Tushar Karumudi

Recognized in the Category:

Additional Info

Nominee’s NameTushar Karumudi
Nominee’s Job Title or RoleSecurity Analyst
Company / OrganizationIndependent
Company size30,000 or more employees
CountryUnited States
World RegionNorth America
Websitehttps://www.linkedin.com/in/tushar-karumudi/

NOMINATION HIGHLIGHTS

True cybersecurity innovation is not a product launch. It is the ability to identify a threat that has no established defense, build the detection capability, write the response playbook, and scale it before adversaries adapt. This nominee has done this not once, but across two distinct, operationally critical frontiers anti-scraping threat intelligence and Generative AI security.

As a co-founder of Anti-Scraping Threat Intelligence program and OSS GenAI Investigations arm, this nominee has engineered a fundamental shift in how a platform serving over 3 billion users defends itself. The approach is not reactive it is predictive, analyzing adversarial ecosystems from financial motivations to technical infrastructure to anticipate and disrupt threats before they execute. This methodology is novel, proven at scale, and generalizable to any large digital platform or critical infrastructure operator.

Proactive Threat Intelligence at Platform Scale: Anti-scraping defense was largely reactive detect and block. The nominee co-built a fundamentally different model: a threat intelligence program that analyzes threat actors holistically, tracking infrastructure, financial flows, and operational patterns to enable preemptive disruption. The program processes millions of events daily and coordinates intelligence from 5 external vendors into a unified picture. This shift from reactive to predictive is the defining innovation in enterprise anti-scraping defense.

I deployed Generative AI at scale. This nominee created the OSS GenAI Investigation security operations, staffed, and methodologically defined by this nominee, handles the novel threat categories unique to GenAI: prompt injection, AUP violations specific to open source models. The investigative runbooks and detection frameworks developed here are now the operational standard at one of the world’s leading AI platforms.

Most security professionals stop at technical mitigation. This nominee went further: their investigative findings served as the evidentiary basis for two successful litigation cases against threat actors. By building the evidentiary chain from technical investigation to legal action, the nominee helped create a deterrence model that raises the cost of attack for all actors not just those targeting the company. This approach is directly generalizable to financial services, healthcare, and critical infrastructure.