Jai Singh Arun

Jai Singh Arun

Raleigh-Durham-Chapel Hill Area
19K followers 500+ connections

About

Chief Product Officer, SVP, VP GM Product Management, Strategy, Engineering, Business…

Articles by Jai Singh

Activity

Join now to see all activity

Experience

  • IBM Graphic

    IBM

    Raleigh-Durham-Chapel Hill Area

  • -

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham-Chapel Hill Area

  • -

    Raleigh-Durham-Chapel Hill Area

  • -

    Raleigh-Durham, North Carolina Area, USA

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham, North Carolina Area

  • -

  • -

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Raleigh-Durham, North Carolina Area

  • -

    Mumbai, India

Education

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • IEEE Graphic

    ENCS Executive Commitee Member

    IEEE

    - Present 20 years

    Science and Technology

  • Committee Leader and Advisor

    IBM Asian Leadership Council and Network Group

    - Present 23 years

  • UNC Kenan-Flagler Business School Graphic

    Mentor

    UNC Kenan-Flagler Business School

    - Present 7 years 8 months

Publications

  • Book: Becoming Quantum Safe

    Wiley Publication

    Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

    A practical guide to navigating cryptographic challenges in the era of quantum computing.

    Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on…

    Becoming Quantum Safe: Protect Your Business and Mitigate Risks with Post-Quantum Cryptography and Crypto-Agility

    A practical guide to navigating cryptographic challenges in the era of quantum computing.

    Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive, pragmatic guide designed for CISOs, CTOs, CIOs, CROs, CCOs, CDOs, DPOs, security leaders, and technology executives who need to understand and act on the challenge posed by quantum computing to current cryptography. This comprehensive playbook delivers step-by-step strategies for transitioning to Post-Quantum Cryptography (PQC)―ensuring your organization remains secure, compliant, and resilient in the quantum era.

    Authored by leading experts in cybersecurity, cryptography, and quantum technologies, this book demystifies the quantum threat, explains the vulnerabilities in today's encryption, and provides clear, actionable guidance to achieve crypto-agility and implement quantum-safe cryptography.

    Other authors
    See publication
  • Book: Blockchain for Business

    Pearson Addison Wesley

    Blockchain for Business: Discover How Blockchain Networks are Transforming Companies, Driving Growth, and Creating New Business Model

    The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain

    "Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and…

    Blockchain for Business: Discover How Blockchain Networks are Transforming Companies, Driving Growth, and Creating New Business Model

    The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain

    "Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and clearly describing the value of blockchain for enterprises, as well as the processes required to harness blockchain to achieve business objectives, Blockchain for Business presents a startlingly concise yet comprehensive roadmap for business leaders. This book is an excellent resource for anyone looking to leverage blockchain to transform their business."

    Other authors
    See publication
  • Book: Secure Utilities from Generation to Consumers

    GeneratingInsights.com KYOTO Publishing

Patents

  • Event-driven, asset-centric key management in a smart grid

    Issued US 20150055780

    A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management…

    A security management system comprises a key management sub-system, an asset/workload management sub-system, and an event management sub-system. The event management sub-system detects events. The asset/workload management sub-system correlates events (irrespective of type) with the assets that generate them, and the key management sub-system uses the event-asset associations determined by the asset/workload management sub-system to automatically orchestrate the necessary key management activities (e.g., key creation, revocation, refresh, etc.) across the impacted components in the information technology and operational realms to ensure data security. In one use case, a security event detected by the event management sub-system triggers one or more actions within the asset/workload management sub-system. Service configuration records are identified from this scan, and assets defined in those records are identified. An event-asset association is then supplied to the key management sub-system, which uses this information to determine a key management operation

    Other inventors
    See patent
  • Identifying confidential data in a data item by comparing the data item to similar data items from alternative sources

    Issued US US20140188921 A1

    A method, apparatus and computer program product to identify confidential information in a document. To examine a document for inclusion of confidential information, the document is compared against documents having similar structure and content from one or more other sources. When comparing documents (of similar structure and content) from different sources, confidential information is then made to stand out by searching for terms (from the sources) that are not shared between or among them…

    A method, apparatus and computer program product to identify confidential information in a document. To examine a document for inclusion of confidential information, the document is compared against documents having similar structure and content from one or more other sources. When comparing documents (of similar structure and content) from different sources, confidential information is then made to stand out by searching for terms (from the sources) that are not shared between or among them. In contrast, common words or terms that are shared across the sources are ignored as likely being non-confidential information; what remains as not shared may then be classified as confidential information and protected accordingly (e.g., by omission, redaction, substitution or the like). Using this technique, non-confidential information may be safely segmented from confidential information in a dynamic, automated manner.

    Other inventors
    See patent
  • Auto-generation and Auto-versioning of a Multi-Sourced Dynamic Document

    Issued US 7877680

    A computer-implementable method, system and computer media for auto-generating and auto-versioning a dynamic document are presented. In a preferred embodiment, the computer-implementable method includes populating a dynamic document with content from multiple sources. The dynamic document is then version named in accordance with a nomenclature rule that identifies a source and version of content from the multiple sources. In response to a content from one or more of the multiple sources…

    A computer-implementable method, system and computer media for auto-generating and auto-versioning a dynamic document are presented. In a preferred embodiment, the computer-implementable method includes populating a dynamic document with content from multiple sources. The dynamic document is then version named in accordance with a nomenclature rule that identifies a source and version of content from the multiple sources. In response to a content from one or more of the multiple sources changing at a source, the dynamic document is updated with updated content, and a version name of the dynamic document is updated to reflect the updated content.

    Other inventors
    See patent

Courses

  • IBM General Manager Leadership Development Program

    2006

Honors & Awards

  • Top 200 Global Blockchain Influencers and Authors

    Open Business Council

    https://www.openbusinesscouncil.org/top-200-blockchain-influencers-authors/

  • Top 20 Global Thought Leaders and Influencers on Blockchain

    Thinkers360

    https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-blockchain-october-2020/

  • Top 20 Global Thought Leaders and Influencers on Digital Disruption

    Thinkers360

    https://www.thinkers360.com/top-50-global-thought-leaders-and-influencers-on-digital-disruption-october-2019/

  • Top Performer Executive Award

    Unisys

  • Management Excellence & Eminence Award

    IBM

  • Patent Issue Award

    IBM

  • Hall of Fame - IBM South East Cluster Software Group

    IBM

  • Marketing Leadership Award

    IBM

    Quarterly WebSphere Marketing Leadership Award

  • Asian Leadership Summit Recognition

    IBM SVP Software & Systems Group and IBM SVP Marketing & Communications

  • IEEE - Outstanding Service Award

    IEEE Eastern North Carolina Section

  • Invention Achievement Award

    IBM

  • BizTech Leadership Participant

    IBM

  • Bravo Award

    IBM

Languages

  • English

    Native or bilingual proficiency

  • Hindi

    Native or bilingual proficiency

  • Marathi

    Limited working proficiency

  • Sanskrit

    Limited working proficiency

Organizations

  • The International Information System Security Certification Consortium (ISC)²

    Member

    - Present
  • Information Systems Audit and Control Association (ISACA)

    Member

    - Present
  • Institute of Electrical and Electronics Engineers (IEEE)

    ENCS Chapter Executive Committee Member

    - Present
  • Project Management Institute (PMI)

    Member

    - Present

Recommendations received

15 people have recommended Jai Singh

Join now to view

More activity by Jai Singh

View Jai Singh’s full profile

  • See who you know in common
  • Get introduced
  • Contact Jai Singh directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses