“Vulnerability management governance as a service is crucial, as it enables organizations to remain compliant with support partners and helps senior management make the right decisions,”

says Satish Thiagarajan, VP & Global Head of Cyber Security at Tata Consultancy Services (TCS)

What role can Vulnerability Management and Remediation (VM&R) solutions play in the growth and security of an enterprise?  

A managed VM program leveraging automation, integration should be powered by risk-based prioritization and can help address the following issues, aiding in the growth and advanced security of an enterprise:

  • The growing backlog of vulnerabilities, the huge volume of open vulnerabilities (Critical & high) which were pending for remediation
  • Inadequate processes for coordination, tracking, closure, and follow-up
  • Responsibility matrix (RACI) improperly identified
  • No significant process around prioritizing remediation efforts
  • Absence of a consolidated view of the organization’s overall security health posture
  • Inconsistencies in asset inventory, Outdated vulnerability Signatures

Also read: How Augmented Reality Simplifies Manufacturing Processes

Does TCS have any significant implementations you would like to speak about? What were the business challenges being faced, for which this solution was needed?

TCS CSP has been involved since October 2017, enabling enterprise-wide vulnerability management for major manufacturers’ internal and external tracks. TCS has a dedicated team of security analysts and SMEs engaged in providing a gamut of services comprising of COTS Patching, Website, VM, Middleware Remediation management, Data privacy scanning, exception management, and more. TCS has, by and large, addressed primary concerns of major manufacturers through its security program resulting in the following key outcomes:

  • Automated burn-down plans for 50k+ vulnerabilities improving the agility of the program
  • Achieved Increased operating effectiveness  of website vulnerability management
  • Audit rating was improved to “effective” from “marginal” in 12 months
  • Increased CMDB accuracy

Going forward and with the inception of Doomsday, the pre-empting of potential application breaches, segmentation, and prioritization will be accelerated. TCS CSP has also invested in creating policies and procedures and assets which are future-ready and can be integrated with any futuristic solution from a security and vulnerability management perspective, on-premises as well as in cloud environments.

Also read: Addressing the Cloud Security Crisis with Automation and Visibility

How have your VM&R solutions helped improve the overall maturity your client organization? Did you use any innovative strategies?

TCS’ VM&R solutions helped improve the client organization by achieving:

  • Vulnerability remediation rate for the internal website was 100 vulnerability / month when TCS started. With better visibility, prioritization and program governance, the remediation rate has been accelerated to 290 vulnerability / month
  • By analyzing external facing websites, TCS enabled Doomsday predictions to predict which website was likely to be breached, thus helping prioritize the fixes of vulnerabilities

The innovative strategies TCS took were the following:

  • Created a dashboard that mapped out a consolidated view of the vulnerability landscape
  • Implemented a remediation advisory, fueled by security intelligence & vulnerability feeds
  • Drafted a Doomsday plan, pre-empting potential application breaches, segmentation and prioritization of applications
  • Created a trend analysis, comparing potential trends against the existing threat landscape

In your opinion, what would be the best strategies for securing enterprise’s IT infrastructures?

The best strategies for securing enterprise’s IT infrastructure include:

  • Prioritizing remediation using a novel 4 pronged approach
  • Firming up the processes, getting buy-in from the top
  • Creating a well-defined RACI
  • Prioritizing the remediation approach based on criticality of risks
  • Accessing real-time vulnerability/security trends of all assets at sub business group & enterprise level
  • Encourage the customer to renew the license and re-scan with new definitions, updating asset inventory as necessary

Please share your views on vulnerability management governance as a service?

Vulnerability management governance as a service is crucial, as it enables organizations to remain compliant with support partners and helps senior management make the right decisions. Additionally, it can act as an implementation of data protection and privacy solutions, something that is becoming ever more crucial to organizations in the new digital economy.

Does TCS support with solutions for risk-based breach prediction, and digital identity as a managed service? What advantages do these provide for enterprises?

TCS does believe it is necessary to devise an enterprise strategy for risk-based breach predications, and digital identity as a managed service. To do this, an organization must embark on a process-oriented journey that involves a detailed IT threat profile, periodic vulnerability costs, identification and planning of security gaps and a robust governance program.

“A managed VM program leveraging automation, integration should be powered by risk-based prioritization. This can help address the the issues and aid in the growth and advanced security of an enterprise.”

Satish Thiagarajan, VP & Global Head of Cyber Security at Tata Consultancy Services (TCS)

Satish is the current, VP & Global Head of Cyber Security at Tata Consultancy Services (TCS) in India. Satish has 23 years of experience in Information Technology involving P&L management, business analysis, concurrent multi-project global delivery, large transformational deal pursuit & delivery, account & relationship management, practice management.