About
Chief Product Officer, SVP, VP GM Product Management, Strategy, Engineering, Business…
Articles by Jai Singh
Activity
-
This Monday, May 4, 2026, marks the 10-year anniversary of IBM putting a quantum computer on the cloud. We wanted to share a few #FlashbackFriday…
This Monday, May 4, 2026, marks the 10-year anniversary of IBM putting a quantum computer on the cloud. We wanted to share a few #FlashbackFriday…
Liked by Jai Singh Arun
-
Heading to IBM Think 2026 I’ll be speaking on why Data Security is more critical than ever in an AI- and Quantum‑driven world—and how leaders can…
Heading to IBM Think 2026 I’ll be speaking on why Data Security is more critical than ever in an AI- and Quantum‑driven world—and how leaders can…
Liked by Jai Singh Arun
-
We are delighted to share that the Department of Computer Engineering and Information Technology - Veermata Jijabai Technological Institute (VJTI)…
We are delighted to share that the Department of Computer Engineering and Information Technology - Veermata Jijabai Technological Institute (VJTI)…
Liked by Jai Singh Arun
Experience
Education
Licenses & Certifications
Volunteer Experience
Publications
-
Book: Becoming Quantum Safe
Wiley Publication
Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on…Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility
A practical guide to navigating cryptographic challenges in the era of quantum computing.
Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC)―ensuring your organization remains secure, compliant, and resilient in the quantum era.
Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography.Other authorsSee publication -
Book: Blockchain for Business
Pearson Addison Wesley
Blockchain for Business: Discover How Blockchain Networks are Transforming Companies, Driving Growth, and Creating New Business Model
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain
"Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and…Blockchain for Business: Discover How Blockchain Networks are Transforming Companies, Driving Growth, and Creating New Business Model
The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain
"Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and clearly describing the value of blockchain for enterprises, as well as the processes required to harness blockchain to achieve business objectives, Blockchain for Business presents a startlingly concise yet comprehensive roadmap for business leaders. This book is an excellent resource for anyone looking to leverage blockchain to transform their business."Other authorsSee publication -
Reimagining the Future of Identity Management With Blockchain
SecurityIntelligence.com
-
Book: Secure Utilities from Generation to Consumers
GeneratingInsights.com KYOTO Publishing
-
Integrated Service Management Excellence for Utilities
GeneratingInsights.com KYOTO Publishing
Patents
-
Event-driven, asset-centric key management in a smart grid
Issued US 20150055780
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management…
A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified. An event-asset association is then supplied to the key management sub-system, which uses this information to determine a key management operation
Other inventorsSee patent -
Identifying confidential data in a data item by comparing the data item to similar data items from alternative sources
Issued US US20140188921 A1
A method, apparatus and computer program product to identify confidential information in a document. To examine a document for inclusion of confidential information, the document is compared against documents having similar structure and content from one or more other sources. When comparing documents (of similar structure and content) from different sources, confidential information is then made to stand out by searching for terms (from the sources) that are not shared between or among them…
A method, apparatus and computer program product to identify confidential information in a document. To examine a document for inclusion of confidential information, the document is compared against documents having similar structure and content from one or more other sources. When comparing documents (of similar structure and content) from different sources, confidential information is then made to stand out by searching for terms (from the sources) that are not shared between or among them. In contrast, common words or terms that are shared across the sources are ignored as likely being non-confidential information; what remains as not shared may then be classified as confidential information and protected accordingly (e.g., by omission, redaction, substitution or the like). Using this technique, non-confidential information may be safely segmented from confidential information in a dynamic, automated manner.
Other inventorsSee patent -
Auto-generation and Auto-versioning of a Multi-Sourced Dynamic Document
Issued US 7877680
A computer-implementable method, system and computer media for auto-generating and auto-versioning a dynamic document are presented. In a preferred embodiment, the computer-implementable method includes populating a dynamic document with content from multiple sources. The dynamic document is then version named in accordance with a nomenclature rule that identifies a source and version of content from the multiple sources. In response to a content from one or more of the multiple sources…
A computer-implementable method, system and computer media for auto-generating and auto-versioning a dynamic document are presented. In a preferred embodiment, the computer-implementable method includes populating a dynamic document with content from multiple sources. The dynamic document is then version named in accordance with a nomenclature rule that identifies a source and version of content from the multiple sources. In response to a content from one or more of the multiple sources changing at a source, the dynamic document is updated with updated content, and a version name of the dynamic document is updated to reflect the updated content.
Other inventorsSee patent -
A System and Apparatus to Identify and Certify that a Food Product is Meat Free
Issued US IPCOM000125996D
Courses
-
IBM General Manager Leadership Development Program
2006
Honors & Awards
-
Top 200 Global Blockchain Influencers and Authors
Open Business Council
https://www.openbusinesscouncil.org/top-200-blockchain-influencers-authors/
-
Top 20 Global Thought Leaders and Influencers on Blockchain
Thinkers360
https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-blockchain-october-2020/
-
Top 20 Global Thought Leaders and Influencers on Digital Disruption
Thinkers360
https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-digital-disruption-october-2019/
-
Top Performer Executive Award
Unisys
-
Management Excellence & Eminence Award
IBM
-
Patent Issue Award
IBM
-
Hall of Fame - IBM South East Cluster Software Group
IBM
-
Marketing Leadership Award
IBM
Quarterly WebSphere Marketing Leadership Award
-
Asian Leadership Summit Recognition
IBM SVP Software & Systems Group and IBM SVP Marketing & Communications
-
IEEE - Outstanding Service Award
IEEE Eastern North Carolina Section
-
Invention Achievement Award
IBM
-
BizTech Leadership Participant
IBM
-
Bravo Award
IBM
Languages
-
English
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
-
Marathi
Limited working proficiency
-
Sanskrit
Limited working proficiency
Organizations
-
The International Information System Security Certification Consortium (ISC)²
Member
- Present -
Information Systems Audit and Control Association (ISACA)
Member
- Present -
Institute of Electrical and Electronics Engineers (IEEE)
ENCS Chapter Executive Committee Member
- Present -
Project Management Institute (PMI)
Member
- Present
Recommendations received
15 people have recommended Jai Singh
Join now to viewMore activity by Jai Singh
-
A couple of weeks ago, I had the privilege of speaking at The Tech Interactive's National AI Literacy Day event representing IBM . It was inspiring…
A couple of weeks ago, I had the privilege of speaking at The Tech Interactive's National AI Literacy Day event representing IBM . It was inspiring…
Liked by Jai Singh Arun
-
Do you have visibility into your cryptography assets? Are you getting ready for the Quantum era? Join us May 4-7 in Boston for IBM #Think2026, a…
Do you have visibility into your cryptography assets? Are you getting ready for the Quantum era? Join us May 4-7 in Boston for IBM #Think2026, a…
Liked by Jai Singh Arun
-
Proud moment for all of us at IBM Expert Labs CoE India! We recently inaugurated our new office space for the Experts Labs CoE at the Bagmane…
Proud moment for all of us at IBM Expert Labs CoE India! We recently inaugurated our new office space for the Experts Labs CoE at the Bagmane…
Liked by Jai Singh Arun
-
We cannot fix things we don’t know. Do you have visibility into your cryptography assets? Are you getting ready for the Quantum era? What does it…
We cannot fix things we don’t know. Do you have visibility into your cryptography assets? Are you getting ready for the Quantum era? What does it…
Liked by Jai Singh Arun
-
Quantum Computing has the potential to address global challenges such as optimizing supply chains, advancing medical treatments, and designing new…
Quantum Computing has the potential to address global challenges such as optimizing supply chains, advancing medical treatments, and designing new…
Liked by Jai Singh Arun
-
Yesterday's launch of the MIT-IBM Computing Research Lab in Cambridge not only builds on our long-standing partnership with Massachusetts Institute…
Yesterday's launch of the MIT-IBM Computing Research Lab in Cambridge not only builds on our long-standing partnership with Massachusetts Institute…
Liked by Jai Singh Arun
-
🚨 Cybersecurity just hit an inflection point It’s called the “Mythos Moment” — when AI-driven vulnerability discovery begins to outpace…
🚨 Cybersecurity just hit an inflection point It’s called the “Mythos Moment” — when AI-driven vulnerability discovery begins to outpace…
Liked by Jai Singh Arun
-
Today we organized the first UNC Kenan-Flagler Business School - Carolina AI in Business Workshop (with Brad Staats, Paul Wolff, Melissa Garrido…
Today we organized the first UNC Kenan-Flagler Business School - Carolina AI in Business Workshop (with Brad Staats, Paul Wolff, Melissa Garrido…
Liked by Jai Singh Arun
-
Top 10 companies in quantum computing. 🌌 Notice something: the top 5 are all hyperscalers, IBM, Google, Microsoft, Amazon Web Services (AWS)…
Top 10 companies in quantum computing. 🌌 Notice something: the top 5 are all hyperscalers, IBM, Google, Microsoft, Amazon Web Services (AWS)…
Liked by Jai Singh Arun
-
Excited about being part of this panel on Wednesday April 29th. The topics are current and the need for an engaging discussion is significant.
Excited about being part of this panel on Wednesday April 29th. The topics are current and the need for an engaging discussion is significant.
Liked by Jai Singh Arun
-
Grateful for three decades at IBM. I came to IBM as an intern in the summer of 1995, while I was still finishing my PhD, and I never really left…
Grateful for three decades at IBM. I came to IBM as an intern in the summer of 1995, while I was still finishing my PhD, and I never really left…
Liked by Jai Singh Arun
-
Oh yes - Bob’s birthday. Graced by our CEO Arvind Krishna . It was a blast with Bob chat with Arvind, Bob band, Bob latte, Bob cake and more…
Oh yes - Bob’s birthday. Graced by our CEO Arvind Krishna . It was a blast with Bob chat with Arvind, Bob band, Bob latte, Bob cake and more…
Liked by Jai Singh Arun
-
IBM has unveiled IBM Bob, an AI-first development partner designed to take enterprises beyond AI-assisted coding to fully automated, production-ready…
IBM has unveiled IBM Bob, an AI-first development partner designed to take enterprises beyond AI-assisted coding to fully automated, production-ready…
Liked by Jai Singh Arun
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content