Enterprises across India and SAARC are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
The session will cover:
Are they able to align their strategy with the business priorities and rise up to the...
Various governments have been striving hard to build a future of cyberspace that is open, interoperable, secure and reliable. With significant improvement in cyber offense capabilities, the global cyberspace has become more vulnerable to attacks.
It’s time to bolster the cyber defense capabilities among government...
Today, the mobility of the modern workforce has empowered users and devices to connect anywhere. Employees and users have more control over the applications they use. These applications are no longer behind the firewall as users can connect directly to work applications over the internet using their own devices. The...
As organizations have already embarked on their digital transformation journey, moving to a ‘zero trust’ concept is a major step toward building your overall security architecture on the philosophy of challenging everything and ‘trust’ nothing.
The fundamental question for security leaders is why you need to...
As organizations grapple with building security into their cloud applications to help thwart cyberthreats, experts recommend an intrinsic security approach that will help develop an easy and seamless path.
Since it would be difficult to defend what you don’t see, intrinsic security will provide a framework that...
As organizations embark on their cloud journey, cloud security is getting more complex, yet it is still a constantly growing field. In addition, the unmanaged permissions are expanding the attack surface, increasing the challenges of visibility and control for security leaders.
The big questions before the...
As a CISO or a key member of your organization's SecOps team, you've watched the attack surface expand over the last decade. The target field of endpoints has dramatically expanded to other attack vectors, forcing a shift from EDR (endpoint detection and response) to XDR (extended detection and response).
The...
Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program — the main reason why organizations often opt for a hybrid Active Directory approach. However, the other side of the coin to the hybrid AD approach is that your network perimeters disappear. Organizations can...
The medical industry holds sensitive personal data along with other critical data. The healthcare industry, unlike financial institutions with stringent cybersecurity policies, lacks strong regulations around cybersecurity and privacy. This turns out to be a bottleneck for practitioners in adhering to certain best...
Most security leaders believe that they are not protecting technology but people. But can fraud, breach and privacy be viewed together? The fundamental questions that arise are ‘is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues’?
How much...
Organization believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the ‘cloud-first’ strategy to...
India and SAARC region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were breached. The current approach is insufficient, and the deployed technologies do not...
The Government of India has passed a regulation stating that every ‘State’ government needs to have a CISO to regulate the security procurement and controls, apart from appointing a security incident response team.
The fundamental question that arises is ‘whether the government needs a CISO and what should...
The first question that provokes security practitioners is: How can they handle stealth and gain insights into how hackers plan their attacks even before contemplating which security solutions to deploy?
The key to strengthening cyber defense is to understand an attacker’s mind about how they conduct detailed...
India and SAARC region is making a headway in the cryptocurrency businesses and as a result, users could prove to be vulnerable to risks.
The government is working to regulate cryptocurrency exchanges in line with guidance from the intergovernmental Financial Action Task Force, which sets global standards for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.