India Insights with Geetha Nandikotkur

Governance & Risk Management , Incident & Breach Response , Security Operations

Bengaluru Summit: Key Lessons on Fighting New Threats

Security Thought Leaders Share Actionable Steps to Prevent Breaches
Bengaluru Summit: Key Lessons on Fighting New Threats
CERT-In Director General Sanjay Bahl

Security practitioners in India need to have a better perception of threats and risks to build successful detection and defense strategies. That was one of the key lessons offered at Information Security Media Group's Fraud & Breach Prevention Summit in Bengaluru June 7.

See Also: Live Webinar | How to Identify & Address Risk with Attack Simulation

"Risk is a function of threats, vulnerabilities and consequences, and having a perception of risks and the process of mapping and managing these to communicate to the board appropriately is critical," keynoter Sanjay Bahl, director general, CERT-In, told summit attendees.

"Having a perception of risks and the process of mapping and managing these to communicate to the board appropriately is critical." 

Bahl stressed the importance of understanding the risk management process while taking stock of asset inventory that is under risk.

"Most practitioners today lack skills in disclosing the vulnerabilities due to deficient incident response skills sets in-house and over-dependency on vendors with no appropriate vendor governance process in place," Bahl said.

In a spotlight session, Vishal Salvi, CISO at Infosys Ltd., called on attendees to "conduct cyber investigations using forensics, address the cyber insurance process, engage the litigation teams, and deploy the lessons learned with regular updates to all stake holders."

The root cause for many breaches has been insiders who provide the entry for hackers into the systems. Sunil Varkey, CISO of Wipro Ltd., told the summit audience: "Convergence of people, technology and process needs to be addressed as a system, and it is imperative to consider internal threat strategy as part of resilience program as an insider can bring you down."

Another speaker, Krishna Sastry Pendyala, executive director, incident response and digital forensic services at PWC, stressed several key steps to help fight the ransomware epidemic, including improving patch management as well as log collection, retention and evaluation.

"There are shortcomings in the monitoring and validation of network permissions among organizations," he said.

A session featuring Bharat Panchal, senior vice president and CISO at NPCI, clarified certain myths around the new Unified Payment Interface. "There is built-in two factor authentication with the 12-digit Aadhaar number recognition being the third factor of authentication at the back end in this interface to help customers do away with the password," he explained.

The adoption of Aadhaar-based biometric authentication and moving beyond passwords triggered a lively debate among the delegates, who sought answers for their critical concerns on securing their biometric transaction mechanism.

Key Steps

Here's a sampling of some of the best practices outlined by speakers at the summit:

  • Map your asset inventory;
  • Focus on the risk management ecosystem and not on individual products;
  • Adopt automated alert recognition mechanism;
  • Use two-factor authentication;
  • Improve visibility into users, systems and information; and
  • Use web-gateway/URL filtering.

What do you see as the most critical best practices? Share your comments in the space below.

About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years' experience in newspapers, audio-visual media, magazines and research. She has an understanding of technology and business journalism, and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a Group Editor for CIO & Leader, IT Next and CSO Forum.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.