Access Management , Cloud Security , COVID-19

Building AI & ML-Based Capabilities to Respond to Incidents

Crowdstrike’s Ajay Kumar on Steps to Enhance Remediation Capabilities
Ajay Kumar, regional head of Cyber Security Services, Crowdstrike

As a strategy, organizations need to harness technologies that can provide real-time visibility to threats combined with intelligence-based automated technologies that can help contain the incidents, says Ajay Kumar, regional head of Cyber Security Services, Asia at Crowdstrike.

See Also: OnDemand Panel Discussion | Practical Viewpoints: Global IT Security Compliance in 2022

With the increase in fileless attacks, organizations need to use behavioral-based technology powered by cloud and automation to identify the indicators of compromise that can help them move faster than the adversary, Kumar says in an interview with Information Security Media Group.

In this video interview, previewing an upcoming virtual roundtable discussion, Kumar discusses:

  • Establishing continuous monitoring and detection capabilities;
  • Building faster recovery and remediation programs;
  • Navigating through people, process and technology to create an effective response mechanism.

Kumar is a subject matter expert in payments, cybersecurity, enterprise technology, and data privacy and has more than 20 years of professional experience. Before CrowdStrike, he worked in senior positions at several fintech and financial services organizations.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.