Benild Joseph is a Limca Book Record Holder, Security Researcher, TEDx Speaker and renowned White Hat Hacker with definitive experience in the field of computer security in India. Benild is profiled in Hacking the Hacker - book written by Roger Grimes along with Bruce Schneier, Kevin Mitnick, Mark Russinovich and World's best white hat hackers and is also listed among the Top 10 Ethical Hackers in India by Microsoft Social Forum and Silicon India Magazine. He was a speaker at The APWG Vienna Symposium on Global Cybersecurity Awareness Messaging at the United Nations. He is a regular speaker at Information security & digital forensics conferences in India and abroad. Benild is working with various corporate companies, law enforcement agencies and government organizations. He has also worked on various security projects at International Cyber Threat Task Force (CTTF) and Cyber Security Forum Initiative (CSFI ). He is the co-author of “CCI” a book written for law enforcement agencies in India. Benild has discovered critical vulnerabilities in popular websites including Facebook, Yahoo, Blackberry, Sony Pictures, Tesco, AstraZeneca, Vodafone and Deutsche Telekom. To his credit he has many registered and pending patents in Cyber Forensic and Information Security domain. He specializes in Web Application Penetration testing and Digital Forensic Investigation. His research interests include Internet Security, Data Forensic, Virtualization and Mobile Security. He has been interviewed by Various Newspapers and TV Channels where he has shared his experiences relating to cyber attacks, latest vulnerabilities and cyber crimes.
President - ISSA India (July 2017 - Present)
The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.
IS Advisor - Governemnt of India (March 2015 - Present)
Review and report periodically on current operational security status and activities. Assist/Advise Implementation of Information Security Controls through on various Projects. Request and review action plans from Delivery Focal Points, to address all outstanding SAP (Security Action Plan) entries.