3rd Party Risk Management , Analytics , Audit

Implementing SASE: Essential Steps

Experts Offer Insights on How to Get Started With Deployment
From left: Yask Sharma, CISO at Indian Oil Corp. Ltd.; Rishi Rajpal, vice president, global security at Concentrix; and Sridhar Sidhu, senior vice president and head of information security services group at Wells Fargo Enterprise Global Services - India.

The adoption of the Secure Access Service Edge, or SASE, model is being driven by numerous factors, including the need to bring down administrative costs and to effectively manage network security, according to a panel of experts who offer implementation advice.

See Also: The State of Organizations' Security Posture as of Q1 2018

"SASE brings down the administrative cost, particularly as employees connect from anywhere," says Yask Sharma, CISO at Indian Oil Corp. Ltd.

To effectively implement the SASE model, an organization must develop a thorough understanding of how to manage network and identity security in a new way, says Sridhar Sidhu, senior vice president and head of information security services group at Wells Fargo Enterprise Global Services - India.

To enhance security, some organizations are expanding use of the SASE framework to the devices of users working at home, says Rishi Rajpal, vice president, global security at Concentrix.

This panel discussion was held at Information Security Media Group’s recent Cybersecurity Summit: India & SAARC.

In this video: the three experts address:

  • Various scenarios for deploying SASE;
  • Ensuring contextual access to identity in real time;
  • Using a subscription-based model for improved security.

As CISO at Indian Oil Co., Sharma is responsible for maintaining cybersecurity operations, infrastructure and governance. He has more than two decades of experience.

Sidhu, senior vice president and head of information security services group at Wells Fargo Enterprise Global Services - India, holds certifications in IT risk management and IT governance.

Rajpal is vice president, global security at Concentrix. He has more than 20 years of global experience and deep expertise in information security with a specialization in risk management, security tools, and technologies, compliance, and privacy.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.