India's largest platform and marketplace for GCCs, AI & Analytics leaders & professionals

Sign in

⁠India’s largest platform & marketplace for AI & GCC leaders & professionals

3AI Digital Library

Sebi is setting up a Cybersecurity Fusion Centre

3AI February 16, 2021

Establishing a cybersecurity fusion centre or a cyber lab is part of Sebi’s three-tier structure for monitoring cybersecurity-related events in the securities markets.

.

NEW DELHI: Markets regulator Sebi is in the process of setting up a cybersecurity fusion centre, a move aimed at detecting cyber threats faster and resolve such incidents efficiently and effectively.

In its annual report for 2019-20, Sebi noted that cyber attacks and threats attempt to compromise the confidentiality, integrity and availability of the computer systems, networks and databases in the markets ecosystem.

Establishing a cybersecurity fusion centre or a cyber lab is part of Sebi’s three-tier structure for monitoring cybersecurity-related events in the securities markets and taking actions as deemed necessary in the interest of protection of the securities market.

The three-tier structure would strengthen the cybersecurity preparedness or resilience of the entire securities market ecosystem.

Under the tier-1, high-powered steering committee on cybersecurity chaired by a whole-time member of Sebi has been set up and a cybersecurity fusion centre would be established under the tier-2, the regulator said.

 

In the tier-3, division of technology and cybersecurity on Sebi would coordinate with the steering committee, cyber security lab security and operations centres at the respective market infrastructure institutions (MIIs).

 

“Tier-1 and tier-3 have been set up and Sebi is in the process of setting up a Sebi cybersecurity fusion centre,” according to the annual report.

Generally, cybersecurity fusion centres establish cooperation among all the teams involved in cybersecurity to minimise the impact of security breach through faster detection and response.

Cyber resilience is an organisation’s ability to prepare and respond to a cyber attack and to continue operations during, and recover from, a cyber attack.

Picture from freepik.co

    3AI Trending Articles

  • Artificial Intelligence (AI) and Business Intelligence (BI) Revolutionize Legacy System Modernization: A Data-Driven Approach

    Featured Article Author: Pankaj Zanke, Sapient Legacy systems, which many organizations rely on, often become technological burdens for the same organization. Built with old technologies, tools, and architecture, they need help keeping up with modern business’s latest technological needs. Scaling and integration issues and security issues also affect agility and innovation. However, how they are […]

  • Process Mining and Task Mining fuels Automation across the Enterprise

    Featured Article: Author: Prakash Narayanan, Head of RPA & Intelligent Automation, Cyient Every business is a collection of core processes. Processes are the foundational infrastructure and form the basic element of business operations. In 1911, Frederick Winslow Taylor became the first person to study and optimize workplace productivity. His monograph ‘The Principles of Scientific Management’ […]

  • Telco Evolution: Expanding Beyond the Core

    Featured Article: Author: Siddharth Shah, Airtel In today’s rapidly changing digital world, telecom players are undergoing a transformation from being mere connectivity service providers to becoming comprehensive digital platforms. This is driven by the interplay of dynamically evolving customer expectations and opportunities for long-term growth. Telcos are diversifying their offerings and in fact, a McKinsey […]

  • PoS Terminals Open Consumers to Fraud

    Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords. Point-of-sale terminal vendors Verifone and Ingenico have issued mitigations after researchers found the devices use default passwords. Researchers are detailing widespread security issues in point-of-sale (PoS) terminals – specifically, three terminal device families manufactured by vendors Verifone and […]