"1) District wise, state wise, Seismic zone wise employee population analysis is important.
2) Historical Situations arising due to power issues, internet issues, natural calamities and political issues to be collected and impact analysis to be done…"
"Hello wonderful team, I would like to nominate myself - https://www.linkedin.com/in/shamane/
Shamane Tan, Chief Growth Officer, Author and TEDx Speaker:
Shamane Tan works with C-Suite and executives on managing cyber risk as part of their business…"
"VKYC completely revolves on Confidentiality, Integrity, Availability & Authorisation.
How you capture the date and store the date - device security
Can it be tamper proof ?
Have Audit Controls for data movement
How the process undergoes multiple…"
"10% of what? Workforce of what? Maturity of what? A fundamental issue is that since "cybersecurity" has come into vogue as its own creation different than "information security" - as defined by NIST CSF and regulatory bodies (such as NY DFS),…"
"I agree with Mr.Anoop. We use the Mac binding for all the devices for any network connectivity and allowing any resources including hardware, software, information assets accesses after due authentication."
"After the detection of vulnerabilities in Zoom, presently we have restricted usage to:
1) Meetings on non-critical issues
2) General Staff interactions
3) Education & Training Sessions
until they come out with secure solutions.
We do not conduct any…"
"Interesting thoughts Anton. Securing the organization's data is (and must be) the key aspect of an organization's security policy. This coupled with business continuity & uptime ('data and systems availability') considerations should form the core…"
"what I have done is profiled assets which are stationed, introduced Network Admission control technology, profiled all assets owned by the company, registered them with their mac addresses, exceptions are listed. So any machines connecting the…"