Analytics , Fraud Management & Cybercrime

The Blurring Line Between Business and Cyber Fraud

Forcepoint's Ajay Dubey Shares Insights on Cross-Channel Fraud
Ajay Kumar Dubey, senior national manager in India, Forcepoint

Technology and business process silos are being exploited to perpetrate sophisticated, technology-driven fraud across business functions, which is blurring the line between cyber fraud and business fraud, says Forcepoint's Ajay Kumar Dubey.

See Also: Webinar | Beyond Managed Security Services: SOC-as-a-Service for Financial Institutions

"Traditionally, cybersecurity teams are constrained to being just another part of the IT function," he says. "But if you look at some of the recent business fraud, they have had a strong link with cyber ... exploiting some cyber loopholes."

In a video interview at Information Security Media Group's recent Mumbai Security Summit, Dubey discusses:

  • Cross-channel fraud and cybersecurity silos;
  • Using UEBA to effectively address insider threat;
  • Best practices for mitigating technology-driven fraud.

Dubey, senior national manager in India at Forcepoint, has been heading the channels business for the last six years. A cybersecurity expert with over 21 years of experience in the IT industry, he formerly worked at Bluecoat, now Symantec; Sun Microsystems, now Oracle; Aventail Inc., now Sonicwall/Dell; Blue Star and Godrej & Boyce.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.