Express Computer
Home  »  Artificial Intelligence AI  »  AI has the potential to counter advanced cyber security threats

AI has the potential to counter advanced cyber security threats

0 433

Mehmood Mansoori, Member of Executive Management & Group Head, HDFC ERGO General Insurance says, AI follows adaptive or machine learning algorithms which are designed into an intelligent security system and have the potential to identify and respond to changing threats as and when they occur. Express Computer interacts with Mehmood Mansoori on various aspects of information security.

Please discuss the best practices against cyber-attacks like Ransomware
Ransomware is a malicious software attack that generally threatens to delete or publish the data from the user’s system, until a ransom is paid.  From a technical perspective, this is best tackled with proactive patch management process. Older systems are much more vulnerable to such cyber attacks and therefore, organisations must ensure a road map for the roll out of regular updates and phase out old systems gradually, as a practice.

To ensure the sensitivity of such attacks as it affects all employees (non-technical), companies should roll out a periodic communication campaign on its awareness. On a generic basis, it would be ideal to avoid opening attachments with unknown extensions or emails from unknown users, thereby practicing caution. Also, keeping systems updated would ensure the system is averse to these vulnerabilities.

Were you affected by the WannaCry Ransomware attack?
We are an ISO 27001 certified company, with consistent and robust processes that ensures relevant security patches are tested and updated timely on all our critical systems. Our systems were safe and remained unaffected from the recent Wanacry Ransomware attack.

What kind of Cyber security drills HDFC ERGO does on a regular basis
Any cyber security incident ultimately impacts the business and hence, from business continuity perspective we consider cyber threats as a higher risk.

Being an ISO 22301 certified company with consistent Business Continuity Management System (BCMS), our business continuity tabletop exercises cover cyber security threat scenarios. We exercise Disaster Recovery (DR) drills every 6 months, which cover cyber security threat scenarios, to test our critical business systems ensuring continuity in operations

Have you calendarised  your cyber security practices, for example, to run the business systems entirely out of your DR site once, twice in an year or, doing ethical hacking on a quarterly basis, IT audit etc ?
We have set processes in place to test the vulnerability of our systems to cyber threats. As a practice, we regularly undertake Pen test for public facing web applications and also conduct DR drills every six months. IT audits, too, are done on an annual basis.

Your opinion on the use of AI in ensuring cyber security
Existing security software databases and algorithms have a limited scope and hence, most often, are unable to keep pace with the rapid development of new cyber threats. AI follows adaptive or machine learning algorithms which are designed into an intelligent security system and have the potential to identify and respond to changing threats as and when they occur. Hence, AI has the potential to increase the scale of resistance that a system can have to counter ongoing attacks which makes the future of AI in cyber security a promising as well as an interesting one to look forward to.

Have you employed any agency or ways for cyber security awareness campaigns?
Awareness has a profound impact on the behaviour of user, which is critical in cyber defence. We look for interesting ways to build the awareness and keep our employees informed. Apart from traditional methods – like mailers and short quizzes, we always explore alternatives to raise the awareness and also reach out to agencies providing innovative ways to spread cyber security awareness among our employees.

How often do you engage with the police, enforcement agencies to discuss cyber security?
We frequently use advisory from CERT-IN, US CERT for the latest information on Cyber threats, which helps us take precautionary measures from time to time. Reporting cyber security concerns to the Police or enforcement agencies, if required, is done on case-to-case basis.

How strong is your cyber security team?
We have an entire structure which is headed by the Chief Information Security Officer and a four member technical team, having competencies across the spectrum to handle and resolve issues pertaining to information and cyber security. Apart from this, an Information Security Committee (a Steering Committee) is also in place, with representation from critical functions like – Risk Management, Legal & Compliance, HR, Administration and other Business departments to take critical decision on information and Cyber security. In addition, we also have an external information security expert, who provides certain specialised services to our team.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image