Security operations centers must scale up to better detect cyberthreats early. New research on "breakout time" reveals strategies on how you can use the 1-10-60 Rule to benchmark your organization in responding to adversary's activities before it results in a full-blown breach.
What is breakout time? It's the time it...
Complying with regulations and standards, including GDPR, PCI DSS, the RBI Gopala Krishna Committee report and the UIDAI's Aadhaar biometric, has increased the need for stringent data protection measures. India's upcoming data privacy bill will further mandate all organizations to safeguard sensitive data.
Many...
Cloud adoption has created challenges for enterprises, including third-party risks, breaches caused by cloud misconfigurations, excessive permissions to access data, lack of effective methods and many more.
Traditional enterprise cloud architectures have paved the way for hybrid enterprise architectures, which have...
How can banks leverage artificial intelligence and machine learning to drive innovation while ensuring that the project is secure and would not make the data vulnerable? How important is it to take a structured approach in implementing "security by design" for conducting proper risk assessments of the organizations...
As quantum computers come into the forefront, they pose immense risks. So the time to change our data security paradigms is now. In this session, learn why Quantum Key Distribution is the technological solution - a "black swan" - to ensure data remains agile, quantum-safe and unconditionally secure.
This session features a dialogue among a CISO, a CIO and a CTO on the challenges they face in executing large projects where security becomes a business enabler. How can the security team navigate and negotiate to gain buy-in from senior executives in all departments? This panel will address the cross-functional...
Nation-state attacks often have close links to the military intelligence or state control apparatus with a high degree of technical expertise. India is fighting off an array of disruptive attacks that include advanced malware, sophisticated distributed denial-of-service attacks and nation-state actors targeting DNS...
About 50 banks in India have cyber insurance policies to cover breach response costs, risk mitigation services, notification, forensic services, public relations, crisis management and any customer loss which can be quantified, as well as third-party risk exposure and other specialty services, such as hiring an...
Digital transformation to the cloud has resulted in increased dependency on third-party vendors to manage security tasks. This means managing the security risks involved is becoming a bigger challenge. Many organizations still have a long way to go in strengthening governance when it comes to vendor management as they...
India's regulatory bodies are insisting that transactional data be stored domestically to help prevent breaches and to have better data protection mechanisms in place. The move could help fast-track cybercriminal investigations. But will data localization lead to improved data security or will it result in major...
Organizations that are relatively well-resourced and committed to cybersecurity stand to benefit from cybersecurity audits.
Cybersecurity audits provide an additional layer of assurance that an organization is safeguarding the data that has become increasingly essential in driving and transforming virtually every...
According to the 2019 Cyberthreat Defense Report, nearly eight out of 10 organizations were victims of at least one successful cyberattack in 2018.
While corporate strategies around digital transformation are driving measurable business outcomes, they are - at the same time - creating new security risks through the...
Many high-profile breaches have grabbed headlines this year, including those at Wipro, Toyota and Capital One. What lessons can CISOs learn from this year's big breaches as they develop risk mitigation strategies for 2020?
This session addresses:
Top priorities for CISOs next year;
Important lessons to be learned...
Creating effective strategies for securing digital India's assets is challenging. For example, the growth of the cashless economy and increase in digital transactions have made consumers' data more vulnerable to cyberattacks, creating a more urgent need to protect digital assets.
This session discusses:
The...
Digitization across sectors has led to data proliferation, and organizations are struggling to handle the sheer volume of data. The abundance of valuable information has captured the attention of subversive elements, while cybercriminals have breached networks and compromised billions of records, not only causing...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.