Cybersecurity strategist

AI & Cybersecurity Consulting for Small & Medium Enterprises

Trusted cybersecurity leadership for global teams. I help enterprises deploy automated threat detection, secure cloud architectures, and resilient response playbooks that scale 24/7.

Dr. Hari M. Koduvely at the Cybersecurity & Identity Summit
40+Global security programs guided
120%Mean time to detect improvement
65%Reduction in operational security risk
30+Peer-reviewed publications

About

Dr. Hari M. Koduvely is a seasoned data scientist working in cybersecurity. His experience spans OpenText, Samsung, Amazon, and Infosys, combining applied research with real-world security outcomes.

Research Publications

Explore a curated selection of research on adversarial AI, incident response orchestration, and security operations optimization.

SV-TrustEval-C: Evaluating Structure and Semantic Reasoning in Large Language Models for Source Code Vulnerability Analysis

IEEE Symposium on Security and Privacy (S&P), 2025. Collaboration with the University of Ottawa.

How to Use LLMs to Augment Threat Alerts with the MITRE Framework

RSA Conference, 2025.

Exploring the Effect of Dimensionality Reduction Techniques on Filtration Attacks

IEEE SSCI Conference, 2025. Collaboration with Dalhousie.

Unmasking Cyber Threats: Command Line Data Meets Small Language Models

Black Hat Sector Conference, 2024.

Detecting Internal Reconnaissance Behavior Through Classification of Command Collections

IEEE CSR Conference, 2023. Best Industrial Paper Award.

Evaluating Usage of Images for App Classification

IEEE INDICON, 2018.

An Empirical Study of Popular Matrix Factorization Based Collaborative Filtering Algorithms

CSI Journal of Computing, 2013.

MapReduce Implementation of Variational Bayesian Probabilistic Matrix Factorization Algorithm

IEEE Conference on Big Data, 2013.

A Comparison Study of Monte Carlo Methods to Compute Rare Event Probabilities in Reliability Models

ACM India Computing Convention, 2013.

A Method for Inferring the Structure of Bayesian Networks in Continuous Systems Using Copulas

ICEECS, 2012.

Blog

Practical guidance for security leaders, from tabletop exercises to modern SOC transformation and policy design.

Music

I learn Indian Classical Music from Ms Bidisha Ghosh, which I play on instruments such as Piano, Keyboard, Geoshred, and Dilruba. Please visit my YouTube channel@ReNewSelf for more details.

Teaching

I am a part-time Professor at Algonquin College, Ottawa, Canada, teaching courses in the Artificial Intelligence Software Development Program.

Consulting

Advisory engagements include risk assessments, security architecture reviews, and automation roadmaps tailored to your industry.

Security Strategy and Roadmaps

Align controls, risk appetite, and regulatory objectives.

AI Security and LLM Evaluation

Test, harden, and monitor AI systems for adversarial risk.

Threat Detection Automation

Modernize SOC workflows with data-driven detection logic.

Incident Response Readiness

Tabletop exercises and playbooks for rapid containment.

Contact

Send an E-mail to discuss your goals.