Welcome to Sid Dutta’s site on Data Protection. Here you will find valuable information on data protection strategies that enterprises need to adopt and also some insights into specific data-centric
technologies and solutions, based on Sid’s experience in leading and operating large data protection programs.

Sid is an industry expert and leader in the Cyber Security space, specializing in Data centric Security & Privacy. Sid is currently employed with one of the largest software companies, under their
Security, Risk & Governance business unit, and drives Product Strategy and Roadmap for data security products, focusing on Cloud Integrations, BigData Analytics and Data LifeCycle
Management & Protection as-a-Service.

Sid comes from the enterprise side, and has led Cyber Security Risk Remediation programs and services globally at various large corporations in the financial services sector for number of
years.

In his last position as the Vice President & Global Head of Data Protection & Applied Cryptography at one of the world’s largest merchant acquired and payment processor, Sid has driven data
-centric protection and key management across on-prem and public cloud hosted applications and data, to address the enterprise needs for compliance to PCI standards and Privacy Regulations
such as GDPR and CCPA. He has also been responsible for enterprise PKI, Encryption & Key Management, Secrets Management, Cloud Security, Payment Security solutions.

Prior to this role, Sid held the position of Director of Information Security in one of the world’s largest credit card companies and globally respected service brands, where he was responsible for
End to End delivery and operations of data protection globally, driving a large enterprise Risk Remediation Program.

Prior to his recent positions in the Cyber Security space, Sid has held multiple leadership positions at throughout IT, and of increasing responsibility. Sid started his career as a Consultant from
TCS in the Contact Center Technologies, architecting and developing voice applications, IVR platforms, Intelligent Call Routing and CTI. He then moved onto architecting Voice and Contact
Center infrastructures globally, which included Outbound Dialing, Call Recording, SIP Trunking, etc. As the Director of Technical Architecture, he then led the Enterprise Architecture
function focusing on IT Infrastructure Uplifts, Business Aligned IT Strategy, Cloud Strategy and Migration, Cloud Security. He was also responsible for the Architecture & Engineering
team for Enterprise Continuous Integration & Continuous Delivery to drive Tool Chain Automation, before he moved into the Information Security space.

Sid was awarded the “Technologies Excellence” and “The Genius Medal” for various
Innovations and multiple Issued Patents. Sid contributes thought leadership to the vendor community and has held Technical Advisory Board positions with multiple software and service
companies.

Sid has a Masters of Business Administration and a Bachelor of Technology Degree in Electronics & Telecommunication Engineering.

You can connect with Sid on LinkedIn

Articles

Home

Key and Secrets Management

Bring Your Own Key

Exploring Cloud Service Providers' Crypto and Key Management Services

Importance and Advantages of Format Preserving Data Protection

Recommendations for Implementing the Right Cloud Crypto and Key Management Solution

Online Shopping Security in the Age of COVID-19

Published Articles and Press Releases

Videos