The CISO of Mahindra & Mahindra Financial Services reveals why security leaders need to be upfront about things and prepare for the outcome of every strategy. A cybersecurity veteran with over 20 years of experience across government, defense, retail and banking domains, Vijay Radhakrishnan is a strategic business security thought leader with digital transformation as the guiding light for his approach towards IT governance, risk, security and compliance.In an interaction with CSOOnline, he reveals what it takes to keep a financial organization secure amidst global threats and compliance roadblocks.What is your organization’s cybersecurity strategy based on? Preventive or reactive or both?In terms of security there is always the unknown. Generally, a cybersecurity expert will talk about 4 things – known known, known unknown, unknown known and unknown unknown. The last two are always interesting. Security does not mean just putting on firewalls anymore. It has to be a layered approach across all layers – physical, application, network etc. You need to have controls everywhere and go for a hybrid model. “Banks have made a huge fundamental mistake by not integrating their systems with the network. They must do it as soon as possible.” Then insider threats are also a big headache for organizations. Technologies like machine learning and artificial intelligence can help in catching these things before it becomes too late. Also, most of the privilege usage accounts have to be continuously monitored or monitored for anomalies as they are targeted the most.In the case of a breach, whose responsibility is it – the CIO or CISO? I’d say it is the responsibility of both. In certain situations, the CIO or CISO might end up in an argument but it can be a healthy argument which is better for the health of the organization in the long run. Ultimately they act like a team in the case of a crisis.RBI has mandated banks to link SWIFT with CBS and released a list of 9000 NBFCs that were found to be high risk. What is your opinion? SWIFT is ultimately one instrument through which international transfers take place. For banks, whenever funds are transferred it means it has to physically exist somewhere – either in paper form or in the ledger. Banks have made a huge fundamental mistake by not integrating their systems with the network. They must do it as soon as possible.Career Highlights:Experience of 20 years in the field.Experience in Government, defense, retail and banking domain.Specializes in enterprise risk, governance and security framework.Member of ISC2, ISACA, CIIA and IEEE.Currently, he is the CISO of Mahindra’s Financial Service Sector. In the case of high-risk NBFCs, there are certain measures which can be deployed (from a loan perspective). Obviously, there has to be a level of stringent assessment before granting loan to high-risk parties. Subsequently, loan repayment should also be monitored. It should be assessed whether the money coming back is through a normal payment mode, or coming in unusual bursts. RBI will say something is non-compliant, but they don’t say ‘X’ is non-compliant. The missives are a little vague when it comes to the regulator. In such a scenario, companies have to stick to the fundamentals.Couple of Do’s and Don’ts for your peers. Be clear of what you are doing. Don’t be biased about things. Because the bylaws are very clear. Forget about the certifications or degrees you have. Fundamentally, be upfront and don’t be afraid. Hacks do happen. It’s a question of how you manage the hacks – what are the preventive measures, what are the mechanisms – even then you can’t be 100 percent sure that everything has been captured. There are different mechanisms including cyber insurance, which you must deploy to keep the organization safe. What are the technologies that are important to an FSI institution’s security strategy? Artificial Intelligence and machine learning are important – but to a certain level only. There has to be a cutoff point. You cannot automate everything. Big data analytics is another extremely important tool because of the churn of data available today. When it comes to blockchain – we have to wait and watch. From a security perspective, I will always look at the abusive part of it first, and how it can be taken advantage of. You can adopt new tech, but one must proceed with caution. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe