Maybe not, says Twitter’s former CISO, but there are risks with Facebook's move from a centralized to a distributed security model in the wake of Alex Stamos's departure.
Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.
The sensitivity towards cyber-crime is increasing. VCs are backing those startups that arrived early in the cyber-security space. In India, this industry vertical is still nascent, with around 50 security product startups.
From CIoTO to automation architect, new IT roles are rising to fill emerging needs. Some may fizzle, but others may have a long future thanks to underlying IT trends.
Businesses, in their haste to move to the cloud, often fall for untested cloud architecture, or even an unproven cloud service provider (CSP) – often failing to make sure the CSP’s capabilities fit their own business strategy needs.
At NSE IT, Chinmay Shrikant Pradhan led implementation of advanced cybersecurity offerings, covering a range of technologies to validate data across applications and processes, along with media management.
Debojit Maitra introduced all level protection Aditya Birla Fashion and Retail. He has implemented various security measures such as datacenter protection, servers and application protection, implemented Machine Learning and Deep Learning in perimeter and gateway level network, adequate measures in web & email security, BYOD device and end point protection and detection that would protect their digital systems from malicious Intruders of all sorts.
Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.