Biocon wanted to ensure that with the changing technology and threat landscape, it also evolves and matures on its controls to combat modern cyber threats and attacks. For this, Biocon re-looked at key risks and compromising factors for its critical assets belonging to various functions for the Information Security Management System (ISMS). It also mapped potential third-party risks and insider threats as part of this framework. As an organization it re-aligned its risk sharing models and strategies to tackle various cyber liabilities and thereby the risk-appetite of the organization.
At Innodata, Rajiv Nandwani led the security augmentation. All controls of HIPAA and DPA were clubbed with the ISO controls to setup one portal whereby all control requirements of each department were mentioned, and the employees were trained on the policies and procedures written entity-wide.
At Flipkart Internet, Ambarish Kumar Singh Establishment of governance structure has helped in getting required top management support and approval in rolling out security initiatives and projects org-wide.
Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.
Gartner analysts explain the importance of creating a better executive engagement to an audience of more than 3,400 security and risk leaders and practitioners.
“We support the aim of giving individuals the choice and control over their data," says Venkatesh Krishnamoorthy, Country Head, BSA.
Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies
Eight new cyber threats detected every second; organizational compliance failure is the main reason behind this surge. Compliance transcends geographical boundaries; companies find themselves cornered by rising security threats, and increasingly complex laws. Most data is on the Cloud, and most of it is highly sensitive as well as unstructured data.