Select Records (Page) :
116
Digital transformation, cybersecurity and cloud/cloud migration: Key Priorities for IT team
This is followed by critiques of existing state-of-the-art mitigation techniques as to why they do or do not work. We then discuss new attack patterns in emerging technologies such as social media,...
“We should plan proactive rather reactive”
We should deploy a firewall with the best security policy, we should have our pain area list always available with us. We should always be eager for new technology, attending seminars and always update us for new things so we can compare what we have v/s what best is available...
OCS follows a strong, dedicated and ethical approach to cyber security and data protection
OCS has a strong, dedicated and ethical approach to cyber security and data protection compliance. Our approach to information security is guided by a large framework of key internal policies, procedures, standards and guidelines. All information ...
‘Digital’ becomes an integral part of every CIO’s or CTO’s portfolio
We have carried out an exhaustive review of our cyber-security strategy, and ensured that the company network (whether onsite or remote) is bulletproof....
“We are running through a digital transformation since 2017 and still going on”
As mentioned above, that we have started our digital transformation journey in 2017, in this journey so far we have covered social media, cloud computing, smartphone technology, artificial intelligence, there was some gap in data security related...
“We at NEC, are planning to adopt cloud wherever possible”
One of the most important aspects is “before we secure, we need to know what to secure” – for this we have streamlined our asset management protocols to ensure that all IT ...
“The first step in designing a security strategy is to understand the current state of the security environment”
TThe current health crisis has driven organizations to shift to a remote-work model overnight. As a result, employees are having to merge personal technology with work devices...
“The CIO role is not only enabling technology but also providing avenues for business to re-invent the business model”
We have invested in the best tools which will help create a secure environment. Also we have built tools in the cloud which are more secure....
Implementation of CMMC/ISO 27001 compliance framework becomes mandatory for manufacturing sector
CIOs have become business enablers to drive organization targets. Since most of the processes involved technology enablement, IT has now started driving the business processes and influencing decision making....
L&T IDPL embraces various best practices to be future ready
We have started our preparation much before the actual lock down announcement made in March’2020. Some of the initiatives which we have implemented made it possible for our organization to work from anywhere. ...