Step 2 – Create the Security Architecture

Hello All. Here is wishing everyone a very Happy and Safe Diwali. Diwali is a festival of lights, and this is a time to get together and celebrate. As we celebrate, we also say a silent prayer of thanks to the countless police, defense forces and cybersecurity specialists who are holding the fort and letting us celebrate through their continuous effort to keep us safe. This series is dedicated to…

Read More

Step 1 – Define the Policy (for both Digital and Cyber/ Information Security)

Thank you for reading through this and as I had mentioned earlier, this is a series. This article is the next in the series. Your feedback means a lot and I appreciate the comments coming my way. In case you have missed the earlier articles, the links are below. Article 1 – http://arrka.com/index.php/2017/07/12/exploring-the-ciso-role-especially-for-the-smb/ Article 2 – http://arrka.com/index.php/2017/08/13/smb-ciso-series-article-2-going-digital-what-dangers-are-you-walking-into/ A policy document, for all practical purposes, is a statement of intent of…

Read More

SMB CISO Series – Article 2 – Going Digital – What dangers are you walking into?

Going Digital is no longer the world of the rich and the famous and the Fortune 500 ones! Going Digital is the mantra for the future scale. Digital means many things, and among the more common ones is about getting information into the electronic age. This requires transformation. For a bank, this means instead of filling forms; have a kiosk where customers can scan their credentials and auto-fill. For Manufacturing…

Read More

Lessons Reiterated by the New York Times Hack

As we keep interacting with folks from different types of organisations in this part of the world, and keep addressing so many ‘fallacies’ around managing Information Security, along comes news of yet another high-profile hack that reiterates some basic lessons. Here is a ‘quick take’ on the lessons we can learn… What Happened – The Background: – The NYT revealed yesterday that it’s computer systems had been attacked & infiltrated…

Read More