“Our security approach has always been a layered one, wherein several components are leveraged to protect business operations”
By MYBRANDBOOK
Dr. Ashish Bharadwaj
CIO - Torrens Global Education Services
Responsibilities of the CIO
The fundamental role of the CIO as a change agent has not changed. What has changed is the context the role operates in. The environment today, competitive landscape, threat landscape, and customer expectations have all changed significantly. Consequently forward thinking CIOs continue to adapt and drive their organizations to success in this new environment.
Key priorities for 2021
From our perspective, key priorities include increasing the engagement of employees through enhanced self-service abilities, ensuring success for our students through ‘smart’ systems that help the learner succeed, simplify the business by leveraging AI and NLP bots with informational and transactional abilities, and catering to future success through intelligent, personalized web fronts, and a more mature IT governance process.
Adopting Work-From Anywhere
Our organization was not new to remote working, including learning and teaching. The impact of COVID accelerated and deepened already deployed technologies – effectively making the entire organization reliant on collaboration and communication tools. Support contact centres were spun up leveraging AWS technologies almost overnight to facilitate the ‘new normal.’ Even now, with the gradual opening up of the economy, we have chosen to adopt a ‘reverse flipped’ model whereby each employee has the flexibility to work remotely for all roles that do not require physical presence.
Redesigning IT & Security strategy
Our security approach has always been a layered one, wherein several components are leveraged to protect business operations with multiple levels of security. This approach ensures that by design every individual defense component has a backup to counter any flaws or gaps in other layers of security. These layers work together to tighten security and have a better chance of stopping/limiting impact from malware/threats.
This starts from the user layer – encompassing policies, procedures coupled with regular trainings and awareness, simulated attacks with ‘teachable’ moments, moves to the network layer and deeper, where controls such as separate authentication domains for staff and students, virtual LANs, comprehensive endpoint (device) protection, stringent application controls, audit logs supporting forensics have been implemented before one can get into the innermost layer – the organization’s data.
TAC Security becomes Cyber Security Assessor for the App Defen
The cybersecurity company, TAC Security has been selected as a key Cyber ...
InterGlobe’s Rahul Bhatia and C.P. Gurnani together announce
In a move that is set to transform the AI landscape, Rahul Bhatia, Group M...
Download masked Aadhaar to improve privacy
Download a masked Aadhaar from UIDAI to improve privacy. Select masking w...
Sterlite Technologies' Rs 145 crore claim against BSNL rejecte
An arbitrator has rejected broadband technology company Sterlite Technolog...
LAVA INTERNATIONAL LTD.
TALLY SOLUTIONS PVT. LTD.
TEJAS NETWORKS INDIA PVT. LTD.
HAVELLS INDIA LTD.
Technology Icons Of India 2023: Gautam Adani
Gautam Adani is the Founder and the Chairman of the Adani Group, an In...
Technology Icons Of India 2023: Harsh Jain
Harsh Jain is an Indian Entrepreneur, the co-founder and CEO of the In...
Technology Icons Of India 2023: Sachin Bansal
Sachin Bansal’s fintech startup, Navi Technologies, simplifies loan ...
New defence PSUs will help India become self-reliant
MIL, India’s biggest manufacturer and market leader is engaged in Pr...
CSCs enabling rural India digitally empowered
Common service centres (CSCs) are digital access points under the Digi...
DRDO is India's largest and most diverse research organisation
DRDO is the R&D wing of Ministry of Defence, Govt of India, with a vis...
IRIS GLOBAL SERVICES PVT. LTD.
Iris Global services is one of the leading distribution houses that d...
SONATA INFORMATION TECHNOLOGY LIMITED
Sonata Software Limited is a leading Modernization engineering company...
REDINGTON INDIA LIMITED
Redington (India) Limited operates in the IT product distribution busi...