Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

Defence-in-depth: An important security architecture


By MYBRANDBOOK


Defence-in-depth: An important security architecture

Harikesh Mishra
CISO & Additional GM (IT) - Jaypee Group

 

Responsibilities of the CIO
It is a great idea to adapt CIO as Chief Influence officer or change agent in the current digital transformation landscape. As a CIO/CISO, one needs to stay ahead of the technological changes and trends that affect an organisation; CIO/CISO can face the function of educating the top players in the firm, so they remain ahead of the same changes and trends. This learning culture will enable the team to be stronger than ever, no matter what challenges come on the way.

 

Adopting Work-From Anywhere
A large-scale transition from traditional, collocated work to remote work arguably began with the adoption of work-from-home (WFH) policies in this pandemic. It is quite exciting that millennials were excited by the idea of traveling the world while still employed.

 

In such a scenario, technologies that enable secure access to data, enterprise applications, virtual meetings, cloud conferencing, and virtual/mixed/augmented reality are the forefront leaders to ensure deliverables are not impacted. Remote working is a blessing that comes due to technology and is one the greatest solution that helps us in social distancing.

 

Redesigning IT & Security strategy
Our ICT world is under assault, and we need to take proactive upgrades to build our defences. In the past couple of years, the attack surface has vastly expanded from a move to remote work, from more people coming online, and from more interconnectivity of PCs and smart devices around the globe.

 

The recent Solar Winds breach that sidestepped cyber-defences of numerous countries and most of the Fortune 500 companies was yet another wake-up call to the overwhelmed cybersecurity ecosystem endlessly being attacked by phishing, ransomware, spoofing, and Distributed Denial of Service attacks. However Defence-in-depth is an important security architecture principle that has significant application to ICT Infra (ICS), cloud services, organization’s sensitive data, and many other areas.

 

We claim that an ideal defence-in-depth posture is ‘deep’, containing many layers of security, and ‘narrow’, the number of node independent attack paths is minimized. In view of the same Zero Trust (ZT) play an important role for an evolving set of cybersecurity paradigms that move defences from static, network- based perimeters to focus on users, assets, and resources.

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org