Cyber Security is a global threat as well as an opportunity, and our objective is to achieve genuine prosperity and progress for our nation as well as globally. We being at the policy front host various programs where we bring in experts on particular fields and collectively bring some positive change in the society. Thus for Proactive Security Strategy Decisions Based On Threat Insights The Policy Times in association with M. Tech Kapalya and Cyber Society of India(CySI) had organized an event on Cyber Security Post-Pandemic: Awareness, Innovations, Policy, and Opportunities, from 8 PM-9.30 PM (IST) on September 8,2021where various eminent speakers had spoken on the related topic.
- Youtube Link for the webinar:- https://youtu.be/gqMyFGn0CDQ
- Facebook Link:- https://www.facebook.com/thepolicytimes/videos/837430610283872/
Ramesh Iyer, President & Chief Revenue Officer at VA Tech Ventures Pvt Ltd(HAPPAY) & Ex MD- India, Concur Technologies, Business President- Enterprise- SME- TATA Teleservice, starts by saying the world has gone irreversibly digital and such a pivot has given an opportunity for cyber threats to increase, hackers are executing their programs at scale with the help of AI and algorithms. In fact, the cyber threat industry is potentially one of the fastest-growing industries today; it’s a multi-trillion dollar industry. Cyber security is no longer an option and ignorance when it comes to security is not bliss. Security in implementation perspective and developmental perspective everything has changed.
Dr. P. Sekhar Chairman, Unleashing India, Global Smart City Panel, MTGF, gave a detailed idea about cybercrime and its various types. The common areas where cyberattacks are happening at a rapid rate are financial institutions, government institutions, corporate offices, retail, oil and gas offices, defense systems, etc. Some key cyber security threats are cloud threats, AI Integration, Extended Detection and Response, Security Process Automation, the Rise of Enterprise level CSOs, Data Privacy as a Discipline, etc. Cyber Attack has a huge market and its market has to be seen in a different way.
Shri Brijesh Singh, IPS, Addl DGP, Maharashtra, says the world has reset in a way, everything has changed. Systems that were within the perimeter protected by complex systems are now out in the open at homes. As the system changed suddenly it has become very easy for hackers to attack enterprise networks. And the pandemic has changed everything and made everything vulnerable.
Mr. Sudesh Kumar, Founder, and CEO, Kapalya, US-based Encryption Management Platform, reiterated the framework of different kinds of cyberattacks. Hackers hack because their main aim is to monetize data. Especially due to this pandemic the attackers are well aware of the fact that due to remote working the systems will not be as protected as it is in the offices and thus the rate of breaches and attacks is increasing. The US as a country worked for cyber security, and ransomware has become the biggest threat and every government offices in the USA are ready to stop ransomware attack. The main challenges after a ransomware attack are to recover all the data on endpoints, ensure that any data which the cybercriminals copied will be unreadable, and not to pay any ransom. The NSF has come up with advanced technology to counter ransomware attacks in collaboration with NS. The technology will prevent ransomware’s inactive memory space using AL/ML.
Bhavin Bhatt, Cyber Security Leader, Mentor & Regional Director, M.Tech for India & SAARC in view of increasing cyber risks for organizations pointed out critical areas of consideration while planning cyber security strategy. The strength of Cyber security strategy includes the integrity between people, processes, and technology. One weak link between these three pillars can compromise the strength of the other two elements and even lack of integration between all the separate parts of one of the three pillars can pose risk. For example, people concerned acquire different technologies for different usage none of them are integrated to a strategic risk mitigating plans can compromise the whole process. So cyber threat modeling based on cyber intelligence strengthened by detailed analysis of tendency, tactics, and technology of cyber threat is the key. The other aspect to consider while devising a cyber security strategy is the detailed understanding of the assets of the organization and the variety of risks they pose and data inflow while in use, transit, and rest. The most common error organization makes while deploying cyber security strategy is employing uncertified admin (by technology vendors) who lacks proper understanding of the cyberspace weakening the strength of best of the technology and strategies. Lastly there should be a cyberwar room equipped with a proactive strategy to counter the cyber threats at a moment’s notice with a pre-decided first step of the action plan. The best strategy and best practices are key to impart the best cyber strategy.
Wayne Lewandowski, Vice President Global Sales HYTRUST, An Entrust Co., USA, talked about the growing pains, that is the challenge of a hybrid, multi-cloud infrastructure, where only 2 or 3 organizations are using 2 or more public clouds, the top factors that make cyber security painful are unclear ownership and lack of skilled personnel and organizations on average use 8 different products that perform key security measures and struggle to maintain a consistent policy as a result. Some ways to reduce risk on the digital transformation journey are to protect sensitive data, secure infrastructure, enable secure and remote workforces, and lastly safeguard digital delivery, transactions, and payments.
Mr. Prem said that post-pandemic critical infrastructure will help in cyber security. The digital world which has transformed into remote working needs proper security and AI-based measures to handle cyber-attacks. And as we social distance in the physical world, we should keep that social distancing in the digital world too.
Mr. Ananth Subramanian, CEO HDGTL, a Meditech venture analyzed the need for proactive cyber based on his own experience in the field from early 2000 to the current time. There is a pressing need to identify and analyze cybercrime patterns in view of certain important perimeters to plan proactive cyber security strategy and media and security agents have a major responsibility in cyber threat analysis and solution.
Mr. Akram Hoque, Founder Editor, The Policy Times, in the view of detailed analysis of the current cyber situation by experts present in the webinar stated the need for initiatives to bring important stakeholders under cyber security awareness campaign to bridge the gap in cyber security strategy of any organization or the nation or the globe.
The webinar gave a comprehensive outlook of complex aspects of cyber security at a current time and a strategic way to plan proactive cyber security measures.