Disaster recovery

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for the unexpected.

Vishwas Pitre

Zensar Technologies’ security team led by Vishwas Pitre implemented an APT detection solution across all India locations.

Rohit Kachroo

Rohit Kachroo is the CISO at Indiabulls Group. He has a vast experience of around 20 years. He has expertise in implementing GRC, BCP, POLICY FRANEWORK, complaince for various acts, SOC implementation. 


Maya R Nair

Idea Cellular implemented an AI-based solution on selected machines. It gave more certainty on the protection of these machines, and added complete visibility into the overall landscape. The GRC reports now show a more complete picture of the Infosec posture.

Subhajit Deb

Subhajit Deb conceptualized and implemented a framework called 'human firewall' aimed to institute security awareness, weave security practices within the business functions, and establish a rigorous central risk review and governance regime across the globe. Based on nominations, individual functional SME's with a solid geo-specific legal and regulatory understanding from various business units spanning across various countries were selected, trained on basic security practices and appointed as 'human firewalls'.

Mannan Godil

Edelweiss Group's data protection program helps identifying sensitive data, monitor leakage, and provides secure information sharing alternatives.