Interviews

In Conversation with Sudhansu M Nayak, Head of Cybersecurity and Cyber Forensics, CMS IT Services

Depending on the current business and cybersecurity maturity, many companies are following Cybersecurity Chakras model for strengthening their cybersecurity posture. In conversation with Mr Sudhansu M Nayak, Head of Cybersecurity and Cyber Forensics, CMS IT Services, we dive deep in the cybersecurity business.

How are companies strengthening their own cybersecurity?

Many customers try to discover their open attack surfaces and build a balanced Protect-Detect-Respond portfolio, starting with a definitive and involved defensible cybersecurity assessment.

Most of them have realized the importance of signature-less Endpoint Security as a Service for endpoints, Zero Trust Network Access and Comprehensive Integrated Identity and Access for enterprise resources, and VOILA (Visibility, Observability, Incident Response, Low-code integration, and Automation based on analytics) Services are essential for their sustained cybersecurity protection and hence, are buying these services. CERT-In, Reserve Bank of India, National Critical Information Infrastructure Protection Centre (NCIIPC), various ministries like the Ministry of Health and Family Welfare, Ministry of Power, Ministry of Finance, Ministry of Education, Indian Parliament, and many more are trying to build guardrails for protecting confidential business and citizen data and release acts, master directions, and guidelines periodically. Compliance with these norms inspires and influences various companies and enterprises to procure cybersecurity solutions to strengthen their Cybersecurity.

Also Read: Caul Brand Philosophy: to deliver quality products at affordable prices

What are your views on cybersecurity laws?

In the Indian context, we see tremendous regulation and focus on 3600 streamlining laws and regulations to protect confidential business and citizen data and building a symbiotic cybersecurity environment. To curb cyber-crimes and create an enabling environment for effective use of cyberspace, our cybersecurity laws, and their drafts are not only going through immense public involvement and scrutiny (at citizens, think-tanks, and enterprise layers), but they are also being deliberated (at legislative, executive, and judiciary layers of government) on approaches to orchestrate a multi-dimensional defense, covering laws and sector-wise cybersecurity reference architectures, building strength then fiction agencies to test supply-chain applications and products, and strengthen cybersecurity education and skilling not only to build a cyber-trained workforce but a cyber-aware citizenry. As more cyber-aware citizens start involving themselves in the process, they become more collaborative and well-rounded in the legal, regulatory, and administrative cybersecurity macro- and micro- environments.

Also Read: In Coversation with Mr. Sanjay Kumar Kalirona

What are the new developments in cybersecurity services technology?

Zero Trust Network Access solutions to manage cyber-phygital risks, Comprehensive Identity and Access solutions to provide identity threat detection, forensics, and response, and security at the Edge cybersecurity mesh solutions covering information technology and industrial control systems are the front-runner emerging technologies in Cybersecurity.

In the Counter Ransomware Initiative on a global level, among four verticals of Network resilience, Countering Illicit Finance, Disruption and other Law Enforcement Efforts, and diplomacy, India is chairing the Network resilience. Multiple protection and incident response solutions to counter ransomware attacks are on the rise.

Soon, 5G- and IPv6- compliant security solutions integrating into Security at the Edge cybersecurity mesh solutions will start becoming mainstay. Quantum cryptography, Quantum-secure communications (especially quantum key distribution (QKD)) and quantum machine-learning may render existing encryption protocols obsolete and artificial intelligence immensely enhanced.

These technologies will be the tipping point to usher in multifarious cybersecurity complexities and hence, the transformation of communication security, data privacy, and organization resiliency.

What is the geographical graph of your clients from the MSMEs and from the non-metro cities?

Over 300 customers vouch for the capabilities of CMS IT Services. Some of these relationships have lasted more than 40 years. As one of India’s top IT services firms, CMS IT Services have support infrastructure spread across 220 direct support locations, 10 regional centres, 33 branch offices, 25+ spare depots, 18 repair centres, 2 state-of-the-art 250+ seater NOC and SOC (Mumbai and Bangalore), 7000+ support engineers in India.

Also Read: In conversation with Mr. Akhilesh Chopra

 Can you please explain in detail what a Defensible Cyber Security Framework is and what value it provides to the users?

“The Defensible Cybersecurity Framework responds to transformed cybersecurity requirements in the post COVID19 era, delivering ready capability to rapidly secure client operations.  CMS IT has made deep investments in the domain to support enterprises across India keeping in view the need for agility and market-led cost structures.” “The Defensible Cybersecurity Framework includes deep threat intelligence, industry expertise, automation-driven Cybercops, AI, and Analytics.

Our approach will allow enterprises to align their cybersecurity program design to business needs by establishing defensible cyberspaces and focus energies towards securing critical information infrastructures”.

Also Read: Apps are the new business offices of today

Share
Published by
Team My Mobile

Recent Posts

The Ultimate iPad Fast Charging Guide: How to Accelerate Your Power Uptake

Learn how to maximize your iPad's charging speed. Use higher-wattage USB-C adapters for faster charging.…

57 mins ago

Unfolding the Debate – Foldable vs Flip Smartphones: Which One is Better For You?

Foldable phones like Galaxy Z Fold 5 offer tablet-like multitasking. Flip phones like Galaxy Z…

2 hours ago

Google’s Gemini AI: The Cosmic Inspiration Behind the Company’s Multimodal Innovation

Google unveiled the Gemini AI model at the May 2023 I/O conference. Gemini name inspired…

3 hours ago

HP Omen Transcend 14 Review: A Lightweight Gaming Laptop For Most of Your Needs

Highlights Lightweight and portable design, ideal for work and gaming Vivid 1800p OLED display with…

19 hours ago

Samsung Galaxy Watch 7 to Feature First 3nm Exynos W1000 Processor

Highlights Samsung Galaxy Watch 7 rumoured to debut 3nm Exynos W1000 processor. 3nm technology offers…

20 hours ago

Apple Vision Pro Headset Set for China Release After Being Spotted on 3C Certifcation

Highlights Apple Vision Pro headset receives quality and safety certification in China. CEO Tim Cook…

21 hours ago