SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Cyber Security
Point of View | Cyber Security
Santha Subramoni
Global Head, Cyber
Security Practices, TCS
Tirath Singh
Global Head, Cognitive Threat
Management Services, Cyber
Security, TCS
Authors
Empowers
Business Growth
March 2021
KEY TAKEAWAYS
While digital transformation is a focus area for many companies,
cyber security requirements tend to get overlooked
Many cyber security practices are focused on ensuring
compliance instead of mitigating risk
Today’s challenges require a zero-trust approach: ‘never trust,
always verify’
User passwords and VPNs can’t protect enterprise data
The best cyber security solutions are now services, not just software
THE PROBLEM
Security lags behind product development and customer
experience, leaving data, critical operations and human lives at risk
Companies lag in adoption of zero-trust cyber security
principles and tools
Technology advances are enabling purpose-driven, resilient and
adaptable enterprises
Yet for many companies, cyber security is still an afterthought
THE CHALLENGE
Robots, microservices, automated functions and technologies
The cyber security threat landscape grows increasingly
complex
Partners and third-party suppliers
Employees
Breaches and threats occur from a vast array of vulnerabilities:
THE SOLUTION
Companies must implement finer-grained, adaptable cyber security
Passwords
Multi-factor
authentication
VPN
Context –
device,
resources,
access
requested
The digital
ecosystem:
cloud, AI,
automation,
etc.
Software-
based
Services-
based
Managing
permissions
Mitigating
risk
Mainframes,
servers & local-
area networks
Usernames
Roles and
identities
TO
FROM
ACHIEVING ‘ZERO TRUST’ CYBER SECURITY
Continuous risk-discovery,
real-time treatment
Never trust. Always verify.
Purpose-driven access
Security as culture
Security by design
Information-centric security
Granular, risk-based and adaptive controls for every
access request
THE TCS APPROACH
How to implement adaptable cyber security
Provide scalable and adaptive access
Leverage insight-led intelligence for human and automated
decisions
Keep bad and reckless actors at bay
Design and implement resiliency to ensure business continuity
Enable real-time detection to take immediate action
PERCEIVED OBSTACLES TO IMPLEMENTATION
Budget. Innovation.
1. 2.
Objection: “We can’t keep investing in point solutions to address specific cyber risks,
because the risks and costs just keep increasing.”
Response:
Cutting-edge cyber security is consumption-based. With cyber
security-as-a-service, companies can optimize cash flow and gain access
to the latest defenses.
Objection: “Compliance-based cyber security is a brake on our ability to collaborate, innovate
and transform.”
Response:
Modern cyber security practices are adaptable enough to meet the demands
of fast-moving teams and emerging opportunities, because they remove
many of the one-size-fits-all constraints of legacy cyber security solutions.
1. Discover
A thorough assessment is the first step to helping business leaders
understand their readiness for modernizing cyber security
2. Define
Create a roadmap based on discovery outcomes
3. Develop
Allocate some resources to a scrum team to address tactical work to
shore up defenses and implement the most foundational solutions
4. Deliver to scale
Deploy strategic security by expanding work to multifold streams of
scrum teams delivering continuously with accelerated agility
CALL TO ACTION
SUMMARY
How modernizing cyber security empowers business growth
Cyber security-as-a-service frees up capital to be spent on strategic
development
Leveraging the digital ecosystem – AI, automation, cloud,
blockchain, etc. – enables the cyber security posture to keep pace
as the business and operating models becomes more digital
A more adaptable cyber security approach makes a business more
resilient, positioning itself to survive new challenges and take
advantage of emerging digital opportunities.
Download the Article Contact Us
Cyber Security
Empowers
Business Growth
Point of View | Cyber Security

Contenu connexe

Plus de Tata Consultancy Services

Plus de Tata Consultancy Services (20)

Make risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agendaMake risk and cybersecurity a boardroom agenda
Make risk and cybersecurity a boardroom agenda
 
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership StudyOutlook for the mid-2020s - TCS 2021 Global Leadership Study
Outlook for the mid-2020s - TCS 2021 Global Leadership Study
 
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
TCS 2021 Global Financial Leadership Study - The Next Era in Financial Planni...
 
TCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings ReportTCS 2021 Global Leadership Study: Key Findings Report
TCS 2021 Global Leadership Study: Key Findings Report
 
Protecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the EnterpriseProtecting Sensitive Personal Data in the Enterprise
Protecting Sensitive Personal Data in the Enterprise
 
Leadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind meltsLeadership in the digital era: new mandates, mindsets, and mind melts
Leadership in the digital era: new mandates, mindsets, and mind melts
 
The digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailersThe digital capabilities of the most resilient retailers
The digital capabilities of the most resilient retailers
 
Mastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics RevolutionMastering the Post-Pandemic Logistics Revolution
Mastering the Post-Pandemic Logistics Revolution
 
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
How the CFO Can be an Effective Partner to the CEO in Navigating the Pandemic...
 
Today’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite ReinventionToday’s Digital Imperatives Demand C-Suite Reinvention
Today’s Digital Imperatives Demand C-Suite Reinvention
 
A new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantageA new CMO role: leveraging an organization’s purpose for strategic advantage
A new CMO role: leveraging an organization’s purpose for strategic advantage
 
Digital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the ImpactDigital Readiness and the Pandemic: Assessing the Impact
Digital Readiness and the Pandemic: Assessing the Impact
 
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
Reduce cost, improve coverage, and enhance effectiveness by using UAVs/Drones...
 
Transforming Asset Inspection with “Insights-on-the-Go” using AR based hands-...
Transforming Asset Inspection with “Insights-on-the-Go” using AR based hands-...Transforming Asset Inspection with “Insights-on-the-Go” using AR based hands-...
Transforming Asset Inspection with “Insights-on-the-Go” using AR based hands-...
 
A Digital Rebirth for Life Insurance, Annuities and Pension Companies
A Digital Rebirth for Life Insurance, Annuities and Pension CompaniesA Digital Rebirth for Life Insurance, Annuities and Pension Companies
A Digital Rebirth for Life Insurance, Annuities and Pension Companies
 
TCS 2020 CIO Study: Data Priorities & Practices
TCS 2020 CIO Study: Data Priorities & PracticesTCS 2020 CIO Study: Data Priorities & Practices
TCS 2020 CIO Study: Data Priorities & Practices
 
TCS 2020 CFO Study Master Report - How real-time intelligence will separate t...
TCS 2020 CFO Study Master Report - How real-time intelligence will separate t...TCS 2020 CFO Study Master Report - How real-time intelligence will separate t...
TCS 2020 CFO Study Master Report - How real-time intelligence will separate t...
 
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
TCS 2020 CFO Study: Key Findings - Empowering the enterprise with data-driven...
 
TCS 2020 CIO Study - Roles & Responsibilities in Digital Business
TCS 2020 CIO Study -  Roles & Responsibilities in Digital BusinessTCS 2020 CIO Study -  Roles & Responsibilities in Digital Business
TCS 2020 CIO Study - Roles & Responsibilities in Digital Business
 
Transforming Clinical Development with IOT
Transforming Clinical Development with IOTTransforming Clinical Development with IOT
Transforming Clinical Development with IOT
 

Dernier

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 

Dernier (20)

Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 

Cyber Security Empowers Business Growth

  • 1. Cyber Security Point of View | Cyber Security Santha Subramoni Global Head, Cyber Security Practices, TCS Tirath Singh Global Head, Cognitive Threat Management Services, Cyber Security, TCS Authors Empowers Business Growth March 2021
  • 2. KEY TAKEAWAYS While digital transformation is a focus area for many companies, cyber security requirements tend to get overlooked Many cyber security practices are focused on ensuring compliance instead of mitigating risk Today’s challenges require a zero-trust approach: ‘never trust, always verify’ User passwords and VPNs can’t protect enterprise data The best cyber security solutions are now services, not just software
  • 3. THE PROBLEM Security lags behind product development and customer experience, leaving data, critical operations and human lives at risk Companies lag in adoption of zero-trust cyber security principles and tools Technology advances are enabling purpose-driven, resilient and adaptable enterprises Yet for many companies, cyber security is still an afterthought
  • 4. THE CHALLENGE Robots, microservices, automated functions and technologies The cyber security threat landscape grows increasingly complex Partners and third-party suppliers Employees Breaches and threats occur from a vast array of vulnerabilities:
  • 5. THE SOLUTION Companies must implement finer-grained, adaptable cyber security Passwords Multi-factor authentication VPN Context – device, resources, access requested The digital ecosystem: cloud, AI, automation, etc. Software- based Services- based Managing permissions Mitigating risk Mainframes, servers & local- area networks Usernames Roles and identities TO FROM
  • 6. ACHIEVING ‘ZERO TRUST’ CYBER SECURITY Continuous risk-discovery, real-time treatment Never trust. Always verify. Purpose-driven access Security as culture Security by design Information-centric security Granular, risk-based and adaptive controls for every access request
  • 7. THE TCS APPROACH How to implement adaptable cyber security Provide scalable and adaptive access Leverage insight-led intelligence for human and automated decisions Keep bad and reckless actors at bay Design and implement resiliency to ensure business continuity Enable real-time detection to take immediate action
  • 8. PERCEIVED OBSTACLES TO IMPLEMENTATION Budget. Innovation. 1. 2. Objection: “We can’t keep investing in point solutions to address specific cyber risks, because the risks and costs just keep increasing.” Response: Cutting-edge cyber security is consumption-based. With cyber security-as-a-service, companies can optimize cash flow and gain access to the latest defenses. Objection: “Compliance-based cyber security is a brake on our ability to collaborate, innovate and transform.” Response: Modern cyber security practices are adaptable enough to meet the demands of fast-moving teams and emerging opportunities, because they remove many of the one-size-fits-all constraints of legacy cyber security solutions.
  • 9. 1. Discover A thorough assessment is the first step to helping business leaders understand their readiness for modernizing cyber security 2. Define Create a roadmap based on discovery outcomes 3. Develop Allocate some resources to a scrum team to address tactical work to shore up defenses and implement the most foundational solutions 4. Deliver to scale Deploy strategic security by expanding work to multifold streams of scrum teams delivering continuously with accelerated agility CALL TO ACTION
  • 10. SUMMARY How modernizing cyber security empowers business growth Cyber security-as-a-service frees up capital to be spent on strategic development Leveraging the digital ecosystem – AI, automation, cloud, blockchain, etc. – enables the cyber security posture to keep pace as the business and operating models becomes more digital A more adaptable cyber security approach makes a business more resilient, positioning itself to survive new challenges and take advantage of emerging digital opportunities.
  • 11. Download the Article Contact Us Cyber Security Empowers Business Growth Point of View | Cyber Security