The strength of a chain is in its weakest link
Jayant Gundewar Executive Director-Value Solution Business, Ingram Micro
“If I go by my experience, I see that in large companies, even mature enterprises, it is very difficult to prevent a hacker from compromising an employee or vendor credential. In fact, employees, vendors get targeted by phishing attacks, either by clicking on malicious attachments, or infected websites. Now this may not be intentional on their part, but this is what is happening while the user accounts are getting compromised. Now we all know that the strength of a chain is in its weakest link. And it may be people in this case, but the only way to go forward as I see is to really have a zero trust framework addressing this environment and have a very tight compliance on the data classification. This is in correlation with the GRC should have much better predictability on the risk picture and also a complete view of the entire security posture.”
Fire Side Chat session at 6th Cyber & Data Security Summit 2022 |
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.