The Information Security Function structure which is inline with organization structure has been designed to ensure effective operation of the core processes and to facilitate smooth implementation of strategic programs. The structure also takes note of the segregation of duty matrix by making independent the Audit and Compliance functions.
Risk & Compliance: Risk & Compliance has dedicated SPOCs for each Delivery Service Line and Enterprise Functions. It manages risk, ensures compliance for all contractual and regulatory obligations across enterprise( Delivery, functions, supplier etc.), drive & represent TechM for all security and customer audits/ customer incidents/escalations,/visits, Pre-Sales Support & Contract Review, ISG ServiceDesk (18x7), Supplier Risk Management, Portfolio companies Security, Central Risk Management and all ISG Automation activities. Below is the updated structure with details of SPOC for each Service Line -
- Security Assurance:
Independent internal audit unit. Ensure that the Security and Privacy Operational process and controls are compliant to Industry standards, of highest quality and effective all the time. Standards and requirements – ISO27001, ISO22301, ISO 27701, SOC2, NIST, PCIDSS , TMW , Contractual requirements.
- Business Continuity:
The Global Business Continuity Management team governs the organization wide continuity and resilience program integrating business units, support functions and provides support and oversight to the Interconnect-Continuity and Disaster Recovery programs for the organization.
- Data Privacy:
Data Protection Function is responsible for governance of policies and facilitating compliance to data privacy requirements and customer privacy requirements. The team will define and facilitate that the requirements to safeguard personal data which includes Personal Information (“PI”), are followed by the Delivery as well as support functions. The function is responsible for facilitating and reviewing Privacy by Design controls, GDPR and country specific, contractual data privacy requirements for the organization units consisting of support functions and delivery units.
- Incident Management, Threat Intelligence, Training & Awareness:
Dedicated Incident Response Teams to respond to security incidents. Implementing Containment, prevention and corrective actions through documented best practices and procedure within a stipulated SLA. Threat intelligence is 24x7 team to ensure respond to rapidly evolving threats, including sophisticated cyber-attacks, using threat intelligence to increase cyber resilience. Vulnerability management program to detect and remediate vulnerabilities in a timely and effective manner. The Security Training and Awareness unit ensures that all the associates are adequately trained on security, privacy and continuity.
- NXTGen Technologies Security:
To ensure Next Gen solutions and projects are suitably engineered to meet security and privacy requirements and standards, These include platforms, AI, Cloud and BlockChain Solutions. It involves architecture, engineering, process development and detailed audits/assessments.