Type to SearchView Tags
Next-Gen Enterprise | Cybersecurity

Blog Category Listing

5 security threats you must be aware of in the hybrid workplace
16

May 06, 2021

5 security threats you must be aware of in the hybrid workplace

Rakshit Ghura Vice President & Global Head - Digital Workplace Services

The pandemic played a key role in forcing businesses to migrate their business application and infrastructure into cloud for building digital resilience. While the adoption of technology has been a boon, data touchpoints are now more spread out than...
Dynamic Cybersecurity: Constantly Evolving Cybersecurity for a Changing World
214
The World Economic Forum (WEF) estimates approximately USD 5.2 trillion in global value will be at risk from cyber-attacks by 2023. Organizations are therefore investing in cybersecurity measures more than ever before and the annual investments in...
Process Utility
100

Feb 05, 2021

Acing Third-Party Risk Management With Limited Resources

Manmohan Singh General Manager ,Cybersecurity & GRC

How a business manages its third-party relationships has a direct, sometimes even exponential, bearing on shareholder value in an organization, depending on the level of engagement and the type of services provided! And yet, despite the growing...
hybrid environment
166
Over the last few years, cloud adoption has become increasingly central to organizations undergoing a digital transformation. In fact, a recent Gartner report noted that cloud adoption is among the fastest-growing IT investments across industries....
Age of Remote Workplaces
151
With the recent vast increase in the need for remote workplaces and the resulting expansion of the potential attack field, it’s even more important to build your own Fort Knox to provide environment-wide security. Using the right tools in the right...
Five key websites
186

Jan 13, 2021

Five key websites that track known security vulnerabilities

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

Endpoint security has seen great advances over the years, from simple scans using signature technology to multi-layered protection and a slew of variations. Even with increasingly sophisticated solutions, it’s important to understand your...
Cloud
189
The article highlights the current trends in Financial Services and provides an insight on what could be the new focus areas for Financial Services across the globe going forward in 2021.
Network Protection
131

Dec 11, 2020

Should Network Protection Focus on Security or Availability?

Josh Wickern Network Security Practice Lead and Technical Architect

Virtually all organizations understand that network security policies are essential if they want to protect their lifeline— the network. When creating network cybersecurity policies, organizations lean in one of two directions— security-focused or...
Fraudsters at the door
111

Dec 09, 2020

Going Digital while stopping Fraudsters at the door

Joe Joseph Head of Risk and Compliance practice

Account opening is a critical process in a Financial Institution (FI), where verifying the identity of potential customers is a regulatory KYC mandate. While lapses in this process may result in large fraud related financial losses, it could also be...
first global pandemic
4,081

Mar 27, 2020

As “WFH-20” goes viral, how do you fend off new cyber security threats?

Maninder Singh Corporate Vice President, CyberSecurity & GRC

With the breakout of the first Global Pandemic in a hundred years we will see many ideas of 21st century which society has been toying with for over two decades bubble to the top. These will include a greater emphasis on dietary changes, lowering...
 IT Integration in M&A
289

Nov 25, 2020

Critical Success Factors for IT Integration in M&A

Fatih Bezirganoglu Director - Strategic Engagements, Europe

In-house IT teams can sometimes be parochial and too closely associated with the internal processes, systems, and it can be an arduous task to analyze the IT needs of the merged entity and most of the times organizations need an outside-in point of...
User security awareness training
1,236
What an attacker is looking to exploit in a phishing attack is a lack of user knowledge, which makes user awareness the most important step in preventing such breaches. The key component of a successful phishing attack is user interaction. A user...
Business and IT Leaders
7,760
Is your security “dynamic” enough? Is your business confident in the ability of its cybersecurity systems to offer protection against the global outbreak? Are your customers convinced that their confidential and personal data is secure with you? Are...
GRC
629
Today, in the second decade of the twenty-first century, enterprise leaders are confronted by regulatory and economic volatility on a scale that has not been experienced in generations. Accelerated by disruptive innovations, GRC challenges are...
GRC
700
While the Nordic organizations have always been attentive to evolving their risk and compliance regulations, they’ve faced several challenges while trying to effectively implement their GRC measures. These organizations still struggle with a 360-...
Risk Management
1,041
Blockchain is rapidly developing into maturity. Three core features—autonomy, immutability, and transparency —drive the technology’s ability to disrupt business models across industries. Five IT risk sub-disciplines of significant interest when...
5 security threats you must be aware of in the hybrid workplace
16

May 06, 2021

5 security threats you must be aware of in the hybrid workplace

Rakshit Ghura Vice President & Global Head - Digital Workplace Services

The pandemic played a key role in forcing businesses to migrate their business application and infrastructure into cloud for building digital resilience. While the adoption of technology has been a boon, data touchpoints are now more spread out than...
Cloud
189
The article highlights the current trends in Financial Services and provides an insight on what could be the new focus areas for Financial Services across the globe going forward in 2021.

5 security threats you must be aware of in the hybrid workplace
Rakshit Ghura - Vice President & Global Head - Digital Workplace Services | May 6, 2021
16 Views

The pandemic played a key role in forcing businesses to migrate their business application and infrastructure into cloud for building digital resilience. While the adoption of technology has been a boon, data touchpoints are now more spread out than before which has unintentionally increased possibilities of cyberattacks and created security gaps for the hackers. This shift between the workplace and home office poses certain security risks to both employees and the organizations - how do we ensure that the new model of hybrid workplace is secure?


Dynamic Cybersecurity: Constantly Evolving Cybersecurity for a Changing World
Sanjeev Mehrotra - Senior Vice President & Global Delivery Head - CyberSecurity & GRC Services | March 23, 2021
214 Views

The World Economic Forum (WEF) estimates approximately USD 5.2 trillion in global value will be at risk from cyber-attacks by 2023. Organizations are therefore investing in cybersecurity measures more than ever before and the annual investments in cybersecurity will reach USD 186 billion by 2024, according to Gartner.


Acing Third-Party Risk Management With Limited Resources
Manmohan Singh - General Manager ,Cybersecurity & GRC | February 5, 2021
100 Views

How a business manages its third-party relationships has a direct, sometimes even exponential, bearing on shareholder value in an organization, depending on the level of engagement and the type of services provided! And yet, despite the growing complexity and the ever-evolving nature of threats within the enterprise, only a handful of companies invest adequately in the vendor risk management function. While the risk function needs to mature across the global business ecosystem, the digitization of risk is causing a significant shift in Third-Party Risk Management (TPRM) models.