Profile

About Yezdi Rabadi

About

A Career Built on
Outcomes, Not Reports

A business leader in cybersecurity and risk transformation across the GCC, with a consistent focus on revenue growth, P&L ownership, and building scalable practices that convert market demand into profitable business outcomes. Working closely with CXOs and boards to position cybersecurity not as a cost centre — but as a lever for growth, resilience, and competitive advantage.

With nearly three decades of experience, built and expanded high-impact portfolios across Cybersecurity, GRC, Digital Identity, Data Security, Regulatory Compliance, OT/ICS Security, Security Operations, and Resilience — delivering measurable outcomes in pipeline growth, deal conversion, and long-term client value. The approach combines market insight, commercial discipline, and execution rigour to accelerate both top-line growth and margin performance.

Leading Cybersecurity & Privacy, Middle East — partnering with Protiviti to build and scale the GRC Technology, Digital Identity, and Managed Security practices from inception. Contributed to Protiviti's recognition as an IDC MarketScape GRC Market Leader in 2025, within three years of practice launch.

Empanelled Cybercrime Intervention Officer with law enforcement, lawyers, and judiciary. NSD Cadet under NCIIPC, PMO, Government of India. Committed to information sharing and capacity development for national and regional cybersecurity resilience.

Yezdi Rabadi — Regional Director, Protiviti Middle East
Regional Director  ·  Protiviti Middle East
CISSP  ·  CCSK  ·  ISO 27032 CSLM  ·  CCIO  ·  NSD Cadet
Competencies
Cybersecurity Architecture Framework
Defining and operationalising enterprise security architecture frameworks, ARB governance, secure-by-design standards, reference architectures, and implementation patterns spanning cloud, applications, identity, data, and enterprise platforms.
Data Classification & Protection
Data classification policy design, DLP architecture and implementation, information lifecycle governance, and regulatory-aligned data protection programs. Delivered using BoldnJames, Forcepoint, Titus, McAfee, Symantec, and TrendMicro.
Digital Identity Security
IAM, PAM, SSO, MFA, CIAM, JML process engineering, role engineering, and identity risk metrics. End-to-end implementations for government, free zones, BFSI, and critical infrastructure including air navigation systems.
Zero Trust & Cloud Security — Framework & Strategy
ZTMM builds, CISA ZTM v2 and DoD ZT Reference Architecture assessments, identity-centric segmentation, cloud security architecture across multi-cloud and sovereign cloud environments.
ICS / SCADA Security
Plant-to-enterprise security architecture, ICS/SCADA vulnerability assessments, anomaly detection, safety and reliability-aligned operating models. Delivered across energy, oil & gas, utilities, and railways.
IT / OT / SCADA / ICS — SOC Build & Operations
End-to-end SOC builds from architecture through operational readiness. Use-case catalog authoring, SIEM/SOAR/UEBA tuning, threat intelligence integration, IR playbook development, MDR models, and managed security operations.