Jaya Baloo

Last updated
Jaya Baloo
Jaya Baloo at Blackphone Launch.jpg
EducationTufts University
OccupationChief Information Security Officer at Avast

Jaya Baloo is a cybersecurity expert who is currently the Chief Information Security Officer (CISO) at Avast Software. [1] Baloo was named one of the top 100 CISO's in 2017 and one of the Forbes 100 Women Founders in Europe To Follow in 2018. [2]

Contents

Career

Baloo studied at Tufts University between 1991 and 1995. She was inspired to study computers after receiving one for Christmas at the age of nine. Baloo's first job was working at a bank dealing with export cryptography problems. She was surprised at how cryptography was treated as a "weapon," with the USA hiding their security advances from the rest of the world. [3] She had an interest in understanding the difference between mistakes in programming and malicious activity. [4] After moving to The Netherlands, Baloo became a network services engineer and consultant at KPN International Consultancy before specialising in fraud and revenue assurance for France Telecom between 2005 and 2009. Baloo then worked at Verizon for nearly 4 years. Baloo believes that the goal of telecommunications attackers is not to bring down services but to shape and intercept traffic without discovery, notably different from attacks on other critical infrastructure like energy or water. [4]

In 2012, Baloo became the Chief Information Security Officer (CISO) at KPN Telecom, a Dutch internet service provider, in the same year that KPN was hacked. [5] During this time, Baloo was chairman of the Dutch Continuity Board, which is a collaboration tackling denial-of-service (DDoS) cyberthreats through exchanging live attack information between competitors. In an interview with the podcast Cybersecurity Dispatch, it was highlighted that Baloo's length of tenure at KPN was considerably longer than the 18-month to 2-year average. [6] She was named one of the top 100 CISOs in 2017, with only 9 other women named. [7] In 2018, Forbes named Baloo as one of the 100 Women Founders in Europe To Follow. [8]

In October 2019 Baloo took on her current role as CISO for Avast. [9] One reason why she joined Avast is her love of their mission to ensure "that cybersecurity is a fundamental right. It’s not just for people who can afford to pay for a product – it's for everyone". [10]

Baloo holds a faculty position at Singularity University. [11] She is also a quantum ambassador for KPN Telecom and Vice Chair of the Quantum Flagship Strategic Advisory Board of the EU Commission. [12] She considers quantum computers as inevitable tools that will disrupt current computing architectures, recommending that businesses and organisations prepare themselves for the impact of new quantum protocols. Among her recommendations are to increase the key length of current algorithms, use quantum key distribution in niche parts of the network, and look at post quantum cryptographic algorithms. [4] Baloo projects that the most exciting development in quantum communication will be beyond the current point-to-point into many-to-many, on demand, instantly. This requires quantum repeaters and other architecture in a managed service, which Baloo predicts could be achieved in 5–10 years' time. [13]

During the COVID-19 pandemic, Baloo has been providing tips for best home working practices on behalf of Avast. [14] [15]

She is a member of the supervisory board of NOS, one of the broadcasting organisations making up the Dutch public broadcasting system. [16]

Interests and views

Baloo is interested in the future of cybersecurity and how quantum computing may impact privacy. She is an expert in network architecture, security weaknesses in mobile and voice-over-IP, cryptography, and quantum communication networks. In 2019, the non-profit Inspiring Fifty selected Baloo as one of the fifty most inspiring women in the Netherlands. [17]

Baloo considers inequality and distribution of assets as one of the biggest global cyberthreats, with only a handful of countries able to detect, respond to, or defend against threats. On quantum computing, Baloo comments:

"You see that happening at Microsoft, at Google, at IBM, the United States is investing heavily in it [quantum computing], China has billions of dollars in it...But the rest of the world certainly doesn’t. You’re not hearing of a quantum computer or post quantum cryptography being developed in Brazil or in Kenya. What I’m worried about from an infosec point of view, is that when we have a quantum computer, it’s going to effectively render our current encryption schemes for public key cryptography moot....So if we see an evolution where only certain countries will be able to possess this kind of technology, all of the other countries will be in this ‘digital divide’ that the UN always talks about." [4]

Baloo's advice for women in cybersecurity is to "Hold onto your passion, and don't shut yourself down. We need you in this industry. Help us keep the world safe". [10]

Personal life

Baloo has three children. In her spare time she enjoys diving, having dived at the Great Barrier Reef and in the Bahamas, and would consider becoming a diving instructor as an alternative occupation. Baloo is also training for a pilot license. [10]

Related Research Articles

In cryptography, key size or key length refers to the number of bits in a key used by a cryptographic algorithm.

<span class="mw-page-title-main">Encryption</span> Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

<span class="mw-page-title-main">Quantum computing</span> Technology that uses quantum mechanics

A quantum computer is a computer that takes advantage of quantum mechanical phenomena.

Quantum information science is a field that combines the principles of quantum mechanics with information theory to study the processing, analysis, and transmission of information. It covers both theoretical and experimental aspects of quantum physics, including the limits of what can be achieved with quantum information. The term quantum information theory is sometimes used, but it does not include experimental research and can be confused with a subfield of quantum information science that deals with the processing of quantum information.

<span class="mw-page-title-main">Avast</span> Czech security software company

Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence. Avast has more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. The company has approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it was in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.

A chief information security officer (CISO) is a senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are adequately protected. The CISO directs staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks. They respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of policies and procedures. The CISO is also usually responsible for information-related compliance. The CISO is also responsible for protecting proprietary information and assets of the company, including the data of clients and consumers. CISO works with other executives to make sure the company is growing in a responsible and ethical manner.

EC-Council is a cybersecurity certification, education, training, and services company based in Albuquerque, New Mexico.

<span class="mw-page-title-main">Susan Landau</span> American mathematician and engineer

Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012.

Post-quantum cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with popular algorithms currently used in the market is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily solved on a sufficiently powerful quantum computer running Shor's algorithm or even faster and less demanding alternatives.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

In cryptographic protocol design, cryptographic agility or crypto-agility is the ability to switch between multiple cryptographic primitives.

YL Ventures is an American-Israeli venture capital firm that specializes in seed stage cybersecurity investments.

Quantinuum is a quantum computing company formed by the merger of Cambridge Quantum and Honeywell Quantum Solutions. The company's H-Series trapped-ion quantum computers set the highest quantum volume to date of 524,288. This architecture supports all-to-all qubit connectivity, allowing entangled states to be created between all qubits, and enables a high fidelity of quantum states.

Caroline Wong is an American chief cybersecurity leader who has worked to advance software security programs and promote the mission, vision, and values D&I in cybersecurity. Throughout her career, Wong has been working to "boost the number of women in the field" and advocate for workplace equality. She regularly speaks at industry events and in publications such as The Washington Post and CBS News, and publishes editorial articles on topics such as DevSecOps alignment, infosec best practices, diversity in cybersecurity, and women in tech.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

Rinki Sethi is an American technology executive who has held Chief Information Security Officer and Vice President of Information Security roles at several large companies.

<span class="mw-page-title-main">Technology Innovation Institute</span> Research institute

The Technology Innovation Institute (TII) is an Abu Dhabi government funded research institution that operates in the areas of artificial intelligence, quantum computing, autonomous robotics, cryptography, advanced materials, digital science, directed energy and secure systems. The institute is a part of the Abu Dhabi Government’s Advanced Technology Research Council (ATRC).

Phil Venables is a computer scientist who has been the chief information security officer (CISO) at Google Cloud since 2020. He specializes in information and cyber security, as well as enterprise risk and technology risk. Previous to Venable's position at Google, he held a number of roles at Goldman Sachs and served on the Board of Goldman Sachs Bank. Since 2021, he has also been a member of the President’s Council of Advisors on Science and Technology (PCAST).

Jelena Z. Matone is global chief information security officer and an advocate for women's empowerment in technology. She is best known for her role as the CISO of European Investment Bank and Founding Board Member and the first President of the Women Cyber Force & Women 4 Cyber (W4C) chapter, a global initiative aimed at promoting cybersecurity awareness, education, and gender equality in the industry.

References

  1. "Rapid7's new CSO Jaya Baloo on her cybersecurity philosophy". IT Brew.
  2. Kapin, Allyson. "100 Women Founders In Europe To Follow". Forbes.
  3. "Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions". www.bizcommunity.com. Retrieved 2020-05-09.
  4. 1 2 3 4 "Jaya Baloo, CISO at KPN Telecom, on the cyberthreats of the future – Intelligent CISO" . Retrieved 2020-05-09.
  5. "From One CISO to Another, Get Back to the Basics - An Interview with Jaya Baloo CISO of KPN". Cyber Security Dispatch. Retrieved 2020-05-08.
  6. "From one CISO to another: get back to the basics: an interview with Jaya Baloo".
  7. "The Top 100 CISOs 2017". Hot Topics. 2017-03-09. Retrieved 2020-05-08.
  8. Kapin, Allyson. "100 Women Founders In Europe To Follow". Forbes. Retrieved 2020-05-09.
  9. "Avast appoints Jaya Baloo as Chief Information Security Officer". press.avast.com. Retrieved 2020-05-08.
  10. 1 2 3 "Q&A With New Avast CISO Jaya Baloo | Avast". Security Boulevard. 2019-11-06. Retrieved 2020-05-09.
  11. "Jaya Baloo - Faculty". Singularity University. Retrieved 2020-05-08.
  12. "SAB". Quantum Technology. Retrieved 2020-05-08.
  13. "Quantum Internet - Moving towards quantum resilience". tu-delft.foleon.com. Retrieved 2020-05-09.
  14. "CISO Jaya Baloo on business continuity during the coronavirus pandemic".
  15. "Remote workers need to improve security measures amidst covid-19".
  16. "Jaya Baloo Lid Raad van Toezicht".
  17. "Jannie Minnema". Inspiring Fifty: The Netherlands. Retrieved 2020-05-08.