Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

“We are not traditional organizations that ‘do’ digital projects; instead, we have altered the corporate DNA to become digital”


By MYBRANDBOOK


“We are not traditional organizations that ‘do’ digital projects; instead, we have altered the corporate DNA to become digital”

Subroto Panda
CIO -  Anand and Anand

 

Key priorities for 2021
For our organisation, digital traits and a digital mindset define the corporate outlook and behavior. Rather than merely digitizing customer touchpoints, we reimagine new ways to engage with customers. Similarly, rather than simply ‘doing’ digital projects, we have adopted an integrated strategy that makes them digital at the core right to the level of their DNA. We are not traditional organizations that ‘do’ digital projects; instead, we have altered the corporate DNA to become digital.

 

Key Priorities for 2021 are:
●  Data-driven decision making                         ●  Agile way of working
●  Multi-speed operating environment               ●  Establishing Cloud ecosystems

 

Redesigning IT & Security strategy
The first step is to understand what the new technologies are and then to look at the potential risks and consequences. After this is it possible to plan to mitigate the risk.

 

Threats change at a much greater pace than organizations can react. So, the onus is put on organizations to ensure that the adoption of new technologies is done in a secure manner. Unfortunately, there is no silver bullet when it comes to cyber-security, but we focused on three areas which needed to be addressed:

 

People: Education is everything in the fast-changing nature of technology. We ensured they understand the risks of any new technology they install as this will be key to properly securing it. This is not just the IT team, everyone working with critical data and new technologies need to understand the risks and how to mitigate them as well.

 

Processes: Established clear processes for implementing new technologies. For example, made it mandatory for the security team to be involved in every discussion about investing in technology so they are aware of what they need to do in order to prepare to secure the devices and the data at the point of installation.

 

Technology: Technology is there as the last line of defense, to help enforce policies and ultimately to keep people and information safe.  Use established security technology to protect data at every point.

 

Adoptive DLP solution adoption helped with the capabilities that go far beyond traditional DLP and network security. For example, features such as anti-steganography can guarantee that images are not used to convey malware or to leak sensitive information, while OCR can ensure that information is not leaked using images from multi-function printers and screen grabs.

"

 E-Magazine 
 VIDEOS  Placeholder image

Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org