Advertisment

Shaping Data Handling and Cybersecurity in Enterprises: The Intersection of Compliance and Innovation

The evolving landscape where compliance regulations, particularly regarding data handling, intersect with cybersecurity initiatives.

author-image
Aanchal Ghatak
New Update
Data Handling

Jaspal Sawhney, Chief Information Security and Privacy Officer at Tata Communications

In an era dictated by data-driven innovation, recent regulations like the Digital Personal Data Protection Act (DPDPA) of 2023 have reshaped how organizations navigate personal data. These regulations stand as a beacon for transparency, holding businesses accountable while fortifying user data security. They present a strategic opportunity for enterprises to realign their data practices, cultivate trust, and bolster compliance. However, this shift isn't without challenges, demanding a reevaluation of cybersecurity strategies, technology implementations, and collaborative efforts across departments to adapt and thrive in this new landscape.

Advertisment

Jaspal Sawhney, Chief Information Security and Privacy Officer at Tata Communications, provides insightful perspectives on the evolving landscape of data protection regulations and their influence on organizations. Sawhney emphasizes the crucial role of these regulations in reshaping data handling practices, cybersecurity strategies, and collaborative efforts across departments. His expertise sheds light on the opportunities and challenges businesses face in adapting to these transformative changes, highlighting the intricate balance between innovation and compliance in the digital age.

How have recent regulations, such as DPDP (Digital Personal Data Protection Act, 2023) and others, influenced the way organizations handle personal data?

In an age, where data drives innovation and fuels business expansion, safeguarding data privacy has become a paramount concern for enterprises globally. The introduction of the DPDP act aims to enhance transparency among users, brands and platforms, holding businesses accountable while bolstering the security and privacy of user data. This legislation also presents an opportunity for businesses to build trust and confidence within the industry, offering a strategic window to align their data processing procedures with the new regulations. It’s a crucial opportunity for businesses to enhance compliance and cultivate deeper trust with their customer base.

Advertisment

At the core of the DPDPA lies the concept of consent, the first step is to conduct a thorough review of data processing activities and identifying what personal data is collected, stored, shared, and transferred. During this transitional phase, organizations should prioritize obtaining proper consent from individuals before processing their personal data. Ideally, leveraging advanced digital verification systems can establish trust and transparency. Transparency plays a vital role – informing users about the purpose and method of data processing is key to building trust. By proactively aligning their operations with the principles of the DPDPA, utilizing software platforms, and preparing for the upcoming specific rules, organisations can position themselves as pioneers in responsible data management and privacy in the digital era.

What are some key challenges organizations face in complying with these data protection regulations, and how have they adapted their cybersecurity strategies to meet these requirements?

Businesses are now tasked with enhancing their core processes and customer products to ensure data privacy for diverse stakeholders, including customers, vendors, and employees. This involves adhering to established guidelines related to data processing, notice, consent requirements, and other provisions. Moreover, companies must demonstrate their preparedness by establishing compliance frameworks and bodies, given the imminent arrival of new laws and regulations. They also need to show readiness to set up compliance frameworks since new laws and regulations are on the way.

Advertisment

Tata Communications is enabling digital transformation of enterprises across 190 countries and territories, powered by 13,000+ employees spread across geographies. With such expansive network of customers, partners, workforce and digital infrastructure, data security is our utmost priority. We design and deliver our solutions and services with customers’ data security and privacy in mind. We maintain a wide variety of compliance programs and accreditations that validate our security controls. The privacy journey at Tata Communications began several years ago pursuant to the EU Directive 95/46/EC (subsequently replaced by GDPR) and the IT Act Rules on Sensitive Personal Data. Our comprehensive privacy policy underscores our commitment to protect personal data and defines how we collect, use, disclose and protect the same complying with privacy laws and requirements in different geographies where we have business and operations. With regards to India Digital Personal Data Protection Act 2023, Tata communications has been very closely engaged throughout the consultation process and acknowledge DPDPA as a significant first step in India’s privacy journey.

How do data protection regulations affect the development and implementation of cybersecurity technologies and practices within organizations?

In the realm of data privacy laws, enterprises prioritize fostering a culture of privacy that permeates every facet of their organization. This approach emphasizes responsible information handling and ensures that privacy considerations are seamlessly integrated into all operational aspects. Data Privacy regulations emphasize also on adequate protection for data classified as personal data. Data discovery and classification tools when used with data flow solution help identify personal data elements and processes where these need to be safeguarded. Various Data Loss prevention, Database access management, encryption tools etc can suitably be deployed to build adequate defence in depth protecting across vital business operations.

Advertisment

In your opinion, what are the main benefits and drawbacks of data protection regulations for both consumers and businesses?

Data protection regulations are aimed to safeguard privacy and data access rights of individuals, allowing users to know what personal information is being collected for what purpose. In addition, organisations are required to obtain explicit consent before collecting and processing personal data and ensure adequate security measure and controls to protect personal data from unauthorised access , disclosure, and alteration. DPAs also impose legal obligations on organizations, making them accountable for ensuring compliance with above requirements and in turn provide adequacy assurance for the transfer and handling of personal data across borders facilitating a greater flexibility with business operations within global supply chain relationships.

However, compliance with above requirements bring their own overheads. Besides the financial burden of implementing and maintaining the underlying controls, an ongoing compliance across all critical functions requires a serious commitment, training and checks. It is also believed that restrictions to access minimal personal data and that for specified purpose only, limits innovation and affect pace of research and development, particularly where comprehensive datasets are required to be put through intensive processing. Finally securing personal data requires additional tooling and is computationally resource intensive.

Advertisment

It's important to note that the goal of data protection regulations is to strike a balance between protecting individual privacy and fostering innovation responsibly. Efforts are being made to design regulations that allow for both privacy protection and technological advancement.

What are the key responsibilities of a CISO in today's digital landscape?

In the contemporary business landscape, technology permeates every aspect of operations, making the role of Chief Information Security Officers (CISOs) instrumental in steering digital transformation. CISOs must possess the agility to navigate the ever-changing cybersecurity landscape, staying updated on the latest trends to ensure the organization's strategies remain current. In today's digital sphere, a CISO's responsibilities extend beyond mere threat response. They are tasked with proactively identifying risks, formulating robust strategies, and aligning security initiatives with overarching business goals. As organisations progress with technological advancements, CISOs must transition from being technical experts to strategic partners. Modern CISOs need to deeply comprehend the organization's business requirements and translate these insights into practical security measures and policies. A well-defined role, coupled with appropriate empowerment and a comprehensive skill set, empowers a CISO to serve as a true cyber guardian for the organization. This role not only holds significant potential for growth and development but also serves as a linchpin in ensuring the company's cybersecurity aligns with its strategic objectives.

Advertisment

How does a CISO contribute to an organization's overall risk management strategy?

In the past decade, the role of Chief Information Security Officers (CISOs) has significantly evolved beyond its traditional boundaries of managing security architecture and ensuring technology safety. Modern CISOs now shoulder strategic responsibilities, encompassing broader initiatives such as cyber risk management, operational resilience, innovation, and fostering growth. Collaborating closely with other stakeholders, CISOs play a crucial role in prioritizing risks during product assessments. They regularly conduct thorough risk assessments to pinpoint vulnerabilities and potential compliance gaps. To effectively assess risk, CISOs establish baseline security criteria, focusing on essential elements like customer contracts and regulatory mandates. By comprehensively understanding the risks inherent in their industry, technology infrastructure, and data handling practices, CISOs can strategically prioritize security initiatives and allocate resources efficiently. Their risk management strategies are meticulously aligned with compliance requirements, ensuring the implementation of robust security controls and incident response plans. This proactive approach safeguards the organization's interests while promoting sustainable growth and innovation.

How does the CISO collaborate with other departments within an organization to enhance cybersecurity measures?

Advertisment

In today's dynamic business landscape, security leaders play a pivotal role in guiding discussions with their board members to safeguard their organisations from emerging threats. While investing in internal safety technologies is essential, fostering a culture of cyber trust and implementing a robust cybersecurity policy are paramount.

The key challenge lies in aligning the entire organisation towards these goals. Equipped with accurate information, it falls upon the Chief Information Security Officer (CISO) to effectively engage board members, ensuring they share the same perspective on organisational security. This involves preparing for worst-case scenarios, while also demonstrating how cybersecurity measures can drive business outcomes and enhance the organisation's overall impact. Tata Communications offers a comprehensive solution through its single-vendor platform, integrating Security Service Edge (SSE) architecture. This unified approach secures web, private, and SaaS applications against threats originating from web, cloud, and network sources. Coupled with our state-of-the-art Managed Detection and Response (MDR) capabilities, this platform enables rapid detection of critical incidents and ensures a swift response, reinforcing organizational security in an ever-changing digital landscape.

How does the CISO role align with compliance and regulatory requirements in various industries?

In the ever-changing business landscape, it's imperative for Chief Information Security Officers (CISOs) to keep pace with evolving compliance regulations. For organizations operating on a global scale, awareness of international standards is essential, while those within specific industries must adhere to sector-specific rules. Understanding these compliance requirements is vital, as non-compliance can lead to significant penalties and damage to a company's reputation. To effectively navigate the complex terrain of regulatory compliance, CISOs should establish a robust framework tailored to their organization's unique needs. This framework must encompass well-defined policies, procedures, and controls aligned with specific regulations. Additionally, it should incorporate mechanisms to monitor compliance, conduct regular audits, and track remediation efforts.

At Tata Communications, we provide an enterprise-class, Infrastructure and Platform as a Service cloud, complete with an architecture designed with the API economy in mind. This cloud platform, which is ‘made in India’ and ‘made for India’ takes care of data sovereignty, residency, and privacy requirements of regulated entities. Tata Communications’ secure and compliant sovereign cloud offers peace of mind to regulated bodies by ensuring data privacy and sovereignty that safeguards extremely sensitive and valuable data, with both user data and meta data deployed, monitored, and managed 100% in-country and governed by the laws of India.

tata-communications aanchalg
Advertisment