Prathamesh Churi

Prathamesh Churi

Mumbai, Maharashtra, India
11K followers 500+ connections

About

As Chief of Staff, CISO’s Office & Lead, Data Protection at SMFG India Credit Company, I…

Articles by Prathamesh

Activity

Join now to see all activity

Experience

  • SMFG India Credit Graphic
  • -

    Mumbai, Maharashtra, India

  • -

    Bengaluru, Karnataka, India

  • -

    Mumbai, Maharashtra, India

  • -

    Berlin, Germany

  • -

    Mumbai Area, India

Education

  • University of Mumbai Graphic

    University of Mumbai

    -

    -

    Pursued an ME in Information Technology, specializing in Information Security and Cryptography. My research focused on secure computing and cryptographic techniques to enhance data protection.
    Key coursework included:
    - Enterprise Security & Risk Management
    - Advanced Data Mining & Business Intelligence
    - Cloud Computing & Digital Forensics
    - Advanced Software Architecture & Network Design
    - Software Quality Assurance & Fuzzy Design

    This program strengthened my…

    Pursued an ME in Information Technology, specializing in Information Security and Cryptography. My research focused on secure computing and cryptographic techniques to enhance data protection.
    Key coursework included:
    - Enterprise Security & Risk Management
    - Advanced Data Mining & Business Intelligence
    - Cloud Computing & Digital Forensics
    - Advanced Software Architecture & Network Design
    - Software Quality Assurance & Fuzzy Design

    This program strengthened my expertise in cybersecurity, risk management, and advanced computing, equipping me with both theoretical and applied knowledge in securing enterprise environments.

  • -

    Completed a BE in Computer Engineering, building a strong foundation in software development, computer security, and system design. Studied key subjects such as database management systems, computer networks, software engineering, microprocessors, image processing, data structures, algorithms, and programming languages like C, C++, and Java. Gained hands-on experience in web programming and human-computer interaction.
    Held leadership roles as Class Representative (2009-2013) and…

    Completed a BE in Computer Engineering, building a strong foundation in software development, computer security, and system design. Studied key subjects such as database management systems, computer networks, software engineering, microprocessors, image processing, data structures, algorithms, and programming languages like C, C++, and Java. Gained hands-on experience in web programming and human-computer interaction.
    Held leadership roles as Class Representative (2009-2013) and Documentation Head of the Technical Council (2012), contributing to academic and technical initiatives. This program honed my expertise in computing, problem-solving, and cybersecurity while developing strong leadership and organizational skills.

Licenses & Certifications

Join now to see all certifications

Volunteer Experience

  • Bureau of Indian Standards Graphic

    Member, LITD 17 – Information Security, Cybersecurity & Privacy Protection Sectional Committee, Bureau of Indian Standards (BIS)

    Bureau of Indian Standards

    - Present 3 months

    Science and Technology

    Serving as a contributing member of the BIS LITD 17 Committee, responsible for formulation and review of Indian Standards in the domain of information security, cybersecurity, and privacy protection. Actively engaged in aligning national standards with ISO/IEC frameworks to support India’s digital trust, resilience, and data protection ecosystem.

  • IEEE Graphic

    Senior Member

    IEEE

    - Present 2 years 2 months

    Science and Technology

    Recognized as a Senior Member of IEEE for professional contributions to technology, research, and industry practices.

  • Computer Society of India, Mumbai Chapter Graphic

    Lifetime Member - Associate Level

    Computer Society of India, Mumbai Chapter

    - Present 9 years 9 months

    Education

    - I am the lifetime member of Computer Society of India
    - My role is to conduct / attend various seminars , Conferences , Guest lectures which comes under CSI Organizer

  • Patkar-Varde College of Arts, Science, Commerce & Economics Graphic

    Board of Studies

    Patkar-Varde College of Arts, Science, Commerce & Economics

    - 4 years 5 months

    Education

    I am the BoS member for B.Sc and M.Sc ( Information Technology Programs).

  • Indian Society for Technical Education Graphic

    Lifetime member -Associate Level

    Indian Society for Technical Education

    - Present 9 years 7 months

    Education

    - I am lifetime member of ISTE .
    - My role is to conduct / attend various seminars , Conferences , Guest lectures which comes under ISTE Organizer

  • Lifetime member

    International Association of Engineering

    - Present 9 years 3 months

    Science and Technology

    - The International Association of Engineers (IAENG) is a non-profit international association for the engineers and the computer scientists.

    -Later, with the efforts from its members, IAENG membership became open to all the members in the engineering and computer science community.

    - the IAENG members include research center heads, faculty deans, department heads, professors, research scientists/engineers, experienced software development directors and engineers, and…

    - The International Association of Engineers (IAENG) is a non-profit international association for the engineers and the computer scientists.

    -Later, with the efforts from its members, IAENG membership became open to all the members in the engineering and computer science community.

    - the IAENG members include research center heads, faculty deans, department heads, professors, research scientists/engineers, experienced software development directors and engineers, and university postgraduate and undergraduate students etc., from over one hundred different countries.

  • Co- session Chairperson

    IEEE Indiacom 2017

    - Present 9 years 2 months

    Science and Technology

    We are conducting a special session on : teaching learning process . All accepted paper will be published by IEEE explore digital library .
    I am co charing the session with prof. Dr. Seema Shah

  • Advisory Board Member

    Informatics in Education Journal

    - Present 4 years 5 months

    Education

  • Inderscience Graphic

    Regional Editor, International Journal of Forensic Software Engineering

    Inderscience

    - Present 4 years 4 months

    Science and Technology

Publications

  • An era of Cloud ERP : Significant Differentiation with Premise ERP

    Computer Research Global Journals

    This paper is the outcome of research in ERP solutions. It talks about how changing in technology is affecting the overall growth of IT industry specifically ERP solution providers. It also gives insight on how different types of organizations are adapting to the change in technology for their betterment. The insights are based on the thorough analysis of the past and current situation in the ERP market. It tries to differentiate cloud and on-premise ERP solution on various parameters. This…

    This paper is the outcome of research in ERP solutions. It talks about how changing in technology is affecting the overall growth of IT industry specifically ERP solution providers. It also gives insight on how different types of organizations are adapting to the change in technology for their betterment. The insights are based on the thorough analysis of the past and current situation in the ERP market. It tries to differentiate cloud and on-premise ERP solution on various parameters. This document also gives the answer to the future of this market segment.

    Other authors
    See publication
  • Development of Innovative Course Outcomes using SMART goals

    IJRTE (Scopus Indexed Journal)

    Built layer of OBEE architecture forms an innovative way to towards development of course outcomes from lesson outcomes. The process of development of course outcomes is crucial and time-consuming without appropriate guidance and support. This paper, therefore, provides guidelines /rules towards a development of outcomes according to the OBEE architecture. The paper also suggests a sample Course outcomes taking one engineering course as a case study. The phenomenon of making course outcome is…

    Built layer of OBEE architecture forms an innovative way to towards development of course outcomes from lesson outcomes. The process of development of course outcomes is crucial and time-consuming without appropriate guidance and support. This paper, therefore, provides guidelines /rules towards a development of outcomes according to the OBEE architecture. The paper also suggests a sample Course outcomes taking one engineering course as a case study. The phenomenon of making course outcome is based on a SMART approach. The process also suggests that we should involve industry domain experts and Alumni students which give a proper academic and practically oriented shape to the documented course outcomes. As a result, the entire OBEE process becomes smoother and functional in the entire semester.

    Other authors
    See publication
  • Honey-Patterns: Recognizing Pattern based Attacks on Websites

    International journal of Computer Application( IJCA)

    The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in…

    The exact definition of a honeypot is contentious. However, the concept can be defined as “A server that is configured to detect an intruder by mirroring a real production system. It appears as an ordinary server functioning normally, but all the data and transactions are phony. Located either in or outside the firewall, the honeypot is used to learn about an intruder's techniques as well as determine the vulnerabilities of the system" Honeypot is a closely monitored decoy that is employed in networks to study the trail of hackers and to alert network administrators of a possible intrusion. Honey net is a method for detection of abnormal activity in the network. Honey net is an additional layer of security. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Data Capture and Data Control are properties of honeyed, used extensively by the research community to study issues in network security, such as Internet worms, Spam control, DoS attacks, etc. In this paper, we will be focusing on the attack part.

    Other authors
    See publication
  • Alchemizing Education System By Developing 5 Layered Outcome Based Engineering Education (OBEE) Model

    IEEEXplore Digital Library - MITE 2016, Tamilnadu

    This paper proposes an architecture for Outcome Based Engineering Education (OBEE). Outcome Based Education (OBE) is one of the most substantial move in Engineering Education in recent years. The paper suggests an innovative and productive way to achieve outcome based education by S.M.A.R.T (Specific, Measurable, Achivable, Reliastic, Time Bound) approach. This research emphasizes on SMART OBEE Architecture which an ideal teacher must follow. The architecture consist of 5 layers namely Build…

    This paper proposes an architecture for Outcome Based Engineering Education (OBEE). Outcome Based Education (OBE) is one of the most substantial move in Engineering Education in recent years. The paper suggests an innovative and productive way to achieve outcome based education by S.M.A.R.T (Specific, Measurable, Achivable, Reliastic, Time Bound) approach. This research emphasizes on SMART OBEE Architecture which an ideal teacher must follow. The architecture consist of 5 layers namely Build layer, Assessment layer, Feedback layer, Target layer and Time management layer. Build layer provides the direction towards development of Course Objectives. Through content delivery, teacher can assess the students using various assessment tools. A feedback can be taken from the students in order to enhance the quality of the course. Time management layer is an integrated layer and provides synchronization among all the activities in Engineering education framework which is drawn. The proposed system also defines the term SMART Teacher.

    Other authors
    See publication
  • Title: E -Zip: An Electronic Lock for Secured System

    IEEEXplore - IEEE sponsored International Conference on Advances in Electronics, Communication& Computer Technology (ICAECCT-16)

    Security is one of the major concern in today’s era, may be it is for your home, locker, your cabin or a restricted area in any institution. This research is aimed at developing a fruitful security system which provides secured log access to authorized people with the feature of an email notification to the administrator along with the captured image of the user. These systems are profoundly welcomed, since it can be monitored from a remote zone. The research have an advantage over physical…

    Security is one of the major concern in today’s era, may be it is for your home, locker, your cabin or a restricted area in any institution. This research is aimed at developing a fruitful security system which provides secured log access to authorized people with the feature of an email notification to the administrator along with the captured image of the user. These systems are profoundly welcomed, since it can be monitored from a remote zone. The research have an advantage over physical lock in term of safety, storage and handiness. There is a necessity to provide safe access to personal rooms, lockers and avoid intruders has compelled to make security systems more digitally compatible. A digital interface can be used to make it more comfortable for access. Sometimes, it becomes tedious to carry physical key to your locker in case of multiple users. The conventional physical key can be replaced by digital password to open your lock. An important feature of this system is to enter the password using Bluetooth enabled smartphone.

    See publication
  • Model -View-Controller architecture in BI Dashboards : Designing best practices

    IEEE Xplore Digital Library , IndiaCom-2016 , New-Delhi

    This paper focuses on a new approach to develop the strategy of Model-View-Controller Architecture pattern in traditional Business Intelligence (BI) dashboards. With the increasing demand of market, we need to store the information so that its retrieval will be simpler for processing management's decisions. The value of information is drastically changing in past years and ultimately all organizations have moved to Quality work. Quality and appropriateness of the information becomes a key…

    This paper focuses on a new approach to develop the strategy of Model-View-Controller Architecture pattern in traditional Business Intelligence (BI) dashboards. With the increasing demand of market, we need to store the information so that its retrieval will be simpler for processing management's decisions. The value of information is drastically changing in past years and ultimately all organizations have moved to Quality work. Quality and appropriateness of the information becomes a key challenge for most of the organizations in past decades. The Business Intelligence architecture therefore consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the end-user tools. The problem associated with business intelligence architecture is the storage of heterogeneous data sources which might leads to inconsistency. The business intelligence information should also be presentable in different format for analyst's decision making. Model-View-Controller (MVC) architecture pattern resolve the issues of typical Business intelligence model by components and process Seperatability technique. Model component of MVC architecture provides the heterogeneous data from operational systems. View provides multiple and synchronized views so that information can be presentable in different format at the same time. Controller handles analyst's input which is associated with each view generated by MVC architecture pattern.

    Other authors
    See publication
  • Jumbling- Salting: An Improvised Approach for Password Encryption

    IEEE Xplore Digital Library , RMUTT university Thailand

    Abstract: This paper presents an improvised approach for the major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute…

    Abstract: This paper presents an improvised approach for the major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute force attacks by increasing the length of cipher text in a considerable limit. In this algorithm, the jumbling process selects characters from pre-defined character set and adds them into the plain password using mathematical modulus (%) function; salting comprises of adding a random string into jumbled password. Ultimately AES block is implemented which obtains a fixed length version of JS algorithm which ensures that there is increase in time to crack the cipher text password, by forming a highly secured version of encrypted password.

    See publication
  • Implementation of Model-View-Controller Architecture Pattern for Business Intelligence Architecture

    International Journal of Computer Application (IJCA) , NY, USA

    This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business Intelligence architecture is to store the data from heterogeneous sources. The heterogeneous sources might lead to inconsistencies in storage and…

    This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. The Business Intelligence architecture consists of the ETL tools and processes, the data warehouse, the technical infrastructure, and the user-interface tools. The major issue related to Business Intelligence architecture is to store the data from heterogeneous sources. The heterogeneous sources might lead to inconsistencies in storage and retrieval of data. Another issue related to Business Intelligence architecture is to provide multiple and synchronized views. The Business information must be presentable in various formats with 'look and feel' approach. Model-View-Controller provides independent approach to the components of Business Intelligence architecture. Model provides guideline for storing the heterogeneous data in one format and implements core functionality of the system. View provides multiple and synchronized views so that information can be available in presentable format. Controller handles user's input. All the three independent components are tightly coupled which ensures consistent and flexible Business Intelligence architecture.

    Other authors
    See publication
  • JSH Algorithm: A Password Encryption Technique using Jumbling-Salting-Hashing

    International Journal of Computer Application (IJCA) , NY, USA

    This paper presents a new algorithm for improvising password encryption using Jumbling-Salting-Hashing technique. One of the most important password protection issue is to secure encrypted passwords on server's database. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing passwords. In order to augment the security aspect regarding passwords, we are devising JSH algorithm which will be responsible for preventing dictionary or brute force attacks on…

    This paper presents a new algorithm for improvising password encryption using Jumbling-Salting-Hashing technique. One of the most important password protection issue is to secure encrypted passwords on server's database. In cryptanalysis, a dictionary attack or brute force attack are the most common ways of guessing passwords. In order to augment the security aspect regarding passwords, we are devising JSH algorithm which will be responsible for preventing dictionary or brute force attacks on the passwords. In this algorithm, the jumbling process consists of randomly selecting characters from pre-defined character set and adding them into the plain password; salting comprises of prepending a random string and hashing process is implemented using cryptographic hash function to obtain a fixed length "fingerprint" which is stored in the server's database. As JSH algorithm deals with randomization, the password encryption technique forms a highly secured form of encrypted password which makes it difficult to decrypt reducing the probability of guessing password.

    Other authors
    See publication
  • Model-View-Controller Architecture Pattern in Business Intelligence

    National Multidisciplinary Conference on Commerce , Management and Technology ,V-CMT -2015 .

    This paper presents a new approach to develop the strategy of Model–View–Controller architecture pattern in Business Intelligence (BI) architecture. Model-View-Controller provides independent approach to the components of Business Intelligence architecture.

    ISBN number : 978-93-85880-11-7 , Won " First Prize " For research paper among 44 research papers presented in the conference.

    See publication
Join now to see all publications

Patents

Courses

  • Cyber security trends and Applications with IIT patna

    -

  • Dale carnegie training

    -

  • ISTE Approved Short Term Training Program ( STTP ) on Cloud Computing

    -

  • ISTE Approved Short Term Training Program on Advanced Data Mining : Tools and Techniques

    -

  • ISTE approved , Technically sponsored by CSI mumbai and IEEE Bombay section Short term Training Program on : Internet of Things ( Considerations and Applications)

    -

  • Official (ISC)² Certified in Cybersecurity (CC) Self-Paced Training

    NA

  • Short Term Training Program on Cloud Computing

    -

Projects

  • JS algorithm as a file encryption algorithm

    - Present

    The project compares all the existing Symmetric file Encryption Key algorithms with JS algorithm as a file encryption algorithms . The parameters for the comparison is : Encryption time , Decryption time , Throughput and Length of Cipher text .

    Other creators
  • Jumbling- Salting: An Improvised Approach for Password Encryption

    -

    This Project presents an improvised approach for password encryption . The major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents…

    This Project presents an improvised approach for password encryption . The major aspect of password protection issue is to secure it by means of encryption process. In cryptanalysis, a dictionary attacks or brute force attacks are the most common ways of cracking passwords. A new approach for improvising the scheme of password encryption is using the process of Jumbling-Salting (JS). In order to augment the security aspect regarding passwords, we are devising JS algorithm which prevents dictionary and brute force attacks by increasing the length of cipher text in a considerable limit. In this algorithm, the jumbling process selects characters from pre-defined character set and adds them into the plain password using mathematical modulus (%) function; salting comprises of adding a random string into jumbled password. Ultimately AES block is implemented which obtains a fixed length version of JS algorithm which ensures that there is increase in time to crack the cipher text password, by forming a highly secured version of encrypted password.

  • Honey pot Security for website testing

    -

    The projects tracks the User's activity on a particular website. The number of possible attacks are already coded in the script. If any user tries to perform any malicious action on website , the tracking code will track the user's statistics like IP address , host address , Timing parameters , Type of Attack etc. We have used PHD-MySQL platform for coding .

    Other creators

Honors & Awards

  • Best Employee Quarterly Award

    SMFG India Credit

  • Reviewer Excellence Award

    Elsevier

    Received Reviewer Excellence Award in elsevier IJIM Data Insights.

  • Outstanding Reviewer Excellence Award

    Springer

    I received Outstanding Reviewer Excellence Award from Springer Journal of Computing in Higher Education (SSCI IF 2.6)

  • Reviewer Excellence Award

    Springer

    Received 𝗥𝗲𝘃𝗶𝗲𝘄𝗲𝗿 𝗘𝘅𝗰𝗲𝗹𝗹𝗲𝗻𝗰𝗲 𝗔𝘄𝗮𝗿𝗱 𝟮𝟬𝟮𝟭 from most reputed journal of Springer- “Educational Technology Research and Development (ETR&D)” this year. The Journal is indexed by Scopus (Q1) and SSCI Web of Science with an Impact Factor of 4.5.

  • Best Reviewer Award

    IEEE TALE 2020

    I received best reviewer award in TALE 2020, Japan

  • Session Chair

    IEEE TALE 2020

    I was the session Chair of IEEE TALE 2020 which was happened virtually in Japan

  • Session chair

    4th International ICACDS 2020

    I was invited as a Session Chairperson in 4th International ICACDS 2020 conference.

  • Appreciation for Best Faculty

    NMIMS University

    Got appreciation award for the best faculty in Convocation 2019 of NMIMS University

  • Young Researcher (Below 40 Years) Award

    GISR Foundation

    Conferred an award of “Best Young Researcher (Below 40 Years)” in International Academic and Research Excellence Award (IARE- 2019) ceremony . After strict scrutiny and on recommendation of external experts for this Award, It has been chosen among a few outstanding persons from India and Overseas.

  • Keynote speaker

    3rd International Conference of Advances of Data Science and Computing

    I was keynote speaker in 3rd International Springer ICACDS 2019 Conference on the topic - “Privacy Preserving Data Publishing Technique using Data Generalization”

  • Session Chair

    3rd International Conference of Advances of Data Science and Computing

    I was the session chair of the track “Data Science” in Third International Springer CCIS series conference- ICACDS 2019

  • Conference Co-Convener

    International Conference on Advances in Computing and Data Science

    Invited as starring committee member ( co convenor) in Springer ICACDS - 2019

  • Special Award in Education

    Somavanshi Kshatriya Sangh (SKS Sangh)

    I got a Special Educational Award from SKS ( Somavanshi Kshatriya Samaj ) Sangh

    The SKS sangh is a maharashtrian Community of a population around 1 Lakh . I belongs to this community.

    Following dignitaries were present during my award function :
    1. Mrs. Manisha Chaudhari, MLA , Mumbai Suburban.
    2. Mr. kesari Patil , Founder and CEO , Kesari Tours and Travels.
    3. Mrs. Dr. Vijaya Vad , Ex President, Maharashtra Marathi Vishwakosh Sahitya Sangh.

  • Associate Editor

    International Journal of Advances in Intelligent Informatics

    More details at : http://ijain.org/index.php/IJAIN/about/editorialTeam

  • Session Chairperson

    Rajmangala University of Technology, Thanyaburi, Thailand

    Session chair at 2nd International IEEE Conference on Science and Technology ( TICST 2017) which will be held at , RMUTT University, Thailand 🇹🇭.

  • Corporate Faculty - Campus Connect Partner

    Infosys Private Limited

    I am a part of Infosys Campus Connect program as a corporate trainer .

  • Editorial Board Member

    Circulation in Computer Science

    I am part of Editorial team of Circulation in Computer Science ( CCS) , A scholarly review journal

  • Co session Chairperson

    INDIACom 2017- 4 th International Conference on global computing

    Honoured with Co session chairperson in INDIACom 2017- 4 th International Conference on global computing which was held at New Delhi

  • Best Research Paper Award

    VCMT-2015 National Multidisciplinary Conference

    I was Awarded with Best Research paper award for the research paper titled "Model -view -Controller Architecture pattern in Business Intelligence Model" . there were 44 research papers presented in the Conference.

  • School Topper

    Maharashtra State Board

    I was the Topper of the school , secured 88.61% ( 1st Position) in S.S.C.Board Examination.

  • Taluka level 1 st Rank in Marathi and Hindi Elocution competition

    Dr. Homi Bhabha School

    Hold first rank at taluka level among 25 schools , in elocution competition.

Languages

  • English

    Native or bilingual proficiency

  • Hindi

    Native or bilingual proficiency

  • Marathi

    Native or bilingual proficiency

Recommendations received

More activity by Prathamesh

View Prathamesh’s full profile

  • See who you know in common
  • Get introduced
  • Contact Prathamesh directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More