Access Management , Application Security , Artificial Intelligence & Machine Learning

CyberEdBoard Profiles in Leadership: Krishnamurthy Rajesh, Digital Innovation Lead from a large financial Services Sector

How to Balance Security and User Convenience
Krishnamurthy Rajesh, head-IT & information security, ICRA

To help balance security and user convenience, organizations should offer secure centralized user access to applications in an integrated way, says Krishnamurthy Rajesh, Head-Information Technology at ICRA Limited, an India-based credit rating agency.

See Also: Live Webinar | A Buyers' Guide: What to Consider When Assessing a CASB

CISOs must take steps to detect threats from various feeds to gain proactive security control over multiple functions, Rajesh adds.

In a video interview with Information Security Media Group as part of the CyberEdBoard’s ongoing Profiles in Leadership series, Rajesh also discusses:

  • Managing unknown threats;
  • Enhancing SoC capabilities with artificial intelligence and machine learning;
  • The value of collaboration in bridging security gaps.

Rajesh, Head the information technology, and information security at ICRA. With over 19 years of information technology experience in multiple business domains at the senior leadership level, Rajesh has expertise in strategizing and implementing different elements of technology and process from the inception to operation stage. This includes information security, digital transformation, and adapting to new technologies like AI, IoT, and RPA.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Managing Editor, Asia & the Middle East, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.