The Information Security Function structure has been designed to ensure effective operation of the core processes and to facilitate smooth implementation of strategic programs. The structure also takes note of the segregation of duty matrix by making independent the Audit and Compliance functions.
The compliance team structure is aligned to the organization structure to facilitate implementation of compliance controls and tailor reviews and accountability in line with the function/delivery organization structure.
Security and Privacy Processes and Requirements for Outsourcing to 3rd parties
Get MSA/RFP/Questionnaire responses for Organizational Security and Privacy clauses or controls.
ICT security standards, policies and processes for Tech Mahindra and Customer Projects.
Process to ensure compliance to security, privacy best practices and SOW obligations
Risks assessments to identify and remediate risks in projects and functions
Privacy Assessments to stay compliant to privacy policy and country laws
Prepare Business Continuity plans, conduct drills to ensure project readiness and employee safety during a crisis.
Get Familiar with Internal and External Audit processes for Compliance
Standards and Policies for acquired companies and their employees
Security Standards and Policies for operating labs within Tech Mahindra
Security awareness programs to train associates on how to recognize and mitigate security threats.
Physical security measures to protect employees and our workplace
Proactive monitoring and active defence of cyber threats to Tech Mahindra
Manages the risk and compliance at Enterprise, Account and Project level
Responds to reported security and privacy incidents and cyber-attacks.
Manages exception request based on risk evaluation.