25. Cyber security Responsibility
Vendors should establish
policies and processes for:
• Threat modeling the
architectures and
designs
• Source code validation
• Product testing
• System testing
• Patch validation
• Antivirus validation
• Vulnerability
management and
mitigation 25
26. Key takeaway: Few steps we have taken
to achieve desire result
Develop right product with excellent requirement
engineering
Build and sustain a Strong Product management team
Controlled product development model (standardized)
Innovation framework for ideation to market release
Build and inject agility into the system(Increase
Operational excellency)
Increase engagement through gamification
Cyber security compliance
Serve few tough customer
Extreme collaboration with stakeholders
26