Page 17 - CIOs Edition June 2021
P. 17

BFSI                                                                                               BFSI



                                                                                      Emphasizing on

                                                                                      Being an Enabler

                                                                                      Rather than
      With over 17 years of experience in   At the same time, there is pressure       Support System
      the  FMCG  and  NBFC  sector,         to implement the best technology
      Avdhoot  Bhogulkar  has  spent        accurately.  Balancing  both  is          -Avdhoot
      much  of  his  time  designing  and   always a task, but I have always felt
      a r c h i t e c t i n g   s e c u r i t y   motivated  to  perform  better  and
      i n f r a s t r u c t u r e s   w h i l e   a l s o   deliver  exceptional  outcomes,
                                            both in terms of cost and solution.
      implementing  enterprise-wide                                                   Avdhoot Bhogulkar
      information  security  processes,  Best IT Deployment                           Head- Networks & security,
      projects,  and  initiatives.  As  the   My best IT deployment project was       Reliance Capital Ltd

      CISO  of  Reliance  Capital  Ltd.,  he   w h e n   I   w a s   a   p a r t   o f   t h e
      works  closely  with  business        implementation  of  the  NPCI  data
      functions  to  align  IT.    Avdhoot   center  at  Mumbai  and  DR  at
      emphasizes  being  an  enabler        Chennai, along with the migration
      rather than the support function.     of  the  IDRBT  setup  to  NPCI.  I
                                            handled  the  project  end  to  end,
     Achievements &                         from  setting  up  the  racks  in  the
     Contributions in the IT Sector         data center till the migration of NFS
                                            and CTS setup to NPCI, aside from
      During  my  career,  I  completed
      many  projects,  such  as  the        t h e   i m p l e m e n t a t i o n   w i t h
      implementation of the EDR and EPP     Mastercard and Rupay.
      t e c h n o l o g y   a c r o s s   1 8 0 0 0 +   Key Learnings
      employees and 1400+ branches. I
      also emphasized the replacement          Project  &  Team  Management
      of  legacy  technologies  with  the      along with Strategic Planning &
      newer edge technologies without          Management.
      any business impact and in record        C o s t   O p t i m i z a t i o n   a n d
      time.  Apart  from  this,  I  played  a   Performance Management.
      pivotal  role  in  implementing
      privileged  access  management           Budget  Development  and
      a n d   p r i v i l e g e d   i d e n t i t y   Conflict resolution.          Given  that  endpoints  and  user
      m a n a g e m e n t   a c r o s s   3 0 0 +   Top 3 technologies in 2021     systems  are  more  vulnerable  to
      applications,  eight  lines  of                                              cyber-attacks,  it  simply  means
      business,  and  more  than  17000     Artificial  intelligence  &  Machine    that  educating  the  end-users
      employees.                            L e a r n i n g ,   R o b o t i c   P r o c e s s   through  security  awareness
                                            Automation  (RPA),  and  Edge          training is not sufficient to control
     Challenges Encountered                 Computing.                             the threats. Hence, we decided to
      There  is  always  some  amount  of
      pressure in terms of cost from the     IT Project With Sophos                implement  24x7  SOC  along  with
      finance department.                    W e   h a v e   i m p l e m e n t e d   t h e   EDR for server farms as well as for
                                            SOPHOS EDR solution at end-user        end  user's  systems  where  the
                                            systems (Laptops & desktops).          likelihood of compromises is more.

                      June 2021
   12   13   14   15   16   17   18   19   20   21   22