Video

Understand Cyberthreats to Prevent Another Vulkan Files Leak

EY Partner Puneet Kukreja Decrypts Vulkan Playbook; Warns Businesses of Complacency
Puneet Kukreja, EY Partner and UK & Ireland Cyber Leader

Cybersecurity leaders would remember the disclosure of a trove of confidential documents by Russian cybersecurity contractor firm Vulkan that decrypted the plans of the country's military and intelligence entities in leveraging their cyberwarfare capabilities. The documents that originated from Vulcan provided insights into the collaborative efforts between intelligence agencies and private enterprises in orchestrating large-scale hacking campaigns on a global scale.

See Also: The Evolution of Online Fraud in 2023 and Best Practices to Plug the Gaps

Puneet Kukreja, EY Partner and UK & Ireland Cyber Leader, sheds light on the intricate web of cyberthreats, strategies for resilience and the evolving landscape of digital protection.

"We're aware of existing technologies and their potential to cause cyber breaches. The key focus lies in comprehending the blueprint of such breaches, making it a valuable knowledge base for organizations," Kukreja said.

In this video interview with ISMG, Kukreja discussed:

  • Precautions for safeguarding businesses in an era of kinetic cyberwar;
  • The "assumed breach" mindset to safeguard digital assets;
  • The importance of acquiring non-technical skills to strengthen cybersecurity.

Kukreja is experienced in building client-centric, growth-focused high-performing delivery organizations that are engineering-led and powered by managed services.


About the Author

Smruti Gandhi

Smruti Gandhi

Executive Editor, ISMG

Gandhi has more than a decade of experience in community engagement and incubating industry events. She is extremely proactive in building engagements with communities including CEO, CFOs and CIOs. Prior to joining ISMG, she worked with Dun & Bradstreet and Great Place to Work.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.