Digital Identity , Governance & Risk Management , Privacy

Establishing Privacy in a Data-Driven Economy

Trust Bank's Mahmud Discusses Additional Steps for Banks
Sakil Mahmud, AVP, information security, risk and compliance,Trust Bank

Banks in Bangladesh must ensure having a proper data repository and understanding the data flow to establish privacy in a data-driven economy, says Sakil Mahmud, AVP, information security, risk, and compliance at Trust Bank.

See Also: An Identity Security-first Approach to the Evolving Threat Landscape

"One size fits all approach will not work here as privacy in Bangladesh is treated differently than Europe," says Mahmud and suggests banks in Bangladesh first understand data flow. "You should map your data flow – how data is coming to your organization, how it is moving around, with whom you share the data, which the third party you are storing your data etc.", says Mahmud.

In a video interview with Information Security Media Group, Mahmud also discusses:

  • How must Bangladesh go about framing privacy law;
  • Practical steps that must be considered;
  • What must be the role of DPO?

Mahmud is AVP, information security, risk, and compliance at Trust Bank. Among the many responsibilities, he is required to set up the bank's technology security roadmap for the bank i.e., planning, developing, and deploying the enterprise information security strategy and program.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.