Studying the Changing Face of Tech

From cyber threats to AI in cybersecurity, IVLP alumna Kavitha Srinivasulu shares tips and best practices for businesses to safeguard data.

By Jason Chiang

July 2024

Studying the Changing Face of Tech

By enhancing cybersecurity, businesses can protect sensitive information and defend against cyber attacks. (Thapana_Studio/Shutterstock.com)

Kavitha Srinivasulu, a Chennai-based cybersecurity and data privacy expert, helps corporate and strategic partners identify and mitigate risks in emerging technologies. Currently working as the global head of cyber security and data privacy—banking, financial services and insurance—at Tata Consultancy Services, Kavitha has specialized in risk advisory, data protection and business resilience over the last two decades.

In 2023, Kavitha participated in an International Visitor Leadership Program (IVLP) on cybersecurity and data protection. The group traveled to Washington, D.C., Boston, Colorado Springs and Burlington, where they met government officials and participated in panel discussions. The IVLP is the U.S. Department of State’s premier professional exchange program that brings together current and emerging professional leaders to cultivate lasting relationships through short-term visits.

Kavitha spoke with SPAN about her insights as a cybersecurity expert and leader in the tech space. Excerpts from an interview.

What were your main takeaways from the IVLP?

I met cybersecurity professionals from 23 countries, who shared their experiences and excellent insights on emerging trends as well as current challenges. We met government officials from the Department of Homeland Security, the Department of State and the Department of Defense. It was a valuable experience to learn from their approaches and gain insights into the workings of the U.S. agencies.

I also had the chance to experience American culture and understand American traditions and ways of life. I was struck by the friendliness and welcoming nature of the people I met throughout my visit.

Overall, the trip was a great success and allowed me to gain valuable insights into the latest developments in the cybersecurity and data protection world, as well as to strengthen professional relationships with experts in this field. I have applied the knowledge and skills gained during my visit to promote cybersecurity efforts within my organization as well as for my customers.

Kavitha Srinivasulu participated in an International Visitor Leadership Program (IVLP) on cybersecurity and data protection. (Photograph courtesy Kavitha Srinivasulu)

Kavitha Srinivasulu traveled to multiple cities in the United States during the International Visitor Leadership Program. (Photograph courtesy Kavitha Srinivasulu)

What are your thoughts on artificial intelligence (AI) from a cybersecurity perspective?

The rapid evolution of AI, particularly in generative models, and its application in cybersecurity are noteworthy. As Generative AI (GenAI) techniques advance, their application in cybersecurity has expanded exponentially. This includes regulatory compliance and transparent AI utilization, robust security measures, data governance, and ongoing collaboration between GenAI and cybersecurity. Successful adoption will require ongoing monitoring, customer education and regular updates to cloud security.

What kind of cybersecurity threats are you actively working on at the moment?

Financial institutions, which manage a vast amount of confidential customer information and comply with a range of regulations, are prime targets for cyberattacks. A New York Federal Reserve report highlights this vulnerability, noting that financial firms experience 300 times more cyberattacks than those in other industries. Cybercriminals target financial firms by locking applications, encrypting data or making systems unusable until they pay a “ransom.”

Please share some best practices for businesses to protect data from such cyber attacks.

Some of the best practices I would recommend are:

  • Increasing the frequency of cybersecurity training for employees and establishing role-based awareness sessions.
  • Strengthening password management controls.
  • Regularly updating patches and upgrading systems and applications.
  • Utilizing optimal storage.
  • Quick data recovery and automated data backup.
  • Ensuring systems, laptops, applications and servers are secure with the right firewalls and virus protection programs.
  • Leveraging Managed Detection and Response (MDR) services to increase data protection.
  • Monitoring systems 24/7.
  • Obtaining cyber liability insurance to mitigate financial losses from cyberattacks.

What would you say to people who want to start a career in cybersecurity? Is there anything you wish you could have told yourself when you embarked on this path?

Based on the challenges and changes I have experienced, I would say that if you truly want to level up as a cybersecurity leader and change your life for the better, there are many changes you need to make, and most of them might not be easy. However, this does not mean that your journey will be just agony. The more you do something with love and passion, the easier it becomes.

One thing I learned is to never give up on your dreams, and you’re the only person who can help yourself achieve them. Take your first step, speak up, be decisive, collaborate and always believe in yourself.

The views and opinions expressed by Kavitha in this interview are solely her own and do not represent the views of her company or customers.

Jason Chiang is a freelance writer based in Silver Lake, Los Angeles.


Click here to sign up for the free SPAN newsletter: https://bit.ly/SubscribeSPAN



  • Venkatakrishnan A

    The response for best practices are very generic and does not sync with the language of a security researcher. Threat Management , Security Champions program etc. , must be pointed out with relevant points. Cyber defence must be like a onion router with layers of protection. 😊

    COMMENTS

    One response to “Studying the Changing Face of Tech”

    1. Venkatakrishnan A says:

      The response for best practices are very generic and does not sync with the language of a security researcher. Threat Management , Security Champions program etc. , must be pointed out with relevant points. Cyber defence must be like a onion router with layers of protection. 😊

    Leave a Reply

    Your email address will not be published. Required fields are marked *