Businesses across the globe have started to see information security as a business priority and this alignment has enhanced the influence of CISOs on top management, says Biju K, Chief Information Security Head of Federal Bank. In an interaction with IDG India, Biju K, the Chief Information Security Head of Federal Bank since 2012, highlights the various cyber risks and steps that CISOs should follow to be assure of their data security strategies. Tell us about your role as a cybersecurity leader at Federal Bank.We at Federal Bank always try to ensure the basic hygiene as far as security is concerned. We work to better understand the environment and devise cost-efficient methods to reduce risk.What are the unique security challenges that CISOs today face when it comes to cloud security? Data Breaches, misuse of cloud services, insufficient security practices, auditability etc. are some of the key challenges as far cloud security is concerned.According to you, what is the appropriate strategy for managing security among rising challenges due to technologies like cloud, IoT and mobility? Adequate due diligence—initially and on regular intervals, to ensure that the service provider follows best security practices— really helps. Relevant certifications of the service provider also must be ensured. Regarding mobility, the enterprise having control over data is most critical. Unless this is ensured, device loss/ theft etc. can have negative impacts.What are the key security initiatives that you have undertaken in your CISO role?We link security strategy to the business strategy and establish collective relationships with the functional heads, specifically those who are responsible for keeping business and controls aligned. We continuously do security awareness for our employees and customers. Here we highlight the need for enterprise-wide security strategy and not limited to IT alone. The business risks are communicated regularly to management.How do you see rising technologies like blockchain, machine learning and AI in enhancing security for digital enterprises?The new technologies will help in strengthening the backbone as well as help in improving the detection capabilities with reduced false positives. What lessons do you take from 2017 as far as the security strategy is concerned? Endpoint security risk has increased significantly; Antivirus solutions are getting replaced. Zero day attacks, unknown threats have increased significantly; Attacks are evolving to incorporate fileless techniques and therefore improving detection and response capabilities are very essential.What are your cybersecurity priorities for 2018? Increasing security awareness across the organization; reviewing the practices at regular intervals and fine tuning to make it more effective; ensuring compliance to the guidelines, etc are prioritized. Ensuring the security standards of cloud as well as vendors will be a priority. More stress for application level, database level and endpoint level security. How do you see the evolution of the CISO role in the coming times? There is an increasing shift towards security as a business priority. The alignment between IT security and the business is certainly improving. The influence of CISOs on the top management is going to further increase. Along with this, the responsibilities and accountability will certainly increase. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe