About
A Cyber security professional with experience in implementing Identity and Access…
Articles by Manoj
-
CISSP Chapter 1: Security and Risk Management
CISSP Chapter 1: Security and Risk Management
By Manoj Makhija
-
What is New York DFS Cybersecurity Regulation?
What is New York DFS Cybersecurity Regulation?
By Manoj Makhija
-
CA Single Sign-On: Architecture and Deployment
CA Single Sign-On: Architecture and Deployment
By Manoj Makhija
Activity
-
After 39 amazing years, including the last eight as PwC’s Global Chair, today is my last day with this great organization. Much like my predecessor…
After 39 amazing years, including the last eight as PwC’s Global Chair, today is my last day with this great organization. Much like my predecessor…
Liked by Manoj Makhija
-
I’m excited to welcome Tim Ryan to Citi, who joined this week as our Head of Technology and Business Enablement. Tim joins us from PwC, where he…
I’m excited to welcome Tim Ryan to Citi, who joined this week as our Head of Technology and Business Enablement. Tim joins us from PwC, where he…
Liked by Manoj Makhija
-
Exciting news! PwC US will be the first reseller of OpenAI's ChatGPT Enterprise and largest user of the product, after signing an agreement with…
Exciting news! PwC US will be the first reseller of OpenAI's ChatGPT Enterprise and largest user of the product, after signing an agreement with…
Liked by Manoj Makhija
Experience
Education
-
University at Buffalo
-
Activities and Societies: President, University at Buffalo ISACA Student Group Graduate Students Committee Member, Management Information Systems Association (MISA)
Spring 2018 Courses:
MGS 610: Digital Forensics
MGS 614: Systems Analysis and Design
MGS 616: Predictive Analytics
MGS 625: Management of IT Projects
MGG 503: Introduction to Business
MGS 649: MS Practicum with GlobalSecurityIQ as a Cybersecurity Intern
MGS 647: Supervised Research with Dr. Gupta on the evolution of HITRUST Common Security Framework
Fall 2017 Courses:
MGS 642: Information Systems Audit for IT Managers (Aligned with CISA)
MGS 650:…Spring 2018 Courses:
MGS 610: Digital Forensics
MGS 614: Systems Analysis and Design
MGS 616: Predictive Analytics
MGS 625: Management of IT Projects
MGG 503: Introduction to Business
MGS 649: MS Practicum with GlobalSecurityIQ as a Cybersecurity Intern
MGS 647: Supervised Research with Dr. Gupta on the evolution of HITRUST Common Security Framework
Fall 2017 Courses:
MGS 642: Information Systems Audit for IT Managers (Aligned with CISA)
MGS 650: Information Assurance
MGS 640: IT Risk (Aligned with CRISC)
MGS 655: Distributed Computing and Big Data
MGS 613: Database Management Systems
MGQ 606: Statistical Analytics
MGS 607: Technology and Innovation Management -
-
Activities and Societies: IEEE, Image Processing, Research Paper Presentation, Website Development, Content Writing
Completed Bachelor of Technology in Electronics and Communications Engineering from JIIT, Noida. Earned a total of 195 credits.
Licenses & Certifications
Volunteer Experience
-
President
UB ISACA Student Group (ISG)
- 8 months
Education
The UB ISG is a student group, the purpose of which is, through student empowerment, to expand recognition of the IT Audit and Assurance, Security and IT Governance disciplines, by extending education beyond the classroom on standards, practices, and certification. More specifically, the objectives of the ISG are:
• To promote the education of and help expand the knowledge and skills of its members in the interrelated fields of IT governance, IS audit, security, control, and assurance;
•…The UB ISG is a student group, the purpose of which is, through student empowerment, to expand recognition of the IT Audit and Assurance, Security and IT Governance disciplines, by extending education beyond the classroom on standards, practices, and certification. More specifically, the objectives of the ISG are:
• To promote the education of and help expand the knowledge and skills of its members in the interrelated fields of IT governance, IS audit, security, control, and assurance;
• To encourage a free exchange of IT governance, IS audit, security, control and assurance techniques, approaches, and problem-solving by its members;
• To promote adequate communication to keep members abreast of current events in IT governance, IS audit, security, control and assurance that can be beneficial to them and their employers;
• To communicate to management, auditors, universities and to IS professionals the importance of establishing controls necessary to ensure proper IT governance and the effective organization and utilization of IT resources; and
• To promote the Association’s professional certifications and IT governance
-
Member, Graduate Committee
Management Information Systems Association (MISA) at UB
- 5 months
-
Manager
AIESEC
- 7 months
• Worked as a team member and then as a manager in Information Management Department of AIESEC in Delhi IIT.
• Managed a team of 10 for preparing Business Intelligence reports and web designing. -
-
Editor, PR, Writer
The Indian Fusion
- 2 years
• Worked as an author and then as the Managing editor of the website. Also worked in the PR team.
Publications
-
Detecting the Number of fingers raised and performing real time applications
ISSPIT IEEE
To make the algorithm work with real time applications, we used the concept of mask subtraction. Improved results and more number of functions were now achieved.
Other authorsSee publication -
Computer Application Control by Hand Gesture Recognition
International Journal of Electronics, Communication and Instrumentation Engineering Research and Development of TJPRC
-
Control Windows Photo Viewer by Hand Gesture Recognition
International Journal of Advance Engineering and Research Development
This paper works on controlling different functions of the image viewer through hand gesture recognition. In this paper a simple yet effective approach has been used to zoom in, zoom out and to view different images in an image viewer. Thumb plays an important role in the algorithm and the gestures used makes sense with the functions that these gestures are doing in the image viewer. This paper used a 30 fps with up to 30 mega pixel camera. Furthermore, pre-processing is done to segment the…
This paper works on controlling different functions of the image viewer through hand gesture recognition. In this paper a simple yet effective approach has been used to zoom in, zoom out and to view different images in an image viewer. Thumb plays an important role in the algorithm and the gestures used makes sense with the functions that these gestures are doing in the image viewer. This paper used a 30 fps with up to 30 mega pixel camera. Furthermore, pre-processing is done to segment the hand region from its background. The proposed algorithm can be used for controlling different applications as well.
Other authorsSee publication -
Switching Application Using Hand Gesture Recognition
National Conference on Emerging Trends in Computer & Electrical Engineering
Courses
-
AWS: Overview of AWS Identity & Access Management (IAM)
-
-
IdentityNow Introduction
-
Projects
-
Risk Management in Healthcare Environment Using HITRUST CSF
-
Healthcare has proven itself to be a lucrative target for hackers. Healthcare Information Systems has always been more vulnerable to malfunctioning or identity theft than any other systems. In 2013, Department of Homeland security checked 300 medical devices and all of them failed security checks . There should be stringent controls in place to curtail the risk associated to Protected Health Information (PHI). To deal with this, HI-TRUST Common Security Framework is increasingly being seen as…
Healthcare has proven itself to be a lucrative target for hackers. Healthcare Information Systems has always been more vulnerable to malfunctioning or identity theft than any other systems. In 2013, Department of Homeland security checked 300 medical devices and all of them failed security checks . There should be stringent controls in place to curtail the risk associated to Protected Health Information (PHI). To deal with this, HI-TRUST Common Security Framework is increasingly being seen as the solution to this problem, it enforces companies to meet privacy and security standards in order to mitigate risk and protect health information. HI-TRUST CSF is now widely being used to correctly implement the security of a healthcare organization . HI TRUST, the parent body that publishes HI-TRUST Common Security Framework claims that the framework works on the 5 steps for Risk Management in any organization. In this paper, we will map HI TRUST Common Security Framework’s controls with COBIT 5’s controls and then with the 5 steps of risk management, to check whether or not HI-TRUST’s claim of HI-TRUST CSF following a risk management approach at the high level is correct or not.
-
Academic Projects at JIIT
-
Controlling music player using Hand Gesture Control- Created a music player controlled by different hand gestures using MATLAB. Received an A+.
Controlling image viewer using hand gestures- Created an Image viewer controlled by different hand gestures using MATLAB.
Classification and segmentation of medical images- Worked on extracting important information out of medical images like identifying fractured bone from X-Ray images. Also worked on classification of Images for CBIR using…Controlling music player using Hand Gesture Control- Created a music player controlled by different hand gestures using MATLAB. Received an A+.
Controlling image viewer using hand gestures- Created an Image viewer controlled by different hand gestures using MATLAB.
Classification and segmentation of medical images- Worked on extracting important information out of medical images like identifying fractured bone from X-Ray images. Also worked on classification of Images for CBIR using machine learning. Received an A+.Other creators
Honors & Awards
-
Dean's Excellence Scholarship
Jindal School of Management, University of Texas at Dallas
Jindal School of Management at University of Texas Dallas offered Dean's Excellence Scholarship for MS in Information Technology Management for Fall 2017.
-
Trailblazer-Best Performer
Wipro
Wipro's 'Trailblazer- Best performer in the account', awarded to best performers for the quarter in band B1 and above.
-
1st Rank in Managed Security Solutions Training
Wipro
Secured 1st rank in Managed Security Solutions Training for freshers joining Wipro Limited.
-
Academic Excellence Award
Kulachi Hansraj Model School
Highest marks in Physics. Good overall performance.
-
Academic Excellence Award
-
Good Academic Performance in SSC Examination.
Test Scores
-
Certified Information Systems Auditor (CISA)
Score: 678
Languages
-
English
Full professional proficiency
-
Hindi
Native or bilingual proficiency
Organizations
-
ISACA
-
- Present
Recommendations received
3 people have recommended Manoj
Join now to viewMore activity by Manoj
-
As I approach my retirement from PwC this week, I am filled with gratitude. It has been the privilege of a lifetime to serve as US senior partner…
As I approach my retirement from PwC this week, I am filled with gratitude. It has been the privilege of a lifetime to serve as US senior partner…
Liked by Manoj Makhija
-
I am thrilled to announce that I graduated last weekend from Purdue University Daniels School of Business with Masters of Science in Finance. The…
I am thrilled to announce that I graduated last weekend from Purdue University Daniels School of Business with Masters of Science in Finance. The…
Liked by Manoj Makhija
-
SailPoint Identity Day in Chicago was a huge success! Our own Scott MacDonald from PwC joined an insightful panel discussion on Identity Security…
SailPoint Identity Day in Chicago was a huge success! Our own Scott MacDonald from PwC joined an insightful panel discussion on Identity Security…
Liked by Manoj Makhija
-
It was an honor to speak to the talented students at Indian Institute of Technology, Delhi. I'm confident that their generation will come up with new…
It was an honor to speak to the talented students at Indian Institute of Technology, Delhi. I'm confident that their generation will come up with new…
Liked by Manoj Makhija
-
Congratulations to Paul Griggs who will serve as the next senior partner of PwC US, following my retirement from the firm at the end of June! I’ve…
Congratulations to Paul Griggs who will serve as the next senior partner of PwC US, following my retirement from the firm at the end of June! I’ve…
Liked by Manoj Makhija
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Manoj Makhija
-
Manoj Makhija
Retail Banking and Wealth Management
-
Manoj Makhija
--
-
Manoj Makhija
2d comp supervisor at redchillies.vfx
-
Manoj Makhija
Business Head at GeTS
42 others named Manoj Makhija are on LinkedIn
See others named Manoj Makhija