Gaurav Pal

Opinions expressed by ICN authors are their own.

Gaurav “GP” Pal is CEO and founder of stackArmor. He is an award-winning Senior Business Leader with a successful track record of growing and managing a secure cloud solutions practice with over $100 million in revenue focused on U.S. federal, Department of Defense, non-profit and financial services clients. Successfully led and delivered multi-million-dollar Amazon Web Services (AWS) cloud migration and broker programs for U.S. government customers including the Department of the Treasury, and Recovery Accountability & Transparency Board (RATB) since 2009.

GP is the Industry Chair at the University of Maryland’s Center for Digital Innovation, Technology and Strategy (DIGITS). He has strong relationship-based consultative selling experience with C-level executives providing DevOps, Managed Services, IaaS, Managed IaaS, PaaS and SaaS in compliance with US FedRAMP, FISMA, HIPAA and NIST Security Frameworks. He has a successful track record of delivering multiple cloud solutions with leading providers including Amazon Web Services (AWS), Microsoft, Google and among others.

GP is a published author and thought leader having spoken at Cloud Expo East, and published in InformationWeek, Gigaom, JavaWorld and IEEE among others.

The opinions expressed in this blog are those of GP and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

4 reasons why CISOs must think like developers to build cybersecurity platforms and stop investing in ‘silver bullets’

The Chief Information Security Officer is the latest addition to the C-suite with funding, staff and authority to ensure the confidentiality, integrity and availability of corporate digital assets. The CISO must quickly shed the...

DOD releases new guidance to protect data within the supply chain

DOD releases new guidance to protect data within the supply chain

Companies supplying products and services to the US Department of Defense must meet 110 security requirements specified in NIST SP 800-171 or risk losing contract awards through a new set of risk scoring guidelines. The new rules...

Driving cybersecurity and digital transformation with cloud technologies

Driving cybersecurity and digital transformation with cloud technologies

Enterprises – especially in regulated industries – need to demonstrate compliance with NIST, HIPAA and GDPR to address an increasing set of privacy and cybersecurity threats. Cloud computing platforms provided a ready-made solution,...

4 steps to creating a winning cybersecurity strategy in 2018

4 steps to creating a winning cybersecurity strategy in 2018

For mid-sized organizations and enterprises looking to focus on cybersecurity issues in 2018, here is a proven playbook to help creating a winning strategy.

Secdevops or devsecops or devops next-generation (NG) – What is your take on devops?

Secdevops or devsecops or devops next-generation (NG) – What is your take on devops?

Should devops adapt to include and incorporate new technologies and expand the community of practitioners?

Is compliance the best insurance for managing cybersecurity risk in 2018?

Is compliance the best insurance for managing cybersecurity risk in 2018?

Cybersecurity challenges and risks continue to emerge as top threats to business as usual for large and small organizations alike. The ability to meet these threats requires understanding emerging standards. Compliance with these new...

Department of Defense contractors must implement IT security controls by December 31

Organizations doing business with the U.S. Department of Defense (DOD) must demonstrate their ability meet higher levels IT security for their corporate network and systems by Dec. 31, 2017 or risk losing business.

Is it time for continuous ‘IV&V’ to ensure cloud security?

Is it time for continuous ‘IV&V’ to ensure cloud security?

Operating securely in the cloud requires a strong and independent security organization that is well equipped to detect and remediate threats in real-time. This requires adequate levels of funding, tooling and empowerment to ensure...

Load More