You are here: Home india
ocument Actions

ACM India Council logo

Arvind (Benny) Benegal

Qualifications: MS Computer Engineering, CISSP

Title: VP - Technology Practices, Persistent Systems Ltd.

Affiliation: Persistent Systems Ltd.

Contact Details: Email:

Short CV:
Currently heading Security Practice at Persistent. My charter is to 1) nurture the Security Practice across the four Persistent focus areas: Cloud, Social, Big Data/Analytics and Mobility 2) institutionalize leadership, culture and competence-learning across different levels of the organization and 3) innovate and incubate technology solutions.

Benny has over two decades of experience in the System and Information Security space in both products as well as services. He started the Security Practice at Mindtree in Bangalore, as General Manager, after living in the US for 21 years. Prior to Mindtree, he was in Atlanta, GA where he played roles that included Business Development and Product Management at IBM ISS. Before that, he was the Information Security Officer at Sun Trust Banks, Senior Security Consultant at HP, had his own boutique network security consulting firm, and also worked in start-ups such as Brickstream and Secureware.

Benny has done his MS in Computer Engineering from Wright State University, Dayton, Ohio, and his undergraduate in Computer Engineering from Pune Institute of Computer Technology. He has represented Persistent in many International conferences such as Oracle World, IIT Kanpur, Bharathiar University in Coimbatore, and in Rajkot, Gujarat.

Beyond the realm of Security and Privacy, Benny is passionate about Isha Yoga, tennis and golf. He loves organizing and promoting film, music and art and revels in business and social networking. He took his ALTA tennis team (fondly referred as Lagaan) in Atlanta to the City Finals in 2009, and won the City Championship the following year.

Title of Talk 1: Role of Security in Big Data Analytics
Synopsis: Big Data is a double-edged sword when it comes to Security. While it poses a huge challenge in terms of Identity Management and Access Control, it is capable of providing significant and meaningful Security insights, if only the data is harnessed appropriately. This talk will dwell on the techniques and methods to effectively harness such data that has high volume, high velocity and high variety, into near real-time insights that are almost immediately actionable.

Title of Talk 2: How Secure Are You from Insider Threats?
Synopsis: Most of the Security engineering emphasis has been around protecting the Enterprise perimeter from the big, bad world outside. While that provides coverage for a certain segment of all the breaches and exploits that occur within organizations, it is a relatively small percentage of the overall threat vector and risk. A large, yet relatively untapped set of vulnerabilities are left exposed within the enterprise itself. This talk will explore mitigating those risks that are created as a result of malicious, and most often unintentional behavior. And above all, the lack of Security hygiene awareness at all levels within the enterprise seems to be contributing heavily to both reputational as well as revenue losses as a result of data exfiltration (data leakage) and infiltration. This talk will explore the organization's security posture and how it can be significantly enhanced, amidst disruptive emerging technologies such as Social, Mobile, Analytics and Cloud (SMAC).

For more information on ACM India contact:

For Membership Inquiries, please contact:

Or, reach us through Twitter or LinkedIn: