Express Computer
Home  »  Artificial Intelligence AI  »  Enhanced focus on cyber security and scope of artificial intelligence

Enhanced focus on cyber security and scope of artificial intelligence

0 477

By Sachin Dutta

Today, we live in a world that seems to be evolving relatively faster as compared to the evolution cycle that any one has seen in the past. When I say past, the point of reference is late 90’s or the early 2000 which one could argue is not really a distant past. Technology is undoubtedly acting as the main catalyst facilitating this evolution. It has helped eliminate boundaries and continues to bring societies, nations, people connect with each other. In fact, the speed of evolution is so fast that technology has outperformed or outlived its own recent inventions. The transition from technology based solutions to digital solutions and making such solutions easily accessible has attracted a lot of investors and analysts, technicians believe that there is more potential waiting to be tapped. So there is no doubt that we live in a new world that has just begun to realize its potential.

As the world comes closer, becomes interconnected and it becomes more convenient to transact and communicate digitally, there is always a threat to its disruption more so when dependency on technology or digital solutions is on the rise and is expected to grow substantially. I am sure all of us had read about worms, virus or trojans during the 90s while pursuing our careers in computers; however the extent of damage these malicious programs can do now has far reaching consequences. This is because of the sheer scale to which any organization operates currently or will do so in future via digital medium. Simply put, this can be one of the biggest threats to any business and overlooking this risk would mean paying damages in the form of cash or probably bit coins.

The recent “WannaCry” and many more after-variants of ransomware outbreak have not targeted any particular sector. These events also do not appear to have been perpetrated with the intent of stealing information but were majorly done to cause disruption to various businesses by encrypting their information with a key which only hackers knew or had access to. News suggest that healthcare sector in the UK was one of the first ones to be impacted as a result of this. Hence, there is a lethal mix of information security events leading to business disruption. There are other variants of ransomware where the information is stolen and threat given to organizations to cough up mighty ransom failing which the information is made available on public sites/ platforms.

As the landscape of the risk is changing and threat levels currently being raised to maximum, it naturally triggered the Regulators to enhance their vigil on the risk. Particularly in the financial sector, guidelines have been prescribed and continuously refined with the recent ones being issued by IRDAI (Insurance Regulatory Development & Authority of India). These guidelines are prescriptive and focus on cyber security along with the basics of information security. While the guidelines shall help insurance companies in base lining their security controls and bringing standardization but clearly the challenge for the banking and financial sector is to outsmart the next cyber event.

It is equally important to understand the importance of cyber security from a customer’s standpoint. For customers, breach of confidentiality is as good as breach of trust. If not addressed properly, it can easily manifest into a reputational crisis for any organization.

When the situation is complex, sticking to basics always help. Here is what I believe can help the organizations develop a better defense system against the ever evolving threat from cyber events.

  • Operate to a consistent framework that is not only in line with regulatory requirements but is also mature and forward looking. This is important incase we want to outsmart the next attack. This could potentially become a unique selling point or a key differentiator for our business. Customers would want to do business with us incase they know that their information is safeguarded against a hack or an intrusion. One can always be a market leader in this space; although claiming supremacy in this area requires courage and one must venture out carefully

  • Be aware of what is at risk and where the potential data leakage points exist in the setup. It is important to segregate the high risk areas from the bunch and work towards addressing vulnerabilities which pose a significant threat over others

  • Focus on information exchanged with the partners as often they act as backdoor for leakage of such information. Carefully chose partners’ basis their maturity in security landscape and expertise in managing security risk. This, as per me must be gating or mandatory criteria for selecting a partner

  • Have a center of excellence pertaining to information and cyber security within your organization. Needless to say that you would need resources with specialized skill set to safeguard the digital borders. Make sure that these resources are given opportunity to enrich and consistently enhance their skill set with time

  • Consistently invest in upgrading the defense systems like firewalls, intrusion prevention systems etc. It’s worth an investment!

  • Monitor the trends through logs generated by security devices to pick up trends. Factor those trends back to programming these devices with the help of your OEM to build a level of intelligence. Operate to a quick and agile patch management process as any deficiency there could increase the risk of intrusion

  • Inform and educate stakeholders internally to ensure that there is adequate support for information security agenda points

  • Ensure awareness amongst all staff/ end users on basic security Dos and Don’ts. In my experience, end user often acts as the weakest link in the entire chain who needs to be consistently reminded about the consequences their actions can have incase an unknown e-mail was to be clicked open or an unauthorized action was to be performed

  • Discourage security over rides and especially incase of privileged users or users with admin access

  • Implement a cyber crisis management plan and simulate a cyber crisis event within your Company to assess the readiness levels and upgrade basis the threat perception. Prevention is better but incase crisis happens, we must know how to react, respond and move back to normalcy

  • Just like the bad guys, there are enough good guys or ethical hackers out there who can help you jointly fight this menace. Use their experience to strengthen your defense

The world as we see today may look very different in time to come as reliance on technology shall increase substantially. Artificially intelligent systems or systems with capability to self learn are going to be in demand, they already are! It is important that we use the same concept of artificial intelligence to our advantage while designing security solutions to protect our digital borders and customer’s digital footprints.

The author is chief risk officer with Canara HSBC Oriental Bank of Commerce Life Insurance Company Limited

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image