Standards, Regulations & Compliance , Video

How UIDAI Is Securing Aadhaar Data

Sumnesh Joshi of UIDAI on the Initiatives the Authority Has Taken to Secure Aadhaar
Sumnesh Joshi, deputy director general, UIDAI

From being in the news about its data being hacked to being hailed as one of the big identity initiatives globally, Aadhaar has indeed come a long way. Sumnesh Joshi, deputy director general of UIDAI, discusses the various initiatives the authority has taken to change the perception of India's individual identification number program.

See Also: AWS Customer Story: REI/FINRA (Japanese Language)

"We have a good cybersecurity strategy in place to ensure proper implementation of our security plans," Joshi said. "We have an independent GRC team within UIDAI. They check for vulnerabilities in applications. They conduct audits of our ecosystem. Additionally, we have our own internal team carrying out audits of authentication tools deployed."

In this video interview with Information Security Media Group at ISMG's Dynamic CISO Excellence Awards and Conference, Joshi discusses:

  • The security framework implemented by UIDAI;
  • How to ensure successful implementation of security frameworks;
  • How UIDAI has managed to change the perception of security critics globally.

Prior to joining UIDAI, Joshi worked for BSNL, a wireline operator. He also worked for the India Department of Telecommunications.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.