Nanjgel Solutions’ MD on Trends and Tips CISOs Must Keep in Mind

Jude Pereira, Managing Director, Nanjgel Solutions, reveals top tips for CISOs to follow to successfully mitigate new age cyber-attacks.

0 604

Can you share some business highlights in the last 12 months?

Over the past 12 months, business has been good and steady for Nanjgel Solutions. We were largely focused on the Work-from-Home or Secure Remote Access trend and delivered solutions to enable this emerging model. We also won some great IBM QRadar SOC projects from semi-government entities in Dubai who have full confidence in us. We attribute this success to our expertise in SIEM / SOC deployments and the 50 plus references we have in the UAE alone.

What are some of the key cybersecurity trends to watch out for in 2022?

The cybersecurity trends will be different for each customer because it depends on whether they are following on-premises or cloud or hybrid models. However, on a general basis, implementing Zero Trust Networks Access across the organisation will be one of the biggest trends this year. This needs to be done by considering five key components – User Validation, Device Validation, Access Validation, Privilege Validation, and full security functions. This includesdata protection, whitelisting and blacklisting of applications, geo location, data loss, device lock down and many more wrapped around the first four components.

What are your top tips for CISOs to mitigate the new breed of cyber-attacks?

My advice for CISOs to fight the new breed of cyber-attacks include the following –

  1. Ensure that you mandate the 80/20 rule of Cyber Resilience, where 80% of all tools and solutions deployed are automated and 20% work using manual intervention
  2. No single solution can do it all and multiple solutions only create noise – therefore, ensure all solutions are cross integrated for optimal performance to achieve validated results with minimum false positives
  3. Cyber Risk Quantification is extremely imperative for most organisations to better understand the cost of breach, dependencies on delivering secured services and cyber insurance
  4. Limit the number of endpoints to increase performance and productivity of all end-users
  5. Focus on zero day attacks and ransomware – they still exist
  6. Finally, always have a definite plan, framework or goal on where you are and what you want to achieve at all times or you will go off track and fail to accomplish your business objectives.

 

Leave A Reply

Your email address will not be published.

Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.