The stratospheric rise in phishing and identity attacks since the beginning of the Coronavirus pandemic is give sleepless nights to CISOs across the world making them the Digital Security Warriors
Covid-19, an unprecedented global catastrophe, has had a massive impact on society as a whole. The most common observation is a sharp increase of phishing and identity attacks. Adaptation of “Work from Home” framework has increased the vulnerability more than ever. This situation has impacted the role of Chief Information Security officers significantly making them the Digital Security Warriors.
While speaking with ETCIO, Rohit Kachroo, CISO, Indiabulls Group talks about how he is handling the raidly expanding threat landscape for Indiabullsa and shares his checklist for secure remote working.
How has Covid-19 changed things for Indiabulls group and how are you handling it?
We are well-equipped with business continuity posture that too without deviating an iota from our Information Security and Cyber Security Policies guidelines. Our strong and tested Business Continuity Plan has helped us immensely.
Every communication traffic is being rigorously scrutinized at various levels. Our Security Operation Center (SOC) which is equipped with industry best security control tools and technologies is keeping vigil on every potential threat and counter them appropriately. Apart from the technology, human assets which are considered the weakest link, are being sensitized at regular intervals through Cyber Security Advisories from CISO’s Desk. Probably we are one of the organizations who are circulating such advisories twice in a week covering the entire population of the organization from top to bottom. I can proudly say that it has helped us in solidifying the human behavioral vulnerabilities very effectively. Additionally, our strong cyber security posture interweaved within resilient compliance fabric, strappingly supported by our top leaders that has provided smooth sailing amid this unprecedented crisis
What were the changes you had to make after lockdown?
We have appropriately invested on right infrastructure pertaining to Cyber Security and strengthen the overall organizational compliance posture that helped in smooth transition into the current environment and seamless adoption of “Work from Home” framework. Under these changed circumstances, we had to adopt a few makeshift arrangements that were appropriately tested and secure. While strategizing the WFH framework, we have scrutinized each and every aspect of cyber vulnerabilities along with implemented security control mechanisms. We have to ensure that each and every bit of communication must be rigorously scrutinized and appropriately monitored. Keeping in view of the increased cyber threat amid the current lockdown, we have fine tuned out strategy effectively and adequately where ever needed.
How are you making your organization secure, since the new normal is making the organizations more vulnerable?
Considering the fast paced changing threat landscape and diversified threat vectors, Cyber Security posture needs to be assessed, evaluated and implemented periodically. Each and every security arsenal must be capable enough to curb the existing threat vectors effectively. I have always believed it is important to deliver the right message at the right time. Although we have implemented industry best security controls in the current scenario, we keep analyzing upcoming security threats and upgrading them. Under the Covid-19 pandemic, Cybercriminals have targeted the emerging vulnerability resulting from Work from Home framework. Our proactive approach and out-of-box thinking has put us in a situation where current security control posture is effectively catering under the changed circumstances.
What is your checklist for secure remote working?
The recent mass transition to working remotely coupled with cyberattacks introduces a heavy burden on the CISO. While securing the remote working, following domains should be adequately covered under the ambit of Cyber Security but not limited to:
Security Technology: A recommended list of security controls that should be installed and configured.
Security Team: Every team, regardless of size and dedication level, has a set of procedures to handle ongoing security operations routinely. These procedures must be at the very least refreshed, and in many aspects updated.
General Workforce: People are increasingly vulnerable to all sorts of social engineering manipulations. Awareness, education, and security drills are essential to arm your workforce against these attacks.
3rd Party Service Providers: Whether your organization performs all its security tasks in-house or not, it’s time to consider outsourcing some of the more skill-dependent missions to a domain expert MSSP – or at least make sure that all IR and security management operations are adequately covered.
Management Visibility: Management must have comprehensive visibility both into the CISOs efforts as well as to the actual security posture.