Speaker

Anshu Gupta

Anshu Gupta

Founder, Fixin Security

San Francisco, California, United States

Actions

Anshu Gupta is a hands on security professional with Fortune 500 security consulting experience at Ernst & Young and KPMG where he worked at companies like Microsoft, Salesforce, Oracle, Cisco, McAfee, Adobe, Yahoo, GAP, Kaiser among others. Based on advice from his mentors, he then moved on to get startup experience at Coupa Software (now a public company), HelloSign (acquired by DropBox), where he was the first security hire and had to build the whole security program from scratch and hire the information security team as well. Anshu served as the Head of Security Engineering at Varo Bank wherein he helped them at the first neobank to get FDIC approval and national OCC charter. He also served as the VP, Security at Fast which was working on solving the consumer identity and checkout experience in the Ecommerce space. Anshu last served as the VP, Security and Privacy at SPAN.io.

Area of Expertise

  • Business & Management
  • Finance & Banking
  • Information & Communications Technology
  • Law & Regulation

Topics

  • Security
  • Cloud Security
  • cyber security
  • Information Security
  • Security & Compliance
  • Application Security
  • IT Security
  • Cloud App Security
  • web security
  • Data Security
  • Cyber Security basics
  • AI and Cybersecurity
  • Enterprise Security
  • Kubernetes Security
  • cybersecurity awareness
  • AWS Security
  • Cloud Security Architecture
  • Microsoft 365 Security
  • Azure Security
  • api security
  • Security Strategy
  • Cybersecurity Strategy
  • Information Security Program Management
  • Security Architecture
  • Security Architecture and Engineering
  • Enterprise Security Architecture
  • Design Principles and Security Architecture
  • Authentication & Security Architecture
  • security engineering
  • Cybersecurity Threats and Trends
  • Cybersecurity Governance and Risk Management
  • cybersecurity compliance
  • Cybersecurity Compliance and Auditing
  • Information Security Governance and Risk
  • Emerging Cybersecurity Topics
  • Cybersecurity Workforce Development and Training
  • Cybersecurity Regulations and Compliance
  • Security and IoT
  • cybersecurity ethics
  • Infrastructure as code (IaC) security and policy-as-code
  • cybersecurity maturity model certification
  • Cybersecurity Automation
  • Identity and Access Management security and Least-privilege Authorization
  • Security Engineer
  • Cybersecurity Engineering with a focus on AI-Powered Threat Detection and Healthcare Compliance Architectures
  • Security Copilot
  • Secure SDLC
  • Secure Code
  • Secure Infrastructure
  • secure by design
  • secure coding
  • secure software architectures
  • Secure Development
  • Secure software development
  • secure coding practices
  • Intelligent and Secure communications
  • secure software systems development
  • developing secure software
  • Secure Design
  • secure supply chain
  • secure development pipelines
  • secure development platforms
  • secure software
  • Building Secure and Scalable APIs for Fintech Applications
  • Secure Endpoint Backup
  • Secure Coding & Cybersecurity
  • threat modeling
  • application threat modeling
  • AI Threat Modeling
  • Security Operations
  • security operations center
  • Security Operations Center (SOC)
  • Product Strategy and Technology with focus on AI-Powered Security Operations
  • Network & Security Operations
  • Cloud Security Operations
  • AI-Based Security Operations Center (SOC)
  • Security Operations Transformation Frameworks
  • Risk Management in Security Operations
  • SIEM
  • Elastic SIEM
  • SIEM Solutions: Enhancing Proactive Threat Detection and Response in Cybersecurity
  • Security Information and Event Management (SIEM)
  • SIEM and SOAR frameworks
  • IT Security Governance
  • Modern ways of working in IT security
  • enterprise security
  • Privacy
  • Security & Privacy
  • Data Privacy
  • Digital Identity & Privacy
  • Data Privacy & Governance
  • HIPAA Privacy & Security
  • Privacy-Preserving AI Models
  • differential privacy
  • Security and Privacy Controls
  • Biometric Privacy Issues
  • privacy engineering
  • Digital privacy
  • Data Security and Privacy in M365
  • Privacy Enhancing Technology
  • AI & Privacy
  • Data Privacy and Security
  • Privacy and Data Protection
  • Data Privacy and Compliance
  • Federated Learning for Privacy
  • Multi-Cloud Data Protection and Privacy Engineering
  • Artificial Intelligence and Machine Learning for Cybersecurity
  • cybersecurity
  • Cyberthreats
  • Women in Cyber
  • cybercrime
  • Cybersecuirty
  • Active Cyber Defence
  • cyber forensics
  • cyber attacks
  • OT Cybersecurity
  • Automotive Cybersecurity
  • Industrial Control Systems Cybersecurity
  • ICS Cybersecurity
  • Industrial Cybersecurity
  • Threat Intel
  • Threat Hunting
  • Cyber Threat Intelligence
  • cyber threat intellience
  • Azure Advanced Threat Protection
  • Microsoft Defender Advanced Threat Protection
  • Defender Threat Protection
  • Defender Advanced Threat Protection
  • insider threats
  • Advanced Threat Analytics
  • Microsoft Threat Protection
  • Advanced Threat Protection
  • Ethical Hacking - OSINT (Open-Source Intelligence) - Threat Hunting - Rubber Ducky - Car Hacking
  • Office 365 Threat Management
  • Threat Intelligence
  • Vulnerability Scanner
  • Vulnerability Research
  • Open source license compliance and vulnerability scanning (SCA)
  • cyber vulnerabilities
  • Vulnerabilities
  • Vulnerability Assessment
  • Vulnerability Remediation
  • vulnerability assessments
  • Scaling Vulnerability Management for AI Development
  • vulnerability disclosure
  • Security Vulnerabilities
  • Vulnerability Analysis of Access Control System
  • Woman: The Vulnerable Leader
  • Vulnerability Testing
  • vulnerability risk management
  • vulnerability handling
  • Vulnerability Detection and Remediation
  • Cloud Vulnerability Management
  • azure vulnerability assessment
  • Vulnerability Management
  • DevSecOps
  • Architecture & DevSecOps
  • Vendor Risk Management
  • Third Party Risk Management
  • Patch Management
  • Security Policy
  • SOC 2
  • SOC Operations
  • SOC Automation
  • ISO 27001
  • iso 42001
  • ISO 27701
  • FedRamp
  • FedRAMP Best Practices
  • CCPA
  • CPRA
  • privacy
  • PCI DSS Compliance
  • PCI:DSS
  • GDPR
  • NIST SP 800-53
  • NIST Cybersecurity Framework
  • NIST SP 800-171
  • Identity Governance and Administration
  • Risk Mitigation
  • AI forensics
  • Digital Forensic
  • digital forensics
  • HIPAA
  • HIPAA compliance
  • HIPAA compliance in healthcare AI
  • HIPAA-Compliant Data Flows in Microservices: Challenges and Solutions
  • AI Security
  • AI Security Testing
  • Cloud & AI Security
  • Model Context Protocol (MCP)
  • Model Context Protocol
  • Security Management
  • artificial intelligence risk
  • artificial intelligence security
  • Artificial Intelligence
  • Artificial Inteligence
  • Machine Learning and Artificial Intelligence
  • Artificial Intelligence (AI) and Machine Learning
  • Artificial intellince
  • Machine Learning/Artificial Intelligence
  • Artificial Intelligence and machine learning
  • Artificial Intelligence (AI)
  • Agentic AI
  • Agentic AI for Compliance
  • Agentic SOC
  • Security Operation Center
  • mobile application security
  • Web Application Security
  • AppSec
  • AppSec Trends
  • AppSec Program Management
  • appsec village
  • Cloud Security: Protecting Web Applications and Data in Distributed Environments
  • cyber
  • vulnerability
  • threat
  • Web application penetration testing
  • Building a Threat Modelling Culture for Proactive Security
  • Cyber Threat Intelligence Sharing and Collaboration
  • Threat Detection and Response
  • penetration testing
  • Mobile application penetration testing
  • Penetration Testing & Ethical Hacking
  • Hacking
  • Ethical Hacking & Incident Response
  • Incident Response
  • Incident Response and Breach Recovery
  • Incident Response Fundamentals
  • Auto-remediation with GenAI and Incident Playbooks
  • AI-Driven Incident Management
  • Incident Response Planning
  • Incident Response and Recovery
  • Automated Incident Response with AI
  • Incident Response and Management
  • Incident and Breach Response
  • Incident Management
  • Ethical Hacking Basics for Students
  • Breach Remediation
  • "Why Do Cybersecurity Breaches Persist Despite Billions Invested in Tech and Awareness Training? Here’s one way to counter it”
  • Data Breach
  • preventing data breach
  • API Security in Healthcare: Preventing Breaches in Distributed Architectures
  • Data Breach Prevention Strategies
  • Solarwinds Breach
  • healthcare data breaches
  • Data Privacy and Security Events
  • Healthcare Data Privacy
  • Autonomous Security Workflows

Anshu Gupta

Founder, Fixin Security

San Francisco, California, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top