Dataquest

CYBER EVERYWHERE; GROW ANYWHERE

While the threat looms larger with new technologi­es on the horizon, one cannot ignore how these technologi­es have been reinventin­g the way we live and for the better

-

Cyber is everywhere. Cyber has embedded itself in every part of an individual’s life and society as a whole- from devices such as mobile, smart watches, assisted voice help service units to uniquely customise customer experience provided by enterprise­s in digital retail that makes cyber omnipresen­t.

While that is true at one end, one will also have to discuss the future of cyber security by taking into account the emerging trends in technology and the related cyber threat vectors that arise due to these advancemen­ts.

How has cyber evolved in the past five years?

Cyber security attacks used to be far lesser and lower in volume and scale. However, times have changed and with the evolution through the years, attackers now launch more sophistica­ted attacks, covering a wider net (devices connected on single servers and connected devices through IoT and on Cloud).

Cyber security management, which once used to be in the custody of IT profession­als and technical support providers and not dependent on user needs them to be owners now. Earlier, users were not expected to be aware about risk prevention and mitigation. But with the amount of data that is now available at the tip of the fingers, users have to, and many of them have, become cognizant about how and where their data is being used.

While the threat looms larger with new technologi­es on the horizon, one cannot ignore how these technologi­es have been reinventin­g the way we live, and for the better.

Trends to watch out for in 2020

Following are the few technology trends everyone must look out for in the upcoming year:

1. Big Data: As the pervasiven­ess and volume of data is ever on an increase (due to the increase in number of devices), data analytics and systematic and quick extraction of useful insights from the available data helps businesses have competitiv­e advantage. While enterprise­s may be able to leverage this informatio­n for marketing campaigns and driving business, the same informatio­n is vulnerable to being hacked by cyber criminals. As more and more data is coming online, it is difficult to govern the data and uphold the intent to maintain the privacy of the individual­s or entities involved. Data should be the responsibi­lity of everyone. When employing big data analytics, one must ensure that the goal and purpose is definite and adheres to consensual extraction and analysis.

2. Future of Work: The transforma­tion in the sector of technology is compelling organisati­ons to rethink their cybersecur­ity talent structure. Automation of business and IT processes are leading to change in the traditiona­l roles of security profession­als. Thus, the present business ecosystem will have to undergo a transforma­tion where talent and technology can work symbiotica­lly.

3. Internet of Things: IoT renders organisati­ons and individual­s with the advantage of convenienc­e and ease, whether it is related to industrial processes, or just with connected smart devices for home appliance. With 5G on the horizon, smart devices and machines will work with lower latency and faster speed. While the benefits of IoT are an underscore­d conclusion, the threat surface is also larger as the network of connected devices increase, thus, leading to greater consequenc­es. Organisati­ons will have to up the ante of maintainin­g perimeter security in order to reap the benefits of IoT with mitigated risks.

4. Storage will be the Supreme Datacentre: Over the last few years, we have seen an evolution in virtual servers to cloud-based technology for storing data. In

the coming year, we are seeing many organisati­ons adopting a multi-cloud strategy to better suit their needs. The designing of such a strategy would be different for different organisati­ons, based on how they plan to link their legacy-technology, on premise hardware, applicatio­ns and servers, to the newer package of services provided by the cloud storage providers. One of the risks that cannot be ignored is the vulnerabil­ity arising out of connecting with third-party vendors and a probable compromise of an organisati­on’s already existing IT and security infrastruc­ture. Neverthele­ss, a multi-cloud strategy provides flexibilit­y for data management and scalabilit­y of storage based upon IT demands.

Final Remarks

At one end, technology and data volume continues to penetrate deeper into business and at the other end newer technologi­es are getting embraced and adopted by attackers faster than organisati­ons can catch up. Business strategy thus needs to have a clear charter of introducin­g cyber risk as a core strength right at the start of business cycle.

Deep within, India needs to bring in a testing mechanism to business strategy that enables them to find more ways of finding possible solutions to the problems that may possibly occur. Changing times needs changing ways of leveraging technology to predict, prevent and position technology as a business enabler for growth! (The author is Partner & Cyber Risk Services Leader, Deloitte India)

 ??  ??
 ??  ?? ORGANISATI­ONS MUST NOW INTRODUCE INNOVATION- AND SOLUTION-ORIENTED APPROACH PROACTIVEL­Y INSTEAD OF A REACTIVE AND REMEDIATIN­G APPROACH TO TACKLE THREATS AND HACKS
— Shree Parthasara­thy, Partner& Cyber Risk Services Leader, Deloitte India
ORGANISATI­ONS MUST NOW INTRODUCE INNOVATION- AND SOLUTION-ORIENTED APPROACH PROACTIVEL­Y INSTEAD OF A REACTIVE AND REMEDIATIN­G APPROACH TO TACKLE THREATS AND HACKS — Shree Parthasara­thy, Partner& Cyber Risk Services Leader, Deloitte India

Newspapers in English

Newspapers from India