Interview

A cognitive SOC can help determine threats which are applicable to you: Vaidyanathan Iyer, IBM India/South Asia

The man spearheading IBM’s security business in India and South Asia, Vaidyanathan Iyer, believes a strong incident response and business continuity plan is imperative in today's threat environment.

Adopt a ‘trust, but verify’ approach for a zero trust security environment: Edgar Dias, F5 Networks

With enterprises using digital platforms to engage better with customers, opening digital assets to potential and new customers creates a whole new bunch of security challenges. Edgar Dias, MD, India at F5 Networks, tells us how CSOs can brace for the challenge ahead.

Automated threat intelligence is a valuable tool against attack vectors: Rajesh Maurya, Fortinet

Automated, actionable threat intelligence shared at speed and scale shrinks the necessary windows of detection. It is able to trace and intervene against attack workflows that move between network ecosystems and provides the automated remediation required for today’s multi-vector exploits, says Rajesh Maurya, Regional Vice President, India & SAARC at Fortinet.

Security and business are intertwined: Prasad Mandava, Akamai India

According to Prasad Mandava, Managing Director & VP of Engineering-India at Akamai Technologies, business risk and security risk are inherently proportional to each other today and can’t exist independently of one another.

AI, AR and blockchain are disrupting the cybersecurity landscape: Shrenik Bhayani, Kaspersky Labs

Shrenik Bhayani, General Manager-South Asia at Kaspersky Labs talks about the technologies and challenges that are disrupting the cybersecurity landscape. Bhayani also lists out tips for CSOs to stay ahead of attackers.

Enterprises should invest in people and build cyber threat-hunting practices: Shrikant Shitole, FireEye

Cybersecurity in the new age enterprise doesn’t end at merely preventing attacks. CISOs need to be able to predict the time of an attack, who is behind the attack, and what is the motive of the attacker. Shrikant Shitole, Senior Director & Country Head for India at FireEye believes AI and automated threat intelligence are key to finding these answers.

Businesses must focus on digital risk management : Rajnish Gupta, RSA

Digital risk is a new form of risk and is larger than the security or cyber risks we faced earlier, says Rajnish Gupta, Regional Director–India & SAARC, RSA (A Dell Technologies Company)

Critical enterprise and govt data will be the new oil: Surendra Singh, Forcepoint

The time has come for shifting the paradigm from protecting infrastructure to understanding the behavior of users, says Surendra Singh, Senior Director and Country Manager at Forcepoint. 

CSOs must develop a training program focused on advanced threats: Nilesh Jain, Trend Micro

According to Nilesh Jain, Vice President, South East Asia and India at Trend Micro, creating awareness of the latest attack methods, and educating executives and privileged users will reduce the chances of attacks. 

Next big wave of innovation in cybersecurity solution is ML and AI: Venkat Krishnapur, McAfee India

If we were to summarize data breaches and infiltrations, the key causes usually are the 4 P’s: People, phishing, passwords and patching, says Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India. 

Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point

Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats, says Bhaskar Bakthavatsalu, Managing Director, India & SAARC at Check Point Software. 
 

Big data analytics, AI and blockchain can help reclaim surrendered ground: Anil Bhasin, Palo Alto Networks 

We generally assume that all threats are ‘information stealing’ in nature. But that has changed, and the threats have become multi-faceted, points out Anil Bhasin, regional vice president, India & SAARC, Palo Alto Networks.