Let’s take a look at some of the key moments.
One of the key objectives of cybersecurity investments is to avoid getting breached, said Sudhir Balakesavan, Country Business Director (India), Safe Security. “Besides vulnerability, loss of visibility is also a concern for the CISOs. Hence checking real-time visibility, intelligent prioritization, consistent communication, and articulation of RoI are extremely important before investing in any solution.”
Anthony Smyth, Sr. Director Solution Architects- International, Armis, also agrees that asset visibility and control is a growing problem. Hence, manage, secure, automate, orchestrate, and detect vulnerabilities, he advised CISOs.
Baljot Bhatia, Regional Sales Director, Orca Security said, “Less than 50% of cloud assets are covered by host security solutions. Identify, address, and prioritize all the cloud risks.”
“Budgets are under pressure, but the threats keep coming. It’s time to fight back with technology,” said Diwakar Dayal, Managing Director, SentinelOne.
Fireside Chat: Integrating cloud strategy with cyber resilience
“Cloud-first is good but policy and security should be put in each layer. Getting due diligence and basic hygiene in place is extremely critical.”
– Venkatesh Subramaniam, Group CISO & Privacy Head, Olam Technology & Business Services
“Despite the cloud making so many advances, change happens slowly in government.”
– Vijay Devnath, CISO, Center for Railway Information Systems
“Flexible, and simplified solutions are good for quick adoption. Always consider the 3Ps while designing security strategy – Product, people, and processes.”
– Nikhil Singh, Director Sales, F5
Mark Simmons, Global Director GSI, XM Cyber explained how seeing attacks before they happen can help in securing enterprises’ critical assets.
Navin Mehra, Leader- Security Business India, Cisco spoke on the importance of building resilient enterprises. “It’s quite crucial for the enterprise today to have the ability to protect the integrity of every aspect of the business so it can withstand, not just survive unpredictable threats and emerge stronger,” he said.
Protecting sensitive data is another critical aspect of cybersecurity in today’s fast-evolving digital landscape. This is why no discussion on cybersecurity is complete with any mention of and data privacy in it.
Join us for a captivating panel discussion on: Decoding India’s data privacy law 2.0 with insightful experts sharin… https://t.co/l8TmRYRouh
— ET CISO (@ET_CISO) 1679148203000
Panel Discussion: Emerging operating models and tech in cyber horizon
“Ensure protection of crown jewels. Identify them and start creating policies to protect them.”
-Mukesh Kumar, VP-IT, Byju
“3 things are important for SoC: Visibility, applying uniform policies and exercising the right amount of governance. Right SoC is one with complementing products.”
-Archit Rajesh, CISO, Teamlease
“Correlate information from various sources and make sense of the elusive data. It gives visibility into risks.”
-Aayush Ghosh Choudhury, Co-Founder & CEO, Scrut Automation
“Having visibility by assessing who has access to what and controlling, we are able to narrow down where to get governance in the organization.”
-Dilip George, Managing Director– India and SAARC, Quest