The CISO checklist for 2024: Mithilesh Singh, CISO, LIC India

LIC’s new CISO, Mithilesh Singh observes that the cybersecurity space is ever dynamic and CISOs should watch out for a few trends.
Shantheri Mallaya
  • Updated On Aug 17, 2023 at 11:05 AM IST
Read by: 100 Industry Professionals
Reader Image Read by 100 Industry Professionals
<p>Mithilesh Singh, CISO, LIC<br /></p>
Mithilesh Singh, CISO, LIC

Although the priorities for a CISO in 2024 may vary depending on the industry, organization size, and geographic location, the geo-political situation defines the cybersecurity trends and hence addressing the emerging threats is the most relevant challenge. Mithilesh Singh, who very recently joined one of India’s largest insurance corporations, LIC, as CISO, makes sharp observations about what the cybersecurity space will look like in 2024.

As the cybersecurity landscape evolves rapidly, the priorities might change based on emerging technologies, threats, and regulations.Mithilesh Singh, CISO, LIC


Advt
Post-pandemic, the adoption of technology, digitization and accordingly cyber risks has taken key priorities for enterprises.

Here are some potential key priorities for CISOs in 2024:

Zero Trust Architecture (ZTA) implementation: The adoption of Zero Trust principles continues to be a significant focus for CISOs. Implementing Zero Trust means verifying every user and device before granting access to resources, regardless of whether they are inside or outside the network perimeter.

AI and automation integration: AI and automation can enhance threat detection, response, and overall security operations. CISOs may need to prioritize integrating these technologies to improve incident response times and reduce human error.

Advanced threat detection and prevention: As cyber threats become more sophisticated, CISOs need to stay ahead by investing in advanced threat detection and prevention solutions. This might involve AI-driven behavior analysis, anomaly detection, and threat hunting capabilities.

Cloud security and compliance: As more organizations embrace cloud services, ensuring the security and compliance of data stored and processed in the cloud is crucial. CISOs need to focus on implementing robust cloud security strategies and ensuring compliance with relevant regulations.

Remote work and endpoint security: With the rise of remote and hybrid work models, securing endpoints becomes even more critical. CISOs should prioritize endpoint security measures to protect devices used by remote workers and mitigate the risks associated with remote access.

Advt
Supply chain and third-party risk management: Cyberattacks often target the vulnerabilities of third-party vendors and supply chain partners. CISOs should work on enhancing third-party risk management programs to ensure the security of the entire ecosystem.

Data privacy and compliance: Evolving data privacy regulations, such as DPDP2023, GDPR and CCPA, require organizations to prioritize data protection and user privacy. Singh comments, “CISOs need to ensure that data handling practices align with these regulations”.

Ransomware prevention and response: Ransomware attacks have grown in frequency and impact. CISOs should develop robust strategies to prevent and respond to ransomware incidents, including secure backup solutions and incident response plans.

Security awareness training: Human error remains a significant factor in cyber incidents. CISOs should continue to prioritize security awareness training programs to educate employees about potential threats and best security practices.

Regulatory compliance: Staying compliant with evolving cybersecurity regulations and standards is a continuous challenge. Singh observes, “CISOs should ensure that their organization's security practices align with industry-specific requirements”.

Incident response and recovery planning: In the event of a cyber incident, having a well-defined and tested incident response and recovery plan is essential. CISOs should regularly update and test these plans to ensure an effective response to security breaches.

Threat intelligence sharing: Collaboration and information sharing with other organizations and security partners can provide valuable insights into emerging threats and attack trends.

Singh concludes, “CISOs should prioritize participating in threat intelligence sharing communities”.

  • Published On Aug 17, 2023 at 11:05 AM IST
Be the first one to comment.
Comment Now

Join the community of 2M+ industry professionals

Subscribe to our newsletter to get latest insights & analysis.

Download ETCISO App

  • Get Realtime updates
  • Save your favourite articles
Scan to download App