IAM has always been a manual process. While many organizations try to automate IAM, it is not easy. Pooja Agrawalla, head of IAM at NXP Semiconductors and winner of ISMG's Dynamic CISO Excellence Award for Women Leaders in Cybersecurity, discusses best practices for IAM deployment and automation.
Supply chain attacks have evolved from exploiting organizations with unpatched vulnerabilities in open-source libraries to proactively injecting malicious code into a victim's IT environment, according to Janet Worthington, senior analyst at Forrester.
More threat actors are dedicated to attacking industrial organizations, and that increasing volume and sophistication of attacks has left organizations clamoring for suppliers with expertise in safeguarding OT infrastructure, said Rockwell Automation's Mark Cristiano.
The Philippines plans to introduce a national cybersecurity plan later this year. What expectations do security practitioners have, and what changes would they like to see? Joey Fontiveros of the Philippine Army Signal Regiment shares his views on the plan and its impact on cloud security.
India is leading the digital payments revolution on the world stage with its widely accepted unified payments interface. N. Rajendran, the chief digital officer of the Multi Commodity Exchange of India, who has worked on UPI since its inception, discusses its successful implementation.
Cyber insurance is just one piece of the puzzle to address rising cybersecurity issues. Cyber insurance is not a defense strategy but more of a risk transfer strategy that can save your skin if there is an incident, said Deepika Mathur, CEO of Markel India.
The hyperconvergence of the communication and computing technology of 5G and edge cloud to offer virtualized services to customers in the form of a "bank in a box" will redefine the way banks will operate in the future, said the Reserve Bank of India’s D. Janakiram.
The proposed Personal Data Protection and Privacy Bill, which was tabled in the Indian Parliament, needs to guarantee the fundamental right of privacy and have a methodology to establish a secure data flow across the border, under Section 17 of the IT Act, said retired Justice B.N. Srikrishna.
Indian national cybersecurity coordinator and retired Lt. Gen. Rajesh Pant says Indian enterprises need to start investing in cybersecurity to respond to increasing cyberattacks since cyberspace is now borderless and interconnected with little attribution.
Small efforts result in big changes to address the skillset shortage. Samrat Bhatt, senior IT director at MatchMove, initiated a skills gap analysis, upskilled resources, drafted new processes and updated old ones to maximize returns. But the defining pillar is always people, Bhatt said.
The U.S. Securities and Exchange Commission and the state of New York have proposed new cybersecurity regulations. Fred Harris, managing director of Societe Generale, says it's a "watershed moment for the industry" and offers insights as to how financial institutions can manage these changes.
Every CISO's dream includes improved outcomes, maturity, increased return on security investments and a faster response to cyber incidents. Retired Commander Sanjeev Singh, CISO and data protection officer at Birlasoft, shares his secret of adopting XDR and realizing that dream.
Cybersecurity practitioners in Asia understand the importance of managed detection and response technology, but they have been slightly slow in adopting it compared to markets in the West, said Aaron Bugal, field CTO of the Asia-Pacific and Japan region for Sophos.
The U.S. Consumer Financial Protection Bureau is mulling over whether to reimburse consumers for online scams and fraud, but this regulatory change could lead to an increase in first-party fraud, cautioned Karen Boyer, senior vice president of financial crimes at M&T Bank.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.