| | November 20178CIOReview IN MY OPINIONBy Umesh Parshetye, Chief Technology Officer, ASK InvestmentUmesh has 19+ years diversified experience in multiple disciplines ­ IT Strategy, Business Analyst, Information Security, Unified Threat Management Systems, ISO 9001, ISO 27001 & BS25999 Standard Implementation & Maintenance, Private Cloud and Data Centre Consolidation. Also his experience spans Disaster Recovery Strategies, Business Continuity Plans (IT DR), Design and Customer Relationship Management.Digital TransformationThe way organizations operate and interact with each other has drastically changed with the advent of the digital revolution. Over the years, the impact of technology has been profound in financial services which are seeking to maintain competitive advantage, gain market share and satisfy evolving customer demands. Businesses around the globe are pursuing digital transformation and India is catching up on digital transformation due to Government policies. A shift from the traditional business model to a real-time, online, customer-centric digital model has led to high customer expectations delivered through various real-time, digital channels.Understanding Critical Information Assets:The organization should recognize that information is a critical asset and has to managed, controlled protected from unauthorized use, disclosure, modification, damage and loss. Additionally, information assets must be available when needed, particularly during emergencies and times of crisis. The organization has to develop or enforce guidelines to reduce the risks commonly associated with heterogeneous computing environments. It should set priorities on how the organization can efficiently and effectively address the management, control and protect the information assets.The Cyber Security Office utilizes a methodology that establishes Cyber Security requirements based on risk assessments. Once risk is determined the mitigation controls are identified and resourced . Security Management, compliance, cloud security and system IT SECURITY RESELLERS INSIDE THE ORGANISATIONCRITICAL INFORMATION ASSET FRAMEWORK INITIATIVESUmesh Parshetye
< Page 7 | Page 9 >