Governance & Risk Management , Leadership & Executive Communication , Training & Security Leadership

How to Translate Business Challenges Into Tech Solutions

Expert Insights: Agnidipta Sarkar, Group CISO at Biocon, on Thinking Differently
Agnidipta Sarkar, group CISO, Biocon Group and executive member of the CyberEdBoard

Agnidipta Sarkar, the group CISO of Biocon Group, says organizations and CISOs are still missing the boat when it comes to treating cybersecurity as a business issue.

See Also: The Top 5 Security Practices With the Best Outcomes

"Business leaders need to realize that their dependence on IT is the same as they would depend on a truck that's carrying their equipment from factories to the market," Sarkar says.

He says translating a regulatory compliance requirement into business as usual is very complex, but if leaders "focus on business first, and have everything that the business needs come up from a cybersecurity perspective," the process will be a lot easier.

He shares advice on building a culture that understands that cybersecurity is a business issue.

In this CyberEdBoard Expert Insights interview, Sarkar discusses:

  • How enterprises and security leaders can think differently to protect against today's cyber incidents;
  • How to translate business requirements and objectives into the right technical solutions;
  • How to build a strong security culture.

CyberEdBoard is ISMG’s premier members-only community of seniormost executives and thought leaders in the fields of security, risk, privacy and IT. CyberEdBoard provides executives with a powerful, peer-driven collaborative ecosystem, private meetings and a library of resources to address complex challenges shared by thousands of CISOs and senior security leaders located in 65 different countries worldwide.

Join the Community - CyberEdBoard.io.

Agnidipta Sarkar is the group CISO for the Biocon Group. He spent three decades working for global companies including HP, HPE, DXC, HCL, Wipro and CMS IT services. He has been both an auditor and an auditee and a consultant, advising business leaders on cybersecurity, business continuity, privacy, risk optimization, standardization and resilience.


About the Author




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.