[Virtual Presenter] Cyber Security & Data Privacy Awareness Aligning with I-R-D-A Guidelines Presented by: Bajaj Allianz General Insurance company.
[Virtual Presenter] Objective of the Session Understand key cyber security threats in the insurance sector Emphasize the importance of data privacy Align employee behavior with I-R-D-A compliance Promote secure digital practices across the organization.
[Virtual Presenter] Regulatory Framework I-R-D-A-I Guidelines on Information and Cyber Security (2023) ISO/IEC 27001:2022 Personal Data Protection Bill (India) G-D-P-R (for international exposure).
[Audio] What is Cyber Security? Definition and importance Types of cyber threats: Phishing Malware Ransomware Insider Threats Data Leakage Real life Example: In 2021, Canara HSBC OBC Life Insurance faced a phishing attack where fraudsters impersonated (I-T ) staff..
[Audio] What is Data Privacy? Definition of personal and sensitive data Importance in the insurance sector Real life Example: In 2020, Policybazaar experienced a data breach exposing Aadhaar and P-A-N details..
[Audio] IRDAI Compliance Highlights Mandatory appointment of C-I-S-O Periodic VA/PT assessments S-O-C implementation and monitoring Incident reporting timelines Third party risk assessments Real life Example: In 2022, I-R-D-A-I issued notices for delay in incident reporting—emphasizing strict compliance..
[Audio] Employee Responsibilities Adhere to acceptable use policies Avoid sharing sensitive data on untrusted platforms Use strong passwords & M-F-A Report suspicious emails and activities.
[Audio] Data Handling Best Practices Encrypt sensitive data Avoid sending customer data via email without masking Clean desk and screen lock policy Role based access controls.
[Audio] Secure Remote Working Use official V-P-N's Avoid public Wi Fi for office tasks Update antivirus and OS regularly Be vigilant for phishing attacks Real life Example: A ransomware attack occurred when an employee used unsecured Wi Fi, prompting stricter policies..
[Audio] Reporting and Response Whom to contact in case of suspected breach Incident Response Team (I-R-T--) Reporting timelines (as per I-R-D-A guidelines).
[Audio] Quiz / Knowledge Check Short quiz to reinforce learnings (5 questions) Example: What should you do if you suspect a phishing email?.
[Audio] Summary & Key Takeaways Everyone plays a role in cyber security Adherence to I-R-D-A guidelines is non negotiable Secure handling of customer data is a top priority.
[Audio] Thank You Questions and Answers Contact info of C-I-S-O or (I-T ) Security team.