Sharat AIRANI's Blog (8)

A CISO AND the cost of a data

The 2012 Cost of Data Breach Study conducted provides some valuable information about the average cost of an enterprise data breach. The study, released in March’13, also recognized that organizations with a chief information security officer (CISO) in place experienced reduced costs for data breaches, which is right on target from my experience.

I am right in suspecting that an organization without a CISO is more prone to a security fault.

The role of a…


Added by Sharat AIRANI on August 22, 2013 at 4:30pm — No Comments

CISO and the business

I have seen many blogs, articles and most of them stated as, CISO need the ability to adopt the business. The role of the CISO in any organisation is to protect the business and bring the operations under secured mode, under the policy defined, governance so on and so forth. So obviously he has to aware of the business, competition and more than that the risk to the organisation and compliance matter.

Here I am putting this in other side of the context. Does business also need to…


Added by Sharat AIRANI on August 1, 2013 at 2:30pm — No Comments

CISO – You need to speak NOW..

If you start off blowing the whistle too quickly, too early on — and believe me, early in my career, I did — I didn't make any friends, didn't get any further with the program of work I was trying to do.

 You are going to discover some very, very ugly things. The secret that I have personally found is when you find the ugly stuff, don't go trumpet it to everybody and say, 'Hey, I've found all these flaws’.

 Instead, what you need to do is to sit with the IT operations staff,…


Added by Sharat AIRANI on July 12, 2013 at 1:00pm — No Comments

Information Lock-in vs Sharing

On 2nd July 2013, National Cyber Security Poilicy has been released. First point in the preamble is an eye opener. It says " Cyberspace is a complex environment consisting of interactions between people, software and services supported by worldwide distribution of information and communication technology (ICT) devices and networks".

Enterprise information security is more than just protecting against viruses. The collaborative and diverse nature of modern business means that…


Added by Sharat AIRANI on July 5, 2013 at 5:00pm — No Comments

How much Secure is Safe?

Regardless of how safe and secure any organisation may think its IT infrastructure is, they realize that they are still not immune to information security threats. In addition to deploying the right tools and technology, organisations globally needs to develop a robust and competent workforce equipped with the necessary skills to adequately defend its IT infrastructures. These cyber defenders need not just basic trained to sufficiently defend against mounting security threats, more than…


Added by Sharat AIRANI on June 26, 2013 at 8:00pm — No Comments

Proactive Security Management - “The next BIG focus“

IT Trends and challenges:

World is becoming Instrumental, Interconnected and Intelligent. IT security teams in enterprises are faced with rapidly mutating threats at every possible point of entry. This is fuelled by the fast evolution of threat landscape and sea of changes in network and security architecture.

  • Changing network paradigm
  • Network has taken center stage – Wired or wire-free
  • Excitement starts from data center
  • BIG data – A true…

Added by Sharat AIRANI on June 16, 2013 at 5:00pm — No Comments

Future Proofing – Protecting the “IT” arena

IT arena is like a security battle ground, where internet is fundamentally open considering the major far-ends like social media, mobility, cloud, virtualisation etc which leads to targeted attacks.

On any given day; any organisation can suffer irreparable harm at the hands of cyber- attackers. No organisation is too small or too big for this.

Unfortunately this battle field is not symmetric. The attackers have the clear advantage. Defenders have to protect a wide perimeter…


Added by Sharat AIRANI on April 12, 2013 at 8:00pm — No Comments

Changing Landscape of IT Security. How should a CISO prepare for the battle?

We have developed the myth that technology can be an effective fortress – We can have security.

Traditional focus on:

  • Better Firewalls
  • Boundary Intrusion Detection
  • Critical Offsite Capacity…

Added by Sharat AIRANI on February 13, 2013 at 5:00pm — 4 Comments

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service