Aditya Khullar

OYO Hotels & Homes incorporated prevention tools for the end point, cloud security and infrastructure security.

Aditya-Khullar_Oyo.jpg

With a decade long experience in network and information security, Aditya Khullar holds a unique blend of visionary leadership with expertise to lead strategic planning, direct multi-functional operations, and restructuring business models.

Prior to his security leadership stint at OYO Hotels & Homes, Khullar led security initiatives across global firms including Paytm, Aricent Technologies, HCL Infosystems, Bank of America and Interglobe Enterprises. In his present role, Khullar heads the Cyber Security function at OYO Hotels & Homes.
 

Key Security Initiative

OYO Hotels & Homes undertook threat hunting programs established by incorporating prevention tools for the end point, cloud security and infrastructure security. Proactive intelligence led to minimize the number of threat vectors for the wide enterprise.

EDR was implemented across infrastructure and for end-user computing. EDR was chosen on the basis of its prevention capabilities only. This found use in detecting and preventing threats like ransomware, exploits etc.

 

Winners

Aditya Khullar

OYO Hotels & Homes incorporated prevention tools for the end point, cloud security and infrastructure security.

CSO Jun 22nd 2018 A-A+
Aditya-Khullar_Oyo.jpg

With a decade long experience in network and information security, Aditya Khullar holds a unique blend of visionary leadership with expertise to lead strategic planning, direct multi-functional operations, and restructuring business models.

Prior to his security leadership stint at OYO Hotels & Homes, Khullar led security initiatives across global firms including Paytm, Aricent Technologies, HCL Infosystems, Bank of America and Interglobe Enterprises. In his present role, Khullar heads the Cyber Security function at OYO Hotels & Homes.
 

Key Security Initiative

OYO Hotels & Homes undertook threat hunting programs established by incorporating prevention tools for the end point, cloud security and infrastructure security. Proactive intelligence led to minimize the number of threat vectors for the wide enterprise.

EDR was implemented across infrastructure and for end-user computing. EDR was chosen on the basis of its prevention capabilities only. This found use in detecting and preventing threats like ransomware, exploits etc.