Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Transition from traditional security to advanced technologies: Rishi Rajpal, Concentrix

Yogesh Gupta | June 29, 2016
APT, DLP, NGFW are hyped for organization’s not updated with changing threat landscape and IT security team working in isolation without alignment to business, says Rishi Rajpal, Concentrix Corporation.

As a result, organizations of all sizes face challenges in maintaining control over network and security policies. Unfortunately, many organizations continue to take a traditional approach to network security in spite of changing technologies, business requirements, regulatory requirements, software, devices, and user habits. Such a traditional approach cannot adapt to the latest trends and leaves organizations vulnerable to today's threats.

The terms like APT, DLP, NextGen Firewall will only be considered Hyped for Organization's who are not keeping pace with changing landscape of threats and work in isolation as the "IT Security " department without alignment to business. As there is a famous saying "you can't manage what you don't measure" so to start realizing importance of these latest technologies we need start measuring and get visibility on some of the threat vectors not considered till date. 

We at Concentrix, are moving away from the traditional security mechanism to a more robust advanced technologies like Net Gen Firewall, DLP and APTs. We have to be careful when it comes to network security, especially when customer data and regulatory compliance are at risk.

What are the biggest challenges for CISO in fast changing tech world and how do you manage to overcome them?

As Cyber-attacks become increasingly sophisticated in engineering these attacks, CISOs face a daunting year ahead. As custodians of sensitive customer information and business value delivery, the CISOs should understand the importance of keeping data safe and secure.

For this, CISOs not only need have very good understanding of the latest technologies, changing threat landscape, but also able to communicate well within business in their language and the associated risks. CISOs need to understand and explain that security hits across business, people, process and technology.

Secondly, CISOs have to be more strategic than tactical. It involves not only leading the organization but also leading the change, change from technology, business and the regulatory requirements. CISOs need to anticipate and participate in the change and invest in the right people and technology. Continue to educate and spread the message that "Security is Non Negotiable". This is not really difficult in today scenario considering the media attention on data breaches.

What big security trends do you foresee in 2016?

Looking ahead to 2016, five security trends that may dominate will be as follows

1. Collaboration and Standardization of Privacy and Regulatory requirements: Last year, we saw many countries and industries bringing in new or enhancing the existing privacy and regulatory requirements. While this trend would continue, we would also see more countries and regulators across the world coming together for building a collaborative approach in privacy and regulatory requirement. This is really at nascent stage, but we would continue to see this maturing over a period of few years.


Previous Page  1  2  3  Next Page 

Sign up for Computerworld eNewsletters.