Page 11 - NOVEMBER MAGAZINE 2022
P. 11

The  Significance  of  Data           l a y e r s   o f   p r o t e c t i o n   l i k e
                                             Protection & Privacy                 encryption, etc. Security solutions
                                                                                  should be set up at the endpoint
                                             The  growth  in  digitalization  has   level as well as the network layer
                                             led to an increase in the volume of   to  mitigate  the  chances  of  the
                                             data.  Hence,  it  has  become       attack.  Insider  threat  is  another

                                             important  to  classify  the  data   point  that  must  be  considered
                                             appropriately,  especially  the      while  framing  policies  and
                                                                                  implementing technologies.
          An increasing                      sensitive  information  that

                                             organizations  handle,  including    Trends & More
             number of
                                             that  of  customers,  shareholders,   Data  encryption:  An  increasing
          organizations                      and employees. Apart from data       number  of  organizations  would

           would opt for                     availability,  data  protection      opt for encrypting critical data to

      encrypting critical                    governance has also become an        prevent any data breach, even in

     data to prevent any                     important aspect.                    the case of an attack.
                                             Recovering Data after the Attack     Z e r o   T r u s t   t e c h n o l o g i e s :
           data breach,                       Depending  on  the  criticality  of

        even in the case                      the data, multiple copies of data   I m p l e m e n t e d   b o t h   a t   t h e
                                                                                  endpoint  level  as  well  as  the
           of an attack.                      and backups may be required.        network  layer  will  help  reduce

                                              DR policies need to be set up to    threats like ransomware etc.
                                              ensure one copy of the backup is
       A  seasoned  leader,  Alok  Sood                                           P r i v a c y - E n h a n c i n g
                                              offsite.
       has  carved  his  niche  in  the                                           Computation Techniques: Unlike
                                              Cloud  backups  are  gaining
       Indian  IT  industry.  At  Percept                                         common  data-at-rest  security
                                              much popularity today as they
       India, a media, communications                                             controls,  privacy-enhancing
                                              take  care  of  both  back-ups  as
       &  entertainment  organization         well offsite.                       computation (PEC) protects data
       with  a  strong  presence  in  India   Organizations  that  cannot  opt    in  use.  As  a  result,  organizations

       and the Middle East market, he is      for certain data backups to the     can  implement  data  processing

       responsible for project planning,      cloud  build  solutions  on-        a n d   a n a l y t i c s   t h a t   w e r e
       m a n a g e m e n t ,   a n d          p r e m i s e   t o   e n s u r e   d a t a   previously impossible because of

       implementation.                        availability  with  minimum         privacy or security concerns.
                                              downtime in the case of attacks.
       In an interaction with DTM, Alok                                           Better AI/ML: Better AI/ML-based
       talks  about  the  growing            Tackling Attacks                     solutions  will  come  into  play,

       importance of data protection         Both business and IT leaders have    which  will  be  excellent  at
                                             to  work  jointly  in  framing  data
       and ways to tackle attacks.
                                             privacy  policies  after  classifying   detecting potential attacks much
                                             the data. The higher the criticality   before they happen.
                                             of data, the higher should be the




                                                                                                               Nov. 2022
   6   7   8   9   10   11   12   13   14   15   16