Page 23 - Information Security Edition Dec 2021
P. 23
Throwing more light on the Ensuring best cybersecurity mitigation if same without BAU
information security landscape, practices are followed that impact and risk detection with
Ambrish Singh highlights how leaves no single system data as well as real-time
the focus has predominantly unaudited. analytics comprising-
shifted on cybersecurity, unlike Measures for de-risking of Anti-money laundering-
investments
earlier, where the assessment of Finding potential transactions
Risk will always be present, and it
traditional IT infrastructure was a a n d p r o fi l i n g b a s e d o n
is just the cognizance as well as
norm. r e g u l a t i o n s l i k e
strong SOC that follows the
Info Security Operational Trends framework for mitigation with FATCA/FEMA/FERA, etc.
in the past couple of years Conduct - Analytics engines
the respective industry. Also, it is
At present, the focus is on can identify suspicious sales
in line with using a vulnerability patterns, connecting dots
c y b e r s e c u r i t y a s i t h e l p s
m a n a g e m e n t t o o l t h a t across sales, product usage,
organizations to prevent their incorporates threat intelligence, incentives, and customer
data and other assets from s o y o u c a n a d d r e s s complaints.
being compromised. Before this, vulnerabilities that have exploits Cyber Risk- Machine learning
the emphasis was primarily on: known to be available in the wild. can analyze sources of signals,
Assessment of only Traditional Addressing people-centric identify emerging threats,
IT Infrastructure that further challenges post WFH replace existing rules-based
left organization vulnerable. As organizations saw the triggers, and reduce false-
Classification of vulnerabilities challenge being posed by the positive alerts.
by Severity of Data. pandemic, they decided to Predictions for 2022 & Beyond
enhance the BYOD and VPN as This new culture of WFH is going
Key Business Priorities & well as virtual workspace using
Challenges to continue across industries
Citrix and other virtualized
Endpoint security along with and will generate more market
platforms. This allowed them to
stringent controls on WFH for Cybersecurity products along
extend the application to their with SIEM and SOC. Also, there will
i n f r a s t r u c t u r e a s w e l l a s
employees to support the
protection against ransomware customer's need and better be a surge in ransomware
and DR readiness, are some of a t t a c k s , e s p e c i a l l y f r o m
experience as well as ease of
our key business priorities. Our extortion.
working from anywhere.
challenges are related to:
Expectations from
Identifying the attack surfaces Cybersecurity Solution Providers
using proper mapping of the
asset with criticality. They must improvise upon
identifying the threats and -
December 2021