Dr. A S Ramasastri, IDRBT's director, says the enterprise security leader's office needs to be strengthened and empowered to tackle new threats and growing cyber espionage with an appropriate risk-based strategy.
The information security field has done a poor job of attracting and retaining women, contends Jo Stewart-Rattray, international director of ISACA, who emphasizes the need for mentoring as well as salary equity.
Indian enterprises must strengthen their capabilities to secure Digital India. To combat emerging threats, security leaders prescribe a self-regulatory approach, rather than one driven by compliance mandates.
The Court of Justice of the European Union has ruled that the EU-U.S. Safe Harbor data sharing agreement is invalid because the United States has failed to safeguard Europeans' privacy rights. Legal experts say the judgment is a direct response to Edward Snowden's revelations.
As cyber threats rise, industry experts see an opportunity to involve government and private entities in building the capacity of security professionals through effective partnerships and cybersecurity clusters.
In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.
Defeating biometrics-based security with far-fetched schemes, such as stealing or replacing eyeballs and fingertips, is a recurring theme in the movies. But real-world advances in authentication will help make it difficult to circumvent real-world security.
As the Indian economy pushes closer to realizing the promise of initiatives such as Digital India, the momentum is causing a strategic paradigm shift in the approach to cybersecurity. DSCI's Vinayak Godse shares observations.
Security experts say digital transformation demands that enterprise leaders look beyond compliance to understand business needs. This drives the need for a managed services model to understand and map enterprise risks.
Mobile computing remains a challenge for many enterprises - with an unprecedented explosion of devices and applications. Understanding diversity, avoiding uncertainty and planning ahead are some suggestions from Gartner's John Girard.
The act of prevention is dead. The new mandate for CISOs is to quickly detect anomalous behavior in the networks to be able to respond quickly to breaches and combat threats, says RSA's director, Kartik Shahani.
Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.
A burgeoning security infrastructure means the headache of management, enforcement and optimization. How do you efficiently administrate it? How do you plan policy enforcement at scale? Juniper's Paul shares insight.