Social Network For Security Executives: Network, Learn & Collaborate
Happy festive season to all our readers.
“BYOD adoption is much easier now, If "CISO / IT" Gets Its Way. It helps IT decision makers supporting BYOD to anticipate the day to minimise the device expenses of any organisation for its employees and secure & simplify management. Now your enterprise applications can be SECURELY accessed on…
Added by Sharat AIRANI on August 17, 2014 at 11:30am — No Comments
The 2012 Cost of Data Breach Study conducted provides some valuable information about the average cost of an enterprise data breach. The study, released in March’13, also recognized that organizations with a chief information security officer (CISO) in place experienced reduced costs for data breaches, which is right on target from my experience.
I am right in suspecting that an organization without a CISO is more prone to a security fault.
The role of a…Continue
Added by Sharat AIRANI on August 22, 2013 at 4:30pm — No Comments
I have seen many blogs, articles and most of them stated as, CISO need the ability to adopt the business. The role of the CISO in any organisation is to protect the business and bring the operations under secured mode, under the policy defined, governance so on and so forth. So obviously he has to aware of the business, competition and more than that the risk to the organisation and compliance matter.
Here I am putting this in other side of the context. Does business also need to…Continue
Added by Sharat AIRANI on August 1, 2013 at 2:30pm — No Comments
If you start off blowing the whistle too quickly, too early on — and believe me, early in my career, I did — I didn't make any friends, didn't get any further with the program of work I was trying to do.
You are going to discover some very, very ugly things. The secret that I have personally found is when you find the ugly stuff, don't go trumpet it to everybody and say, 'Hey, I've found all these flaws’.
Instead, what you need to do is to sit with the IT operations staff,…Continue
Added by Sharat AIRANI on July 12, 2013 at 1:00pm — No Comments
On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide distribution of information and communication technology (ICT) devices and networks".
Enterprise information security is more than just protecting against viruses. The collaborative and diverse nature of modern business means that…
Added by Sharat AIRANI on July 5, 2013 at 5:00pm — No Comments
Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs to develop a robust and competent workforce equipped with the necessary skills to adequately defend its IT infrastructures. These cyber defenders need not just basic trained to sufficiently defend against mounting security threats, more than…Continue
Added by Sharat AIRANI on June 26, 2013 at 8:00pm — No Comments
IT Trends and challenges:
World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.
Added by Sharat AIRANI on June 16, 2013 at 5:00pm — No Comments
IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.
On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.
Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…Continue
Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments
We have developed the myth that technology can be an effective fortress – We can have security.
Traditional focus on: