" With 5G, data can move fast, it can also accelerate risk allowing cyber criminals to move faster"
Rohit Ghai, President RSA talks Data security and highlights the need for emerging and established enterprises to adopt cyber security
What are the two biggest threats as it relates to cyber security given the rise of emerging technologies like 5G, AI, IoT, etc?
Everything comes down to Data as this is the currency of the digital era. The first risk faced in this era is that data can be stolen. In order to offer digital experiences to consumers, we have to create their profile and therefore have to gather data. Being a good custodian of that consumer data is extremely important for an organization’s reputation as well as its financial safety moving forward.
The second risk we face is that we are increasingly going to live in a world of Artificial Intelligence and machine learning where data is used as fuel. If the data is tampered with, you face the garbage-in-garbage-out situation and this feeds automated decision support systems that are relying on tampered data resulting in compromised AI and sub-optimal outcomes.
What should countries that host large scale events such as World EXPO 2020 be vigilant about to mitigate any damages as it relates to cyber security?
Any large event today is more connected than ever before. It has a large target painted on its back because hackers and adversaries are driven by the motivation to gain publicity as well as capture the attention of cyber citizens across the world and instill fear in them.
For the large scale events it is important to recognize both the risks as well as the opportunities that present themselves. Governments and companies should also pay attention to all the new technologies that are being adopted that could create digital risk. Events such as World Expo 2020 are extremely connected events that use technologies such as the IoT, Cloud and more that pose risk and therefore enough attention to risk management and cybersecurity is paramount to make sure that these events run smoothly and successfully without incident.
Furthermore, the impending implementation of 5G is a significant accelerant. With 5G, data can move fast and is the foundation for IoT networks. As much as 5G can accelerate value creation, it can also accelerate risk allowing cyber criminals to move around the network and connected devices faster than ever before making it something that needs attention.
Ransomware is something that is affecting companies across the world and in the region. What can companies do to mitigate the risks associated with this kind of attack and what solutions does RSA Security offer?
There are two types of ransomware. The first is ransomware as it pertains to data and the second is ransomware as it pertains to infrastructure where a turbine, train or something of that caliber is compromised and cybercriminals demand for financial compensation to release the data or infrastructure and restore normal operations.
A business resiliency program is needed counter the threat of ransomware. As it pertains to data, you must have air tight copies of data so that even if data is compromised, you do not find yourself as the victim for the demand for ransom.
For the infrastructure side, if you have business resiliency, if the infrastructure is somehow compromised because of a cyber-attack or any other reason that you have a fallback plan whereby you can manage operations despite that failure.RSA Security helps organizations across the world create robust business resiliency risk management programs.
How will cybersecurity evolve over the next decade?
In the next decade I believe that cyber security will be more business driven. Across the world, people are overwhelmed with the concept of cybersecurity as there is too much work that is required to be done.
In the coming years, cyber security will do three things. The first is automation where work will be automated. The second is that cyber security will benefit from business context and take a risk orientation enabling individuals to prioritize the risks based on the importance of the risk that is faced. Third, the infrastructure providers will have to play a larger role to reduce the attack surface so cybersecurity will be hardwired and designed into the infrastructure of the future.