Download Certificate- CMOs | ECIO | Most Admired Brand | Most Trusted Company

“Our security approach has always been a layered one, wherein several components are leveraged to protect business operations”


By MYBRANDBOOK


“Our security approach has always been a layered one, wherein several components are leveraged to protect business operations”

Dr. Ashish Bharadwaj
CIO - Torrens Global Education Services

 

Responsibilities of the CIO
The fundamental role of the CIO as a change agent has not changed. What has changed is the context the role operates in. The environment today, competitive landscape, threat landscape, and customer expectations have all changed significantly. Consequently forward thinking CIOs continue to adapt and drive their organizations to success in this new environment.

 

Key priorities for 2021
From our perspective, key priorities include increasing the engagement of employees through enhanced self-service abilities, ensuring success for our students through ‘smart’ systems that help the learner succeed, simplify the business by leveraging AI and NLP bots with informational and transactional abilities, and catering to future success through intelligent, personalized web fronts, and a more mature IT governance process.

 

Adopting Work-From Anywhere
Our organization was not new to remote working, including learning and teaching. The impact of COVID accelerated and deepened already deployed technologies – effectively making the entire organization reliant on collaboration and communication tools. Support contact centres were spun up leveraging AWS technologies almost overnight to facilitate the ‘new normal.’ Even now, with the gradual opening up of the economy, we have chosen to adopt a ‘reverse flipped’ model whereby each employee has the flexibility to work remotely for all roles that do not require physical presence.

 

Redesigning IT & Security strategy
Our security approach has always been a layered one, wherein several components are leveraged to protect business operations with multiple levels of security. This approach ensures that by design every individual defense component has a backup to counter any flaws or gaps in other layers of security. These layers work together to tighten security and have a better chance of stopping/limiting impact from malware/threats.

 

This starts from the user layer – encompassing policies, procedures coupled with regular trainings and awareness, simulated attacks with ‘teachable’ moments, moves to the network layer and deeper, where controls such as separate authentication domains for staff and students, virtual LANs, comprehensive endpoint (device) protection, stringent application controls, audit logs supporting forensics have been implemented before one can get into the innermost layer – the organization’s data.

 E-Magazine 
 VIDEOS  Placeholder image
 ITFORUM 2024  

 WIITF 2024  

   



 CMO of the Year   Placeholder image

 WOMEN LEADERSHIP  Placeholder image

 EMINENT CIO's OF INDIA   Placeholder image

 TRENDS IN TECHNOLOGY  Placeholder image

MORE VIDEOS  Placeholder image
 ADVERTISEMENTS  Placeholder image

 TECHNOLOGY DISRUPTION Placeholder image


 UNICORNS REVOLUTIONISING Placeholder image



Copyright www.mybrandbook.co.in @1999-2024 - All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.
Other Initiatives : www.varindia.com | www.spoindia.org