Video

How Companies Can Secure Supply Chain Amid Surge in Attacks

Sunari Dandeniya, CISO, Commercial Bank of Ceylon Sri Lanka, on Minimizing Supply Chain Attacks
Sunari Dandeniya, CISO, Commercial Bank of Ceylon PLC, Sri Lanka

Cybercriminals are increasingly targeting software supply chains to carry out data breaches, causing organizations to remain vigilant. However, according to Sunari Dandeniya, CISO of Commercial Bank of Ceylon, simply extending existing risk management efforts is insufficient. Instead, she emphasizes the need for actively monitoring inventory and conducting regular risk assessments, particularly when granting access.

See Also: Unlocking Seamless SD-WAN Deployments

According to Gartner, by 2025, at least 45% of organizations globally will have experienced attacks on their software supply chain, a three-fold increase from 2021. "Continuous assessment of inventory and risks can be the key to managing supplier risks," Dandeniya says.

Companies often focus on supply chain risks only during onboarding and while implementing standard due diligence, neglecting information security risks. To effectively manage supplier risks, she recommends implementing proper checks and balances on information security from the outset and following up with continuous risk assessments.

In this video interview with Information Security Media Group, Dandeniya discusses:

  • Top cyberthreats;
  • Managing supply chain attacks;
  • Technologies in focus.

Dandeniya has nearly 20 years of experience in the information security space. In her role at Commercial Bank of Ceylon, she is responsible for the bank's IT and operational risk management. Her focus areas include information security, audit and risk management.


About the Author

Shipra Malhotra

Shipra Malhotra

Managing Editor, ISMG

Malhotra has more than two decades of experience in technology journalism and public relations. She writes about enterprise technology and security-related issues and has worked at Biztech2.com, Dataquest and The Indian Express.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.