Top Selling Multipurpose WP Theme
Home Technology IT Leaders From Gujarat Predict Tech Spend This Year

IT Leaders From Gujarat Predict Tech Spend This Year

B Swaminathan| IMAWS

With an ambitious target to increase exports from the existing Rs 3,000 crore to as high as rs 25,000 crore in the information technology (IT) sector, the Gujarat government rolled out its new Information Technology & Information Technology-enabled Services (IT & ITeS) policy, 2022-2027, last year. is emerging as an important destination for the IT industry, and experts believe that the availability of the talent pool has improved, which will continue to boost the IT sector’s growth here. IT companies in the state are evolving, and professionals with expertise in new technologies will continue to get heftier rewards. Leading tech leaders from the state share their key predictions in the new-financial year in terms of budgeting, spends and other details.

Sandip Shah, Partner – Technology & ERP, Baker Tilly , India

Businesses should pay more attention to identity and access management when moving to the cloud. While cloud environments offer many benefits, including flexibility and scalability, they also introduce new security risks that organizations need to address.

One of the most significant risks is that bad actors may gain access to sensitive data and systems if they obtain a user’s credentials. To mitigate these risks, organizations should implement best practices for IAM, such as the principle of least privilege, strong authentication methods, regular access reviews, monitoring and logging of user activities, and robust incident response plans.

Overall, moving to the cloud offers many benefits, but it’s essential to prioritize security and implement strong identity and access management measures to protect against potential threats.

Nilay Shah, Head-IT, Navneet Education Limited

Soon, modern privacy regulation will blanket the majority of consumer data, but less than 10% of organizations will have successfully weaponized privacy as a competitive advantage. Organizations are beginning to recognize that a privacy program can enable them to use data more broadly, differentiate from competitors, and build trust with customers, partners, investors and regulators. Experts also advise security leaders enforce a comprehensive privacy standard in line with GDPR to differentiate in an increasingly competitive market and grow unhindered. There’s no question that CISOs and their teams must be laser focused on what’s happening today to ensure their organizations are as secure as possible.

Apurva Dalal, CIO at Adani Green Energy and Adani Solar Manufacturing

There is no secret about the lack of cybersecurity workers. In 2025, research says worldwide openings will arrive at 3.5 million. That discussion has been theoretical up to this point, and if anything, it has been presented as an opportunity for young professionals interested in pursuing a career in cybersecurity, which it is. Unfortunately, however, this will all come to an end in 2023. I anticipate a nationally significant attack in the United States that may be directly related to a lack of cybersecurity talent. This could be because of a mistake made by an overworked employee or because of an attack that overwhelms a team with insufficient staff. Humans continue to pose the greatest threat to cybersecurity, as demonstrated by research, and this is largely attributable to a lack of awareness, carelessness, or inappropriate access controls. Attempts to make everyone a cybersecurity expert and training alone will not address these issues.

Jayesh Tank, GM IT, Harsha Engineers International Limited

New attacks will also emerge as new technologies advance. The danger grows with the popularity of electric cars, which will also lead to more breaches and attacks in this area. Vehicle-charging points will also become increasingly susceptible to attack as hackers learn how to take control of vehicles and listen in on conversations through EVs’ microphones. In order to embed themselves and their capabilities in the client risk management decision process around corporate objectives and the role security plays in that chain, vendors will need to engage and serve the IT and CISO functions within an organization. In order to map out how a cybersecurity strategy will support business unit outcomes and business plans, vendors will also need to align cybersecurity with business priorities, frequently working from the top down with various teams in a client organization outside of the IT function.

Milton Dorairaj – Assistant Country Manager, Netpoleon India –

‘We Secure our Customers from Cyber Threats’ After successfully leading the Sales team at TechKnowLogic Consultants India Private Limited (A Member of Netpoleon Group of Companies) as the Sales Director, Mr. Milton Dorairaj took on the new role of the Assistant Country Manager. He successfully handled the PAN India sales team, business development, OEM and channel partner engagement at Netpoleon India for the past four years. His flawless industry experience of 18 years and understanding of the market makes him the obvious choice to lead this national role. As Netpoleon expands its reach in the market looking forward to getting further and deeper insights into the Industry, Milton in this new role is in charge of helping Netpoleon’s footprint grow in the India & SAARC market, also scale up the company’s portfolio across the country. Netpoleon India is proud to have a leader who already has great popularity with the team, partners, vendors and OEM Communities.

THIS ARTICLE IS POWERED BY

@2023 – Cellit. All Rights Reserved.

Contact us: contact@cellit.in