We make continuous efforts for preventing our firm’s network and systems from cyber threats and cyber incidents. We have devised policies and procedures which help us in implementation of cyber security. This, however, requires coordination and support from all the relevant stakeholders (Employees, partners, vendors and customers) alike.
We have documented and implemented a cyber security management framework which is headed by the Chief Information Security Officer. The metrics on the cyber security are reported to the Chief Information Officer. We have further implemented Information Security Management Systems (ISMS) which supports the implementation of the objectives as identified for cyber security resilience. All material cyber issues or incidents are reported to the Audit Committee. It is our responsibility to make you aware of our stand on the cyber security front and inform your responsibilities for its successful implementation.
We have implemented multiple lines of defences – i) Policies ii) Operational Procedures iii) KPIs and Metrics for measurement implemented procedures and iv) education and training. We update and improve our knowledge about our IT environment and perform periodic risk assessment exercises to identify and mitigate the risks associated with our IT environment. We further conduct a regular assessment of our partners and vendors in order to assess our outsourcing risks and comply with the industry and government standards/regulations.
It is of utmost importance that due care should be taken while transacting online: