Sandeep Singh explains the basic aspects of modern cybersecurity

While implementations may vary in each specific situation, IAM plays an integral role in mitigating cybersecurity risks.
The signs in India in the second half of 2024 are several cybersecurity incidents, such as the Star Health Insurance breach in September, which affected data from 31 million customers, or security breaches in the Signzy Fintech startup in December. These events underscore the importance of implementing and continually improving available cybersecurity standards. Sandeep Singh, a senior member of IEEE, a world-renowned cybersecurity expert specializing in identity and access management (IAM) with over 20 years of experience implementing & Support high-security IAM solutions across Australia, the USA, Canada and Singapore, marked with multiple awards including “Cybersecurity Expert” in BrainTech Awards 2024, explains what technology is required to ensure an adequate level of security.
Sandeep, you have implemented and supported identity and access management solutions across a variety of organizations throughout your career, including Brisbane City Council, Bank of Montreal, BG Group, EMC Data Storage Systems and T-Mobile. Your achievements in a technological democracy are particularly impressive as your efforts save $40 million in cost in integrating customer accounts through multiple stores. While the diversity of domains requires a tailored approach to each situation, do you follow any common principles?
Although implementation may vary in each specific situation, IAM plays an integral role in mitigating cybersecurity risks as it becomes the first line of defense against threats to prevent unauthorized access to sensitive information and ensure that only the right individuals can access the right resources at the right time. The tasks that need to be solved to achieve this goal are also kept the same.
You have experience using a variety of technologies including Oracle Identity Management and Sailpoint Identityiq to migrate your identity management system to a more modern solution. One of the most impressive examples is your work at the Australian City Council where you play a key role in stabilizing projects in critical states. How do you overcome this transition challenge?
To migrate smoothly to new solutions, professionals must have a deep understanding of the architecture of old target systems and existing workflows. The challenge is exacerbated by the fact that the IAM solution market is growing rapidly as new solutions continue to evolve. Therefore, professionals who aim to build a career in the industry need to constantly learn to keep up with the ever-evolving technology. I stress the importance of my recent continuous learning in all international science publications researching educational and scientific methods and in the International Journal of Computer Science, which I always emphasize when educating others. I also aim to support the best implementations by participating in jury awards such as Globee Awards and Case & Faces, which can be a role model for other developers.
Keeping up with technological advancements is an important part of education for any cybersecurity professional, and your Singapore Exchange project provides a clear example of this. How do you include the latest developments and challenges in your consultation and presentation?
In this project, we provide IAM solutions and consulting for advanced features of Oracle IAM to find effective solutions to solve challenges and critical issues arise in their environment. As technology continues to evolve, it creates new cybersecurity threats and attack vectors, and it also gives developers new tools to offset them. To ensure adequate levels of security, companies need to consider these technologies, incorporate them into their processes, and build reliable IAM systems, which play a crucial role here.