About
Award-winning growth-focused technology leader.
Saadat's expertise lies in generating…
Articles by Saadat
-
Time to Refresh Your VDI? How to Sidestep the Upfront Expense
Time to Refresh Your VDI? How to Sidestep the Upfront Expense
By Saadat Malik
-
Business Outcomes and Experiences: Taking IoT momentum to the next level
Business Outcomes and Experiences: Taking IoT momentum to the next level
By Saadat Malik
Activity
-
I'm looking forward with excitement to meeting our customers at VMware Explore 2024 Las Vegas. We are putting together an incredible slate of…
I'm looking forward with excitement to meeting our customers at VMware Explore 2024 Las Vegas. We are putting together an incredible slate of…
Shared by Saadat Malik
-
Enterprise infrastructure is not a one-size-fits-all solution. For data center environments, Broadcom's VMware Cloud Foundation (VCF) offers an…
Enterprise infrastructure is not a one-size-fits-all solution. For data center environments, Broadcom's VMware Cloud Foundation (VCF) offers an…
Shared by Saadat Malik
-
Excited about VMware Edge Compute Stack 3.5 launch, and I'm proud to have been part of the engineering team behind it. ECS simplifies edge computing…
Excited about VMware Edge Compute Stack 3.5 launch, and I'm proud to have been part of the engineering team behind it. ECS simplifies edge computing…
Liked by Saadat Malik
Experience
Education
-
Purdue University
Activities and Societies: Eta Kappa Nu: Electrical & Computer Engineering Honor Society
-
Volunteer Experience
Publications
-
Cisco Smart Grid Communications Architecture
Cisco Live Conference
This talk presents to the audience Cisco's Smart Grid End to End Communications Architecture. Building a smart grid is a complex process that can span many years. Key to ensuring a successful deployment revolves around putting in place a business objectives driven process that drives technology decisions with a view into present and future needs. Business objectives must be mapped to crisp and well defined use cases cutting across all domains of a utility. Communications requirements, such as…
This talk presents to the audience Cisco's Smart Grid End to End Communications Architecture. Building a smart grid is a complex process that can span many years. Key to ensuring a successful deployment revolves around putting in place a business objectives driven process that drives technology decisions with a view into present and future needs. Business objectives must be mapped to crisp and well defined use cases cutting across all domains of a utility. Communications requirements, such as those around security, bandwidth and quality of services, derived from an analysis of these use cases, then leads to a roadmap of technology architectural decisions. Good technology decisions here result in an intelligent, fully integrated and participative communications infrastructure, pivotal to the roll out of a smarter grid. The purpose of this talk is to start a rich, interactive, architectural dialogue that leads to a close partnership between the utility and Cisco, resulting in the development of a business goals driven communications architecture enabling the utility’s smart grid transformation.
Other authors -
-
Building a Secure Smart Grid: Motivations, Principles and Methodology
EU Smart Grid Cyber Security Conference
Ensuring that the electric grid infrastructure of the future is resilient in the face of attacks, existing and unknown, is essential to achieving the objectives of a “smart grid”. Interoperability of this environment is critical, yet creates a more diverse threat environment and creates further complexity with which a security framework must deal with. Perhaps, the best way to reduce risk and secure the grid is by ensuring that security is built into the communications fabric that pulls the…
Ensuring that the electric grid infrastructure of the future is resilient in the face of attacks, existing and unknown, is essential to achieving the objectives of a “smart grid”. Interoperability of this environment is critical, yet creates a more diverse threat environment and creates further complexity with which a security framework must deal with. Perhaps, the best way to reduce risk and secure the grid is by ensuring that security is built into the communications fabric that pulls the various components of the grid together into a synergistic, more intelligent grid. This talk presents a security analysis of the various functional domains of the utility grid, discusses the environmental dynamics created by the integrated and interoperable functioning of these domains, and proposes a communications fabric based, end to end framework for securing this environment. The talk concludes by discussing at a high level the communications architecture that would need to be developed keeping in mind this security framework to ensure that security embedded within it is gets applied effectively to all aspects of the utility environment.
-
Buidling a Communications Architecture for the Utility of the Future
Cisco Live Conference
This was the first public talk on Cisco's end to end communications architecture. It summarized the work that was produced by the cross functional group I had led at Cisco the past year.
Other authors -
-
Securing Smart Grid: Transforming the Power Infrastructure Through an Intelligent Communications Fabric
US China Green Energy Council (UCGEC)
Delivered at the Google campus to a mixed audience comprised of US Chinese entrepreneur community, Silicon Valley venture capital firms and a fair sprinkling of interested Google employees. Ed Lu, former Astronaut, was one of the fellow members on the panel that took place after the talk!
-
Securing Distribution 2.0: Security for a Converged Demand and Supply Environment
California Public Utility Commision (CA-PUC) (Televised Live)
The electricity distribution landscape is facing some radical changes. It will become the melting pot of demand as well as supply sources of tomorrow. These sources will behave differently that the more centralized or static sources of today behave. Renewables integration for example is taking a centralized supply system and inserting a distributed element into it in a big way. PHEVs are changing the way utilities must look at its consumers. From fixed predictable entities to mobile entities…
The electricity distribution landscape is facing some radical changes. It will become the melting pot of demand as well as supply sources of tomorrow. These sources will behave differently that the more centralized or static sources of today behave. Renewables integration for example is taking a centralized supply system and inserting a distributed element into it in a big way. PHEVs are changing the way utilities must look at its consumers. From fixed predictable entities to mobile entities with changing demand patterns. The backend would change too. Today where the DMS systems interface with just a few other systems, these will interface with a lot more applications in the backend, changing the way information structures must be created to support them. All this will fundamentally challenge not only the way we construct our power system but will require us to think carefully about how we build the information system which will integrate with this power system. But here is the good news. The good news is that these challenges are not entirely new for the IT and communications community. We have seen computing go from centralized to a distributed model, from fixed user locations to anywhere, anytime connectivity. There is a wealth of experience and know how that exists in the IT community to help the power system community make the jump. The key is to ensure that we build the right framework and drive it through effective policies to ensure that the right paradigms are mapped to this new environment and the right results are achieved. Cyber physical convergence is a complicating factor in all this. But with careful design and planning, we can meld the best practices the IT and communications industry has developed over many years with the power industry changing ways and bring smart grid in its most optimal, resilient and secure form to its consumers.
-
Leveraging Intelligent Communications to Transform the Power Infrastructure
Cisco Systems Inc.
This was the first public white paper from Cisco outlining its vision and strategy for Smart Grid. Smart grid is the term generally used to describe the integration of the elements connected to the electrical grid with an information infrastructure to offer numerous benefits for both the providers and consumers of electricity. It is an intelligent future electricity system that connects all supply, grid, and demand elements through an intelligent communication system. The backbone of a…
This was the first public white paper from Cisco outlining its vision and strategy for Smart Grid. Smart grid is the term generally used to describe the integration of the elements connected to the electrical grid with an information infrastructure to offer numerous benefits for both the providers and consumers of electricity. It is an intelligent future electricity system that connects all supply, grid, and demand elements through an intelligent communication system. The backbone of a successful smart grid operation is a reliable, resilient, secure, and manageable standards-based open communication infrastructure that provides for intelligent linkages between the elements of the grid while participating in the decision making that delivers value to the utility and supply and demand entities connected to it.
Other authors -
-
Requirements Analysis for IP-based Government Emergency Telephony Service
IEEE 20th International Conference on Advanced Information Technology and Applications
IP telephony has been adopted to replace the traditional circuit switch networks in various environments. Government Emergency Telephony Service (GETS) is one of the critical services currently provided in the traditional circuit switch network. GETS supports personnel from different organizations performing their critical missions including incidence response and prevention, national security, and emergency preparedness. Because of the convergent infrastructure for both voice and data, how to…
IP telephony has been adopted to replace the traditional circuit switch networks in various environments. Government Emergency Telephony Service (GETS) is one of the critical services currently provided in the traditional circuit switch network. GETS supports personnel from different organizations performing their critical missions including incidence response and prevention, national security, and emergency preparedness. Because of the convergent infrastructure for both voice and data, how to provide GETS over IP is one of the challenges for IP telephony to prove its flexibility and strength for large-scale critical services. In this study, we explore many aspects for providing IP-based GETS, such as availability, security, interoperability, and reliability. Based on IP multimedia subsystem (IMS) architecture, the requirements along with some analyses and recommendations are outlined to meet the strict demands for GETS in different convergent paradigms.
Other authors -
-
Vulnerability Analysis and Best Practices for Adopting IP Telephony in Critical Infrastructure Sectors
IEEE Communications
IP telephony has been rapidly introduced to replace the traditional circuit switched infrastructure for telephony services. This change has had an enormous impact on critical-infrastructure (CI) sectors, which are expected to become increasingly dependent on IP telephony services. Reliable and secure telephony service is a key concern confronting most organizations in the critical-infrastructure sector today. With the proliferation of voice over IP (VoIP) services in these organizations, it is…
IP telephony has been rapidly introduced to replace the traditional circuit switched infrastructure for telephony services. This change has had an enormous impact on critical-infrastructure (CI) sectors, which are expected to become increasingly dependent on IP telephony services. Reliable and secure telephony service is a key concern confronting most organizations in the critical-infrastructure sector today. With the proliferation of voice over IP (VoIP) services in these organizations, it is important for them to understand the security vulnerabilities and come up with a set of best practices during the evolution of the IP telephony services. This article outlines the potential security issues faced by CI sectors as they transform their traditional phone systems into VoIP systems. Vulnerability analyses are conducted to understand the impact of VoIP security challenges in the new convergent network paradigm. The most common security measures are analyzed to identify their strengths and limitations in combating these new security challenges. A set of recommendations and best practices are offered to address the key issues of VoIP security as IP telephony is being introduced into critical infrastructure.
Other authors -
-
National Infrastructure Protection Plan (IT SSP for NIPP)
US Department of Homeland Security
Chairperson, IT SCC’s IT Sector Specific Plan (SSP) Research and Development (R&D) Working Group that produced the R&D chapter (chapter 5) of the Sector Specific Plan for the IT SCC. This plan is the IT sector’s input to the US National Infrastructure Protection Plan (NIPP) on behalf of the IT SCC and IT GCC (government coordinating council).
-
Security Analysis and Solutions for Deploying IP Telephony in the Critical Infrastructure
IEEE SecQOS
Voice over IP (VoIP) is being adopted to replace the traditional circuit switched infrastructure for telephony services. This trend has an enormous impact on the critical infrastructure sectors which will progressively become more dependent in part or as a whole on VoIP services. Phone communications and its security is a relevant concern for most critical infrastructure sector organizations today. With passage of time this concern will morph into a new set of challenges and opportunities…
Voice over IP (VoIP) is being adopted to replace the traditional circuit switched infrastructure for telephony services. This trend has an enormous impact on the critical infrastructure sectors which will progressively become more dependent in part or as a whole on VoIP services. Phone communications and its security is a relevant concern for most critical infrastructure sector organizations today. With passage of time this concern will morph into a new set of challenges and opportunities brought forward by the deployment of VoIP in these organizations. This study attempts to outline the potential security issues faced by the critical infrastructure sectors as they transform their traditional phone systems into VoIP systems. Security analysis is provided to understand the impact of VoIP security challenges in the new convergent network paradigm. Some recommendations are made on how to address many issues of VoIP security along the process of adopting IP telephony into critical infrastructure.
Other authors -
-
Book: 'Network Security Principles and Practices' (ISBN: 1587050250)
Pearson Education
As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security…
As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by the CCIE engineer who wrote the CCIE Security lab exam and who helped develop the CCIE Security written exam, Network Security Principles and Practices is the first book to help prepare candidates for the CCIE Security exams and is a valuable resource on security principles and practices for all other IT professionals.
Patents
Projects
-
Common Vulnerability Scoring System (CVSS)
-
Manager of team which provided technical leadership for development of the Common Vulnerability Scoring Systems (CVSS).
This project was initiated in support of John Chambers, CEO of Cisco Systems Inc., who was Vice Chair of the US National Infrastructure Advisory Council (NIAC) at that time. CVSS is in wide use today in the industry as a common framework for vulnerability information.
Organizations
-
IT Sector Coordinating Council (IT SCC)
Co-Chair Protective Programs and R&D Implementation Group
-This group is working on creating an implementation strategy for furthering R&D and improving national Protective Programs in the US.
-
Institute for Information and Infrastructure Assurance (IIIA)
Executive Advisory Board Member
- -
Stanford Research Institute (SRI)
Executive Advisory Board Member
- -
Center for Education and Research in Information Assurance and Security (CERIAS)
Executive Advisory Board Member
- -
IT Sector Coordinating Council (IT SCC)
Co-Chair R&D Working Group
-This group produced the R&D chapter of the Sector Specific Plan for the IT SCC. This plan is the IT sector’s input to the US National Infrastructure Protection Plan (NIPP) on behalf of the IT SCC and IT GCC (government coordinating council).
-
San Jose State University Industry Board
Advisory Board Member
-
Recommendations received
6 people have recommended Saadat
Join now to viewMore activity by Saadat
-
The edge computing battleground is where real-world operations meet complex IT challenges. Our customers frequently face issues with massive scale…
The edge computing battleground is where real-world operations meet complex IT challenges. Our customers frequently face issues with massive scale…
Shared by Saadat Malik
-
My CV, if I asked my teenage kids to help write it! 👴 With 25+ years in the IT game, I’m the OG CTO, the sigma tech wizard who's seen it all and…
My CV, if I asked my teenage kids to help write it! 👴 With 25+ years in the IT game, I’m the OG CTO, the sigma tech wizard who's seen it all and…
Liked by Saadat Malik
-
Met a customer last week who had invested in a modern eCommerce solution, yet is seeing very high drop off rates in the conversion phase of the…
Met a customer last week who had invested in a modern eCommerce solution, yet is seeing very high drop off rates in the conversion phase of the…
Liked by Saadat Malik
-
I’m happy to share that I’m starting a new position as Chief Revenue Officer (CRO) at Bitsight! I am saddened to leave my team at Nile, but I hope I…
I’m happy to share that I’m starting a new position as Chief Revenue Officer (CRO) at Bitsight! I am saddened to leave my team at Nile, but I hope I…
Liked by Saadat Malik
-
Gratitude and New Beginnings: As they say, all good things must come to an end, I wrapped up a fantastic 5-year journey at cloud networking leader…
Gratitude and New Beginnings: As they say, all good things must come to an end, I wrapped up a fantastic 5-year journey at cloud networking leader…
Liked by Saadat Malik
-
Business cases are key to winning deals today. Empower every seller to build C-suite ready, ROI-driven business cases with ease.
Business cases are key to winning deals today. Empower every seller to build C-suite ready, ROI-driven business cases with ease.
Liked by Saadat Malik
-
Thrilled to Announce a New Chapter! Today marks a pivotal moment in my career as I step into the role of CEO at VistaXM, an AI-enabled customer…
Thrilled to Announce a New Chapter! Today marks a pivotal moment in my career as I step into the role of CEO at VistaXM, an AI-enabled customer…
Liked by Saadat Malik
-
Six Five Media interview with the Futurum Group. Hard-hitting discussion with the brilliant team of Daniel Newman and Patrick Moorhead – your…
Six Five Media interview with the Futurum Group. Hard-hitting discussion with the brilliant team of Daniel Newman and Patrick Moorhead – your…
Shared by Saadat Malik
-
Interview with SiliconANGLE & theCUBE at #mwc24. My gratitude to the terrific team of Shelly DeMotte Kramer, Savannah Peterson and David Vellante for…
Interview with SiliconANGLE & theCUBE at #mwc24. My gratitude to the terrific team of Shelly DeMotte Kramer, Savannah Peterson and David Vellante for…
Shared by Saadat Malik
-
Sat down with Evan Kristel at MWC 2024 to talk about the changes taking place at the edge. #broadcom #vmware #edgecomputing #retail #healthcare…
Sat down with Evan Kristel at MWC 2024 to talk about the changes taking place at the edge. #broadcom #vmware #edgecomputing #retail #healthcare…
Shared by Saadat Malik
-
🚑 Learn how first responders are empowered like never before with connectivity that extends a wireless network beyond the vehicle. See our Mobile…
🚑 Learn how first responders are empowered like never before with connectivity that extends a wireless network beyond the vehicle. See our Mobile…
Liked by Saadat Malik
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Saadat Malik
-
SAADAT ALI
Property Consultant | Derrick Man in Oil Field.
-
Saadat Malik
Structural Engineer (🏅)| M.Eng | P.E | Mushtaq and Bilal- Consulting Engineers | PAK. Ex- Arif & Associates| N.E.D| SSUET
-
Saadat Malik
Marketing Specialist at Dahua Technology Co. LTD
-
Saadat Malik
Interested in Network Engineering
22 others named Saadat Malik are on LinkedIn
See others named Saadat Malik