Page 23 - Information Security Edition Dec 2021
P. 23

Throwing  more  light  on  the            Ensuring  best  cybersecurity         mitigation  if  same  without  BAU

    information  security  landscape,         practices  are  followed  that        impact  and  risk  detection  with
    Ambrish  Singh  highlights  how           leaves  no  single  system            data  as  well  as  real-time

    the  focus  has  predominantly            unaudited.                            analytics comprising-
    shifted  on  cybersecurity,  unlike     Measures for de-risking of                Anti-money  laundering-
                                            investments
    earlier, where the assessment of                                                  Finding potential transactions
                                            Risk will always be present, and it
    traditional IT infrastructure was a                                               a n d   p r o fi l i n g   b a s e d   o n
                                            is just the cognizance as well as
    norm.                                                                             r e g u l a t i o n s   l i k e
                                            strong  SOC  that  follows  the
    Info Security Operational Trends        framework  for  mitigation  with          FATCA/FEMA/FERA, etc.
    in the past couple of years                                                       Conduct  -  Analytics  engines
                                            the respective industry. Also, it is
    At  present,  the  focus  is  on                                                  can  identify  suspicious  sales
                                            in line with using a vulnerability        patterns,  connecting  dots
    c y b e r s e c u r i t y   a s   i t   h e l p s
                                            m a n a g e m e n t   t o o l   t h a t   across  sales,  product  usage,
    organizations  to  prevent  their       incorporates threat intelligence,         incentives,  and  customer
    data  and  other  assets  from          s o   y o u   c a n   a d d r e s s       complaints.

    being compromised. Before this,         vulnerabilities that have exploits        Cyber Risk- Machine learning
    the emphasis was primarily on:          known to be available in the wild.        can analyze sources of signals,

       Assessment of only Traditional       Addressing people-centric                 identify  emerging  threats,

       IT  Infrastructure  that  further    challenges post WFH                       replace  existing  rules-based
       left organization vulnerable.        As  organizations  saw  the               triggers,  and  reduce  false-

       Classification of vulnerabilities     challenge  being  posed  by  the          positive alerts.
       by Severity of Data.                 pandemic,  they  decided  to            Predictions for 2022 & Beyond
                                            enhance  the  BYOD  and  VPN  as        This new culture of WFH is going
    Key Business Priorities &               well  as  virtual  workspace  using
    Challenges                                                                      to  continue  across  industries
                                            Citrix  and  other  virtualized
    Endpoint  security  along  with                                                 and  will  generate  more  market
                                            platforms. This allowed them to
    stringent  controls  on  WFH                                                    for Cybersecurity products along
                                            extend  the  application  to  their     with SIEM and SOC. Also, there will
    i n f r a s t r u c t u r e   a s   w e l l   a s
                                            employees  to  support  the
    protection  against  ransomware         customer's  need  and  better           be  a  surge  in  ransomware

    and  DR  readiness,  are  some  of                                              a t t a c k s ,   e s p e c i a l l y   f r o m
                                            experience  as  well  as  ease  of
    our  key  business  priorities.  Our                                            extortion.
                                            working from anywhere.
    challenges are related to:
                                            Expectations from
       Identifying the attack surfaces      Cybersecurity Solution Providers
       using  proper  mapping  of  the
       asset with criticality.              They  must  improvise  upon
                                            identifying the threats and -

                     December 2021
   18   19   20   21   22   23   24   25   26   27   28