Prerna Seth
Learner - She / Her
(1)
5
Location
Hamilton, Ontario, Canada
Portals
Categories
Data visualization Data analysis Market research Project management Marketing strategy

Skills

Collaboration 2 Cyber security 2 Cyber security management 2 Data extraction 2 Ethical standards and conduct 2 Presentations 2 Report writing 2 Student engagement 2 Vulnerability 2 Vulnerability management 2

Achievements

Latest feedback

Recent projects

PatchIT Solutions Inc
PatchIT Solutions Inc
Canada

Cybersecurity Data Collection Research Assistant

The main objective of the project, focusing on cybersecurity data collection and labeling for vulnerability management, is to enhance the understanding and management of cybersecurity vulnerabilities. This project aims to engage students in the crucial task of gathering, analyzing, and labeling data related to cybersecurity threats and vulnerabilities. Problem to Solve: Students will be tasked with addressing the challenge of identifying and categorizing various types of cybersecurity vulnerabilities. This involves the collection of vast amounts of data from different sources, such as security logs, network traffic, and public vulnerability databases. The key challenge lies in accurately analyzing and interpreting this data to identify potential vulnerabilities. Expected Outcome: By the end of the project, students are expected to achieve the following outcomes: 1. Comprehensive Data Collection: Students should be able to gather relevant cybersecurity data from multiple sources systematically. This includes understanding where to find data and how to extract it efficiently. 2. Effective Data Labeling and Categorization: Students should develop skills to accurately label and categorize the collected data based on the type and severity of the vulnerabilities. This involves understanding different types of cybersecurity threats and their characteristics. 3. Vulnerability Analysis Skills: Students should be able to analyze the labeled data to identify patterns or trends that could indicate potential security vulnerabilities or breaches. 4. Reporting and Documentation: Students should be able to document their findings in a clear and concise manner, providing insights and recommendations for vulnerability management and mitigation strategies. 5. Awareness of Ethical and Legal Considerations: Students should understand and adhere to ethical and legal standards in data handling, particularly regarding sensitive or personal information. 6. Collaborative Skills: Given the complexity of cybersecurity, students should also learn to collaborate effectively, sharing insights and combining expertise to tackle multifaceted problems. The success of this project lies in its ability to equip students with practical skills in handling real-world cybersecurity challenges, enhancing their ability to identify, analyze, and manage cybersecurity vulnerabilities in various environments.

Matches 6
Category Education + 1
Open

Work experience

Senior Associate Consultant
Infosys
Pune, Maharashtra, India
June 2022 - December 2023

• Worked as a project manager For Marks and Spencer account for enterprise planning and allocation support wherein led a team of 5 people.
• Allocated and managed resources effectively, including team members, and equipment, ensuring successful project execution.
• Monitored project progress, tracked milestones, and implemented corrective actions to ensure project success.
• Facilitated communication among team members, stakeholders, and relevant parties through effective meetings, updates, and reports.
• Maintained accurate and organized project documentation, including plans, reports, and logs. Worked on artifacts preparation as part of GTM (Go-To-Market) Activities.
• Performed Market research for Kredx on the Supply Chain Finance domain.

Education

Post Graduate Dipoloma Certificate, Cybersecurity Analytics
Mohawk College
January 2024 - Current
Masters of business adminstration, digital and telecom management
Symbiois Institute Of Telecom And Digital Management
June 2022 - June 2022

Personal projects

A Comprehensive Study of Classification of Phishing and its AI/I detection- Research Paper

Published in 2022 International Interdisciplinary Humanitarian Conference For Sustainability (IIHC), Which Included Below Topics-
• An Overview of Phishing Attacks and the Importance of Cybersecurity.
• Classification and analysis of the attack type by determining the potential impact of the damage.
• Generic knowledge of AI operations in the cybersecurity landscape.
• Identifying the key strength of various AI/I-enabled detection systems.