Senior Technical Program Manager at Cisco Networking, driving strategic security programs for the AI/ML landscape with a research foundation in wireless and network security.
Senior Technical Program Manager at Cisco Networking
AI/ML SecurityFederal ComplianceNetwork Security
Ishita Thanki is listed by AI Gov World as Senior Technical Program Manager at Cisco Networking. Her speaker profile highlights strategic program leadership within the security portfolio, cross-functional collaboration, AI/ML security solutions, and federal compliance initiatives.
Her public research profile adds depth in wireless and network security, secure connected devices, metaverse identity, biometric privacy, supply-chain systems, and quality improvement workflows.
AI Gov World Speaker Profile
Security programs built for the AI/ML landscape
The AI World Conference speakers page describes Ishita as adept at driving strategic programs, notably within Cisco's security portfolio. It highlights a proven track record of exceeding revenue targets, building collaboration across cross-functional teams, and creating significant impact across multiple Cisco programs.
AI/ML SecuritySecurity solutions tailored for AI and machine-learning environments.
ComplianceFederal compliance initiatives and governance-aware delivery.
Research DepthExtensive background in wireless and network security.
Featured Writing
Ideas for applied AI and secure digital systems
Blog-style essays inspired by Ishita's AI Gov World speaker profile and publications.
Responsible AI
Designing privacy-aware intelligence for immersive and ambient systems
AI/ML security solutions need privacy controls that travel with the system context. Ishita's VR/AR privacy research extends the same question into immersive environments: how should intelligent systems sense context while keeping consent and biometric boundaries enforceable?
Why zero-touch trust matters before intelligent devices join the network
Secure onboarding can begin before power-on. Research around MUD-based controls and trusted tags points toward networks that can evaluate device intent earlier and reduce exposure from altered identifiers.
Discovery
Identity and trust for next-generation assistants and knowledge systems
AI beyond search depends on trusted context. Digital citizens, agentic workflows, and conversational discovery all need clearer standards for identity, accountability, and cross-environment movement.
Applied AI
From inventory flow to AI-assisted forecasting decisions
Ishita's earlier supply-chain work fits the applied AI arc: better forecasting starts when data, logistics, and demand signals become connected systems that decision-makers can trust.
Media Publications
Related work in secure digital identity
Published research connected to immigration systems, blockchain security, and identity verification.
Trade Brains
01
Bridging Technical and Non-Technical Teams
A profile of Ishita's program management approach: translating complex technical ideas, aligning engineering, product, UX, and executive stakeholders, and keeping teams focused on customer-centric outcomes.
Coverage of Ishita's federal cybersecurity compliance work across FISMA, NIST 800-53, SSDF, FedRAMP, CMMC, AI-powered compliance dashboards, and operational security programs.
A Nature Scientific Reports article on secure immigration workflows using Hyperledger Fabric, PBFT consensus, zk-SNARK verification, IPFS-backed storage, and compliance-aware transaction handling.
An Inkl profile on Ishita's leadership in security infrastructure and compliance using generative AI, including mentorship, AI-powered dashboards, compliance risk prediction, and next-generation security training.