Kapil Madaan is the new CISO of global automotive firm Spark Minda Group. Madaan would be based out in Gurugram and will report to Ashok Jade, Group’s Chief Information & Technology Officer. Spark Minda has over 17,000 workforces worldwide and is into manufacturing of all sorts of vehicles — passenger, commercial, motorcycle, scooter and off-road. Madaan has over 12 years of work experience and was the cybersecurity leader at Max Healthcare previously.
Zoom on Wednesday announced former Salesforce security executive Jason Lee as its chief information security officer. Lee will take over from June 29 and will lead Zoom’s security team. Zoom has been in talks due to its recent security vulnerabilities and this move comes as the firm is nearing the end of its 90-day security plan. Before Salesforce, Lee was a security engineering executive at Microsoft Corp for 15 years.
Unique Kumar is the new Group CISO of CK Birla Group. The $2.4 bn conglomerate, with business interest in five continent, has over 24,000 employees. The group has interests in technology, automotive, home, building, healthcare, and education. Kumar’s last assignment was with Max Hospitals as a Head of Digital Innovation and Cybersecurity. During his close to two decades of experience, he has worked with Aviva Life Insurance, Aptara, and Idea Cellular.
Infosys uses ML and AI for proactive threat intelligence. First, they create a system-friendly language to avoid malicious feed parsing followed by receiving the usable feed. Then they filter threat-causing IPs thereby blocking their reception in firewall and proxies. 2. Secure access (two-factor authentication, VPN gateways, etc) and secure edge phenomenon maintain security. 3. Board involvement in knowing new cyber threats and preventive measures.
1. As remote workers use open networks, they should change passwords regularly. 2. Ensuring software-based security by either using BYOD or Virtualization depending on requirements. 3. Close work collaboration between Security teams, HR, and senior management along with behaviour analytics to avoid data breaches by disgruntled employees. 4. Designing network access principles to meet conditional and contextual security needs.