As cybersecurity demand surges in India, there is a crippling shortage of skilled professionals that the industry has been facing. KPMG's Sundar Ramaswamy suggests increased impetus on automating security roles will alleviate the problem.
Collaboration, information sharing and a need to keep security discussions real and grounded are just some of the themes that were reinforced by speakers and attendees at the ISMG Data Breach and Fraud Prevention Summit in Mumbai.
The third edition of ISMG's Data Breach and Fraud Prevention Summit in Asia took off June 8 in Mumbai. Here are some highlights and first impressions from the day-long event, featuring key industry thought leaders.
ISMG's upcoming Data Breach & Fraud Prevention Summit Asia 2016 in Mumbai will focus on the latest fraud techniques and technologies, as industry thought leaders take us through new approaches to tackle breaches as well as today's top schemes and solutions to stop them.
The Hong Kong Monetary Authority plans to raise the cybersecurity of its banking system through a new, three-pronged approach. But critics say the regulator needs to come up with clear security mandates to ensure a cybersecure ecosystem.
Narayan Neelakantan, outgoing CISO at the National Stock Exchange of India, is concerned that the lack of capacity in incident response is going to haunt Indian organizations in the near future. He shares insight on IR maturity and the imminent need.
The Reserve Bank of India has issued new cybersecurity guidelines to scheduled banks, directing them to devise cybersecurity policies distinct from their institutions' existing IT or IS security policies.
Security is moving fast, but is still playing a catch-up game with technology. In this scenario, age-old paradigms need to be revised to remain relevant, says Oracle's security lead for APAC, Chris Pickett
Nandkumar Saravade, DSCI's chief, has been named CEO of Reserve Bank of India's new IT subsidiary. Security leaders set expectations for the new role and suggest important areas that need immediate attention.
IBM's Vaidyanathan Iyer says security practitioners need new tactics to bridge the skills gap and fight emerging threats. He suggests the use of analytics and machine learning would easily help fill the gap in detecting threats.
Cross-regional collaboration, biological cybernetics and active defense/deception technology where some of the forward-looking themes at the recent MESA event in Dubai. Here are some highlights from ground zero.
Since California passed its pioneering data breach notification law in 2003, many other states and some countries have followed suit. Here's a closer look at the status of breach notification requirements in four regions.
As Asian countries work to bring their cybersecurity capacity up to speed, collaboration can help ease the burden. Dr. Amiruddin Wahab, Cybersecurity Malaysia's CEO, shares insight on national capacity building and cross-regional cooperation.
Dr. Amirudin Wahab, CEO, Malaysia Cybersecurity, says organizations in the Middle East must adopt a strong public-private partnership model and build an effective information-sharing platform to create a more secure ecosystem.
Security leaders, while welcoming India's new intellectual property rights policy as a step in the right direction, argue that the policy lacks specifics around awareness creation, enforcement of IP rights and software patenting.