Compliance

Security is a machine-to-machine war; not human-to-machine anymore: Bharath Kalyanram, Oracle

It is a VUCA world. Amidst the clutter, it is hard to tell which is real threat and which is just noise. This is the battle of machine to machine; it can’t be done human to machine anymore.

CISOs must invest in an effective GRC tool over anything else: Shubhagata Kumar

Shubhagata Kumar, Additional Director General and CISO, CBIC talks about what constitutes a robust security framework.

Partner Content
How to Maximize your ROI on Aadhaar Data Vault

With GDPR in play, there has been a total rehaul in the way organizations now store, process and protect their customers’ personal data.

Ruby Mishra

Ruby Mishra led the implementation of an effective data security policy at KPMG India.

 

Pragnesh Mistry

For RPG Group, Pragnesh Mistry setup an ISO 27001 framework based on which the availability of business-critical data to authorized users, communication link availability, and necessary controls were built through single service provider. 
 

Satish K Sharma

Satish K Sharma led a team of experts to carry out a detailed gap analysis against ISO-27001:2013 guidelines to attain high security levels. 
 

Karthik Shankar

At RRD, Karthik Shankar led a cross-functional team in order to comply with data protection regulations. The team was responsible for delivering an action plan based on the data privacy principles. 

Shailendra Upadhyay

Shailendra Upadhyay has been in-charge of the implementation of SaaS (security-as-a-service) to identify any incident reported on the internet at any given point of time. He also helped deploy a centralized patch management solution that assists in managing all OS patches automatically. 

Meetali Sharma

Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings. 

Milind Nanal

At Volkswagen India, Milind Nanal performed implementation of redundant appliances threat prevention subscription in order to replace the installed perimeter firewall. A separate firewall was established for internal segmentation and production network. This led to cost benefits and freed up significant bandwidth for the organization.

Jagdeep Singh

At Rakuten India, Jagdeep Singh set up cyber security function to cater to in-house 24*7 security monitoring and incident response needs.
 

Nitin Gaur

Nitin Gaur implemented an advanced software and technology framework to enable tight security controls at Omega Healthcare Management Services.