Zero Trust Gives much more Granular Control and Visibility on Access and Identity: Abhijit Chakravarty 

 In an era of rapid technological advancement and evolving cyber threats, the banking industry stands at a crossroads. To delve into the currents shaping this landscape, we sat down with Abhijit Chakravarty, Senior Vice President of Core Network & Security Operations at HDFC Bank. With a wealth of experience in network infrastructure, cybersecurity, and emerging technologies, Chakravarty shares insights into the current trends driving the banking sector’s transformation and HDFC Bank’s strategies for staying ahead in this dynamic environment 

 Please provide insights into the current trends shaping the banking industry, particularly in terms of technology adoption and cybersecurity? 

In the banking sector, three key trends dominate: payments, lending, and digitization. However, these endeavors are futile without robust cybersecurity measures. API integrations are at the forefront of technology adoption, facilitating seamless connectivity between applications. Security remains paramount, with a particular focus on API security, given the interconnected nature of modern banking systems. Moreover, application modernization, API integrations, blockchain, and confidential computing are crucial for enhancing security and efficiency. 

 How are banking organizations adapting their network infrastructure to meet the growing demands for speed, security, and seamless customer experience? 

Banking networks are undergoing a transformation, moving away from traditional setups to software-defined networks (SDN) and Network as a Service models. The integration of SD-WAN and security blurs the lines between network and security, ensuring a holistic approach to infrastructure management. Additionally, application modernization and cloud-native architectures are pivotal for enhancing agility and scalability. 

 What strategies are banks employing to stay ahead of emerging cyber threats, considering the evolving nature of cyber risks? 

Banks employ a two-pronged approach: defense and prediction. While defense mechanisms safeguard against known threats, predictive analytics and threat intelligence help anticipate and mitigate zero-day attacks. Technologies such as DDoS mitigation, email filtering, and identity and access management play a crucial role in bolstering security posture. 

 Are there any particular technologies you would like to highlight in this regard? 

DDoS mitigation, email phishing prevention, identity and access management, threat intelligence integration, and zero-trust network access are vital technologies in the fight against cyber threats. Additionally, robust SIEM and SOAR solutions streamline incident detection and response, ensuring timely remediation. 

 How do you handle situations where systems are compromised or data breaches occur? 

In the event of a system compromise or data breach, swift action is imperative. Isolating affected systems, conducting forensic analysis, and engaging cybercrime authorities are crucial steps. Additionally, having robust data backup mechanisms with air-gapped storage ensures data resilience and facilitates recovery in the aftermath of a breach. 

 Do you believe zero-trust architecture is effective in combating the challenges posed by emerging technologies like AI? 

Zero trust gives you much more granular control and visibility on access and identity. If we look at traditional VPNs, they served their purpose in the past when people needed to log into the network to work. VPNs provided a certain level of security, and later, some security was added with VDI. However, the challenge with VPNs and VDI is that when you log into a network, you essentially have lateral access to everything on that network if you compromise one identity. Zero trust addresses this issue by providing visibility and control at every stage. It challenges you at every step of access. To simplify, VPN is like locking the front door of your house; once inside, you have access to everything. Zero trust, on the other hand, challenges you at every point, like allowing access to specific rooms in your house. It’s about controlling access to different resources based on the user’s identity and posture. 

 How does zero trust handle BYOD scenarios? 

With zero trust, when someone logs in from their device or a third-party device, it allows you to check the device posture. You can verify if the device is clean, if the antivirus is updated, if it’s running the latest patches, and even if the software versions are up to date. For example, if someone wants to upload or download a PDF file, and the Adobe version they’re using is outdated, zero trust can restrict that action. It gives you the capability to enforce security measures based on device posture. 

 What is the significance of identity and access management (IAM) in today’s security landscape? 

IAM is foundational in security. It’s where security starts. Beyond IAM, organizations need mechanisms to log data from various systems. Simply logging data isn’t enough; you need to be able to correlate and analyze it effectively. This is where AI comes into play. AI helps in correlating and analyzing data to identify anomalies or suspicious activities. However, it’s crucial to fine-tune the algorithms continuously to minimize false positives and ensure accurate threat detection. 

 What are the standard operating procedures in case of a system hack or a network breach? 

If a system is hacked and the network is compromised, the first step is to isolate the affected systems from any access. Then, the focus shifts to understanding what happened, how it happened, and where it originated from. Forensic analysis and incident response are critical at this stage. However, incident response should not just be a theoretical plan; it needs to be tested through simulations or surprise drills to ensure its efficacy. Red teaming exercises, where simulated attacks are launched to test incident response, are increasingly common in organizations. 

 What advice do you have for handling data breaches? 

In case of a data breach, it’s essential to act swiftly. Forensic analysis can help determine the extent of the breach and the whereabouts of the compromised data. Reporting the breach to cybercrime detection authorities, like the cybercrime cell, is crucial. They have made significant progress in handling such incidents. Additionally, organizations need robust data backup strategies, including air-gapped backups, to mitigate the impact of ransomware attacks. Hackers now target backup sets directly, so having secure backup mechanisms is crucial. 

 How are banks navigating the regulatory landscape while fostering innovation in financial services? 

Banks need to classify and categorize data according to regulatory requirements, such as those outlined in the DPDP Act. Compliance audits, particularly for handling personal data (PCI DSS audits), are essential. Banks must ensure compliance with industry standards and regulatory requirements while partnering or collaborating with third parties. Security posture, risk assessment, and compliance auditing play a significant role in navigating the complex regulatory landscape. 

 How do banks balance customer-centric initiatives with maintaining high standards of data protection and privacy? 

Balancing customer experience with security is crucial. Too much convenience may compromise security, while excessive security measures may inconvenience customers. Technologies like SASE, API integrations, and digital journeys are essential for delivering a seamless customer experience while ensuring security. Organizations must focus on delivering SST (Simplicity, Speed, Trust) to customers to drive adoption of digital products and services. 

 What are your top tech and security priorities for the next one or two years? 

Visibility and observability remain top priorities, along with threat assessment and risk management. Enhancing customer experience through omni-channel integration and leveraging AI for personalization are also key priorities. Additionally, application and infrastructure modernization, coupled with robust security measures, are essential for staying ahead in the evolving landscape. 

 How have budgets for IT landscapes changed, given the increased emphasis on security and digital transformation? 

Budgets for security have increased as organizations recognize the importance of robust security measures. Similarly, investments in customer experience and digital transformation have also grown. However, it’s essential to align budgets with strategic priorities and focus on executing initiatives effectively to achieve desired outcomes. 

 What do you see as the most impactful trend shaping the future of the banking industry, and how is HDFC Bank positioning itself to embrace these trends? 

Open banking, payments innovation, and digitization are driving the future of the banking industry. HDFC Bank is positioning itself to embrace these trends by focusing on customer-centric initiatives, enhancing security measures, and leveraging AI and digital technologies to deliver personalized and seamless banking experiences. 

 What advice would you give to aspiring leaders in the ICT domain? 

Aspiring leaders should focus on aligning vision, strategy, and execution. Execution is paramount for success; having a great vision or strategy is not enough if you cannot execute effectively. Additionally, prioritize customer experience and business transformation, and always strive for simplicity, speed, and trust in technology implementations. Finally, remember that execution is an ongoing journey, and continuous learning and adaptation are key to staying ahead in the rapidly evolving ICT landscape.