Banking Frontiers

CYBERSECUR­ITY

Technology Supplement­s Boost

-

Banking Frontiers asked 5 BFSI technology experts about new approaches to improve informatio­n security in the light of growing attacks and frauds. We present their viewpoints in 4 parts spanning smarter approaches, emerging tools, updating process and people deployment.

Part 1

Intelligen­ce as Force Multiplier

The risk and severity of cyberattac­ks have grown over the past few years. In fact, since 2018, organizati­ons have witnessed the most horrific cases of cybercrime­s related to massive data breaches, flaws in microchips, crypto jacking, and many more. The advancemen­ts of technology and the wide use of digital media are making attackers smarter by the day. Cybercrimi­nals take advantage of individual­s and f i r ms targeting everything from a newly launched blog to an establishe­d website to gain access to sensitive informatio­n. A report by Threat Horizon, 2019 reveals that in the coming years, organizati­ons will face cyberthrea­ts under 3 key themes. The first is disruption as cybercrimi­nals will use ransomware to

hijack technology devices and the IOT. The second is distortion, which is the spread of misinforma­tion by bots and automated sources will cause a compromise of trust in the integrity of informatio­n. And the third is deteriorat­ion resulting from rapid advances in smart technologi­es and conflictin­g demands posed by evolving national security that will negatively impact an enterprise’s ability to control informatio­n.

Says Pawan Chawla, CISO, Future Generali India Life Insurance: “We are seeing increased activity of cybercrimi­nals and we are seeing sophistica­ted techniques used by them to circumvent traditiona­l organizati­ons’ security tools. Organizati­ons also face enormous challenges in the light of covid and the displaced workforces.”

Sourabh Chatterjee, President & Head - IT, Web Sales & Travel, Bajaj Allianz General Insurance, maintains that it is a long-standing open secret that systems must be secure and most enterprise­s do not think of security as the first step. “Embedding security in the design of processes, architectu­re of solutions, and a part of daily operations is perhaps the most effective proactive measure for any enterprise. It is an active measure and the passive is protecting and detecting flaws, vulnerabil­ities in existing systems,” says he.

TECHNOLOGY ENVIRONMEN­T

One of the essential things required to improve the informatio­n security team’s efficiency is the skilling and reskilling of them. The other one is they need to have the right visibility to detect the anomalies in the technology environmen­t that may trigger an incident and can be converted into a breach.

Kiran Belsekar, Chief Informatio­n Security Officer, Aegon Life Insurance, believes that if an organizati­on uses DevOps or leverage cloud for innovation, then it can add security to the CI/CD pipeline and bring security to the left.

Sourabh says usage of artificial intelligen­ce and machine learning increases the efficiency of informatio­n security teams. It also reduces manual tasks of detection and quarantine healing. Triaging critical incidents, hiring experts instead of generalist­s and correcting organizati­on structure with proper developers instead of just auditors are all ways to boost the efficiency of informatio­n security teams, he avers.

ACTION NEEDED

Organizati­ons need to understand manpower alone is not enough to cope with the ever-increasing number of cyberthrea­ts. Security teams need to have a force multiplier to help maximize the use of their human intelligen­ce and resources. Increasing efficiency requires 2 prospects: optimizati­on of internal resources and an expert (internal/external) on hand to defend against the most advanced cyberthrea­ts.

A force multiplier for operationa­l security can be achieved through operationa­l insight to obtain maximum resource value and gain a deep understand­ing of the current and desired level of security. Since one cannot be an expert to defend against the most advanced cyberattac­ks, there is need to involve a security expert.

Pawan recommends: “Identifyin­g advance t h r e a t s a n d a u t o mat i n g intelligen­ce responses and subscribin­g to various threat sources will help in detecting and protecting from the most advanced threats. One must automate correlatio­n of data points using real-time threat intelligen­ce for rapid identifica­tion and response. There is also need to empower the team through automation - automate actions that will help the security team to do more in less time.”

Even today, if the organizati­on follows basic security hygiene, they can prevent most attacks on their networks. The easy way to achieve this is by ensuring that one follows in spirit industry best practices, systems hardening and patching and a robust access control policy.

Kalpesh Doshi, CISO, FIS Global, believes that the principle of least privilege, multi-factor authentica­tion for any remote access to organizati­on networks or applicatio­ns, regularly assessing your environmen­t for known vulnerabil­ities and fixing them before the bad guy exploits the same cam help organizati­ons to counter vicious attacks.

“The fundamenta­ls of security will remain the same, hence you need a leader to steer your organizati­on in these challengin­g times. I strongly believe that CISO is a leadership role, you can be a great manager or be strong technicall­y but you can still fail. Also, the board and especially the CEO must LOVE (Listen, Oblige, Value, Empower) their CISO function to build robust organizati­on security for their organizati­on” says Kalpesh.

 ??  ??
 ??  ?? SOURABH CHATTERJEE
SOURABH CHATTERJEE
 ??  ?? KIRAN BELSEKAR
KIRAN BELSEKAR
 ??  ?? KALPESH DOSHI
KALPESH DOSHI
 ??  ?? PAWAN CHAWLA
PAWAN CHAWLA
 ??  ?? ANJANA RAO
ANJANA RAO
 ??  ??
 ??  ??
 ??  ?? Sourabh Chatterjee advocates the usage of AI & ML for the infosec teams
Sourabh Chatterjee advocates the usage of AI & ML for the infosec teams

Newspapers in English

Newspapers from India