iifl-logo-icon 1
IIFL

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

  • Open Demat with exclusive Advice & Services
  • Get a dedicated Relationship Manager to help you grow your wealth
  • Exclusive advisory on 20+ trading & wealth-based investment options
  • One tap Investments, Automated trading & much more
  • Minimum 1 lakh margin required
sidebar image

Mr. Sudhanshu M. Nayak - Head Cybersecurity & Cyber Forensics, CMS IT Services

13 Jan 2023 , 04:51 PM

Interaction With Sudhansu Nayak X India Infoline 

Cybersecurity could emerge as the biggest challenge in 2023. How companies should prepare for that?? 

First and foremost, the companies need to discover what they need to protect. Like each patient, cybersecurity prophylaxis, symptoms identification, diagnosis, treatment, and post-exposure guidelines differ. These have been documented in MITRE ATT&CK Framework, CIS/ NIST/ ISO guidelines, CERT recommendations, and incountry compliance frameworks. To build resilience, companies should adopt a healthy mix of solutions and services. • What not to do in times of digital disruption? How to prepare for the future? 

Don’t follow your peers blindly. Your technology stack is unique to your business dataflow and hence, needs appropriate technologies and their integration. Don’t buy technologies which have multiple overlapping functional specifications. This will create digital bulge and is wasteful. Always remember, it’s not multiple tools, it’s how you integrate them into your enterprise fabric is what differentiates you and optimises investments. Don’t start recruiting skill sets in all digital disrupting technology areas. They will drain your finances. Outsource. Remember old cassettes, CDs, and DVDs went through rapid sunsets. 

Invest in a balanced technology portfolio of technology platforms and services. Don’t follow reports of analyst firms and rest all your judgements on them. There are quite a few smaller technology firms delivering knock-out solutions. Explore them in sandbox/ proof-of-concept mode. •

What are the  Data privacy trends in 2023, in compliance with new regulations and their impact on data security ?

India’s Digital Personal Data Protection bill 2022 draft will be tabled in parliament in 2023. Digital India Bill is expected to  subsume the Information Technology Act 2020 and create a revised transformative integrated compliance framework. EU’s Artificial Intelligence (AI) Act draft is trying to take cognisance of the rampant usage of AI and Metaverse developments. Aimed at regulating the massive data processing globally by non-human intelligence, this will have strong echoes on country level compliances. This may peak in 2023. 

After aligning the USA CLOUD Act with UK and Australia, USA and India may, to tackle cross-border data transfer and data free flow with trust, come to a mutual agreement. 

What are the trends, strategies, and future in cloud strategies?

 The Quad Cybersecurity Partnership aims to build resilience to address cybersecurity vulnerabilities and cyber threats by focusing on critical infrastructure protection (led by Australia), supply-chain resilience and security (led by India), workforce development and talent (led by Japan), and software security standards (led by the US). This will create new thrust on multiple trends in cyber resilience, cloud adoption, and resource development. 

 India-specific trends are as follows. IoT/ OT Security will take centre- stage in discussions but the expensive solution implementations will take another year to gather steam. Most enterprises will replace on-premises legacy anti-virus solutions with cloudbased antivirus solutions with enterprise detection and response solutions.  Cloud adoption will be mixed. DevSecOps will pick speed. Shared Responsibility matrices will be more crystallised in services delivery.  Automation and shift-left will continue to evolve. Cloud-based identity and access solutions will gather speed. Cloud skills will be scarce. Organisations will keep paying low for resources and won’t be able to accrue the full potential of cloud. There are hush hush rumours of organisations going back to DC/ DR technologies for better control. 

CMS IT Services works based upon a framework called defensible cybersecurity. How defensible cybersecurity contributes to all cybersecurity stakeholders ?

CMS IT Defensible Cybersecurity framework is a holistic approach to address cybersecurity challenges, aligned to the context of business, addressing systemic issues, challenges, and stakeholder requirements, designed to handle constant change while consistently improving operational controls, designed to address cybersecurity risks for both traditional & digital businesses and their supply chains. Through the framework, we 1. demonstrate value in cybersecurity investments through continuous improvement in cybersecurity posture, 2. establish global oversight on evolving threat vectors, for all elements of the computing environment, and achieve segregated management of all computing elements by deconstructing the entire ecosystem into Defensible Cyberspaces based upon the cybersecurity threats, 3. reduce risks, by operating and measuring cybersecurity controls across physical networks, cloud and mobile leveraging and consolidating technology solutions. Establish granular change governance when changes affect cybersecurity controls, 4. build and enhance capabilities to respond to breaches and to recover to business-as-usual within predictable timelines, 5. demonstrate cybersecurity assurance to leadership by being on top of cybersecurity protection, using the most effective technology options available. 

 How CMS IT Services solve today’s problems in cybersecurity through strong partnerships?

In a digital-intensive world, to address customers’ various cyber security risks and advance their digitization journeys, combining and integrating complementary and symbiotic solutions is essential for a holistic, innovative, and customized cyber security architecture. This architecture should also aim to be future-proof and leverage automation in a big way. This entails delving deep into extremely complex and intricate challenges with business- contextual processes, dataflows generating complicated datasets, and business-vision-based outcomes while balancing financial limitations. To cater to all these themes, CMS IT cybersecurity partnerships are strategic collaborations on IT/ OT security, threat intel, and forensics. Across IT/ OT endpoints, perimetered or open networks, through DC/ DR or cloud or hybrid compute and storage designs hosting web and mobile applications, collaboration suites, e-commerce platforms engaging large structured and unstructured databases and sometime massive data-lakes, more than fifty CMS IT cybersecurity partnerships are aimed at defending, detecting, and mitigating cyber-disruptions. 

 How CMS IT Services consider security in the early stages of digital transformation? 

 CMS IT follows the following three phases: 1. Conduct a vulnerability assessment and penetration testing of the customer applications and the underlying infrastructure.  2. Determine the exploitability of the vulnerabilities 3. Conduct a risk assessment exercise 4. Develop a 5-year Cyber Security Strategy to baseline best industry practices. 5. Build Defensibility into the ICT fabric 6. Recommend measures to ensure Cyber Resilience 7. Conduct Capacity Building for both the Technical ICT Staff and the Senior Leadership as part of Cyber Security resilience.

 

Mr. Naik

Related Tags

  • Leaderspeak
sidebar mobile

BLOGS AND PERSONAL FINANCE

Read More
Knowledge Centerplus
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Securities Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Knowledge Centerplus

Follow us on

facebooktwitterrssyoutubeinstagramlinkedin

2024, IIFL Securities Ltd. All Rights Reserved

ATTENTION INVESTORS
  • Prevent Unauthorized Transactions in your demat / trading account Update your Mobile Number/ email Id with your stock broker / Depository Participant. Receive information of your transactions directly from Exchanges on your mobile / email at the end of day and alerts on your registered mobile for all debits and other important transactions in your demat account directly from NSDL/ CDSL on the same day." - Issued in the interest of investors.
  • KYC is one time exercise while dealing in securities markets - once KYC is done through a SEBI registered intermediary (broker, DP, Mutual Fund etc.), you need not undergo the same process again when you approach another intermediary.
  • No need to issue cheques by investors while subscribing to IPO. Just write the bank account number and sign in the application form to authorise your bank to make payment in case of allotment. No worries for refund as the money remains in investor's account."

www.indiainfoline.com is part of the IIFL Group, a leading financial services player and a diversified NBFC. The site provides comprehensive and real time information on Indian corporates, sectors, financial markets and economy. On the site we feature industry and political leaders, entrepreneurs, and trend setters. The research, personal finance and market tutorial sections are widely followed by students, academia, corporates and investors among others.

RISK DISCLOSURE ON DERIVATIVES
  • 9 out of 10 individual traders in equity Futures and Options Segment, incurred net losses.
  • On an average, loss makers registered net trading loss close to Rs. 50,000.
  • Over and above the net trading losses incurred, loss makers expended an additional 28% of net trading losses as transaction costs.
  • Those making net trading profits, incurred between 15% to 50% of such profits as transaction cost.
Copyright © IIFL Securities Ltd. All rights Reserved.

Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248

plus
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.