Malhotra has more than two decades of experience in technology journalism and public relations. She writes about enterprise technology and security-related issues and has worked at Biztech2.com, Dataquest and The Indian Express.
Enterprises are grappling with constantly changing technologies and new stakeholders, making it hard for security teams to achieve both cyber maturity and long-term sustainability. Standardization plays a critical role in cyber resilience, said Sunil Varkey, former CISO of Wipro and Idea Cellular.
Flipkart embraced a comprehensive security maturity program that incorporated defense-in-depth, automation, zero trust and secure SDLC/security-by-design principles across its four subsidiaries. Flipkart's Raakesh Thayyil discussed the importance of a cohesive strategy.
Flipkart Group companies achieved a uniform SOC implementation by adopting a single data ingestion point. This simplifies integration, log parsing and normalization challenges with two SaaS-based SIEM tools, minimizing device and data source modifications.
Securing distributed and hybrid workforces is challenging traditional cybersecurity paradigms. Integrating zero trust with secure access service edge, SASE, in a unified platform addresses the threats associated with the need for flexibility and a data-anywhere environment.
Developing a cyber resilience playbook is a continuous process that demands constant enhancement, rather than a one-time input. By beginning with targeted action items and progressively expanding upon them, organizations can make every conceivable recovery scenario more manageable.
Gaurav Gupta from MeiTY, India, recommends that CIOs and CISOs should initiate their digital forensics readiness journey in advance by training first responder employees to prevent any evidence contamination. Gupta emphasized that data created will always remain.
The successful implementation of a zero trust strategy requires a comprehensive vision that combines simplicity, visibility and practicality. By taking a phased approach and aligning it with a unified goal and vision, organizations can establish a robust foundation for zero trust adoption.
Studies indicate that on average most enterprises use 25 to 49 security tools sourced from up to 10 different vendors. To make this environment easier to manage, CISOs should adopt an integrated approach driven by consolidation and automation, says Microsoft's Terence Gomes.