CyberKriya

Gaurav Singh

🎙️ Welcome to CyberKriya – the home of enterprise cybersecurity wisdom, one conversation at a time. At CyberKriya, we bring you powerful, no-fluff podcasts and interviews with global experts, trailblazers, and practitioners in SAP Cybersecurity, Cloud Governance, Risk & Compliance, and Digital Resilience. Whether you’re an SAP security leader, cloud architect, or just starting your journey — CyberKriya helps you stay ahead with real stories, real challenges, and real solutions. 🛡️ Topics we cover: • SAP & ERP Cybersecurity • RISE with SAP, BTP & S/4HANA Security • NIST CSF, Zero Trust, IAM, FinOps & GRC • AI for Cybersecurity & Digital Transformation • Career journeys, mentorship & community building 🧠 Hosted by Gaurav ‘Mr G’ Singh – author, global speaker, and CyberKriya founder. 🎧 New episodes every Tuesday – subscribe, hit the bell & join the #SAPCyberSecurity tribe! 🌐 cyberkriya.com | 🎙️ Also on Spotify, Apple Podcasts & LinkedIn. #CyberKriya #SAPCyberSecurity #DigitalResilience #CyberPodcast 🎙️ CyberKriya Podcast Disclaimer The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

  1. 4D AGO

    EP-20 - #CyberKriya Podcast -Women Leader in #Cybersecurity- Rasha Horn

    EP-20 - #CyberKriya Podcast -Women Leader in #Cybersecurity- Rasha Horn #IWD2026 Keywords: cybersecurity, NICE program, community, career ambassador, awareness, personal growth, AI, youth empowerment, Rasha Horn, CyberKriya Summary: In this engaging conversation, Gaurav Singh and Rasha Horn explore the significance of cybersecurity, the importance of community involvement, and the transformative power of the NICE Cybersecurity Career Ambassador Program. Rasha shares her personal journey from being an immigrant to becoming a leader in cybersecurity advocacy, emphasizing the need for awareness and education in digital safety. The discussion highlights the role of individuals in shaping the future of cybersecurity, especially in the context of emerging technologies like AI. Rasha encourages young aspirants to pursue their passions and connect with communities that can support their growth. Key Takeaways: Rasha emphasizes the importance of surrounding yourself with inspiring individuals. Cybersecurity is a field that requires diverse backgrounds and skills. Awareness about digital safety is crucial for children and parents alike. The NICE Cybersecurity Career Ambassador Program is open to everyone, regardless of their background. Community involvement can lead to personal and professional growth in cybersecurity. Cybersecurity is not just about preventing hacks; it's about protecting people. Young people can make a significant impact in the field of cybersecurity. AI will create new challenges in cybersecurity that require human oversight. There are many free resources available for learning about cybersecurity. Persistence and community support are key to overcoming obstacles in pursuing a career. Titles Empowering the Next Generation in Cybersecurity Rasha Horn: A Journey from Immigrant to Cyber Advocate sound bites "You are who you spend time with." "Cybersecurity is not just about money." "We need humans to protect technology." Chapters: 00:00 Introduction to CyberKriya and Rasha Horn 04:15 Rasha's Journey and Background 10:29 The Importance of Cybersecurity Awareness 12:20 NICE Cybersecurity Career Ambassador Program Overview 24:23 The Role of Community in Cybersecurity 30:04 Cybersecurity as a Career and Personal Growth 36:02 The Future of Cybersecurity in the Age of AI 40:22 Encouragement for Young Aspirants 47:26 Celebrating Community and Future Events Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    54 min
  2. MAR 4

    EP-19 - #CyberKriya Podcast -"No IIT Tag, No Problem, NVIDIA, Yes- Kartik Khurana #Cybersecurity"

    EP-19 - #CyberKriya Podcast -"No IIT Tag, No Problem — How Kartik Khurana Cracked NVIDIA Through #Cybersecurity" Keywords: #cybersecurity, #mentorship, career journey, resilience, continuous learning, networking, overcoming challenges, self-discovery, youth guidance, personal growth Summary: In this episode, Gaurav Singh interviews Kartik Khurana, a young cybersecurity professional who shares his inspiring journey from a tier 3 college in India to working at NVIDIA. Kartik discusses the importance of mentorship, self-discovery, and the challenges he faced along the way. He emphasizes the need for continuous learning, networking, and resilience in the face of failure. The conversation also touches on the expectations placed on young individuals in India and how to navigate them while pursuing one's passion in cybersecurity. Key Takeaways: Start whenever you can. Hard work cannot be replaced. Accept failure and learn from it. Learn from others. Be consistent and persevere. Networking is crucial for growth. Embrace your unique journey. Seek mentorship and guidance. Continuous learning is essential. Don't be afraid to explore different paths. Chapters: 00:00 Introduction to Kartik Khurana's Journey 04:12 Overcoming Challenges from a Tier 3 College 09:25 The Importance of Mentorship and Self-Discovery 16:54 Navigating Expectations and Finding Your Path 23:25 The Role of Continuous Learning and Networking 29:36 Embracing Failure and Building Resilience 36:29 Transitioning into Cybersecurity from Other Fields 42:36 Key Takeaways and Final Thoughts Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    1 hr
  3. FEB 18

    EP-18 - #CyberKriya Podcast - Securing Non-Human Identities - with Vishal Verma #SAPCyberSecurity

    EP-18 - #CyberKriya Podcast - Securing Non-Human Identities - with Vishal Verma #SAPCyberSecurity Keywords: cybersecurity, SAP, GRC, non-human identities, service keys, BTP security, identity management, governance, risk management, compliance, cloud security Summary: In this episode, Gaurav Singh interviews Vishal Verma, an industry veteran with over 20 years of experience in SAP and GRC. They discuss Vishal's journey in the cybersecurity field, the importance of governance, risk, and compliance (GRC), and the challenges posed by non-human identities and service keys in the BTP environment. The conversation highlights the need for organizations to manage these identities effectively and the solutions being developed to address these challenges. Vishal emphasizes the importance of staying updated with industry trends and the evolving landscape of cybersecurity. Key Takeaways: Vishal Verma has over 20 years of experience in SAP and GRC. GRC is essential for managing risks and compliance in organizations. Non-human identities and service keys pose significant security challenges. Organizations must rotate and protect service keys to prevent breaches. The integration of health and charity through yoga is a personal passion for Vishal. SAP's GRC solutions are tightly integrated with business processes. The future of SAP security lies in understanding non-human identities. Staying updated with industry trends is crucial for cybersecurity professionals. Organizations should measure their security posture around integrations. The community must evolve to address new cybersecurity challenges. Titles: Navigating the Future of Cybersecurity in SAP The Evolution of GRC in the Cloud Era sound bites "You have to take risks, right?" "We are trying to connect health to charity." "These keys must be protected and rotated." Chapters 00:00 Introduction to Cybersecurity and Guest Introduction 02:44 Vishal Verma's Journey in SAP and GRC 05:31 Understanding Governance, Risk, and Compliance (GRC) 11:11 The Importance of Non-Human Identities and Service Keys 16:57 Challenges in BTP Security and Key Management 22:28 Building Solutions for Non-Human Identity Management 28:12 Future of SAP Security and GRC 33:41 Key Takeaways and Closing Remarks Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    46 min
  4. FEB 10

    EP-17 - #CyberKriya Podcast - Building #Cybersecurity Communities That Matter — with Ken Fishkin

    EP-17 - #CyberKriya Podcast - Building #Cybersecurity Communities That Matter — with Ken Fishkin Keywords: cybersecurity, community, mentorship, career development, internships, education, networking, certifications, leadership, AI Summary: In this engaging conversation, Gaurav Singh interviews Ken Fishkin, a prominent figure in the cybersecurity community, who shares his journey and insights on building a thriving chapter of ISC2 in New Jersey. They discuss the importance of mentorship, community engagement, and various programs that support career development in cybersecurity. Ken emphasizes the significance of inclusivity, innovative educational approaches, and the commitment required for effective leadership. The conversation also touches on the relevance of certifications and staying updated in a rapidly changing technological landscape. Key Takeaways: Ken Fishkin has built a community of over 800 members in the ISC2 New Jersey chapter. The chapter offers various programs, including public speaking workshops and mentoring opportunities. Inclusivity is a key focus, welcoming individuals from diverse backgrounds and experiences. Internship programs have been established to help students and newcomers find job opportunities. Networking events have led to job placements and professional growth for members. The chapter has received recognition for its innovative approach to community building. Ken emphasizes the importance of continuous learning and staying updated with industry trends. Certifications like CISSP can be pursued even without extensive experience, showcasing commitment. Community support and collaboration are vital for personal and professional development. Ken's journey illustrates the impact of passion and dedication in leadership roles. Sound bites "It's about the community!" "It's been a wild ride!" "Stay on top of things!" Chapters: 00:00 Introduction to Cybersecurity Community Leadership 05:20 Building a Thriving Cybersecurity Chapter 10:33 Creating Opportunities: Internships and Mentorships 16:04 Engaging the Next Generation in Cybersecurity 21:00 The Importance of Community and Accountability 26:01 Staying Relevant in a Changing Job Market 32:42 Advice for Career Advancement in Cybersecurity Join the Award Winning and #1 NA ISC2 NJ Chapter Here: https://newjersey.isc2chapters.isc2.org/page/overview Follow and Connect with Ken and Gaurav Here - https://www.linkedin.com/in/kfishkin/ https://www.linkedin.com/in/gauravsingh14/ Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    37 min
  5. FEB 4

    EP-16 - #CyberKriya Podcast - Securing SAP - The OWASP Way - With Waseem and Julian

    EP-16 - #CyberKriya Podcast - Securing SAP - The OWASP Way - With Waseem and Julian Keywords: cybersecurity, SAP security, OWASP, penetration testing, SAP transformation, cybersecurity framework, information security, enterprise security, security tools, collaborative security Summary: In this episode of CyberKia, host Gaurav Singh welcomes cybersecurity experts Waseem Ajrab and Julian Petersohn to discuss the OWASP Core Business Application Security Project, focusing on SAP security. They explore the importance of collaboration between cybersecurity and SAP teams, the challenges of securing SAP environments, and the resources available through the OWASP project to enhance security practices. The conversation emphasizes the need for a collective approach to cybersecurity, particularly in the context of SAP transformations, and encourages professionals to engage with the OWASP community. Key Takeaways: This is our first multi-guest podcast. Sharing is caring. OWASP is an extensive foundation. SAP is a black box for cyber folks. The OWASP project is an informational tool. We need a place to store information. Security has to be baked in. It takes two to tango. We need collective wisdom. Join the OWASP project if you can. Titles Unlocking SAP Security with OWASP The Future of Cybersecurity in SAP Sound bites "Sharing is caring." "We need collective wisdom." "It takes two to tango." Chapters: 00:00 Introduction to Cybersecurity Podcast 05:03 Understanding the OWASP Project 11:49 Diving into SAP Security 20:27 Exploring the OWASP Core Business Application Security Project 30:52 Navigating SAP Transformation and Security 48:08 Collaboration Between Cybersecurity and SAP Teams Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    1h 2m
  6. JAN 28

    EP-15 - #CyberKriya Podcast - Observability in SAP - Breaking Silos with Brian Bates

    EP-15 - #CyberKriya Podcast - Observability in SAP - Breaking Silos with Brian Bates #SAPCyberSecurity Keywords cybersecurity, SAP, observability, zero trust, enterprise software, AI, transformation, data security, monitoring, business processes Summary: In this conversation, Gaurav Singh and Brian Bates delve into the evolving landscape of cybersecurity and observability within the SAP ecosystem. They discuss the importance of observability in understanding enterprise operations, the integration of cybersecurity practices, and the role of AI in enhancing these strategies. Brian shares insights from his book on SAP's evolution and emphasizes the need for organizations to adopt a holistic approach to observability, breaking down silos and fostering collaboration across teams. The discussion also touches on the significance of zero trust architecture and the challenges faced during S4 transformations. Key Takeaways: Observability provides a comprehensive view of enterprise operations. The customer experience should be the primary focus of all roles. An effective observability strategy breaks down organizational silos. Cybersecurity and observability are converging rapidly. AI can enhance observability and drive business value. Organizations must embrace a zero trust architecture for security. The role of basis engineers is evolving in cloud environments. Observability tools should provide full fidelity data for insights. Collaboration across teams is essential for effective observability. Organizations need to remain flexible with their technology choices. Chapters: 00:00 Introduction to Cybersecurity and SAP Observability 02:06 Understanding Observability in SAP 06:56 The Role of Cybersecurity in SAP 11:02 Ownership and Responsibility in SAP Security 14:50 The Importance of End-to-End Observability 17:51 Observability from a Cybersecurity Perspective 23:11 Linking Observability with Zero Trust Architecture 23:25 The Rise of Observability in Security 25:43 Integrating Zero Trust in S4 Transformations 29:54 Navigating Phase Zero: Security and Transformation 30:39 Leveraging AI for Transformation and Security 34:07 The Role of Key Tools in Observability 37:36 Insights from Brian's Book on AI and Business 40:20 The Importance of Cybersecurity in Transformation 44:46 Empowering Security Practitioners for Observability Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    47 min
  7. JAN 20

    EP-14 - #CyberKriya Podcast - Bandana Kaur: From Zoom Bots to NASA - A Gen Z Cyber Researcher

    EP-14 - #CyberKriya Podcast - Bandana Kaur: From Zoom Bots to NASA - A Gen Z Security Researcher's Journey- 18 Year Old Girl - Blackhat Speaker, UN Ambassador, NICE Ambassador Summary: In this episode of CyberKriya, host Gaurav Singh welcomes Bandana Kaur, a remarkable 18-year-old cybersecurity researcher and advocate. Bandana shares her inspiring journey, which began at the age of 13 when she created a Python bot to automate her Zoom attendance during the pandemic. This early experience ignited her passion for cybersecurity, leading her to work with organizations like NASA and the United Nations. Bandana emphasizes the importance of representation in the field, particularly for young girls, and discusses her mission to make cybersecurity education accessible to all. She also highlights the challenges faced by her generation, including societal pressures surrounding education and career choices, and encourages young people to pursue their passions without fear of judgment. Keywords: cybersecurity, Gen Z, women in tech, youth empowerment, Hack with Her, Bandana Kaur, coding, AI security, representation, digital rights Key Takeaways: "If you are passionate about something and if you set your mind to it, you can do absolutely anything." "Representation matters a lot; if I can be 13 and look at a girl hacker in a movie and want to be like her, then any girl can too." "The way that you choose to spend your time will define your future." "Cybersecurity is for everyone; it doesn't matter if you have a technical aptitude or not." "You can achieve whatever you want to do in life; we have access to knowledge that no other generation has had in a very long time." Chapters: 00:00 Introduction to CyberKriya and Bandana Kaur 02:52 Bandana's Journey into Cybersecurity 05:55 Parental Guidance in Cybersecurity Awareness 08:52 Experiences and Opportunities in the US 12:04 The Impact of Generational Differences 14:48 Encouraging the Next Generation in Cybersecurity 17:49 Navigating Content and Influences Online 20:56 Practical Steps to Start in Cybersecurity 23:46 Introduction to Hack With Her 23:57 The Mission Behind Hack With Her 25:13 Passion for Accessibility and Representation 27:10 Building a Community on Discord 29:34 The NIST and NICE Cybersecurity Ambassador Program 34:45 Navigating Education and Societal Pressures 43:35 Final Advice for the Next Generation Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    47 min
  8. JAN 14

    EP-13 - #CyberKriya Podcast - #SAPCyberSecurity- The IAG Guy- Entrepreneur - Sarveshvaran Rajendran

    EP-13 - #CyberKriya Podcast - #SAPCyberSecurity- The IAG Guy- Entrepreneur - Sarveshvaran Rajendran Keywords: SAP, GRC, cybersecurity, entrepreneurship, AI, identity management, ECC, S4HANA, transformation, licensing Summary: In this episode of the CyberKriya Show, host Gaurav Singh engages with Sarvesh Rajendran, an expert in SAP GRC and entrepreneurship. They discuss Sarvesh's journey in the SAP world, the importance of continuous learning, and the evolving landscape of SAP security. Sarvesh shares valuable insights for early-career professionals, the significance of understanding FUE in licensing, and the challenges and opportunities presented by AI in the SAP ecosystem. The conversation emphasizes the need for SAP security professionals to adapt to changes and embrace new technologies while maintaining a focus on community and purpose. Key Takeaways: Continuous learning is essential in the rapidly changing SAP landscape.Understanding FUE is crucial for managing licensing costs effectively.SAP security professionals must adapt to both S4HANA and BTP security.AI presents both opportunities and challenges in the SAP ecosystem.Community engagement and mentorship are vital for professional growth.The transition from ECC to S4 requires careful user management and identity orchestration.SAP is moving towards a more open and integrated environment.Security professionals should focus on cross-system risk analysis.Books can serve as valuable mentors in one's career journey.The importance of purpose-driven work in the tech industry. Chapters: 00:00 Introduction to CyberKriya Show and Guest Introduction 06:18 Sarvesh's Journey in SAP GRC and Entrepreneurship 13:44 Advice for Early Career SAP Security Professionals 19:49 Navigating S4 Transformation and Identity Management 26:02 Understanding Full User Equivalent (FUE) in S4 HANA 32:30 The Evolution of SAP Security 38:45 The Changing Landscape of SAP Security 48:26 AI's Role in SAP Security 56:25 The Future of SAP Security and Community Engagement Disclaimer: The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.

    1h 2m

Ratings & Reviews

5
out of 5
2 Ratings

About

🎙️ Welcome to CyberKriya – the home of enterprise cybersecurity wisdom, one conversation at a time. At CyberKriya, we bring you powerful, no-fluff podcasts and interviews with global experts, trailblazers, and practitioners in SAP Cybersecurity, Cloud Governance, Risk & Compliance, and Digital Resilience. Whether you’re an SAP security leader, cloud architect, or just starting your journey — CyberKriya helps you stay ahead with real stories, real challenges, and real solutions. 🛡️ Topics we cover: • SAP & ERP Cybersecurity • RISE with SAP, BTP & S/4HANA Security • NIST CSF, Zero Trust, IAM, FinOps & GRC • AI for Cybersecurity & Digital Transformation • Career journeys, mentorship & community building 🧠 Hosted by Gaurav ‘Mr G’ Singh – author, global speaker, and CyberKriya founder. 🎧 New episodes every Tuesday – subscribe, hit the bell & join the #SAPCyberSecurity tribe! 🌐 cyberkriya.com | 🎙️ Also on Spotify, Apple Podcasts & LinkedIn. #CyberKriya #SAPCyberSecurity #DigitalResilience #CyberPodcast 🎙️ CyberKriya Podcast Disclaimer The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with. This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.