Risk management

Anup P K

Biocon wanted to ensure that with the changing technology and threat landscape, it also evolves and matures on its controls to combat modern cyber threats and attacks.  For this, Biocon re-looked at key risks and compromising factors for its critical assets belonging to various functions for the Information Security Management System (ISMS). It also mapped potential third-party risks and insider threats as part of this framework. As an organization it re-aligned its risk sharing models and strategies to tackle various cyber liabilities and thereby the risk-appetite of the organization. 

Manish Sehgal

At AU Small Finance Bank, Manish Sehgal implemented a Mobile Security Solution with the ability to implement geographic, device and user-based security policies. 

Rajiv Nandwani

At Innodata, Rajiv Nandwani led the security augmentation. All controls of HIPAA and DPA were clubbed with the ISO controls to setup one portal whereby all control requirements of each department were mentioned, and the employees were trained on the policies and procedures written entity-wide. 

Sanjeev Lamba

Sanjeev Lamba led the consolidation of IT teams for better control over IT infra and end user services at UNOMinda Group.

Ambarish Kumar Singh

At Flipkart Internet, Ambarish Kumar Singh Establishment of governance structure has helped in getting required top management support and approval in rolling out security initiatives and projects org-wide.

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

Five steps for security leaders to create better customer experience: Gartner

Gartner analysts explain the importance of creating a better executive engagement to an audience of more than 3,400 security and risk leaders and practitioners.

Policies should ensure free flow of data across borders: BSA Country Head

“We support the aim of giving individuals the choice and control over their data," says Venkatesh Krishnamoorthy, Country Head, BSA.

GDPR is here. Are you ready?

Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Partner Content
More than 2.5 billion records stolen or compromised in 2017

Gemalto Breach Level Index highlights improperly secured databases in the cloud and internal threats were the fastest growing security risks for companies

What does it take for companies to stay on top in the new landscape of data security

Eight new cyber threats detected every second; organizational compliance failure is the main reason behind this surge. Compliance transcends geographical boundaries; companies find themselves cornered by rising security threats, and increasingly complex laws. Most data is on the Cloud, and most of it is highly sensitive as well as unstructured data.