Krishna Avva
Associate Director of IT Engineering & Architecture
Actions
I’m Krishna Avva, and with 17 years in IT engineering leadership, I’ve developed a strong proficiency in solution architecting, design, and executing large-scale distributed enterprise platforms. My experience spans across diverse domains, including Enterprise CRM, Integrated Solutions, and Machine Learning, with a special focus on Life Sciences (such as CTMS, Pharmacovigilance, Patient Support Platforms, Commercial, Medical Affairs, Cell & Gene Therapy), Retail (eCommerce, OMS), and Commercial Insurance.
In my career, I’ve worked extensively on IT strategy, including creating three-year roadmaps, technology strategic roadmaps, and innovation operating models. I’ve managed capability maturity models, program prioritization, and project-to-product transformations, along with vendor assessments and security/privacy evaluations.
I bring technical expertise in hosting and cloud solutions, business applications, identity and access management, data management, business analytics, and AI/ML technologies.
My security knowledge covers privacy by design, the principle of least privilege, OWASP standards, and protocols like oAuth, RBAC, JWT, OIDC, SAML, and Single Sign-On.
I’m also well-versed in design patterns such as N-layered architecture, pub-sub architecture, event-driven architecture, and model-view-controller.
Additionally, I have hands-on experience with SaaS applications like Salesforce, Veeva, and Model N, as well as I/PaaS platforms including MuleSoft, CAI Webservices, APIGEE, AWS, and Azure.
Beyond the Hype: Scaling by Necessity for 90% of Enterprises
Scalability isn’t just for tech giants—it’s for every enterprise. This session guides attendees through scaling strategies, from simple systems to complex architectures. Gain practical insights into scaling enterprises.
Optimizing Identity and Access Management for Secure Cloud Environments
This presentation explores the essential design principles of security architecture and how IAM frameworks and solutions can aid enterprises in meeting industry compliance standards, adhering to privacy laws, and achieving operational efficiency while minimizing business risks.
Identity and Access Management (IAM) is a crucial framework encompassing business processes, policies, and technologies aimed at managing digital identities—whether human users, devices, or applications. At its core, IAM focuses on user identification, access control, identity provisioning and de-provisioning, and safeguarding both data and systems.
The advent of cloud hosting has revolutionized IT infrastructure by offering flexibility, scalability, security, and cost-effectiveness, primarily due to its multi-tenant architecture. This model allows multiple customers to concurrently share fundamental cloud resources, such as computing, networking, storage, and databases. As regulatory and compliance demands intensify, organizations increasingly rely on IAM to mitigate risks related to data loss, corruption, legal penalties, and unauthorized access.
Effective IAM design begins with fundamental components—identities and groups—that inform identity patterns (e.g., DIM, FIM) and protocols (e.g., OAuth 2.0). These elements are crucial in crafting and implementing robust IAM solutions for cloud environments.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top