One of the hallmarks of Desetty's approach is his active utilisation of AI and ML techniques
Avinash Gupta Desetty, a name synonymous with innovation and excellence in cybersecurity, is making waves with his visionary approach to Security Orchestration, Automation, and Response (SOAR) integration. With a trail of accolades behind him, Desetty's journey exemplifies his sheer commitment to enhancing cybersecurity measures today and beyond.
Pioneering the Future of Cybersecurity
Cyberattacks happen frequently, occurring every 39 seconds. This makes Desetty's efforts to enhance security measures all the more crucial. His journey began with a comprehensive understanding of the constantly changing cybersecurity threats. With his impressive academic background and years of experience, he set out to redefine cybersecurity with a mission to make it even more effective.
At its core, SOAR integration represents a holistic cybersecurity strategy that combines automation, orchestration, and intelligent response mechanisms. It addresses the limitations of traditional cybersecurity approaches by automating routine tasks and enabling cybersecurity teams to focus on more strategic aspects of threat analysis and incident response. With Artificial Intelligence (AI) and Machine Learning (ML), SOAR platforms can swiftly collect, analyse, and correlate security data from various sources, accelerating incident response and reducing the risk of human error.
Desetty emphasises the crucial role of SOAR integration, stating, "We are witnessing a surge in cyberattacks, and traditional approaches to cybersecurity are no longer sufficient. SOAR integration empowers organisations to automate their threat detection and response processes, significantly reducing the workload on cybersecurity professionals."
Bridging the Gap with AI/ML Expertise
One of the hallmarks of Desetty's approach is his active utilisation of AI and ML techniques. Rather than relying solely on rule-based detection, he leverages these to create use cases that detect subtle anomalies and sudden changes in data patterns.
Desetty explains, "The power of AI and ML in cybersecurity lies in their ability to adapt and learn from evolving threats. These technologies enable us to identify patterns and anomalies that might go unnoticed by traditional methods."
Data Security and Compliance as a Top Priority
Desetty has a comprehensive approach to both detecting threats and safeguarding sensitive data. With his technical expertise and compliance awareness, he ensures that sensitive information, such as the Payment Card Industry (PCI) and Personally Identifiable Information (PII), is effectively identified and monitored.
"Data breaches can have catastrophic consequences for organizations and individuals alike," Desetty emphasises. "By incorporating compliance requirements into security monitoring, we create a protective shield around sensitive data, mitigating potential risks."
A Collaborative Approach to Integration
The cybersecurity expert excels at bridging the gap between diverse security tools. Desetty seamlessly integrates them with SIEM (Security Information and Event Management) systems to enhance monitoring capabilities and generate a holistic view of the security landscape.
His focus on collaboration is evident: "I thrive in collaborative environments, fostering strong relationships with the SOC (Security Operations Center) team and security tool vendors. Together, we constantly improve the overall security posture."
An Impressive Track Record
Desetty's track record speaks volumes about his contributions to cybersecurity. He has published 17 scholarly articles in international journals and judged more than 15 papers in international journals, solidifying his status as an influential thought leader.
His innovative approach has earned him prestigious awards, including the Indian Achievers' Award in 2023, the Global Recognition Award in SIEM in 2024, and the International Popular Scientist Awards' Best Researcher Award in 2024. These accolades are proof of his unwavering dedication to pushing the boundaries of cybersecurity.
As cybersecurity threats evolve, Desetty leads as a prime innovator. After all, such pioneering work in SOAR integration, AI/ML utilisation, data security, and collaboration sets a high standard for the industry. He explains his vision, "We must adapt, innovate, and collaborate relentlessly to stay ahead of cyber threats. It's not a choice but a necessity."
— Shagun Sharma is a business journalist.