration and 💻 Digital Transformation in HR practices.

  • -

    Activities and Societies: Yachting, Squash, Sea Swimming, Marathon

    🎓 Awarded the Admiral Ramnath Trophy for Best All Rounder: This prestigious honor highlights my exceptional versatility and well-rounded skill set across multiple domains. I was recognized for demonstrating outstanding leadership qualities and for my unwavering dedication, consistently excelling in all aspects of my training.

    📚 Awarded the Book Prize for Academic Excellence: I was honored with the distinguished Book Prize in recognition of my superior academic performance. This…

    🎓 Awarded the Admiral Ramnath Trophy for Best All Rounder: This prestigious honor highlights my exceptional versatility and well-rounded skill set across multiple domains. I was recognized for demonstrating outstanding leadership qualities and for my unwavering dedication, consistently excelling in all aspects of my training.

    📚 Awarded the Book Prize for Academic Excellence: I was honored with the distinguished Book Prize in recognition of my superior academic performance. This accolade acknowledges my significant contributions to the academic field and reflects my deep commitment to continuous learning. It serves as a powerful motivator, inspiring me to pursue excellence in all my future endeavors.

  • -

    🏆 Admiral Katari Trophy for Best All Rounder: This prestigious award highlights my well-rounded abilities and versatility across both academic and extracurricular domains, showcasing my exceptional skills and adaptability in various areas.

    📚 Awarded Book Prize: Honored with the distinguished Book Prize for academic excellence, recognizing my outstanding performance and significant contributions to the academic field. This accolade is a testament to my unwavering dedication, hard work…

    🏆 Admiral Katari Trophy for Best All Rounder: This prestigious award highlights my well-rounded abilities and versatility across both academic and extracurricular domains, showcasing my exceptional skills and adaptability in various areas.

    📚 Awarded Book Prize: Honored with the distinguished Book Prize for academic excellence, recognizing my outstanding performance and significant contributions to the academic field. This accolade is a testament to my unwavering dedication, hard work, and deep commitment to learning.

  • -

    Activities and Societies: Raksha Mantri Trophy for Most Promising Cadet during cadets training in Naval Academy.

    🏆 Raksha Mantri Trophy for Most Promising Cadet: Earned during my training at the Naval Academy, this prestigious award highlights my 🌟 exceptional promise, dedication, and leadership potential within the military realm. It signifies my 🎖️ outstanding performance and 🔥 unwavering commitment to excellence, reflecting the hard work and determination I exhibited throughout my cadet training. This achievement is a 🚀 testament to my capability and serves as a powerful source of inspiration for…

    🏆 Raksha Mantri Trophy for Most Promising Cadet: Earned during my training at the Naval Academy, this prestigious award highlights my 🌟 exceptional promise, dedication, and leadership potential within the military realm. It signifies my 🎖️ outstanding performance and 🔥 unwavering commitment to excellence, reflecting the hard work and determination I exhibited throughout my cadet training. This achievement is a 🚀 testament to my capability and serves as a powerful source of inspiration for all my future endeavors.

  • -

    Activities and Societies: Skill Development Program on ‘Renewable Energy’ at National Institute of Solar Energy(NISE), Gurugram

    🎓 Qualified Energy Manager: Certified as an Energy Manager, showcasing a deep understanding of energy management principles and sustainable practices.

    🔧 Expertise in Solar Systems: Hands-on experience in setting up solar systems, reflecting practical skills in harnessing renewable energy sources.

    🌱 Commitment to Sustainability: Contributions demonstrate a commitment to reducing environmental impact and promoting energy efficiency.

    🌍 Advancing Renewable Energy: Played a…

    🎓 Qualified Energy Manager: Certified as an Energy Manager, showcasing a deep understanding of energy management principles and sustainable practices.

    🔧 Expertise in Solar Systems: Hands-on experience in setting up solar systems, reflecting practical skills in harnessing renewable energy sources.

    🌱 Commitment to Sustainability: Contributions demonstrate a commitment to reducing environmental impact and promoting energy efficiency.

    🌍 Advancing Renewable Energy: Played a crucial role in advancing towards a greener and more sustainable future through work in the renewable energy sector.

  • -

  • -

    Roll No-1123289

Licenses & Certifications

Volunteer Experience

  • National Institute of Disaster Management Graphic

    Volunteer

    National Institute of Disaster Management

    - Present 23 years 8 months

    Disaster and Humanitarian Relief

    🌍 Comprehensive Risk Mitigation: Actively contributed to a holistic approach in mitigating and managing risks associated with natural and human-made disasters, focusing on creating resilient communities.

    🛡️ Advanced Strategies: Worked on integrating advanced risk assessment, preparedness, response, and recovery strategies to ensure resilience at every stage of disaster management.

    🔧 Cutting-Edge Technology: Leveraged cutting-edge technology to address vulnerabilities, enhancing…

    🌍 Comprehensive Risk Mitigation: Actively contributed to a holistic approach in mitigating and managing risks associated with natural and human-made disasters, focusing on creating resilient communities.

    🛡️ Advanced Strategies: Worked on integrating advanced risk assessment, preparedness, response, and recovery strategies to ensure resilience at every stage of disaster management.

    🔧 Cutting-Edge Technology: Leveraged cutting-edge technology to address vulnerabilities, enhancing the capacity to respond to and recover from crises.

    🤝 Community Engagement: Engaged with communities and collaborated across sectors to effectively safeguard lives, infrastructure, and livelihoods during disaster situations.

  • Bureau of Energy Efficiency (ऊर्जा दक्षता ब्यूरो) Graphic

    Volunteer

    Bureau of Energy Efficiency (ऊर्जा दक्षता ब्यूरो)

    - Present 18 years 6 months

    Education

    🎓 Qualified Energy Manager: As a certified Energy Manager, I utilized my deep understanding of energy management principles and sustainable practices to educate others on the importance of energy conservation and efficiency.

    🔧 Solar Systems Expertise: Provided hands-on training in setting up solar systems, imparting practical skills to students and communities on harnessing renewable energy sources.

    🌱 Commitment to Sustainability: Through my volunteer efforts, I emphasized the…

    🎓 Qualified Energy Manager: As a certified Energy Manager, I utilized my deep understanding of energy management principles and sustainable practices to educate others on the importance of energy conservation and efficiency.

    🔧 Solar Systems Expertise: Provided hands-on training in setting up solar systems, imparting practical skills to students and communities on harnessing renewable energy sources.

    🌱 Commitment to Sustainability: Through my volunteer efforts, I emphasized the importance of reducing environmental impact and promoted energy efficiency as key components of a sustainable future.

    🌍 Advancing Renewable Energy: Played a crucial role in advancing knowledge and awareness of renewable energy solutions, contributing to a greener and more sustainable future by educating the next generation on the significance of renewable energy.

  • Volunteer

    Cybersecurity Training

    - Present 22 years 6 months

    Education

    🔐 Comprehensive Cybersecurity Training: Led and facilitated cybersecurity training sessions, focusing on equipping individuals and organizations with the knowledge and skills to protect against digital threats.

    🛡️ Risk Mitigation Strategies: Developed and delivered training on advanced risk assessment, threat mitigation, and incident response strategies to enhance overall cybersecurity posture.

    💻 Hands-On Learning: Provided hands-on experience with cybersecurity tools and…

    🔐 Comprehensive Cybersecurity Training: Led and facilitated cybersecurity training sessions, focusing on equipping individuals and organizations with the knowledge and skills to protect against digital threats.

    🛡️ Risk Mitigation Strategies: Developed and delivered training on advanced risk assessment, threat mitigation, and incident response strategies to enhance overall cybersecurity posture.

    💻 Hands-On Learning: Provided hands-on experience with cybersecurity tools and practices, helping participants understand and apply critical concepts in real-world scenarios.

    🤝 Community Engagement: Engaged with diverse communities to raise awareness about cybersecurity best practices, fostering a culture of security and resilience in the digital landscape.

    🌐 Cross-Sector Collaboration: Collaborated with various sectors to tailor training programs that address specific cybersecurity challenges, ensuring participants were well-prepared to manage potential threats.

Publications

  • "Security Risk Assessment & Mitigation Framework for Cloud-based IT Systems," 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), pp. 1-5, doi: 10.1109/ICAN56228.2022.10007263.

    2022 3rd International Conference on Computing, Analytics and Networks (ICAN)

    More often than not, the need for security is realized only after the system has been broken. Adding security afterwards is often difficult and much costlier and sometimes, nearly impossible. Hence, Security needs to be embedded into an IT system in order to develop secure IT systems which is possible only when a Security Engineering Framework is well defined for the entire lifecycle of an IT system. In this Paper, we have designed and developed an implementable Framework for Security…

    More often than not, the need for security is realized only after the system has been broken. Adding security afterwards is often difficult and much costlier and sometimes, nearly impossible. Hence, Security needs to be embedded into an IT system in order to develop secure IT systems which is possible only when a Security Engineering Framework is well defined for the entire lifecycle of an IT system. In this Paper, we have designed and developed an implementable Framework for Security Engineering of Cloud-based IT Systems. Cloud-based IT Systems are vulnerable to a plethora of cyber-attacks because of their accessibility and their services exposed in a multi-tenant environment. The Cloud-based IT Systems Security Risk Assessment & Mitigation Framework (CISSRAMF) is agnostic to Cloud Service Providers (CSPs) as well as to the type of Services provided, i.e., Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS). CISSRAMF encompasses the entire lifecycle of any Cloud-based IT System right from the conception phase till decommissioning of the system. CISSRAMF utilizes the Standards for Information Security and Cybersecurity like ISO/IEC 27001:2013, ISO/IEC 27002:2013, NIST SP 800-53 Rev. 5 and OWASP Application Security Verification Standard (ASVS) Project

    Other authors
    See publication
  • "Study on Smart Security Measures in Threat and Risk Assessment," 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), pp. 1-4, doi: 10.1109/ICAN56228.2022.10007166.

    2022 3rd International Conference on Computing, Analytics and Networks (ICAN)

    SEP, more specifically Security Engineering Process, forms a part of the modern assessment and evaluation of related threats and risks, whether it is an agile form of development or SSDLC (Secure Software Development Life Cycle). While in today’s era we deal with modern concepts like cloud computing, remote processing, etc. kinds of strategies which involve data at rest and data in motion, and data computation-intensive tasks. Threat and Risk Assessment are closely related to different attack…

    SEP, more specifically Security Engineering Process, forms a part of the modern assessment and evaluation of related threats and risks, whether it is an agile form of development or SSDLC (Secure Software Development Life Cycle). While in today’s era we deal with modern concepts like cloud computing, remote processing, etc. kinds of strategies which involve data at rest and data in motion, and data computation-intensive tasks. Threat and Risk Assessment are closely related to different attack values in which an attacker can perform actions in order to gain additional privileges to your system, software, cloud etc. Threat and Risk Assessment of different projects including web applications development, cloud onboarding, requires accessing the project at the design level so that the product is more specifically secure in the terms of compliance and the coding techniques used are in accordance with the secure coding guidelines. This paper focuses on the comparison of various standardized threat and risk assessment techniques with respect to dynamic threats and possible risk mitigations.

    Other authors
    See publication
  • "Improved Security and Privacy in Cloud Data Security and Privacy: Measures and Attacks

    " 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), Uttarakhand, India, 2022, pp. 230-233, doi: 10.1109/ICFIRTP56122.2022.10063186.

    The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several…

    The advantages of the cloud environment for data processing and sharing are utilized by millions of people worldwide. A cloud system must inevitably provide data security and privacy. Users' widespread use and sharing of information creates security gaps. This study aims to discuss the cloud environment, its benefits, difficulties, and upcoming research trends pertaining to safe data processing and exchange. The widespread issue is caused by the increased adoption of cloud computing by several enterprises. As a result, utilizing any device to load and receive data from the cloud providers' facilities raises various security and privacy risks, such as data modification, data loss, and theft. Unauthorized access by insiders is one of the significant problems that might develop. Although there are various ways to prevent cloud administrators from gaining illegal access, such methods haven't been successful in keeping them from gaining access to client data in the cloud.The degree of protection a system may offer to the CIA triad—a paradigm that includes the information security qualities confidentiality, integrity, and availability—is how information security is assessed. In this paper, we have analyzed such scenarios. This study analysis provided dangers to cloud data security, cloud assaults, and found vulnerabilities for several factors affecting cloud computing.

    See publication
  • "An Analysis of Vulnerability Scanners in Web Applications for VAPT," 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), 2022, pp. 278-283, doi: 10.1109/CISES54857.2022.9844365.

    IEEE -International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)

    Though the development in cybersecurity for protecting the websites and applications are growing rapidly, the attacks on these crucial websites are still happening. Irrespective of the development of society, third-party attacks would always increase correspondingly. To protect these websites and web applications, the developers would always use defensive mechanisms to survive third party attacks. But the reliability of the website's strength against third party attacks depends on several…

    Though the development in cybersecurity for protecting the websites and applications are growing rapidly, the attacks on these crucial websites are still happening. Irrespective of the development of society, third-party attacks would always increase correspondingly. To protect these websites and web applications, the developers would always use defensive mechanisms to survive third party attacks. But the reliability of the website's strength against third party attacks depends on several factors. Intruders are now using automated structures in form of BOTS, AI, ML, to perform these attacks.Need of security arises from the initial stages of planning and development. As part of SEP (Security Engineering Process) defined by individual vendors and companies for securing the system and performing risk analysis, Vulnerability Analysis are essential as part of standard procedures. Apart from SEP, VAPT (Vulnerability Analysis and Penetration Testing) now forms the standard operating measures for prevention of intrusion activities. We hereby focus on various vulnerability analysis tools forming basis for vulnerability analysis and Penetration testing (VAPT) for short and try to analyze the various impact with respect to stages of penetration testing.

    Other authors
    See publication
  • Modeling Real Time Object Identification Performance Evaluation with YOLO

    YMER Digital 2022-06-10 | Journal article DOI: 10.37896/ymer21.06/23 Part of ISSN: 0044-0477

    Object identification in pictures, videos, and signal processing is not a big frontier and has been around for a few years. Though object recognition in static pictures has proven highly promising in terms of specific items such as facial recognition systems, illness diagnosis, and so on, it has been tricky when it comes to video processing and real-time image processing. Traditional object identification techniques are coupled with machine learning methodologies to improve algorithms' speed…

    Object identification in pictures, videos, and signal processing is not a big frontier and has been around for a few years. Though object recognition in static pictures has proven highly promising in terms of specific items such as facial recognition systems, illness diagnosis, and so on, it has been tricky when it comes to video processing and real-time image processing. Traditional object identification techniques are coupled with machine learning methodologies to improve algorithms' speed and accuracy. The paper focuses on real-time object recognition systems and how recent advances in the realm of object recognition and identification have been made while bearing in mind the real-time scenarios for recognizing varied objects.The paper discusses the current implementations illustrated by varied authors using far more widely used algorithms including YOLO for real-time visualizations. Keywords: Object recognition, YOLO, Machine learning, RCNN, faster RCNN

    Other authors
    See publication
  • DOS Attack mitigations: A study

    IEEE OCIT Dec 2022

    OITS International Conference on Information Technology 14th - 16th Dec 2022

  • HR Analytics to improve decision making process

    Indian Navy HR Seminar

    HR Analytics to improve decision making process and use case using machine learning algorithms to understand reliable ways to figure out, if and why the best and most experienced employees are leaving prematurely.

  • IDS IPS : A survey

    IEEE INCITE Mar 2023 (Scopus)

    International conference on information Technology INCITE 2023

  • Improved Privacy and Security in cloud Data Security and Privacy

    Springer ANTIC Dec 2022

    International Conference on Advanced Network Technologies and Intelligent Computing

Courses

  • Advanced Course in Digital Signal Processing, Defence Institute of Advanced Technology, Pune(2009)

    -

  • Business Analytics using R (12 Weeks)

    License NPTEL18MG11S463

  • Data Mining (08 Weeks)

    Licence NPTEL18CS14S263

  • HR Analytics and Audit, Administrative Staff College of India, Hyderabad| 2018

    -

  • Industrial Relations and Labour Laws, XLRI, Jamshedpur| 2018

    -

  • Introduction to Machine Learning(12 Weeks)

    License NPTEL18CS26S363

  • Pogramming, Data Structures and Algorithims using Python (08 Week)

    License NPTEL17CS28S154

  • R Software(12 Weeks)

    License NPTEL17MA17S254

  • Training Manager Certification Course,Naval Institute of Education & Training Technology, Cochin| 2008

    51623

  • • Skill Development Program on ‘Renewable Energy’, National Institute of Solar Energy, Gurugram, Haryana|2017

    -

Projects

  • Computerised Monitoring of DA(Diesel Alternator).

    -

  • Data Mining For Automated Personality Classification

    -

  • Designing NAS(Network Attached Storage System) using ARM9 processor on a GigaByte Ethernet

    -

  • HR Analytics to improve decision making process and use case using machine learning algorithms to understand reliable ways to figure out, if and why the best and most experienced employees are leaving prematurely.

    -

  • Human Rights issues in 21th Century

    -

Honors & Awards

  • 5 Years @ Bosch

    Bosch

  • Star Performance and Leadership Award 2023

    Bosch

    🏆 Honored with the 'Performer Award': I am truly humbled to be recognized for my contributions and leadership. This accolade reflects the impact of my efforts and the collaborative spirit that drives our team. I am deeply grateful for the opportunity to work alongside an exceptional team, dedicated to shaping the future of automotive cybersecurity.

  • Performance Award 2019

    Bosch

    🏆 Awarded the 'Performer Award' in 2019 for my impactful contributions to Automotive Cybersecurity. This recognition underscores my commitment to excellence and the significant role I played in advancing cybersecurity within the automotive industry.

  • Commander-in-Chief Commendation

    Indian Navy

    🏅 Commendation by the C-in-C: Honored with a commendation by the Commander-in-Chief for my role in flood rescue operations, recognizing my dedication, bravery, and commitment to saving lives during a critical time.

  • Admiral Ramnath Trophy for Best All Round officer during Electrical Specialisation course

    Government of India

    🏆 Admiral Ramnath Trophy for Best All-Round Officer: Awarded the prestigious Admiral Ramnath Trophy for Best All-Rounder during the Electrical Specialisation course. This honor highlights my well-rounded skill set across various domains, recognizing my exceptional leadership abilities, unwavering dedication, and outstanding performance throughout the training.

  • Admiral Katari Trophy for Best All Rounder during Bachelor of Engineering course

    IHQ MoD(N)/GOI

    🏆 Admiral Katari Trophy for Best All-Rounder: Awarded the prestigious Admiral Katari Trophy for Best All-Rounder during my Bachelor of Engineering course. This accolade highlights my well-rounded skill set, recognizing my exceptional abilities and versatility across both academic and extracurricular domains.

  • Raksha Mantri Trophy for Most Promising Cadet during cadets training in Naval Academy

    IHQ MoD(N)/GOI

    🏆 Raksha Mantri Trophy for Most Promising Cadet: Awarded the prestigious Raksha Mantri Trophy for being the Most Promising Cadet during my training at the Naval Academy.

  • Best Instructor

    Indian Navy

    Awarded best Instructor at 2 occasions in Electrical Training School

Languages

  • English

    Professional working proficiency

  • Hindi

    Professional working proficiency

  • Russian

    Elementary proficiency

Recommendations received

7 people have recommended Santosh

Join now to view

View Santosh’s full profile

  • See who you know in common
  • Get introduced
  • Contact Santosh directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses