Rajnish Gupta, Regional Director, India & SAARC at RSA explains why identifying critical assets and assigning a risk score is imperative to new age cybersecurity.
At IDG Security Day, Jaspreet Singh, Partner – Cyber Security (Africa, India & Middle East) at EY, decodes GDPR and points out areas that could prove to be a challenge.
Bharti AXA General Insurance wanted to meet the IRDAI requirements on cyber and information security guidelines and to establish the managed security from India Data Centers. Bharti AXA general Insurance implemented a IT DC transition project which was a green filed Security stack project (built up from scratch), solution and implemented as per industry standards and security best practices. The implementation of regulatory requirement along with the new Security Stack for the IT DC transition project was the strategic projects led by Atyam.
At RRD, Karthik Shankar led a cross-functional team in order to comply with data protection regulations. The team was responsible for delivering an action plan based on the data privacy principles.
Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings.
Lopa Mudraa Basuu developed investor reporting audit support model for enterprise IT of OCWEN by re-engineering IT risk management program through fine-tuning and bringing in different investor IT controls requirements under a single umbrella.
At Choice International, Amit Jaokar led a Cloud based Identity and Access Manager (IdAM) solution to optimize information security and risk management, and achieve regulatory compliance faster. It reduced administrative costs by 20 percent, automated account management by 85 percent, reduced helpdesk calls by 90 percent, and reduced user on-boarding time by 75 percent.
Biocon wanted to ensure that with the changing technology and threat landscape, it also evolves and matures on its controls to combat modern cyber threats and attacks. For this, Biocon re-looked at key risks and compromising factors for its critical assets belonging to various functions for the Information Security Management System (ISMS). It also mapped potential third-party risks and insider threats as part of this framework. As an organization it re-aligned its risk sharing models and strategies to tackle various cyber liabilities and thereby the risk-appetite of the organization.