Topic: IT Infrastructure Management
Date:September 21, 2010
Speaker Profile :
Mr. Srinath Gopalakrishna has over 21 years of experience in the IT field. He has worked successfully with technology majors and start-ups alike. In his last assignment, he was Vice President at Covansys managing the European business. He started his career with Wipro and went to build a successful career at IBM, Ramco Systems, Kshema Technologies, Netkraft and Covansys. Srinath’s career spans functions in support, channel development, sales management, product management & marketing, global outsourcing, international operations and Business Development. He has a Bachelors degree in Engineering from Bangalore University.
Mr. Srinath Gopalkrishna, VP & GM, IMS Division, WEP Solutions delivered a lecture on “IT Infrastructure Management” to the students of KSOM. He also talked about ‘Positioning of e-security products in the Indian Market’.
He said security is a notion that is dependent on the risk attached to it. After risk categorization and prioritization we look for risk mitigation. Protecting confidential information is a business requirement, legal requirement and in many cases also an ethical requirement. Therefore Information Security is very important for any organization.
Mr. Srinath discussed about the concept of positioning, what is security, and the India IT security Scenario with citing various examples. He explained the concept of positioning, re-positioning and de-positioning and also the various types and methods of product positioning.
Coming to IT Security, he gave an idea of various modes of attack like spyware, malware, virus, worm, trojan, spam, phishing etc. The key question before companies today is: How do we safeguard their IT infrastructure / assets and information? It is here that we should realise the importance of Information security.
• Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction.
• Information security is an ongoing process.
• The never ending process of information security involves ongoing training, assessment, protection, monitoring & detection, incident response & repair, documentation, and review. This makes information security an indispensable part of all the business operations across different domains.
Who is vulnerable?
Financial institutions and banks, Internet service providers, Pharmaceutical companies, Government and defense agencies ,Contractors to various government agencies, Multinational corporations, Large and small enterprises, Educational Institutions, SoHo, Homes, personal devices.
Objectives of Security
The three fundamental pillars of Security: C-I-A
Confidentiality: Protect vital information while still allowing access to those who need it. Ex: Trade secrets, medical records, etc.
Integrity: Guaranteeing the identity of users, ensuring the integrity of their devices, and controlling access to user-appropriate data and resources
Availability: Guarantee availability of resources
Ex: 5 9’s (99.999% reliability)
Key question: How will today’s security solution evolve, scale to meet new challenges?
- Better Software
- Better Understanding
- Better Systems
- Better Systems Management
- Better People
Your network security is being evaluated on a weekly if not daily basis. If you’re smart, you’re the one doing the evaluating. You should test it before someone else does.