The key components of an effective "zero trust" architecture include multifactor authentication, network segmentation and a defense-in-depth approach, says Dr. Erdal Ozkaya, regional CISO and managing director at Standard Chartered Bank in the United Arab Emirates.
Just as it's necessary to think about security before throwing yourself into the clouds when paragliding, the same holds true for large healthcare organizations migrating data to the cloud. Whether it's your first 'flight' in the clouds or you've been gliding for a while, there are security and compliance best...
Even before the pandemic set us on the road to a global recession, many banks were struggling to balance the polarising pressures of a changing world and keeping to business as usual.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans in place to ensure uninterrupted service, says Srilanka-based Sujit Christy, global CISO at John Keells Holdings.
To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec.
Security leaders in enterprise energy organizations face the challenge of assessing the efficiency of their cybersecurity program, planning proactive risk mitigation, and communicating their posture across all levels of the organization from the Board of Directors to auditors and asset owners.
Read this case study...
As an IT or OT security leader, you must be able to communicate cybersecurity compliance, risk posture, and Return on Security Investment (ROSI) to management. Hundreds of these security leaders have already made the transition to an integrated risk management approach to cyber program management, reconfiguring the...
The global nature of business and the presence and impact of cyber adversaries make it an organizational imperative to consistently re-assess the effectiveness of our security practices. Adopting best practices have become essential to consistently managing enterprise risk. Zero Trust offers security practitioners a...
The Insurance Authority of Hong Kong has issued cybersecurity guidelines - including data breach reporting requirements - with a compliance deadline of January 2020. What else is now required?
The National Internet Exchange of India, an autonomous body under the Ministry of Electronics and IT that maintains the .In registry and country code Top Level Domains, has switched to a new outsourcer for operations and maintenance. Some security experts are criticizing the move.
Dora Gomez of the Association of Certified Fraud Examiners discusses why security professionals should set up a framework to deal with changing regulations and threats.
Regulatory compliance and technology innovation are making security more complex, so organizations need to look beyond technical base measures for metrics, says SAI Global's Andrew Bissett.
Information security program development and maintenance continues to reside at the core of good response, incident management and overall information security program capability. In the current landscape, where the cyber threat consists largely of a growing and persistent threat of fraud and the potential for a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.