APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 47 Secure Indian How Are Airports? T he Indian civil aviation industry is experiencing a significant growth trend, with a rapid increase in passenger traffic resulting in the expansion of airports, aircraft, and flight routes. The Niti Aayog has proposed a plan to increase airport capacity to handle up to one billion annual trips. This growth highlights the importance of prioritising security measures in the civil aviation sector, particularly in the context of evolving terrorism threats. It is crucial to ensure airport security meets international standards and to maintain a strict zerotolerance policy towards any vulnerabilities. In addition to this, the construction of a world-class airport in Noida, set to be operational by mid-2024, will further enhance India’s civil aviation landscape. By Prabhat Shukla
48 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 NOIDA INTERNATIONAL AIRPORT PIONEERS ADVANCED SECURITY TECHNOLOGIES WITH NET-ZERO CARBON EMISSIONS The Noida International Airport, slated to be India’s largest airport once completed, is taking major steps towards achieving net-zero carbon emissions during its construction and operational phases. The construction of this state-of-the-art airport is currently underway on a sprawling greenfield site, located 75 kilometres from Delhi, with a strong commitment to environmental sustainability. A groundbreaking technology being utilised is the Nanogence Catalyst, a patented smart activator that increases the binding efficiency of cementitious materials. This innovation allows for a direct reduction or replacement of up to 20 per cent of the required cement, resulting in a significant decrease in carbon emissions and enhanced cost efficiency. Given that cement is a significant contributor to the carbon footprint of infrastructure projects, this technology plays a crucial role in promoting sustainability. Christoph Schnellmann, the CEO of Noida International Airport, has expressed his excitement about the technology’s potential in helping to achieve the airport’s sustainability goals and aiming for net-zero emissions. The project THE CURRENT AIRPORT SECURITY SCENARIO IN INDIA INCLUDES ROBUST MEASURES SUCH AS STRICT SCREENING PROCEDURES, ADVANCED SECURITY TECHNOLOGIES AND A VISIBLE SECURITY PRESENCE Existing Security Measures in Indian Airports has collaborated with experts in the field to incorporate sustainability elements into the airport’s design and infrastructure. Tata Projects, the engineering, procurement, and construction partner for the airport, has been conducting control trials of the Nanogence technology. The results have demonstrated improved resistance to weather and corrosion, increased longevity of concrete structures, reduced cement consumption, and a lower carbon footprint. Abhishek Kumar, the CEO and founder of Nanogence, has emphasised the catalyst’s capability to optimise cement content while maintaining concrete strength and quality. This optimisation leads T rained Security Personnel: The presence of highly trained security personnel or agents, responsible for conducting identity checks, monitoring CCTV footage, searching bags, and observing for suspicious behaviour, significantly enhances airport security. n Thorough Screening of Passengers and Goods: Advanced security technologies, including X-ray machines and explosive detection systems, are used to thoroughly screen passengers and their belongings, reducing potential security threats. n Encouragement and Mandate for Reporting Suspicious Activity: Passengers and airport personnel are encouraged and required to report any suspicious items or individuals, promoting a collective effort to enhance airport safety. n Strategic Positioning of High-Definition CCTV Cameras: High-definition CCTV cameras strategically placed throughout airports enable continuous monitoring, swift responses to suspicious behaviour, and serve as a deterrent and intervention tool. n Strict Regulations for Firearms and Explosives: Strict regulations prohibiting firearms and explosives within airport premises enhance safety and security. n Deployment of Dog Squads: Highly trained dog squads detect suspicious items or explosives, and their presence serves as a powerful deterrent to potential threats. n Biometric Scanners at Entry and Exit Points: Biometric scanners verify the identity of travellers swiftly.
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 49 to substantial reductions in both carbon emissions and costs. The technology has the potential to decrease emissions by 30–60 per cent compared to traditional concrete mixes. Nanogence provides an innovative solution to improve the binding strength of concrete, enabling the integration of ecofriendly materials such as fly ash and slag, which are usually discarded, thereby reducing the environmental impact. Tata Projects expects a decrease in operational costs due to reduced cement usage, as well as lower logistics and energy requirements, as a result of the Nanogence catalyst. The Noida International Airport is investing in state-of-the-art security systems to ensure a smooth and secure travel experience. These include high-resolution X-ray screening, explosives detection systems, and automatic tray return systems. This investment aligns with the Indian government’s commitment to cutting-edge airport infrastructure and prioritising passenger safety. A LOOK AT THE STATE OF AIRPORT SECURITY IN INDIA The Transportation Security Administration (TSA) in the United States sets the standard for comprehensive aviation security and serves as the regulatory body for security policy, both domestically and internationally. It is responsible for law enforcement and Federal Air Marshal Services, maintaining an intelligence branch, utilising dog detection teams, and operating a robust research and development branch. A notable difference from the Indian model is that the TSA procures, owns, and maintains all primary screening equipment, highlighting its commitment to security. WHY DOES INDIA NEED THE TSA MODEL? n Centralised Responsibility: Unlike in India, where airport operators share the responsibility for baggage screening, the TSA in the United States holds full accountability. This centralised approach ensures a uniform screening process, leading to Feature / Aviation Security n Thorough Screening of Airport Personnel: Comprehensive screening procedures for airport personnel ensure that individuals working within the airport have not been involved in any suspicious activities, contributing to a secure airport environment. n Baggage Screening: Advanced technologies, such as X-rays and explosives detection capabilities, scan all baggage for potential threats, enabling security personnel to quickly detect and respond to potential threats. n Rigorous Monitoring of Private Aircraft: Strict monitoring and inspection protocols for private aircraft ensure thorough inspections and clearance for takeoff, maintaining a secure airport environment. In addition to these existing measures, the Standing Parliamentary Committee on Transport, Tourism, and Culture, in its report on the safety and security of civil aviation, has provided some recommendations. APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 49
50 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 a more secure aviation environment. n Holistic Approach: The TSA’s jurisdiction goes beyond airport security, encompassing highways, railroads, mass transit systems, and pipelines. Adopting a similar comprehensive approach in India, given the intricate interplay of various transportation modes, could be beneficial. n Emphasis on Research and Development: The TSA’s dedicated research and development branch focuses on continually improving security technologies and procedures. Emulating a research-driven approach in India can lead to the development of cutting-edge security solutions. SECURITY MANPOWER AT AIRPORTS The committee’s report identified a significant shortage of security personnel at Indian airports, with only 64 of the 118 operational airports receiving protection from the Central Industrial Security Force (CISF). The committee recommended that the central government urgently extend CISF security cover to all operational airports. Additionally, the committee pointed out a shortfall of 1,166 positions within the CISF, the primary security force at airports. They suggested that the full complement of CISF personnel be made available at airports nationwide. Moreover, the committee recommended the establishment of specialised institutions across the country to address the growing demand for security personnel in the aviation sector. Considering the ever-changing nature of threats, the committee underscored the need for regular surveys to evaluate the evolving threat landscape at all airports. Based on these assessments, the committee stressed the importance of promptly deploying trained security personnel at airports. BOMB DETECTION AND DISPOSAL SQUAD The committee’s evaluation revealed a worrying shortage of security measures at 44 airports, where Bomb Detection and Disposal Squads (BDDS) were not available. Local police were being relied upon in these cases, but the committee raised concerns about their technical competence in handling bomb threats. To address this, the committee urged the immediate deployment of BDDS at all 44 airports that currently lack this critical resource. They also recommended that these The Niti Aayog has proposed a plan to increase airport capacity to handle up to one billion annual trips
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 51 BDDS units incorporate highly trained international pedigree dogs, renowned for their effectiveness in improving airport security. UPGRADING SCREENING TECHNOLOGY The committee pointed out the widespread use of outdated door frame metal detectors (DFMDs) and hand-held metal detectors (HHMDs) for passenger screenings at most Indian airports. Given that these systems are outdated and can infringe on passengers’ privacy, the committee recommended a complete technology overhaul. The committee also suggested the following: n Accelerated Implementation of Full-Body Scanners: The committee recommended the swift installation of full-body scanners at airports, a cutting-edge security measure that significantly improves passenger screening. n Adoption of Global Biometric Screening Standards: The committee advised implementing global best practices in biometric screening, such as employing facial recognition, fingerprint, and retinal scans at airports, to enhance security. n Radiological Detection Equipment: The committee proposed the prompt installation and operationalization of radiological detection equipment to streamline passenger frisking procedures, reducing wait times at security checkpoints. SPECIFICATIONS FOR EQUIPMENT Airport operators have an obligation to procure and provide security equipment meeting the Bureau of Civil Aviation Security specifications. To ensure compliance and proficiency in equipment usage and maintenance, the committee recommended proactive engagement between BCAS and airport operators. BCAS, operating under the Ministry of Civil Aviation, plays a pivotal role in safeguarding civil aviation operations against unlawful interference. This cooperation is essential to upholding security standards. The committee emphasised the importance of soft skills training for security staff, such as CISF personnel, to enhance the passenger experience while maintaining security. They also recommended the quick implementation of the draft SOP for passengers with special needs. The current airport security scenario in India includes robust measures such as strict screening procedures, advanced security technologies, and a visible security presence. However, the Standing Parliamentary Committee’s recommendations highlight areas for improvement, including enhancing security manpower, upgrading screening technology, and investing in specialised units like bomb detection and disposal squads. Modernising security equipment, such as full-body scanners and radiological detection equipment, is also essential to meet global standards. Feature / Column / Aviation Security Airport APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 51
52 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Column Career in Security
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 53 Beyond the Badge Career Options in Security Industry The security industry is growing and provides a fantastic opportunity for career progression T he security industry in India has experienced tremendous growth, as has the global security sector. In India, the industry employs over one crore security professionals and is growing at a rate of 20 percent per year, outpacing many other sectors. The economic reforms in India have created an increasing demand for security services among industries, corporations, and households, making the security industry a significant contributor to the Indian economy in terms of market share, employment, and tax revenue. The maintenance of law and order is mainly the responsibility of the police force. However, police services cannot be provided everywhere. It is also seen that the low police-tocitizen ratio is considered one of the driving forces behind the growth of the private security industry. Due to these factors, the government of India is also considering hybrid modes of security. The implementation of the same has already started. Airports and metro stations already have hybrid security with CISF and private guards. The list is only going to grow bigger. Outsourcing some of the non-core tasks of the police is also on the cards. Hence the huge scope for Column / Career in Security By Maj. Gen. Sanjay Soi (Retd) Director Binary Global Ltd, Advisor International Institute of Influencers, President Advisory Board EXSTEMPLAR, Advisor Forum for Global Studies
54 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 a career in the security sector. Expansion means more demand and more verticals in the security field, resulting in faster promotions and growth. As the security sector continues to evolve as a career of choice for many young people, with their involvement crucial to its success, what steps are organisations and the industry taking to attract and retain the best young people? The young people should seriously consider a long-term commitment to this sector. Like many industries, there is some stigma attached, but the security industry is growing and provides a fantastic opportunity for career progression. It also gives opportunities for promotions through the ranks. Many managing directors of security companies started their careers as security officers or supervisors. The exciting thing about the security field today is quick adaptation to new business opportunities internationally with new global threats. One has to respond to a widening range of risks S ome of the career options for security professionals are enumerated below. n Security Manager: A security manager would be responsible for overseeing all security operations, making security guidelines, implementing them, and doing threat analysis or risk assessment. He will also be responsible for preparing the budget for security. n Security Consultant: A security consultant would identify potential security risks and make plans and strategies to mitigate the risks. He will also recommend the best method to overcome the threats, including implementing security technologies and advising on security protocols. n Security Analyst: A security analyst would be assessing the threat level and analysing the security system to ensure that it meets the requirement. Will prepare the standing operating procedure and checks and balances. n Physical Security Expert: The physical protection of any organisation or set-up is the basic security need. A physical security specialist would be responsible for assessing the threat and planning deployment, access control systems, and surveillance systems. n Compliance Officer: Security organisations are manpowerintensive, and they are governed by various rules in security matters, financial matters, and human resources. Compliance is mandatory; without it, they may lose their licence to work and incur heavy penalties. This would involve conducting audits, developing Career Options for Security Professionals
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 55 and vulnerabilities in the physical structure, access control systems, and surveillance measures. n Communication Skill: A security professional has to deal with people from different backgrounds, teams, visitors, and stakeholder groups. They need to convey clear and concise instructions. The team should be able to clearly understand the expectations and guidelines. To diffuse the situations, they need to have empathy, listening skills, and calming verbal communication. n Conflict Resolution: Related to communication skills is the quality of conflict resolution. There could be an incident that leads to a volatile situation. The security professional should be able to deescalate stressful situations and help maintain a positive and cooperative environment. n Emergency Response: Security personnel are the first responders in any crisis. They should be able to assess and respond appropriately. n Technology Proficiency: The present security environment needs proficiency in technology, being able to absorb the latest technology for the security of the organisation. The latest alarm and surveillance systems are fully automated and linked to control rooms. AI integration and face recognition are now part of modern security setups. n Legal Knowledge: The security professional has to have knowledge of relevant laws and regulations. Laws Column / Career in Security THE INDUSTRY NEEDS TO DO A LOT TO ATTRACT YOUNG TALENT INTO THE SECTOR. THE SECURITY SECTOR SHOULD BE SEEN AS A CREDIBLE PLACE TO START A CAREER compliance programmes, and providing guidance on legal and regulatory requirements. n Security Command or Control Centre: Individuals with an IT or computer background can be part of the control room, network security, alarm management, crisis response, and HR issues. n Fire Officers: Ensures fire safety, rehearsals, and serviceability of equipment. n Emergency Manager: Emergency response plans for any organisation are very important, and this would be the responsibility of the emergency manager. This would involve identifying potential emergency scenarios, conducting rehearsals and preparedness training, as well as responding to emergencies. n Cyber Security Officers: With the increase in automation, cyber security is a full-fledged field for security professionals. Cybersecurity professionals are responsible for protecting IT infrastructure, networks, and data. They are responsible for preventing data breaches, monitoring the system, and reacting to attacks. There are many options within this sub-sector of security, too. These are just a few examples of the career options in the security sector. Going to specifics, each role may have specific requirements and areas of expertise depending on the industry or sector they are serving, like refineries, mines, ships, hotels, hospitals, etc. It is therefore important to have the qualifications and skills needed for the particular line. and threats. Hence, there is more demand in different verticals of security. Requirement of Skill Sets The security industry basically deals with humans, be it your team, your client, a visitor, or an intruder. Hence, some of the skill sets required are enumerated below: n Observation and Awareness: Observation and situational awareness are the basic requirements for being proactive in security matters. It involves being attentive to details, recognising suspicious behaviour, identifying potential threats, checking suspicious incidents, and mitigating security risks before they escalate. n Critical Thinking: Fast thinking and problem-solving talent are the qualities a security professional must possess. He should be able to assess risks, make sound decisions, and respond appropriately. He should be able to analyse security gaps
56 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 related to privacy, search, seizure, trespassing, and use of force are a must-know. Knowledge of the law will assist in better coordination with lawenforcing agencies, make informed decisions, and avoid litigation. Face of the Security n Company and Client: Security professionals are the first to be contacted by a visitor. They are actually brand ambassadors of their company as well as the clients they are serving. They should be able to create a positive environment and follow the philosophy of “Respect All, Suspect All”. n Physical Fitness: The security office has to lead by example. The task of security may involve chasing, apprehending, and performing a physical search. Fitness will help in reducing the risk of injury to oneself and their team. It will also enhance the confidence of themselves and the team in their leader. Attracting the Best Candidates The industry needs to do a lot to attract young talent into the sector. The security sector should be seen as a credible place to start a career. This sector provides a fantastic opportunity for career progression. It enables them to be promoted through the ranks within the industry. The sector can only benefit from opening itself up better to ambitious young people. There is a need to encourage campus placement of graduates who are doing courses from securityrelated universities like RRU, Gandhi Nagar, and Sardar Patel University of Police, Security and Criminal Justice, Jodhpur, and many other universities. Young professionals will definitely bring a positive change to the profession. There is a need to encourage campus placement of graduates who are doing courses from security-related universities like Rashtriya Raksha University, Gandhi Nagar, and Sardar Patel University of Police, Security and Criminal Justice, Jodhpur and many other universities
FOR MORE INFORMATION Devika Kundu Sengupta | +91 98716 54991 [email protected] FOR NOMINATIONS Neeraj Verma | +91 8076825854 [email protected] fifffflffiflflffffflflfflffflflffifl fl ASSOCIATE PARTNERS COMMUNITY PARTNER flffi ffi flflffi Sumnesh Joshi ITS Deputy Director General (Joint Secretary level GoI) Ministry of Communications, Government of India Kalpana Ajayan Regional Head - South Asia Women's World Banking Sharat Chandra Founder EmpowerEdge Ventures Monica Jasuja Fintech and Product Management Executive Hrushikesh Mehta SVP – Financial Services ONDC Dr. Deepankar Roy Associate Professor, National Institute of Bank Management Vikram Tanna CEO, Mzaalo (Xfinite Global plc) Dr Annurag Batra Chairman & Editor-in-Chief, BW Businessworld & Founder, exchange4media fifffflffiflflffiffl
58 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Building a Fortified Future Manned guarding, a long-standing way of securing physical locations with human beings, is experiencing a technological change By Jyotsana Bhalla Senior Vice President, APS Group T he impact of technology on manned guarding is transforming the landscape and rethinking established paradigms in the field of security services. Manned guarding, a long-standing way of securing physical locations with human beings, is experiencing a technological change. As cutting-edge tools and systems are integrated, it is critical to investigate the complex influence technology is having on the efficacy, efficiency and overall function of manned guarding services. One of the key ways that technology is affecting manned guarding services is through the installation of surveillance and monitoring technologies. Guards benefit from greater situational awareness when using advanced CCTV cameras with capabilities such as facial recognition and realtime video analytics. This not only increases their ability to detect and respond to possible threats, but also allows for a more proactive approach to discovering security flaws. The integration of drones in manned guarding services represents Column Women in Security
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 59 Column / Women in Security a significant leap forward in terms of surveillance capabilities. Drones can cover large areas quickly, providing real-time video feeds to security personnel. This aerial perspective enhances the effectiveness of manned guards, allowing them to monitor expansive spaces, identify potential risks, and respond promptly to unfolding situations. Access control systems, another technological aspect influencing manned guards, have evolved to provide increasingly complex options. Biometric access systems, such as fingerprint and facial recognition scanners, improve entry point security by guaranteeing that only authorised people obtain access. These solutions not only strengthen security but also make the process easier for guards, lowering the possibility of unauthorised entrance. Communication tools and devices are becoming increasingly important in enhancing the performance of manned guarding services. Guards can communicate with one another and with central command using advanced radio communication systems, mobile devices, and wearable technologies. This ensures quick response times, effective emergency coordination, and the capacity to adapt to changing security scenarios. Furthermore, the introduction of artificial intelligence (AI) and machine learning (ML) is changing the way manned guarding services operate. Intelligent algorithms can analyse vast amounts of data in real time, assisting security personnel in identifying patterns, predicting potential dangers, and making more educated judgements. AI-powered technologies also help to automate mundane activities, freeing up manned personnel to focus on more complicated security concerns. Despite these advances, the human element is still essential in manned security services. Guards’ powers are enhanced by technology, but human intuition, judgement, and adaptability are essential assets. Manned guards must not only respond to security situations, but also identify and mitigate threats using interpersonal skills and critical thinking. The employment of technology in manned security services also helps to reduce costs. When combined with manned security, automated monitoring technologies allow for more efficient resource allocation. Guards can devote their attention to duties that require human interaction, while technology handles regular surveillance and data processing. This collaboration of technology and human beings improves the overall efficiency of security. While technology has had a good impact on manned guarding services, it has also presented obstacles. It is critical for security personnel to have continuing training and upskilling in order to adapt to emerging technologies. Furthermore, technology integration must be complemented by comprehensive cybersecurity measures to protect against any vulnerabilities and cyber-attack. Technology’s impact on manned guarding services is a dynamic and transformational force. The integration of modern surveillance, access control, communication tools, and AI is improving manned guard capabilities and overall security. THE EMPLOYMENT OF TECHNOLOGY IN MANNED SECURITY SERVICES ALSO HELPS TO REDUCE COSTS
60 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Many Any Woman in Security? The increased awareness of the value of diverse perspectives and skill sets has led to greater opportunities for women in the security sector Column Women in Security By Rekha Gairola CFE, CRT, Global Leader in Security & Risk Assessment/ Resilience POSH Trainer 60 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 61 Column / Women in Security Over the past 20 years, the security sector in India has experienced significant changes, particularly in terms of gender diversity. As we work towards a safe and inclusive future, it is essential to examine the evolution of women in corporate security in India. With over 23 years of experience in the corporate security world, I have personally observed the shifting TRADITIONAL GENDER STEREOTYPES HINDERED WOMEN’S POTENTIAL IN THE SECURITY SECTOR AND DISCOURAGED THEM FROM PURSUING MALE-DOMINATED PROFESSIONS I n India, despite the advancements made in the corporate sector towards gender equality, women still face significant challenges in showcasing their potential. These challenges can vary based on factors such as sector, region, and corporate culture. Here are some common obstacles that women encounter: n Gender Bias and Stereotypes: Women often navigate preconceived notions about their abilities and leadership styles, which can hinder their progress. n Glass Ceiling: Limited representation of women in top-tier roles can perpetuate this issue. n Lack of Mentorship and Role Models: The absence of visible female leaders can make it challenging for women to envision their own success and growth within the organisation. n Unequal Pay: The gender pay gap remains a persistent issue in many industries, with women earning less than their male counterparts for similar roles. This disparity can be demotivating and contribute to feelings of undervaluation. n Double Standards: Traits perceived as assertive in men may be labelled as aggressive in women, leading to a double standard in expectations and evaluations. n Inadequate Representation in Decision-Making: Limited representation of women in key decision-making bodies within an organisation can result in policies and practices that do not fully consider or address the needs and concerns of female employees. Challenges in showcasing women’s potential landscape of opportunities and challenges for women in the industry. Although substantial progress has been made in recent decades, there are still critical issues that require our immediate attention. By comparing the scenarios of the past with the current situation, we can gain a better understanding of the advancements made and the path forward. THE EVOLUTION OF CORPORATE SECURITY: A 20-YEAR ODYSSEY Two decades ago, the corporate security landscape in India was predominantly male-oriented, with limited opportunities for women to make a substantial impact. Traditional gender stereotypes hindered women’s The gender pay gap remains a persistent issue in many industries, with women earning less than their male counterparts for similar roles APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 61
62 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 potential in the security sector and discouraged them from pursuing male-dominated professions. Women aspiring to excel in corporate security, risk management, and other securityrelated fields faced prejudices and societal norms that posed significant barriers. Furthermore, limited educational and career options restricted the progress of women in the industry. Despite these challenges, some pioneering women defied convention and forged a path in the security sector, paving the way for others to follow. As we look at the present day, the transformation has been remarkable. The increased awareness of the value of diverse perspectives and skill sets has led to greater opportunities for women in the security sector. Educational institutions have responded by offering specialised programmes in risk management, security, cybersecurity, and related fields, thereby encouraging more women to consider careers in security. Various initiatives have emerged to support women in the industry, providing mentorship, networking opportunities, and skill development. As a result, we are witnessing a surge in the number of women across the nation taking on key roles in threat intelligence, cybersecurity, and security management. While progress has been made, the journey is not without its challenges. I have been fortunate to have the opportunity to travel extensively and gain insights into the global situation, including the longer history of women’s contributions in the security sector in some developed nations, where they have benefited from more established gender equality frameworks. However, gender disparities remain a persistent issue worldwide, with many regions still grappling with underrepresentation of women in the security sector. T he challenges for women, particularly those without military experience, can be significant. The common belief that military background and physical strength are essential for security positions can create barriers for women. This bias, combined with the predominance of ex-military personnel in leadership roles, can create a glass ceiling for those entering the sector from non-military backgrounds. The diverse skill set that women bring—such as strategic thinking, effective communication, and problem-solving—often gets overlooked due to these biases. While ex-servicemen’s experiences are valuable, it’s crucial to recognise that effective security requires a multi-faceted approach that includes various skills. It’s essential to work towards a security sector that mirrors the diversity of our nation. We must advocate for a culture where women, regardless of their background, are not only welcomed but also provided with equal opportunities for. To achieve this, we must challenge and redefine the stereotypes associated with security roles. Over the past two decades, Indian women in security have shown resilience and growth, despite ongoing challenges in achieving equal representation. As a corporate professional, I am optimistic about the future, believing that sustained efforts— such as inclusive policies, mentorship programmes, diversity training, and a commitment to a culture valuing all employees, regardless of gender—will lead to a more innovative, diverse, and robust security sector. The Path Forward
DR. ANNURAG BATRA Chairman & Editor-in-Chief BW Businessworld & Founder, exchange4media SALIL KAPOOR CEO Hindware Home Innovation Limited PROF. HIMANSHU RAI Director Indian Institute of Management Indore DR. BHIMARAYA METRI Director IIM Nagpur TALEES RIZVI Director BW People & BW CFO World DR. SY SIDDIQUI Former Executive Advisor Maruti Suzuki VARADARAJAN S (RAJA) Board Advisor, Start up Partner, Leadership Coach & Former CHRO & Head of Corporate Affairs of Vistara (Tata & SIA JV) EVENT PARTNERS FOR REGISTRATION QUERY: Ashish Kumar | +91 97179 22747 [email protected] Aditi Rawat | +91 9873431912 [email protected] FOR COMMUNITY COLLABORATION: Talees Rizvi | +91 93106 34007 [email protected] FOR SPEAKING OPPORTUNITY: Reeti Gupta | +91 98996 10630 [email protected] FOR SPONSORSHIP: Aparna Sengupta | [email protected] | +91 9958000128 Anjeet Trivedi | [email protected] | +91 9818122217 CS Rajaraman | [email protected] | +91 9342262859 Deepak Bhatt | [email protected] | +91 9429423232 Kiran Dedhia | [email protected] | +91 9833399009 Rajeev Chauhan | [email protected] | +91 9811820301 Ravi Khatri | [email protected] | +91 9891315715 Sajjad Mohammad | [email protected] | +91 9911855935 Shruti Arora | [email protected] | +91 79826 28913 Somyajit Sengupta | [email protected] | +91 9818247444 Faizuz Ahamed | [email protected] | +91 98206 68333 Santosh B Singh | [email protected] | +91 9820129879 SCAN TO NOMINATE 9th 2024 NOMINATE NOW #HRExcellenceAwards JURY MEMBERS
64 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 SECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 65 Insight / Ethical Hacking T he term hacking is frequently associated with something malicious and harmful, but the adage ‘Every cloud has a silver lining’ applies equally to hacking as it does to anything else. Can hacking be beneficial? The answer is simple: yes. Surprised, right? Let us consider how hacking can be useful in today’s complex digital landscape. Here, we need to learn about another aspect of hacking called ‘Ethical Hacking’. Ethical hacking, also known as white-hat hacking, is a practice that involves the use of similar techniques as malicious hackers, but with the intent of identifying and resolving vulnerabilities in a system. This method has become an essential tool for organisations to assess and strengthen their network security. The concept of ethical hacking has gained popularity due to the increasing reliance on the internet and the shift of critical information to digital formats. As personal computers and the internet became more widespread, unauthorised system access became a concern, leading to the creation of laws and regulations. ORIGIN OF HACKING Hacking’s origins can be traced back to 1961, when MIT researchers first modified a toy railway set. In the 1970s, with no internet, hackers targeted telephone systems to make free calls due to expensive phone services. The 1980s marked the advent of computers, initially for research and defense purposes on the internet, but also saw the growth of cybercrime. Subsequently, governments enacted laws like the United States Computer Fraud and Abuse Act, Good Hacks Bad Hacks Even Hacking Has Got Ethics Ethical hacking, also known as white-hat hacking, is a practice that involves the use of similar techniques as malicious hackers, but with the intent of identifying and resolving vulnerabilities in a system By Prabhat Shukla
66 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 making unauthorised computer access illegal. The 1990s saw a surge in internet popularity and a rise in criminal activities, such as credit card fraud and hacking cases involving figures like Robert Morris and Kevin Mitnick. In the 2000s, as the internet expanded and reached prominent sites and the International Space Station, businesses sought the help of ethical hackers to improve their system security. Notably, some ethical hackers transitioned from criminal backgrounds to using their skills for businesses, highlighting the transformation from hacking’s negative history to the indispensable role of ethical hacking in today’s corporate landscape. THE INCEPTION OF BLACK-HAT HACKING The 1980s and 1990s witnessed a significant shift in the perception of hacking, as it became synonymous with illicit activities, casting a dark shadow over the digital realm. As personal computers gained prominence, critical information transitioned from paper to digital format, capturing the attention of hackers. They recognsed the immense potential for stealing valuable data, which could be sold or used for fraudulent purposes. Regrettably, notorious hacking incidents began to dominate headlines, reinforcing the image of hackers as digital outlaws. These black hat hackers exploited their skills to infiltrate private systems, pilfer sensitive data, and, in some instances, extort large sums from businesses. Their malicious actions led to the infamous moniker “black hat hackers,” symbolising their misuse of expertise for illegal activities. The media focused on these black hat hackers, particularly due to high-profile breaches affecting major companies such as eBay and Sony. The rise of black hat hackers added an element of intrigue and caution to the digital world, emphasising the growing significance of cybersecurity in our increasingly interconnected lives. ETHICAL HACKING BEGINS With the development of laws and regulations, and increasing demand for improved cybersecurity among businesses, governments, and individuals, ethical hackers have emerged as a new professional group. These ethical hackers significantly contribute to enhancing cybersecurity in various ways: Addressing a spectrum of threats - Online scams, device theft, DDoS attacks, and network security vulnerabilities are among the numerous threats faced by organisations. Ethical hackers proactively tackle these issues to protect sensitive information. n Reinforcing Network Infrastructure: Ethical hacking initiatives strengthen network infrastructure within organisations, making them more resilient to potential attacks and enhancing threat detection capabilities. n Training Security Personnel: Ethical hackers educate and train internal security teams, sharing knowledge about the latest hacking techniques to improve threat recognition and countermeasures. n Penetration Testing: Ethical hackers perform penetration testing, identifying vulnerabilities and taking necessary actions to secure online business security, thereby preventing unauthorised access to sensitive data. HACKING’S ORIGINS CAN BE TRACED BACK TO 1961, WHEN MIT RESEARCHERS FIRST MODIFIED A TOY RAILWAY SET. IN THE 1970S, WITH NO INTERNET, HACKERS TARGETED TELEPHONE SYSTEMS TO MAKE FREE CALLS DUE TO EXPENSIVE PHONE SERVICES
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 67 In summary, ethical hackers serve as digital security guardians, reinforcing defences, predicting threats, and preserving the integrity of online systems, ensuring the protection of essential data and information. IMPORTANCE AND KEY CONCEPTS OF ETHICAL HACKING Ethical hacking contributes significantly to network security by fulfilling three key functions: Uncovering Vulnerabilities: Ethical hackers proactively detect and report potential weaknesses in networks, allowing organisations to rectify these issues before being exploited by malicious hackers, thereby enhancing overall security. n Enhancing Defences: By leveraging ethical hacking, organisations identify susceptible areas in their networks, enabling them to establish robust security measures and strengthen defences, thereby minimising the likelihood of successful cyberattacks. n Employee Education: Ethical hacking initiatives frequently incorporate training programs to educate employees about cybersecurity. This awareness empowers staff to identify and react appropriately to various threats, such as phishing schemes and other social engineering attacks. THE THREE FUNDAMENTAL CONCEPTS OF ETHICAL HACKING Scanning: Systematically identifying the target network, its associated devices, and their configurations, which proves valuable for ethical hackers in discovering vulnerabilities and planning their approach. Insight / Ethical Hacking n Black-box Testing: Operating without prior knowledge, ethical hackers identify security vulnerabilities as potential attackers would. n White-box Testing: With complete system knowledge, ethical hackers evaluate system performance under potential threats before deployment. n Grey-box Testing: Ethical hackers, with partial system knowledge, apply deductive reasoning and technical expertise to discover vulnerabilities. n Web Application Hacking: Focusing on web-based applications, ethical hackers exploit security vulnerabilities using techniques like XSS attacks. n Wireless Network Hacking: Gaining unauthorized access to computer networks, often through weak wireless security, is the focus here. n Social Engineering: Ethical hackers use manipulation tactics to extract confidential information, exploiting trust and awareness gaps. n System Hacking: Compromising computer software, ethical hackers gain access to sensitive data or system control, exploiting system weaknesses. n Web Server Hacking: Ethical hackers target web servers, accessing and stealing information, data, or passwords using methods like DoS attacks and port scans. Types of Ethical Hacking
68 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 n Enumeration: A process involving the collection of further information about the target network, such as usernames and passwords, which can be utilised in subsequent stages of ethical hacking operations. n Exploitation: Ethical hackers utilise their findings to exploit system or device vulnerabilities, potentially gaining unauthorised access to sensitive data or controlling the targeted device. This demonstrates potential security risks, aiding in improving cybersecurity measures. Ethical hacking plays a crucial role in the interconnected digital world of today. As we navigate the complexities of cyberspace, where unseen threats exist within lines of code, ethical hackers serve as guardians. Their pursuit of knowledge, integrity, and n Automation security measures: Automation enhances threat detection, incident response, and vulnerability management, allowing organizations to protect digital assets from emerging cyber threats. n Penetration testing services: Growing demand for ethical hackers to simulate real-world cyberattacks, enabling organizations to address vulnerabilities before exploitation by malicious actors. n Bug bounty programmes: Rise of these initiatives incentivizes security researchers to disclose vulnerabilities, fostering transparency and accountability. These trends reflect the ethos of ethical hacking, bolstering digital defences while maintaining ethical standards. Embracing these trends incentivizes ethical hackers, transforming cybersecurity challenges into opportunities for resilience and innovation. Examples include Facebook’s 16M rewards and Google’s 38.7M payouts to ethical hackers, as well as over $90M via managed bug bounty programmes in the past three years. SHASHANK, CEO AND CO-FOUNDER OF CREDSHIELDS, HIGHLIGHTS A NOTABLE EVOLUTION IN CYBERSECURITY, HE SAYS 68 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 69 relentless pursuit of the greater good make them significant. In an era where the virtual and real worlds merge, ethical hackers emphasise the importance of active engagement in the digital world. They embody the principle of power and responsibility, using their skills to protect, educate, and innovate. Ethical hacking is more than a profession; it is a moral imperative, representing the collective resolve to uphold privacy, security, and freedom in the digital age. It encourages critical thinking, continuous adaptation, and evolution alongside digital threats. Shashank, CEO and Co-founder, CredShields, says, “In recent years, the cybersecurity landscape has witnessed a significant shift towards proactive measures to identify and mitigate vulnerabilities. Three prominent trends driving this shift are the integration of automation security measures, the increasing demand for penetration testing (pentesting) services, and the rise of bug bounty programmes. Integrating automation security measures represents a cornerstone of modern cybersecurity practices. Automation streamlines threat detection, incident response, and vulnerability management, enabling organisations to proactively safeguard their digital assets against emerging cyber threats. Complementing automation security measures is the growing demand for penetration testing services. Ethical hackers, through penetration testing, simulate realworld cyber-attacks to identify weaknesses in organisations’ systems, networks, or applications. By adopting a proactive approach to Insight / Ethical Hacking Examples include Facebook’s 16M rewards and Google’s 38.7M payouts to ethical hackers, as well as over $90M via managed bug bounty programmes in the past three years security assessment, organisations can preemptively address vulnerabilities before they are exploited by malicious actors, thereby mitigating potential risks and safeguarding against cyber threats. The major role of ethical hackers has been seen in the rise of bug bounty programmes, which exemplifies the collaborative nature of ethical hacking. These programmes incentivise security researchers to responsibly disclose vulnerabilities they discover, fostering a culture of transparency and accountability within the cybersecurity community. For instance, Facebook’s bug bounty programme has paid out over $16 million in rewards since 2011 to ethical hackers across 45 countries, while Google has paid out $38.7 million. Furthermore, with the rise of blockchain and smart contracts, more than $90 million has been paid to ethical hackers via managed bug bounty programmes in the past three years alone, demonstrating the significant impact of bug bounty initiatives in identifying and mitigating security vulnerabilities. Together, these approaches epitomise the ethos of ethical hacking, serving as a blessing in disguise for organisations striving to bolster their digital defences while upholding ethical standards. They have also greatly incentivised ethical hackers across the globe with monetary rewards and the inscription of their names on security hall of fame pages. By embracing these trends, organisations can leverage the power of ethical hacking to proactively identify and mitigate vulnerabilities, thereby transforming cybersecurity challenges into opportunities for resilience and innovation.
70 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Why Infrastructure Security Matters? Column Infrastructure Security 70 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 71 Column / Infrastructure Security Protecting an organisation’s infrastructure is no longer a choice but a necessity in today’s digital age By SS Prasad CFO, BPMS T oday’s corporate environment’s operational foundation is infrastructure. The development of cloud services and remote employment has caused digital technologies to advance, which has elevated the need for better digital security in business operations. Protecting infrastructure is not just an optional measure but a critical aspect of sound business administration. Data breaches can significantly impact network, database and system security and reliability, making it essential to avoid them at all costs. The modern world faces intense competition from cyber threats and data breaches, making strong security measures crucial. To be prepared for future technological advancements, it’s essential to stay adaptable and embrace cutting-edge security measures. This includes investing in state-of-the-art security methods, staying informed about current threats and fostering a culture that prioritises cybersecurity awareness. Protecting an organisation’s infrastructure is no longer a choice but a necessity in today’s digital age. Understanding Security Infrastructure Infrastructure security is a crucial aspect of modern-day business operations. It encompasses several critical components, including networks, systems, data centres, cloud services and physical assets. The primary objective of infrastructure security is to ensure the smooth functioning of business operations by protecting against cyberattacks and information leakages. Protecting networks and systems is essential, as it helps safeguard critical business data, ensure continuity of operations and prevent attacks. To achieve this, strict security measures such as encryption and monitoring are implemented to ensure data integrity in data centres and cloud services. Moreover, restricting access to hardware is a vital security measure that physically guarantees integrity.
72 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Threat & Risks In today’s rapidly evolving cybersecurity landscape, vigilance is crucial for businesses to avoid the detrimental impacts of cyber threats and data breaches. These threats can lead to operational disruptions, the loss of sensitive information, damage to reputation and financial consequences. Cyber threats and data breaches can cause significant harm to businesses. They can result in the exposure of sensitive information, leading to a loss of money, legal penalties, and a decline in consumer trust. To mitigate these risks, implementing robust cybersecurity measures and conducting periodic risk assessments are essential. Frameworks And Best Practices Robust security measures are based on established frameworks such as CIS, NIST and ISO, as well as sector-specific best practices that are implemented in various environments. These adaptive frameworks allow for modifying security strategies to address potential vulnerabilities. By using a structured approach, strong security controls and effective incident responses can be implemented, making the infrastructure resilient to risks. Integrating these frameworks and best practices enhances compliance, strengthens defences and fosters a proactive and responsive security culture. Key Strategies Maintaining a secure infrastructure requires a multi-faceted approach that includes several critical components. Access control and identity management are essential for limiting unnecessary access and preventing unauthorised entry. Encryption and protecting sensitive data ensure the security and confidentiality of information. Regular system upgrades and continuous patching provide an additional layer of protection against cyberattacks, leaving no vulnerabilities for attackers to exploit. Coordinated security breach responses, including incident response and disaster recovery plans, help limit data loss and downtime in the event of a security breach. Human Element A people-centric culture is essential for maintaining a robust security posture. This involves recognising the significance of employees’ awareness, training, and culture towards security. Employees are often the weakest link in an organisation’s security, making them the most vulnerable target for cybercriminals. Therefore, it’s crucial to educate personnel to identify potential threats and encourage them to report any suspicious activity that could compromise business security. Role Of Technology Technology plays a vital role in strengthening infrastructure security by providing businesses with the necessary tools and software to protect against evolving cyberspace hazards. Emerging technologies and advancements in security software enable organisations to adapt their security measures to stay ahead of emerging threats. Businesses can now leverage advanced methods, such as AIpowered threat identification software and encryption devices, to fend off emerging cyber threats. The first line of defence lies in advanced computer software, such as end-point protection and network monitoring. It is crucial for organisations to keep up-to-date with the latest technologies and integrate them into their security systems to remain secure in an everchanging world. THE PRIMARY OBJECTIVE OF INFRASTRUCTURE SECURITY IS TO ENSURE THE SMOOTH FUNCTIONING OF BUSINESS OPERATIONS BY PROTECTING AGAINST CYBER-ATTACKS AND INFORMATION LEAKAGES
fifffflffffiflflff fl fifffflffiflfifffflffifl fifififffflfiffiflfiffiff 3rd EDITION BUILDING BLOCKS OF RETAIL SUMMIT 2024 fiffffl flffi fifffflffiflfifffflffifl fifififffflfiffiflfiffiff UNDER FORTY AWARDS 3rd EDITION JULY 2024 NOMINATE NOW MR. T. KOSHY MD & CEO, ONDC MR. DEVNDRA CHAWLA MD & CEO, Chief Driving Ofice, Greencell Mobility MR. KAZEM SAMANDARI Executive Chairman, L’Opéra MS. GEETIKA MEHTA MD, Nivea India DR. ANNURAG BATRA Chairman Editor in Chief BW BusinessWorld and Founder, exchange4media MR. SUNIL CHAUHAN Founder, Fab Cafe Foods & Chefs United Foodtech MR. DEEP BAJAJ Co-Founder, Sirona & Pee Buddy MR. VED SHUKLA Founder & CEO Mylomart & Advisor BW Retail World MS. NOOR FATHIMA WARSIA Group Editorial Director BW Businessworld MR. VIKAAS GUTGUTIA Founder & MD, Ferns N Petals OUR EMINENT JURY For Nominations & Queries: Chirodeep Mitra: +91 98111 36111, [email protected] Sanjana Choudhary: +91 86900 34757, [email protected] For sponsorships: Aparna Sengupta: +91 99580 00128, [email protected] Somyajit Sengupta: +91 98182 47444, [email protected]
74 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 The Untapped Power of Risk In the modern age, risk management has become increasingly complex and challenging due to the need for rapid decision-making and the high velocity of data exchange L eaders are primarily responsible for three key functions: creating a solid plan for the organisation, ensuring the necessary resources are available to execute the plan, and managing risks to stay on track with the plan or adapt to changing conditions. Among these, risk management is the only continuous function, as planning and resource allocation are typically periodic activities. However, it’s concerning that many CEOs may not be adequately trained in risk management, with some not even recognising their risk management responsibilities. In the modern age, risk management has become increasingly complex and challenging due to the need for rapid decision-making and the high velocity of data exchange. Leaders often face pressure to make resilient, enduring decisions in a short amount of time, with data coming from various sources. In countries like India, risk management is further complicated Column Risk Management By Gurpawan Singh President, IIRIS
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 75 Column / Risk Management by a dynamic risk environment where risk levels can change rapidly. These shifts often have direct consequences for businesses and profitability. Additionally, India faces risks associated with specific events, such as national holidays, elections, and religious festivals. TOP THREE RISKS IN INDIA The top three risks in India for business are: n Technology risk n Business disruptions n Insider threat TECHNOLOGY RISKS The technology itself encompasses many diverse sub-risks. As our lives and businesses keep adopting further technological tools, this risk is likely to keep increasing. Technology failure has been faced by everyone, right from the largest of the companies to the smallest entity, such as an individual user of technology. There are many examples when critical units, such as hospitals and power supplies, couldn’t operate due to technology failure. At the same time, data and privacy are causing serious concerns. The main reason behind the data is the enormous utilisation of the data that can impact countries and individuals. Protecting intellectual property rights (IPR) and preventing the misuse of IP have increased with the advent of technology. The criminals in the cyberspace have not only enjoyed nontrackability but are also getting newage tools like VPN, spoofing, etc. to detect them, which is more difficult.
76 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 As per a report, cybercrime costs are expected to grow by 15 per cent per year and reach $10.5 trillion annually by 2025. BUSINESS DISRUPTIONS Disruption is the fastest-growing trend globally, and India is quite ahead of others. In fact, among risk management professionals, it is often discussed that India is the perfect ground for training on risk management due to the plethora of business disruptions. Indian businesses face disruptions of many kinds, including political protests, social unrest, outages of utilities, natural disasters, etc. The cost of such disruptions is very high, apart from the loss of reputation that is a product of business losses and the loss of faith of customers. As per the Global Peace Index, communal violence alone brought a cost of $646 billion to India in 2020. 1 Treat risk management as an ongoing process, not just a reaction to visible risks. 2Integrate risk management into your organisation’s DNA by establishing a comprehensive risk management framework, as opposed to having a small, isolated department. 3Develop a risk strategy that covers at least three years, taking into account global environmental factors and local incidents. 4Implement a dedicated digitalisation strategy review to address associated risks. 5Adopt an impact-focused risk management approach instead of focusing solely on individual events. 6Opt for risk financing as a more advantageous alternative to losses caused by insufficient risk management. 7Foster a culture where all employees are responders through awareness and training, rather than unintentionally contributing to risks. 8Ensure the risk management team meets regularly, at least once a month, to review and discuss risk-related matters. When developing a risk management strategy, consider the following recommendations to optimise your efforts: New Age Mitigations IN COUNTRIES LIKE INDIA, RISK MANAGEMENT IS FURTHER COMPLICATED BY A DYNAMIC RISK ENVIRONMENT WHERE RISK LEVELS CAN CHANGE RAPIDLY India loses almost 9 per cent of its GDP due to riots. As per ASSOCHAM, the farmer protests in the Delhi area cost the economy almost Rs 3,500 crore per day. If a company or country is part of the global supply chain, then it’s a must for them to implement mitigations to avoid being impacted by local disruptions. INSIDER THREAT This is the most prominent problem, however, most denied as a concern. My favourite example is that Lord Ram also had to take the help of an insider to win against Ravana. The ever-increasing incidents of board room leaks, IP thefts, loss of commercial information, etc. are the root cause of the insider problem. In fact, even physical thefts take place with the help of insiders. The retail industry faces more than 90 per cent of inventory shrinkage due to insiders rather than shoplifting. The tapestry of a competitive duel today may be economic in nature, but the victorious insights are still being achieved by gaining secrets and, more often than not, through insider involvement. In a growing economic regime, companies operating in the same environment often seek a peek at the future plans of their competitors to formulate their own strategy, hoping to gain an edge or a head-start, while governments also utilise their own insider network to be aware of tax evasions and other non-compliance issues.
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 77 6 SIGMA BEST IN INDUSTRY 6000+ SUCCESSFUL PROJECTS 350+ TEAM 99.99% HAPPY CLIENTS Empower Your Strategy: Harnessing Risk Mitigation and Intelligence I IRIS a Value Catalyst to the clients, not only customises the solutions but also uses a scientific approach to provide holistic solutions for the effective running of their entities saving cost and time. We take pride in calling ourselves end-to-end consultants who believe in helping clients not only to unearth risks but also mitigate them and help implement such solutions through the best use of technology, strategic planning and manpower advisory. DISCOVER IIRIS Are you tired of navigating the treacherous waters of business uncertainty alone? Look no further than IIRIS, your trusted partner in risk mitigation and intelligence management solutions. At IIRIS, we go beyond conventional approaches to offer unparalleled support in enhancing critical business value. Our mission? To empower you to make informed decisions, steer clear of unnecessary losses, and surge ahead of your competitors in the market Embracing Our Roots: The Indus Spirit As we expand our horizons globally, we remain grounded in our origins. The first letter "I" in IIRIS pays homage to the Indus, reminding us of our heritage and the values we hold dear. Wherever our journey takes us, we stay true to our roots and our commitment to excellence. OUR SERVICES n Risk Management n Digitisation & Design Solutions n Forensics & Investigations n Response Services n Resources & Skill Provisioning (Rsp) n Advisory & Consulting n Brand Protection n Cyber Intelligence For more information, please contact: IIRIS, Unit No. 1105 & 1106, Tower B, “UNITECH CYBER PARK” Sector 39, Gurugram, Haryana - 122003 Phone: +91 9717860086 E-mail: [email protected] Website: www.iirisconsulting.com BW; BUSINESSWORLD Feature Presentation IIRIS office Strategic Partner Office Θ Θ Θ Θ ΘΘ Θ Θ Θ Θ Θ Θ Θ Θ Θ 30+ WINNING AWARDS APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 77
78 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 Drones The New Edge Weapon Drones have become increasingly popular for industrial security due to their ability to provide aerial surveillance, remote monitoring and rapid response capabilities DRONES, ALSO KNOWN AS UNMANNED AERIAL VEHICLES, CAN PLAY A CRUCIAL ROLE IN ENHANCING INDUSTRIAL SECURITY IN VARIOUS WAYS
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 79 Column Technology in Security
80 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 On November 12, 2023, a section of the Silkyara BendBarkot tunnel, which is under construction to connect National Highway 134 in the Uttarkashi district of Uttarakhand, India, collapsed. This incident resulted in 41 workers being trapped inside. After 17 days, Indian engineering teams successfully rescued the workers. The workers were lowwage and had been stranded in the 4.5 km (2.8 mile) tunnel. Miners drilled the final section by hand to reach the workers. Drones were successfully utilised for many critical requirements and assessments and have proved their importance in such operations. Drones have become increasingly popular for industrial security due to their ability to provide aerial surveillance, remote monitoring and rapid response capabilities. Drones, also known as Unmanned Aerial Vehicles (UAVs), can play a crucial role in enhancing industrial security in various ways. Drones are increasingly being used in emergency response and security management for various reasons. They have the ability to reach challenging areas and provide aerial views, making them useful in law enforcement and search and rescue operations. Some specific applications include locating missing persons, traffic collision reconstructions, real-time investigations, crime scene analysis, disaster response, and surveillance. The use of drones has several advantages. They can access remote or hazardous locations that are inaccessible to humans. Additionally, drones have become a popular solution for data gathering and routine tasks that were previously performed by expensive helicopters. In many ways, drones represent the future of crime fighting and rescue missions. Here are some ways drones can be better utilised for industrial security: EMERGENCY RESPONSE Drones were used to monitor the rescue operation of 41 workers trapped in the Silkyara tunnel in Uttarakhand. The tunnel collapsed on November 12, 2023. The drones were able to track inside the tunnel and provide real-time data and imaging. The drones were also able to operate in GPS-denied areas. The drones used in the rescue operation were created by Squadrone Infra Mining Pvt. Ltd. The drones were controlled by a motion control device that allowed them to be operated by hand. The rescue operation was successful and all 41 workers were removed. Drones play a significant role in emergency response scenarios, DRONES HAVE BECOME A POPULAR SOLUTION FOR DATA GATHERING AND ROUTINE TASKS THAT WERE PREVIOUSLY PERFORMED BY EXPENSIVE HELICOPTERS. IN MANY WAYS, DRONES REPRESENT THE FUTURE OF CRIME FIGHTING AND RESCUE MISSIONS n Aerial Surveillance n Search and Rescue Operations n Communication Relay n Medical Supply Delivery n Damage Assessment n Environmental Monitoring n Evacuation Assistance n Firefighting Support n Mapping and 3D Modelling n Hazardous Material Detection n Data Collection and Analysis Several ways in which drones are utilised for emergency response By Prof. (Capt.) SB Tyagi Chief Councillor, ICSSM
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 81 providing valuable support to first responders and aiding in various aspects of crisis management. In the event of an emergency, drones can quickly survey the area to assess the situation, providing crucial information for emergency response teams. They can be deployed to areas that may be hazardous or difficult for human responders to access. Drones play a significant role in emergency response scenarios, providing valuable support to first responders and aiding in various aspects of crisis management. COMMUNICATION RELAY Drones can serve as communication relays in areas with poor connectivity, ensuring that security personnel remain in contact with each other and with the central monitoring system. Drones can serve as valuable tools for communication relay in various Column / Technology in Security n Disaster Response n Remote Areas and Infrastructure Inspection n Crowded Events and Public Gatherings n Search and Rescue Operations n Military and Defense Operations n Precision Agriculture n Wildlife Monitoring and Conservation n Humanitarian Aid and Connectivity n Border Surveillance Drones can be employed for communication relay scenarios, particularly in areas where traditional communication infrastructure is limited, damaged or nonexistent. The effective deployment of communication relay drones requires consideration of regulatory compliance, security, and privacy concerns. Additionally, advancements in drone technology, such as extended flight times and increased payload capacities, contribute to the feasibility and success of communication relay missions. Intruder Detection and Access Control and Asset Protection: Drones can easily navigate to the most unreachable locations without any major workplace hazards. Not just for maintenance, but the videos and images can be stored in a safe repository and used by relevant stakeholders whenever necessary. Drones can be used during the construction period of assets as well.
82 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 When it comes to asset protection, the focus is on deterrence and recovery. Both of which are accomplished with drones. Drones are quick to deploy, require minimal manpower, record video and photos for prosecuting thieves, and offer a significant return on investment (ROI). Drones equipped with thermal imaging cameras can identify and track intruders, even in low-light conditions. Autonomous drones can be programmed to patrol predefined routes, alerting security personnel to any unusual activities. Drones can be integrated with access control systems to monitor and control entry points, ensuring that only authorised personnel have access to specific areas. They can be used to inspect fences, gates, and other barriers for signs of damage or tampering. Drones can be used to monitor high-value assets, such as equipment and machinery, to prevent theft, vandalism, or unauthorised access. They can also perform routine inspections to identify maintenance needs and potential issues. SURVEILLANCE AND MONITORING Drones equipped with highresolution cameras and thermal imaging sensors can provide real-time video feeds to security personnel, allowing them to monitor large industrial sites, such as oil refineries, power plants, and manufacturing facilities, from a safe distance. Drones can patrol n Perimeter Surveillance n Intrusion Detection n High-value asset monitoring n Facility Inspections n Access Control n Anti-Theft Deterrence n Quick Response to Security Alerts n Integration with Security Systems n Documentation and evidence gathering Drones are used for asset protection
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 83 the perimeter, fly over restricted areas, and identify potential security breaches or safety hazards. They provide real-time video feeds to security personnel, enabling them to detect and respond promptly to potential security threats. ENVIRONMENTAL MONITORING Drones equipped with sensors can monitor environmental conditions, such as gas leaks, chemical spills, or other hazardous materials, helping to prevent accidents and ensuring a safe working environment. ACCESS TO HARDTO-REACH AREAS Industrial facilities often have hardto-reach areas such as rooftops, silos, Column / Technology in Security and storage tanks that are difficult for security personnel to access. Drones can navigate these areas easily and safely, providing visual inspections and identifying any anomalies or vulnerabilities that may pose security risks. QUICK RESPONSE TO INCIDENTS Drones can be deployed rapidly in response to security incidents, such as intrusions or alarms. They can provide real-time situational awareness to security teams, enabling them to assess the situation quickly and respond appropriately. Drones can also transmit live video feeds to a command centre, allowing for remote decisionmaking and coordination of security personnel.
84 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 DETERRENCE AND PREVENTION Drones can serve as a visible deterrent to potential intruders or trespassers. The presence of drones flying over an industrial site can discourage unauthorised access and criminal activities. Additionally, drones can be used to enforce no-fly zones, preventing unauthorised drones from entering restricted airspace around industrial facilities. COST-EFFECTIVE SOLUTION Drones can provide a cost-effective solution for industrial security compared to traditional methods. They require less manpower, can cover large areas quickly, and can be operated remotely, reducing the risk to security personnel. With drones, carrying out inspections is cheaper. Drone security patrols have the ability to monitor vast areas and provide high-quality images and video footage in real time, which could also mean that fewer on-site security officers are needed to protect a site or property. Speed is another advantage. DATA COLLECTION AND ANALYSIS Drones can capture vast amounts of data, and advanced analytics can be employed to process and analyse this data for actionable insights. Integration with other security systems, such as video surveillance and access control, enhances the overall security infrastructure. Drones can collect and transmit data from various sensors, such as gas detectors or radiation detectors, to assess environmental risks or detect leaks, emissions, or other anomalies. This data can be analysed in real-time or stored for further analysis, helping industries proactively address potential security or safety issues. TRAINING AND SIMULATIONS Drones can be used for training and simulations to improve the preparedness of security personnel. Drone-based simulations can simulate various scenarios, such as intrusions, fires, or chemical spills, allowing security teams to practice their response procedures in a controlled environment. The drones offer significant potential for enhancing industrial security through enhanced surveillance. Drone security patrols have the ability to monitor vast areas and provide high-quality images and video footage in real time
MAY 14, 2024 Final Material Deadline: Aparna Sengupta, [email protected], +91 9958000128 Anjeet Trivedi, [email protected], +91 9818122217 Ravi Khatri, [email protected], +91 9891315715 CS Rajaraman, [email protected], +91 9342262859 Somyajit Sengupta, [email protected], +91 9818247444 Kiran Dedhia, [email protected], +91 9833399009 Sajjad Mohmmad, [email protected], +91 9911855935 Shruti Arora, [email protected], +91 7982628913 Deepak Bhatt, [email protected], +91 9429423232 Santosh B Singh, [email protected], +91 9820129879 Nitin Pawar, [email protected], 9456639006 fifffflffiflfflffifflffffl flflff For Editorial: Noor Fathima Warsia, [email protected] Spotlight: Who were India's Most Respected Companies in the Year Gone In-depth Articles: Highlighting business practices, innovations and impact on respective industries CEO Interviews: Insights from leaders about strategies, corporate culture and visions for the future that have earned respect in the industry and from their peers Exclusive Features and Interviews Opinions & Insights from Industry Leaders MOST RESPECTED COMPANIES JUNE 1 2024 Block your pages...
86 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 IN AN ERA WHERE DIGITAL TRANSFORMATION EXPOSE US TO MULTIFACETED RISKS, OUR APPROACH TO SECURITY MUST BE EQUALLY MULTIFACETED 86 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 87 Rethinking Security The security profession is evolving from an intuition-based approach to a more deliberate and financially-informed practice S ecurity is definitely one of the oldest professions, dating to the beginning of life and the instinct to protect it. Security is an essential process that continuously changes and develops instead of being a simple product that can be created, bought, used and replaced. Corporate security has a variety of responsibilities, including risk assessment, measurement, and quantification. The security team is in charge of creating, implementing and maintaining security measures. These measures are designed to identify trends, prevent incidents, and understand their impact on various business areas. A cycle of analysis and evaluation ensures that security measures remain relevant and up-to-date. The security team works closely with the organisation, receiving feedback on mandates and funding. This creates a symbiotic relationship that strengthens the corporate security framework. However, the role of corporate security is often misunderstood within the corporate world. This is due to controversies, internal conflicts, and a lack of understanding about the value of security. When it comes to security measures, organisations often prioritise establishing security functions and fostering a securityoriented culture. However, they may not fully recognise the commercial potential of their security investments. Security is commonly seen as a necessary expense rather than a value-adding component of business processes. Nevertheless, this perspective is slowly changing as businesses start to understand the wider benefits of security. The security profession is evolving from an intuition-based approach Column CSO’s Perspective By Capt. Sanjay Sharma Global Security Head, Wipro
88 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 to a more deliberate and financially informed practice. To optimise security investments, security professionals should be open to innovation, acquire new skills, and highlight the commercial advantages of security initiatives. The current state of physical security is driven by economic instability and geopolitical disruption, steep increases in severe weather, lingering post-pandemic effects and a security talent shortage. If we have to categorise the economic influencers according to speed of impact, severity of consequences, and time required to recover, security issues will be at the top of all three categories. In today’s rapidly changing geopolitical climate, CEOs face unparalleled challenges as they navigate uncharted waters. The evolving geopolitical system requires constant vigilance and adaptability from CEOs. With its rapid pace and limited predictability, success depends on a CEO’s ability to proactively address these challenges. To succeed in this environment, CEOs must prioritise geopolitical monitoring and response, taking a personal role in guiding their organisations through turbulent times. In this context, corporate security becomes an invaluable partner, providing professional support in understanding and navigating complex geopolitical landscapes. By working together, CEOS MUST PRIORITISE GEOPOLITICAL MONITORING AND RESPONSE, TAKING A PERSONAL ROLE IN GUIDING THEIR ORGANISATIONS THROUGH TURBULENT TIMES
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 89 capabilities, and gaining new insights to allow security teams to better defend against attacks. Unifying cyber and physical unlocks powerful new scenarios. Most physical security leaders agree that physical security needs to become predictive and are investing in technologies to deliver these capabilities. The convergence of physical and cyber, of people and things, all intersect at the digital transformation. Digital transformation will deliver significant non-financial benefits such as an enhanced employee experience, converged cyber and physical intelligence, and environments that are not only smart but also aware. As physical security organisations transform to harness the power of data, they must also make data protection and privacy a priority. Monitoring and analysing data is only half of the equation; intelligence must get connected with people who can act on it. New physical security models deliver faster response times at a lower cost, better security asset utilisation and improved lifecycle management. Security leaders can leverage these systems to create compelling insights that can be shared across the organisation to not only identify potential security vulnerabilities but also drive efficiencies, increase cost savings, and elevate customer trust by preserving privacy and Column / CSO’s Perspective CEOs and corporate security can forge a path to success in an era of constant change. Today’s threats often keep one foot on each side of the physical and digital divide. These blended threats require connecting data, building new Highlight the commercial benefits of security: Showcase the potential advantages of security measures in terms of process optimisation, risk reduction and value creation. n Foster a culture of continuous improvement: Encourage a security-focused mindset that supports regular evaluation and adjustment of security measures. n Acquire new skills: Stay updated on industry trends, threats, and best practices. Develop new skills in areas like strategic planning, financial management, and communication. n Collaborate with other departments: Work closely with other business units to ensure a consistent understanding of security priorities and to maintain support for security initiatives. n Measure and demonstrate ROI: Develop metrics to assess the effectiveness of security investments and share these results with stakeholders. This will help illustrate the value of security initiatives and secure ongoing support for the security programme. Key points to consider
90 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 security. An effective strategy will enable physical security to become the core intelligence platform of the organisation, transforming from a cost centre into a value hub. By harmonising both organisational and CSO objectives, companies can strengthen their enterprise security posture, implement processes necessary to address threats, and realise gains in both the bottom line and overall business efficiency. In an era where digital transformation and global interconnectivity expose us to multifaceted risks, our approach to security must be equally multifaceted. It’s about more than just safeguarding assets; it’s about fortifying the foundation upon which our business aspirations rest. The fortification of corporate digital infrastructure, protection of sensitive data, and proactive risk management become not merely defensive measures but integral components of enterprise growth strategy. In the journey towards fortifying corporate security, tangible metrics that demonstrate the value of security investments play a pivotal role. These metrics extend beyond traditional security measures to showcase how security initiatives contribute directly to the organisation’s bottom line, resilience, and overall success. In the everevolving landscape of corporate security, the current renaissance, intricately woven with the Internet of Things (IoT) and marked by AI integration, sets the stage for a future that promises unprecedented advancements, creating a unified security ecosystem where data from diverse sources converges to provide By working together, CEOs and corporate security can forge a path to success in an era of constant change
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 91 comprehensive situational awareness. This integration ensures that security measures are not isolated but part of a holistic strategy that leverages real-time data from various sources to make informed decisions. The future lies in proactive security, where AI algorithms continuously learn, adapt, and predict potential threats. With machine learning algorithms analysing vast datasets in real-time, security is not just a partner in organisational success—it becomes an intelligent collaborator, identifying patterns, predicting risks, and evolving alongside the organisation’s objectives. By harmonising these objectives, companies can fortify their enterprise security posture with unparalleled efficiency. AI-driven technologies offer not only robust threat prevention but also the ability to adapt to and learn from emerging risks, creating a holistic security ecosystem that seamlessly integrates with organisational processes. The future demands security measures that can adapt to dynamic threats. AI-driven adaptive security solutions will dynamically respond to evolving risks, adjusting security protocols in real-time. This adaptive approach ensures that security is not a static concept but a living, breathing system that learns and evolves, staying one step ahead of potential threats. The perception of security extends beyond the walls of any organisation. Trust is the currency of modern business, and corporate security plays a pivotal role in its preservation. A secure environment directly influences how an enterprise is perceived in the eyes of our stakeholders—clients, investors, and the wider community. It not only instills confidence but also becomes a testament to leadership commitment to ethical practices and the well-being of those associated with the corporation. By safeguarding enterprise assets, companies create a secure environment conducive to innovation, collaboration, and sustained productivity. This, in turn, fosters an atmosphere that attracts top talent, enhances employee morale, and positions the corporation as an employer of choice. Security, therefore, becomes a strategic driver of enterprise-level human capital strategy, thereby driving organisational growth. Corporate physical security is also a critical Column / CSO’s Perspective
92 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 component in mitigating financial risks. From theft prevention to protection against potential liabilities arising from security incidents, a robust security posture directly contributes to cost savings. By preventing financial losses associated with physical threats, security becomes a proactive financial risk management tool, safeguarding enterprise assets and contributing to overall fiscal health. In an era of increasing regulatory scrutiny, corporate security plays a crucial role in ensuring compliance with a myriad of industry regulations, standards, and privacy laws. Demonstrating a commitment to physical security standards not only instills confidence in existing clients but also becomes a differentiator in winning new business. It positions the organisation as a reliable partner capable of safeguarding sensitive client data and critical business processes. This not only mitigates legal risks but also enhances the organisation’s credibility in the global market. Modern-day business enterprise is synonymous with innovation, data-driven processes, and global connectivity. Amidst this tech-driven euphoria, the importance of safeguarding physical assets, intellectual property, and the well-being of the workforce often takes centre stage. In the complex world of international business, Chief Security Officers serve as resilient sentinels, ensuring not only the security of physical assets, facilities, and personnel but also acting as visionaries for the organisation’s prosperity. A strong security foundation enables businesses to withstand disruptions and maintain operations during crises. As physical security takes centre stage during emergencies, CSOs play a critical role in minimising downtime and preserving corporate reputation. IN THE COMPLEX WORLD OF INTERNATIONAL BUSINESS, CHIEF SECURITY OFFICERS SERVE AS RESILIENT SENTINELS, ENSURING NOT ONLY THE SECURITY OF PHYSICAL ASSETS, FACILITIES AND PERSONNEL BUT ALSO ACTING AS VISIONARIES FOR THE ORGANISATION’S PROSPERITY
FOR NOMINATIONS: Shivam Popli: +91 88003 29489, [email protected] FOR PARTNERSHIP OPPORTUNITIES: Aparna Sengupta, +91 9958000128, [email protected] Shruti Arora, +91 7982628913, [email protected] #BWTheMerits NOMINATIONS OPEN www.bwmarketingworld.com SCREENING JURY AJAY DANG President Head Marketing UltraTech Cement DEEPALI NAAIR Group CMO CK Birla Group SHUVADIP BANERJEE Chief Digital & Marketing offcer ITC DEEPIKA WARRIER Chief Marketing Offcer Bajaj Auto RAM SURESH AKELLA Executive Offcer (Marketing) – Maruti Suzuki India AMIT GUJRAL Chief Marketing Offcer JK Tyres Chief Marketing Offcer ManipalCigma Health Insurance SAPNA DESAI GAURI MALHOTRA Chief Marketing Offcer Bombay Shaving Company BHAVIN DEVPURIA Marketing Head - India & Sri Lanka Triumph International SAMYUKTA IYER Chief Experience Offcer Vice President and Head Marketing, Sephora SACHIN CHHABRA Chief Marketing Offcer Relaxo Footwears ANU RAJ Head of Marketing Aditya Birla Health Insurance NEELIMA BURRA CTO Luminous Power Technologies Group Chief Marketing and Growth Offcer, ART Fertility Clinics KARAN KUMAR PUNEETH BEKAL Executive Vice President & Chief Marketing offcer - HDFC Securities, HDFC Sky Vice President Ecommerce Lenskart MADHUR ACHARYA
94 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 The private security industry in India has been experiencing significant growth and it now holds the distinction of being the largest security industry in the world Column Private Security Private Security Industry Bolsters Public Safety 94 | BWSECURITYWORLD.COM | APRIL-JUNE 2024
APRIL-JUNE 2024 | BWSECURITYWORLD.COM | 95 Column / Private Security L ife and liberty are very fundamental to human life. This position has been reiterated in our Constitution too (Article 21), which serves as a cornerstone for courts while adjudicating cases. The sovereign function of the state includes ensuring the life and liberty of people. To achieve this objective, governments create instrumentalities, including police, enforcement agencies, defence forces, etc. With the passage of time, the pattern has been changing in this area. Further, whenever there is a gap in the system, some alternatives emerge and fill up the gap. With the opening of economies, the world over, the participation of forces other than the state started taking shape and getting consolidated. The emergence of the private security industry is a similar phenomenon that started a few decades ago but has become visible and noticeable as well as gearing up for a much bigger role as a public-private partnership (PPP) in the arena of the internal security of the country. Impact of Private Security Industry Like in other parts of the world, the private security industry in India has come of age and is growing rapidly. It is the largest security industry in the world as of today. It is the highest employment-generating sector and has left behind the much-talkedabout agriculture sector. It is also the top contributor to the government’s coffers as a corporate tax provider. With a mammoth 10 million work force through over 15,000 companies and firms, the sector has been growing at an annual compound rate (CAGR) of around 20 per cent for many years and has a turnover of about Rs 3 lakh crore. The presence of the private security industry is now visible to the common people through its ubiquitous presence in residential, commercial, industrial, and government establishments. With improved training standards, private security guards and supervisors or managers are going to be important players alongside the public police in the years to come. As it is, they are five times the size of the available police force in the country. Recently, they have been inducted into the airport security system, handling non-core areas and, in the future, they can be entrusted with some of the core functions of the police too after proper upskilling, as is the position in the developed world. It is a welcome step that provides a winwin position for the government as well as the private security industry, which ensures better accountability, trustworthiness, and efficiency for a variety of reasons. The growth of the security By Bhagwan Shankar, IAS (Retd) Advisor, CAPSI, New Delhi CAPSI, THE APEX BODY FOR THE PRIVATE SECURITY INDUSTRY, IS A NON-PROFIT ORGANIZATION REGISTERED UNDER SECTION 8 OF THE COMPANIES ACT 2013. IT COLLABORATES CLOSELY WITH THE MINISTRY OF HOME AFFAIRS ON POLICY MATTERS AFFECTING THE INDUSTRY
96 | BWSECURITYWORLD.COM | APRIL-JUNE 2024 industry can be attributed to several factors, including a shortage of police personnel, an increase in business establishments due to a growing economy, an increase in residential and official complexes from urban migration and infrastructure development, heightened security requirements by citizens and changing patterns of crime in modern times. The evolution of personal security on a global scale includes the integration of AI technology in surveillance tools, protective equipment and resources for security personnel. This modernisation enables security devices to become more intelligent and powerful through connected devices in the IoT world. Enhanced perception capabilities, such as radar, temperature measuring, humidity sensing, and gas leak detection, are now integrated into security systems. These devices can perform a variety of tasks that previously required multiple devices. The Zero Trust Initiative Biometrics and the zero-touch approach have been embraced by security companies, and cybersecurity has become a significant challenge due to the increasing number of WITH A MAMMOTH 10 MILLION WORK FORCE THROUGH OVER 15,000 COMPANIES AND FIRMS, THE SECTOR HAS BEEN GROWING AT AN ANNUAL COMPOUND RATE (CAGR) OF AROUND 20 PER CENT FOR MANY YEARS AND HAS A TURNOVER OF ABOUT RS 3 LAKH CRORE