Tech Mahindra has appointed one executive- Subsidiary Risk
Manager who liaises with all the subsidiary risk officers for all
Risk and Compliance matters including periodic compliance status
report from the subsidiary risk officers. Subsidiary Risk Manager
works with Risk officers of all subsidiaries to ensure that our
subsidiaries (which are not yet integrated) are secure and comply
to applicable laws and regulations (w.r.t security and privacy).
Through this council we drive maturity improvements and extend ISG
services in the area of security testing, monitoring and advice.
Each subsidiary also has to undergo a self-driven security
assessment based on the Standard of Good Practice that Tech
Mahindra follows.
Tech Mahindra shall provide the guidance on the policies to
be implemented by the subsidiaries and will ensure:
- Each subsidiary has a well-defined security organization.
- Each subsidiary has a roadmap to comply with ISO 27000.
- Each subsidiary has a privacy and data protection policy
in place.
- Each subsidiary has a well-defined security policy and
improvement plan.
- Proper external assurance is provided to the security
program and implementation of the same to the subsidiaries.
- The interaction between the Tech Mahindra and its
subsidiaries are in sync and they comply with appropriate legal
requirements while sharing data and IT assets.
- The subsidiaries security policies, tools and processes
align with the Tech Mahindra security policies, tools and
processes.
Additionally, Tech Mahindra is
working with Subsidiaries in:
- Harmonizing with TechM Microsoft and
Security Journey and upgrading subsidiaries.
- Moving to Office 365 and McAfee Endpoint Protection
- 2FA for remote access to systems
- ATP for infra, Email and Network
- Annual Security Audit
- DMARC compliance
- Extending Supplier Monitoring Tool and
Technology Solutions
- Periodic Vulnerability assessment
- Improvement actions on VRR
- Alignment of subsidiary to TechM Infra,
Services and Audit.
- Creating Information Security Audit Scope document.
- Incident management Process review
Training
All Subsidiaries are required to have an annual Information
Security and Data Protection training and assessment program. TechM
is sharing the training program used in TechM with the Subsidiaries
for them to customize the program based on their requirements to
use in their organization.
Employees who have been provided access to TechM systems,
will be able to access TechM Learning portal (DEXT) and have to
go through the mandatory security awareness training program
Connect with Manish Sodhi for
any queries related to Subsidiary.