Page 5 - NOVEMBER MAGAZINE 2022
P. 5

A  seasoned  and  accomplished  leader  with  In an interaction with Team Digitaltech Media,
       diverse sales, business, and partner leadership  Debasish spoke about the growing market and
       experience  in  the  IT  industry,  Debasish  brings    demand for data protection & privacy and how
       Global and Cross-cultural work experience from          SonicWall  offers  the  best-in-class  tools  &
       both India and the Gulf. He holds an MBA from           t e c h n o l o g i e s   f o r   s a f e g u a r d i n g   d a t a .

       the  New  Delhi  Institute  of  Management  with  a     Read excerpts from his interview below.
       specialization in marketing and is a Graduate in
       Science.

       Can you throw more light on the       business  email  compromise          How Businesses and IT Leaders
       growing  importance  of  data         (BEC),  and  ransomware.  For        can address these issues?
       protection & privacy?                 instance,  many  organizations       Every  organization  is  different,

                                             h a v e   i n a d e q u a t e   b a c k u p
       Today,  data  is  boundless  and                                           and there is no single approach to
       m o v e s   a c r o s s   a l l   s o r t s   o f   processes  to  enable  them  to   creating  a  sound,  layered
                                             recover  from  a  ransomware
       b o u n d a r i e s ,   d e v i c e s ,   a n d
                                             attack  rapidly,  and  others  lack   cybersecurity  environment.
       geographies. Data plays a crucial
                                             strong internal control processes    While  there  are  many  different
       role for organizations for business,
                                             t h a t   w o u l d   p r e v e n t   C E O   routes  to  achieving  this  kind  of
       financial  growth,  and  other         Fraud/BEC attacks.
       management  decisions.  Such  a                                            cybersecurity  posture,  some  of
                                             What  about  a  data  recovery       the essentials include:
       scenario  creates  an  increased
                                             post-attack?
       requirement for defense against                                              Network security

       cyber warfare.                        At  SonicWall,  we  have  always       Real-time sandboxing
                                             believed  that  a  good  backup
       Organizations  must  recognize                                               Zero-trust security
                                             process  and  strategy  is  the
       and  address  the  increased                                                 Strong authentication
                                             primary  line  of  defense  for  data
       cybersecurity  risks  from  all
                                             recovery after any cyber-attack.       TLS/SSL inspection solutions
       aspects  of  their  network.  Today
                                             Enterprises  need  to  ensure  that    Cloud application security
       there's a greater need to secure      the  backup  solutions  used  are      Mobile and remote access security
       and establish an IT framework to      resistant  to  ransomware  or  any     Email security solutions
       build  a  solid  foundation  for  a   other  attacks  while  monitoring
       healthy data security and privacy     the  status  and  integrity  of      India  is  still  waiting  for  a  data

       plan.                                 backups continuously.                protection  law.  What  can  we
                                                                                  expect next?
       Why  do  you  feel  the  protection   Recovery  as  a  process  goes
       gaps are growing?                     beyond  restoring  the  data.        As far as data protection laws and
                                             Having the tools & processes for     policies are concerned, one of the
       Cybercriminals  are  succeeding       restoring  endpoints  to  a  golden   primary issues is that most Indian
       because  organizations  fail  to      image can speed up the recovery      sectors using digital technologies
       exercise adequate due diligence       time.  Also,  security  hygiene  is
       to address the issues of phishing,    critical  to  protect  against       o r   i n t e g r a t i n g   e m e r g i n g
       spear phishing, CEO fraud/ -          “human-operated”  attacks,  and      technologies do not have a digital

                                             a  holistic  view  of  the  entire   r i s k   e l e m e n t   d e fi n e d   b y   a
                                             organization is required.            regulatory authority.


                                                                                                               Nov. 2022
   1   2   3   4   5   6   7   8   9   10