“Data Protection & Privacy regulation will rule 2020”
By MYBRANDBOOK
Sandeep Sengupta
MD
ISOAH Data Securities
Key Priorities of 2020
Being an Ethical Hacker and Auditor with an experience of over 20 years, it is understood that security depends on “People, Process and Technology”.
Since we ignore the first two “P” and only focus on “Technology”, companies are falling in front of cyber criminals. Anything that we invest in 2020 will be focused on “people”. And when we will visit the clients / auditee, we will recommend them to do the same.
Combining Breakthrough & Fusion approac
The winning companies will be those, who will bring disruptions while being equally adaptive. First they have to adhere to industry benchmarks for business continuity (ISO 22301) and resilience (BS 65000). While their research team will strive to create an industry benchmark for their core business.
Cyber Security
Most of the organizations do not have a Red Team, who is dedicated to identify the risks. Most of the organizations are poor in risk identification and assessment. They only follow industry trends.
So they are over spending on risks which they do not have, and not spending enough to mitigate the risks which are important for them. They are putting a lock on the wall, while keeping the doors unlocked. Ideally, a company should allot a risk identification job to a dedicated team (who will work with everyone else in the company, along with the SOC team).
Hire a CISSP to head the team. Then get a different team or consultant to assess and mitigate the risks. While getting a neutral third group of external auditors to audit the entire information security management system and report to top management.
Achieving Digitalization
Research on how to do the current job more efficiently? Or research on understanding what this world would be like in future. Understanding the future and making own company future ready is the most vital.
“Data Protection & Privacy regulation will rule 2020. Companies have to align their strategy to get compliant. Those who cannot, may not survive. We are aligning ourselves for the same. Our adoption to cloud & open source will balance security & data protection principles.”
TAC Security becomes Cyber Security Assessor for the App Defen
The cybersecurity company, TAC Security has been selected as a key Cyber ...
InterGlobe’s Rahul Bhatia and C.P. Gurnani together announce
In a move that is set to transform the AI landscape, Rahul Bhatia, Group M...
Download masked Aadhaar to improve privacy
Download a masked Aadhaar from UIDAI to improve privacy. Select masking w...
Sterlite Technologies' Rs 145 crore claim against BSNL rejecte
An arbitrator has rejected broadband technology company Sterlite Technolog...
AGGRESSIVE ELECTRONICS MANUFACTURING SERVICES PVT. LTD.
TP-LINK INDIA PVT LTD.
GLOBUS INFOCOM LTD.
ATRIE TECHNOLOGY PVT. LTD.
Technology Icons Of India 2023: Honorary Prof. N. Balakrishnan
Prof. N. Balakrishnan is an Indian aerospace and computer scientist. H...
Technology Icons Of India 2023: Anil Kumar Aggarwal
Anil Agarwal is an Indian billionaire businessman who is the founder a...
Technology Icons Of India 2023: Mukesh D. Ambani
An Indian billionaire businessman Mukesh Dhirubhai Ambani is currently...
STPI encouraging software exports from India
Software Technology Parks of India (STPI) is an S&T organization under...
BSE provides highly secure, efficient and transparent market for trading
BSE (formerly known as Bombay Stock Exchange Ltd.) is Asia's first & t...
C-DAC keeps India ahead in IT & Electronics R&D space
Centre for Development of Advanced Computing (C-DAC) is the premier R&...
ADITYA INFOTECH LTD.
Aditya Infotech Ltd. (AIL) – the technology arm of Aditya Group, is ...
SONATA INFORMATION TECHNOLOGY LIMITED
Sonata Software Limited is a leading Modernization engineering company...
SAVEX TECHNOLOGIES PVT. LTD.
Savex Technologies is the 3rd largest Information & Communication Tec...