Firstpost
  • Home
  • Video Shows
    Vantage Firstpost America Firstpost Africa First Sports
  • World
    US News
  • Explainers
  • News
    India Opinion Cricket Tech Entertainment Sports Health Photostories
  • Asia Cup 2025
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
Trending:
  • PM Modi in Manipur
  • Charlie Kirk killer
  • Sushila Karki
  • IND vs PAK
  • India-US ties
  • New human organ
  • Downton Abbey: The Grand Finale Movie Review
fp-logo
Indian CISOs Gear Up To Tackle New Age Threats
Whatsapp Facebook Twitter
Whatsapp Facebook Twitter
Apple Incorporated Modi ji Justin Trudeau Trending

Sections

  • Home
  • Live TV
  • Videos
  • Shows
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Health
  • Tech/Auto
  • Entertainment
  • Web Stories
  • Business
  • Impact Shorts

Shows

  • Vantage
  • Firstpost America
  • Firstpost Africa
  • First Sports
  • Fast and Factual
  • Between The Lines
  • Flashback
  • Live TV

Events

  • Raisina Dialogue
  • Independence Day
  • Champions Trophy
  • Delhi Elections 2025
  • Budget 2025
  • US Elections 2024
  • Firstpost Defence Summit
  • Home
  • Business
  • Biztech
  • Indian CISOs Gear Up To Tackle New Age Threats

Indian CISOs Gear Up To Tackle New Age Threats

FP Archives • February 3, 2017, 00:13:25 IST
Whatsapp Facebook Twitter

Indian economy is facing a tough time. Amidst such an unstable scenario, a serious cyber breach/attack can dent a company’s balance sheet and image in a not-so-good way.

Advertisement
Subscribe Join Us
Add as a preferred source on Google
Prefer
Firstpost
On
Google
Indian CISOs Gear Up To Tackle New Age Threats

Indian economy is facing a tough time. Amidst such an unstable scenario, a serious cyber breach/attack can dent a company’s balance sheet and image in a not-so-good way. As per a study done by Kaspersky Lab and B2B International, a serious incident can cost a large company an average of $649,000; for small and medium-sized companies the bill averages at about $50,000.

But, does that ring any alarm bells for executives sitting at the top? Well, not really. Going by the same report, it estimates that most companies greatly underestimate the extent of the malicious attacks they are prone to on a daily basis. To be more precise, that’s almost 90 percent of the companies underestimating the volume of the new cyber threats. Only 6 percent actually recognise their true scale, with only 4 percent estimating them significantly higher.

STORY CONTINUES BELOW THIS AD

An inaccurate assessment of the scope of threat by a company can, in turn, seriously impact the decision making in terms of choosing the right security tools and solutions. A much lower estimate would mean very high chances for the enterprise letting down its guard when devising its security strategy, and adversely impacting its readiness to deal with the threats.

More from Biztech
Future Group - Reliance Retail Deal approved by CCI Future Group - Reliance Retail Deal approved by CCI RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market RBI ban on cryptocurrencies takes effect; prohibition could force investors to tap the black market

Understanding and acknowledging the opponent’s strength to its full extent can be the first step in fighting this battle. The next step is the realisation that there is no such thing as 100 percent security, and that your security measures are as good as the weakest link. At the risk of sounding clichéd, this mantra can work to help organisations constantly stay on their toes and proactively ward off threats and attacks.

Biztech2.com reached out to three key CISOs across enterprises to find out how each one believes in this mantra in their own individual way. The fact that security is not fool-proof comes out loud and clear. But, with that they further talk about how effective they feel their security measures are, and their readiness to deal with the cyber threats.

Radharishna T., Head-IT & Security, ING-Vysya

In today’s scenario, no company can claim that we are 100 percent prepared for cyber attacks. The fact that these attacks are growing in number and complexity is a great matter of concern. Having said that, we are also proactive in our approach. Besides the technology tools to secure the entire network we also have very stringent security policies that enable us to minimise any such incidents.

STORY CONTINUES BELOW THIS AD

What Holds The Key: In the banking industry, the most important thing to secure is the data. All data is precious for us, both from business and reputation maintenance perspectives. The traditional firewall is not enough for this. One needs to step up and have a multi- layer security system in place along with specific policies to secure the data.

BYOD Thoughts: BYOD and mobility have brought newer challenges. We understood that we need to amend the existing policies to support BYOD from a security perspective.

Manish Dave, CISO, Essar

![](https://images.firstpost.com/wp-content/uploads/media/images/2013/Sep/img_124562_manishdaveessar_190x95.jpg) I can say we have adequate control over security, but cannot claim to have everything right. There are always some grey areas, especially in the security context, to be looked at. We need to understand the governance part a little more, wherein we can decide about the implementation of the current policies and monitor how the existing policies are being followed.

What Holds The Key: The web applications which are exposed more than the other business apps should be the ones on top of the priority list. We should not look at external breaches alone as inside-out breaches are more common in the Indian context.

STORY CONTINUES BELOW THIS AD

BYOD Thoughts: BYOD and mobility are trends one cannot shy away from. Every organisation will need to accept the BYOD trend in the next two-three years. Being cautious is the key. One has to implement proper policy first and then look for the technology part to implement those policies. In Essar, we have allowed BYOD but in such a manner that company policies are not compromised and at the same time the end user does not feel restricted.

Atul Kumar, CISO, Syndicate Bank

![](https://images.firstpost.com/wp-content/uploads/media/images/2013/Sep/img_124572_atulkumarsyndicatebank_190x95.jpg) We are prepared for any kind of known attack but cannot say the same for unknown attacks, which don’t have any signature. In fact, none of the banks can claim that they are fully prepared for such unknown attacks. Hence, constant monitoring and being vigilant are absolute necessity.

What Holds The Key: End-to-end security should be the priority for any CISO. There is a need for a proper channel through which the customer interacts with the bank. When a customer is using any third party terminal to access Internet banking, it is very difficult for us to provide ample security to the customer. On our side, we are also constantly upgrading our servers and firewalls in order to be proactive.

STORY CONTINUES BELOW THIS AD

BYOD Thoughts: BYOD and mobility are a sort of hype created by vendors. If a bank chooses not to allow its employees to access their core banking applications on their mobile devices, then there is no question of BYOD posing any threat. From bandwidth perspective also, core banking applications cannot be accessed from a mobile device. However, there are companies that allow their employees to access core business applications. But then they should also be aware of the possible implications of a breach.

Government Take:

_Dr. Gulshan Rai, Director General, I-CERT and GC (Cyber Laws Group Formulation & Enforcement Division), Department of Information Technology, Govt. of India

![](https://images.firstpost.com/wp-content/uploads/media/images/2013/Sep/img_124582_dr-gulshan-rai479_190x95.jpg) _The Government is very serious when it comes to cyber security. Looking at the latest invasions on some of the government websites, a working group, including experts in relevant areas, has been constituted specifically for this purpose. It provides full advisory support in implementation of this activity in cyber security arena through analysis of technology trends, identification of thrust areas and preparation of technology development plan.

STORY CONTINUES BELOW THIS AD

We certainly believe that the cyberspace is vulnerable to a variety of incidents - accidental or intentional. So we keep a track of all our data that is being exchanged over the cyberspace in order to minimise any misuse by either state or non-state elements. We are also looking at rapid identification, information exchange, investigation and co-ordinated response from various government agencies across India.

_The Government of India also understood the need for a unified policy to address the challenges, and came up with the new National Cyber Security Policy 2013. Under the policy, our mission is to provide information infrastructure in the cyberspace along with building capacities to prevent and respond to cyber threats. By strengthening the regulatory framework, we are trying to ensure a secure cyberspace ecosystem.
_

STORY CONTINUES BELOW THIS AD
Tags
Economy India Trojan Information security threat Data theft CISO BYOD National Cyber Law Policy
End of Article
Written by FP Archives

see more

Latest News
Find us on YouTube
Subscribe
End of Article

Top Stories

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

Russian drones over Poland: Trump’s tepid reaction a wake-up call for Nato?

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

As Russia pushes east, Ukraine faces mounting pressure to defend its heartland

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Why Mossad was not on board with Israel’s strike on Hamas in Qatar

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Turkey: Erdogan's police arrest opposition mayor Hasan Mutlu, dozens officials in corruption probe

Top Shows

Vantage Firstpost America Firstpost Africa First Sports
Latest News About Firstpost
Most Searched Categories
  • Web Stories
  • World
  • India
  • Explainers
  • Opinion
  • Sports
  • Cricket
  • Tech/Auto
  • Entertainment
  • IPL 2025
NETWORK18 SITES
  • News18
  • Money Control
  • CNBC TV18
  • Forbes India
  • Advertise with us
  • Sitemap
Firstpost Logo

is on YouTube

Subscribe Now

Copyright @ 2024. Firstpost - All Rights Reserved

About Us Contact Us Privacy Policy Cookie Policy Terms Of Use
Home Video Shorts Live TV