Page 11 - Information Security Edition Dec 2021
P. 11

Dimple Santwan opines that the          f o r   a   s e c u r i t y   t e a m -   a r e   E f f e c t i v e   c y b e r s e c u r i t y
    r a t e   o f   t e c h n o l o g i c a l   compounded  by  the  current        programs  should  demonstrate

    advancement,  as  well  as  the         technological  landscape.  The          business  value  to  de-risk
    resulting  complexities,  implies       speed  of  technological  growth        investments in Cyber Security.

    that the prominent threats that         and  its  resulting  complexity         Addressing People-centric
    businesses will have to manage          means  the  major  threats  an          Challenges Post WFH Scenario
                                            organization has to manage will
    would  expand  with  time.  She                                                 As  the  world  gets  past  the
                                            only grow with time.
    f u r t h e r   e l a b o r a t e s   t h a t                                   pandemic,  employees  and

    companies will look forward to a        We  will  face  new  security  employers  will  prefer  a  hybrid

    hybrid  working  model  as  the         challenges each year, requiring         working model. The best way to
                                            them  to  keep  pace  with  the
    world moves past COVID-19.                                                      drive productivity and growth is
                                            constant  revolutions  of  the          to stay connected and engaged
    The rise of pandemic and remote  technology  world.  This  pace,                with the people while remaining
    work has led to new threats and  however, is accelerating rapidly.              empathetic.
    solutions.  In  fact,  there  was  a  Other challenges faced, ranging           Expectations from Cybersecurity

    significant increase in the Covid-       from  risk  management  to              Solution Provider

    19 phishing schemes and a fresh         s t r a t e g y   s e c u r i t y   t o o l   Cybersecurity  is  built  on  trust,
    set  of  ransomware  challenges         proliferation  and  cybersecurity
                                            awareness.  These  increasingly         c o m m u n i c a t i o n ,   a n d
    that  raised  security  concerns
                                            varied  risks  will  put  us  in  an    c o l l a b o r a t i o n ,   s o   s e r v i c e
    across  organizations-big  and
                                            unenviable but critical position in     providers  should  work  with
    s m a l l .   T h e r e   h a s   b e e n   a   the corporate hierarchy.        customers  to  set  the  right
    continuous  rise  in  Artificial                                                 expectations.  Setting  the  right
                                            Measures for De-risking
    Intelligence  and  multi-factor                                                 customer expectations is about
                                            Investments
    authentication  usage.  With            Operations  across  all  sectors        focusing  on  the  value  they  can
    insider  threats  increasing,  we       have  been  going  digital,  driven     provide  and  the  problems  they

    witnessed an increased need for         by  the  need  for  efficiency  and      can solve.
    cybersecurity  professionals            rising  customer  expectations.         Prediction for 2022 & beyond

    s i n c e   m o r e   a n d   m o r e   The pace of adoption varies and  Going forward, we shall witness a
    organizations  critically  required     is  based  on  an  organization's  growth  in  the  popularity  of

    real-time data visibility.              appetite as well as readiness for  cryptocurrencies both in India &

    Business Priorities & Challenges        change, agility, and size, among  globally. However, the prominent
    The  three  challenges-hackers,         other factors.                          breach of 2022 won't be that of

    an  expanding  attack  surface,                                                 data but revolve around the loss
    and the opportunities required                                                  of cryptos.



                     December 2021
   6   7   8   9   10   11   12   13   14   15   16