Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point

Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats, says Bhaskar Bakthavatsalu, Managing Director, India & SAARC at Check Point Software. 
 

Bhaskar-Bakthavatsalu-Check-Point-300X225.jpg

In an exclusive interaction with CSO India, Bhaskar Bakthavatsalu, Managing Director, India and SAARC at Check Point Software speaks on the latest cybersecurity trends and what organizations can do to prevent advanced zero-day attacks. 

Edited excerpts:

What are the three biggest security challenges?

In the wake of growing incidences of cybersecurity threats, enterprises need to be prepared more than before. Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats. Mentioned below are some of the biggest challenges that can be encountered in 2019:

The Next-Gen cyber-attacks: The next generation of cyber-attacks is termed as Gen V attacks - large scale attacks that can move fast across cloud, mobile and on premise networks and have impacted organizations much harder than in previous years. However, growing cybersecurity complexity and lack of cooperation between solutions is one of the many causes for the current failure on the cybersecurity front.

Lack of trained experts: With cybersecurity professionals in short supply, it is even more difficult to find skilled and experienced professionals with the knowledge and experience to manage the solutions for evolved cyber risks effectively.

... Organizations do realize that standard security solutions are not strong enough to protect devices and networks in workplaces, and they must detect new and advanced malware and vulnerabilities in networks, operations systems and apps.
Bhaskar Bakthavatsalu
Managing Director, India and SAARC at Check Point

Cloud adoption on the rise: The rapid growth in IoT devices and cloud adoption, managing IoT security and compliance across all kinds of cloud services is adding to cybersecurity woes of enterprise owners. As cloud storage continues to grow, the attacks also continue to sky rocket and traditional security tactics don’t align with the constant growing adoption. It is critical to have a secure cloud system.

Which technologies are disrupting the cybersecurity landscape?

In the last couple of years, awareness towards security has increased and enterprise and consumers have become more acceptable towards taking a preventive approach than defensive towards security. Keeping in view of the latest trends, cyber attackers have become increasingly sophisticated and have already started to perpetrate next generation crimes such as data thefts, frauds, identify theft, etc.

Machine learning, artificial intelligence, big data technologies are witnessing increased adoption from enterprises and as these technologies get more integrated in our day-to-day lives, so will new cyber threats.

How can enterprises prepare better to deal with zero-day attacks and advanced persistent threats?

“The security ‘generation gap’’ needs to be filled by deploying evolved security infrastructures, which combine real time threat prevention, shared intelligence and advanced security across all enterprise environments.”

We are currently facing 5th generation attacks, whereas enterprises are protected with only 2nd or 3rd generation security. It is very important to educate enterprise on the rising concerns and ways to prevent it. Check Point’s algorithms can analyse millions of known indicators of compromise and hunt for additional similar ones. As a result, we’re able to produce an additional threat intelligence feed that offers first-time prevention of attacks that we’ve never seen before.

Our philosophy has always been to work closely with the channel partner community and our market strategy is consciously aligned to making customers more security aware and make them proactively deploy the latest in security and enabling them to proactively secure themselves.

What impact will artificial intelligence and automated threat intelligence have on cybersecurity initiatives in the coming times?

AI-generated phishing e-mails have come into play with the aim to trick people into handing over passwords and other personal and sensitive data. As technology evolves, so will the number of threats. It also offers an array of potential vulnerabilities, including malicious corruption or manipulation of the training data. 

What is your advice to CSOs and other top-level security management professionals?

In recent years, cybercrime and attacks are on the rise. Organizations do realize that standard security solutions are not strong enough to protect devices and networks in workplaces, and they must detect new and advanced malware and vulnerabilities in networks, operations systems and apps.

The need of the hour is to be ready with security of the future and protect before the advent of any cyber breach or attack. The security “ generation gap’’ needs to be filled by deploying evolved security infrastructures, which combine real time threat prevention, shared intelligence and advanced security across all enterprise environments.

Interview

Indian enterprises are highly exposed to advanced cyber threats: Bhaskar Bakthavatsalu, Check Point

Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats, says Bhaskar Bakthavatsalu, Managing Director, India & SAARC at Check Point Software. 
 

Bhaskar-Bakthavatsalu-Check-Point-300X225.jpg

In an exclusive interaction with CSO India, Bhaskar Bakthavatsalu, Managing Director, India and SAARC at Check Point Software speaks on the latest cybersecurity trends and what organizations can do to prevent advanced zero-day attacks. 

Edited excerpts:

What are the three biggest security challenges?

In the wake of growing incidences of cybersecurity threats, enterprises need to be prepared more than before. Today, the vast majority of enterprises in India are only protected against Gen I to III threats-viruses, networks and applications and they remain exposed to advanced cyber threats. Mentioned below are some of the biggest challenges that can be encountered in 2019:

The Next-Gen cyber-attacks: The next generation of cyber-attacks is termed as Gen V attacks - large scale attacks that can move fast across cloud, mobile and on premise networks and have impacted organizations much harder than in previous years. However, growing cybersecurity complexity and lack of cooperation between solutions is one of the many causes for the current failure on the cybersecurity front.

Lack of trained experts: With cybersecurity professionals in short supply, it is even more difficult to find skilled and experienced professionals with the knowledge and experience to manage the solutions for evolved cyber risks effectively.

... Organizations do realize that standard security solutions are not strong enough to protect devices and networks in workplaces, and they must detect new and advanced malware and vulnerabilities in networks, operations systems and apps.
Bhaskar Bakthavatsalu
Managing Director, India and SAARC at Check Point

Cloud adoption on the rise: The rapid growth in IoT devices and cloud adoption, managing IoT security and compliance across all kinds of cloud services is adding to cybersecurity woes of enterprise owners. As cloud storage continues to grow, the attacks also continue to sky rocket and traditional security tactics don’t align with the constant growing adoption. It is critical to have a secure cloud system.

Which technologies are disrupting the cybersecurity landscape?

In the last couple of years, awareness towards security has increased and enterprise and consumers have become more acceptable towards taking a preventive approach than defensive towards security. Keeping in view of the latest trends, cyber attackers have become increasingly sophisticated and have already started to perpetrate next generation crimes such as data thefts, frauds, identify theft, etc.

Machine learning, artificial intelligence, big data technologies are witnessing increased adoption from enterprises and as these technologies get more integrated in our day-to-day lives, so will new cyber threats.

How can enterprises prepare better to deal with zero-day attacks and advanced persistent threats?

“The security ‘generation gap’’ needs to be filled by deploying evolved security infrastructures, which combine real time threat prevention, shared intelligence and advanced security across all enterprise environments.”

We are currently facing 5th generation attacks, whereas enterprises are protected with only 2nd or 3rd generation security. It is very important to educate enterprise on the rising concerns and ways to prevent it. Check Point’s algorithms can analyse millions of known indicators of compromise and hunt for additional similar ones. As a result, we’re able to produce an additional threat intelligence feed that offers first-time prevention of attacks that we’ve never seen before.

Our philosophy has always been to work closely with the channel partner community and our market strategy is consciously aligned to making customers more security aware and make them proactively deploy the latest in security and enabling them to proactively secure themselves.

What impact will artificial intelligence and automated threat intelligence have on cybersecurity initiatives in the coming times?

AI-generated phishing e-mails have come into play with the aim to trick people into handing over passwords and other personal and sensitive data. As technology evolves, so will the number of threats. It also offers an array of potential vulnerabilities, including malicious corruption or manipulation of the training data. 

What is your advice to CSOs and other top-level security management professionals?

In recent years, cybercrime and attacks are on the rise. Organizations do realize that standard security solutions are not strong enough to protect devices and networks in workplaces, and they must detect new and advanced malware and vulnerabilities in networks, operations systems and apps.

The need of the hour is to be ready with security of the future and protect before the advent of any cyber breach or attack. The security “ generation gap’’ needs to be filled by deploying evolved security infrastructures, which combine real time threat prevention, shared intelligence and advanced security across all enterprise environments.