Retired Lt. Gen. Rajesh Pant, national cybersecurity coordinator for the Government of India, says the six-hour cybersecurity incident reporting requirementis necessary because it will help protect all enterprises from cyberattacks. He discusses India's cybersecurity strategy.
The world's deep dependence on technology has become its greatest vulnerability, says retired Lt. Gen. Prakash Menon, of Takshashila Institution in Bengaluru. He discusses how technology begets technology, the ongoing cycle in cybersecurity and his view of the six-hour breach reporting mandate.
Pooja Agrawalla says young people trying to enter the cybersecurity field should pursue fundamental skills instead of certifications. The global head of identity and access management at NXP Semiconductors also discusses her career challenges and how learning something every day keeps her going.
The biggest challenge facing security leaders is using security to enable business, says Agnidipta Sarkar, group CISO of Biocon. In the pharmaceutical industry, the business includes research, development, manufacturing, distribution and sales. He shares the areas to focus on for digital safety.
When choosing cyber insurance, follow the checklist of cybersecurity requirements the prospective insurer provides, but go beyond it to lower your premiums and avoid a "nasty surprise," says Jacxine Fernandez, vice president of IT at Bangalore International Airport Ltd.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
Three ISMG editors discuss important cybersecurity issues, including the sharp rise in Maui ransomware attacks, how the FBI seized cryptocurrency ransom payments worth $500,000 from North Korean attackers and advice for CISOs navigating the great zero trust debate.
Harish Sekar, senior technical evangelist & head of business development, ManageEngine, discusses the ways in which a CISO's job can be a "nightmare," offers tips on how to manage the "how" as well as the "what" of zero trust and handle product sprawl, and weighs in on the importance of false positives.
Satyavathi Divadari's passion for continuous learning has helped the chair of the Cloud Security Alliance to grow her career in cybersecurity. Divadari discusses the advantage of working in multiple industries, her devotion to including women in cybersecurity and some of her career highlights.
To be cyber resilient, an organization needs visibility across the entire infrastructure landscape, says Venugopal Arcot, senior director and head of solution consulting at ServiceNow. He discusses including the board in security conversations and integrating enterprise data in one location.
The best protection against a ransomware attack is a very good backup policy, says Krishna Sastry Pendyala, partner, cybersecurity, at Ernst & Young. He discusses ransomware trends in Asia, how CISOs view the question of whether to pay a ransom, and where cyber insurance fits in.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
With dozens of cybersecurity vendors offering solutions, today's zero trust debate is not about whether to do it but rather how to implement it. Some argue that firewalls and VPNs are dead while others caution against cobbling together new solutions. Experts advise to start small - but start now.
As the world embraces renewables and green energy, is the energy sector properly learning from past cybersecurity mistakes? Rafael Narezzi, CTO of CF Partners, discusses current industrial cybersecurity shortcomings and the need for the industry to take a more mature and proactive approach.
Venable's Grant Schneider and Jeremy Grant and ISMG editors discuss progress at the U.S. federal level in developing legislation for digital identity, the significance of an 18% increase in funding for CISA in fiscal year 2023 and the challenges of expanding the use of software bills of materials.