pritha's Posts (581)

Sort by

Supply chain attacks have become a growing trend in the security world. Attackers are exploiting the trust users have in acclaimed software companies to implant malware into systems. It often results in mass-scale outreach attacks and goes undetected for long periods of time. This talk will uncover the current trends, unique insights from industry experts, understand how to build a reference architecture stack and the regulatory requirements.  

Contributors

  • Anthony Ng, VP Systems Engineering, APAC
  • Bikash Barai, Co-founder CISO Platform & FireCompass,
  • Agnidipta Sarkar CISO Biocon,
  • Rejo Thomas CISO Exide Life Insurance,
  • Prasenjit Das CISO TCS,
  • Sudarshan Singh CISO Capgemini
  • A V S Prabhakar Chief Risk & Compliant Officer Zeta

 

Key Points Of Discussion:

  • Current Trends
  • Unique insight from the trenches and industry expert
  • Responding and recovering techniques
  • Building a reference architecture stack
  • What are the asks from regulators

 

(Panel Discussion) Recorded

 

 

Discussion Highlights

  • Current Trends
  • Unique insight from the trenches and industry expert
  • Responding and recovering techniques
  • Building a reference architecture stack
  • Have complete visibility on your supply chain ( inventory, criticality, dependencies )
  • Reduce the attack surface ( narrow the supply chain)
  • Integrate with your own enterprise risk mgmt. framework
  • Integrate (to the level feasible) with Enterprise IT security architecture (IAM , SOC, Encryption etc)
  • Execute due diligence on your supplier ( enhance the assessment from survey based questionnaire to  3rd part audit report , PT , external cybersecurity benchmarking scorecard  etc)
  • Ensure segregation in case of Supplier being multi-tenant
  • In case of cyber event , isolate /quarantine your company quickly  ( know the  “kill Switch”)
  • Have capability to scan and assess IOC/IOA in your network  ( very relevant for Ransomware)
  • Keep communication  template ready for your stakeholders ( Mgmt , Operations, IT , Customers, Regulators)

P.S. Discussion Summary was contributed by Sudarshan Singh (CISO, Capgemini)

 

 

(Fireside Chat) Recorded

Read more…

9430611298?profile=RESIZE_710x

 

Key Takeaways (Summary by Anton Chuvakin):

  • SOC is first a TEAM. Next a PROCESS. And it uses TECHNOLOGY too, but ultimately people and process defines SOC success
  • Key challenges in building a modern SOC include (1) gaining visibility with the expanding attack surface (2) managing alerts and volumes of data (3) retaining an engaged and loyal staff, keeping them productive and engaged
  • Engineers who create alerts should be the same or in lock step with those who respond to alerts. Reduce the amount of friction between people who do those tasks today in your SOC.
  • As you build a modern and hybrid SOC, there are parts of a SOC that do and don’t outsource well.

 

1.Contributors (Security Heads Of Organizations)

  • Anton Chuvakin, Google Cloud
  • Rajesh Thapar, Axis Bank
  • Vishal Salvi, Infosys
  • Durga Dube, Reliance
  • Harshad Mengle, Future Group
  • Imran Mohd., L&T Financial Service
  • Satyajit, Indusind Bank
  • Vikas Kapoor, Vodafone
  • Vikas Yadav, Nykaa
  • Sanjay Suri, Nykaa
  • Nitin Gaur, Omega Healthcare
  • Sanil Anand, SLK Global
  • Vishwas Pitre, Zensar
  • Maya Agarwal, Google Cloud
  • Bikash Barai, CISO Platform, FireCompass

 

2.Challenges of Modern SOC

  • Visibility of all assets
  • People and skill availability
  • Maintaining continuous updation of Tech Stack
  • Getting right insights from huge volume of incident events
  • Assurance to management
  • False positive
  • Scaling response handling
  • Dashboards
  • People harder to hire at scale of event incident log
  • Attack surface grows faster than people can be hired
  • Increased signals and alerts
  • Integration and dependency on environment (AWS, Azure)
  • Management’s education and awareness on SOC impact
  • Optimising expense on SOC

 

3. Critical Capabilities /SOC Tool Essentials

  • Use AI to automate SOC Analyst L1 level job
  • Improve threat visibility
  • Have great talent pool
  • Standardised dashboard for management

 

4.Questions To Choose Right SOC Partner

  • How do you onboard clients ?
  • What AI have you used to reduce reliance on human resources ?
  • How did you handle a breach (past) ?
  • How many customers & segregation (industry, geography) ?
  • What is the wallet share of services consumed ?
  • Have you been able to successfully replace previous SOC ?
  • What is the relative importance of people over processes in your organization ? (Hint: Great people should be more important)

 

 

9430639856?profile=RESIZE_710x 

Read more…

9380349677?profile=RESIZE_1200x

 

I wanted to personally invite you to join us today with Ryan Benson (Ex-Gartner Analyst) and Bikash Barai (Co-founder, FireCompass & CISO Platform). They will be discussing the "New Trends From Gartner Hype Cycle, 2021 That A CISO Must Know". Date & Time: 4th August, Wednesday, 11 AM - 12 PM (ET)

Gartner Hype Cycle is the most important analyst document which helps to find out the key trends in our Industry. The acceleration in digital transformation has brought about new threats. In the 2021 Hype Cycle for Security Operations, Gartner analyzes 21 profiles and points out that alongside a focus on detection and response, a continuous assessment and exposure-based approach is emerging in the Industry.

In this session, Ryan Benson (Ex Gartner Analyst, Director @ Stratascale) & Bikash Barai (Co-founder FireCompass & CISO Platform) will analyze the Gartner Hype Cycle 2021 and share their key insights. (CISO Platform Member Benefit) Join the webinar and get a complimentary copy of Gartner Hype Cycle For security operations, 2021

 

Key Points Of Discussion

  • Which are the new technologies/trends in Gartner Hype Cycle - 2021?
  • How to use insights from Gartner Hype Cycle for your security strategy
  • Understating the future and emerging new shifts in security landscape

 

Register Here : https://lnkd.in/dy9w2VBs

Read more…

Over The Last 12-18 Months, the way we run our business and manage our teams has Changed. Our data, applications, users are everywhere. We are more reliant on The Cloud than ever before. As a result, many security leaders globally are turning to zero trust, as protecting the scattered ecosystem requires a correlation of real-time security context across all security domains.

Why has zero trust become a huge cyber priority now?
How to align zero trust to business initiatives?
Can zero trust help address internal threats, especially with employees working remotely?
How do I enable zero trust across complex, hybrid cloud environments?
How do I leverage zero trust to ensure data privacy?
How to get started with zero trust?

 

About Speaker

Shivaswaroop NS, Consulting and Delivery Lead - Security Services, IBM India

Ketan Solanki, Security Architect, Infrastructure and Endpoint Services, IBM India

 

Webinar (Recorded)

Read more…