Associate Sponsors

Co-sponsor

Zero trust is pervasive, but gaps remain on emerging cybersecurity threats

As AI adoption accelerates, zero-trust security, continuous monitoring, and stronger customer awareness are critical to counter deepfakes, fraud, and evolving cyber threats

(L-R) Malcolm Gomes, chief operating officer (COO), IDfy; Deep Narayan Mukherjee, partner, Boston Consulting Group; and Mahavir Jindal, COO, Amazon Pay India (Photos:  Kamlesh Pednekar)
(L-R) Malcolm Gomes, chief operating officer (COO), IDfy; Deep Narayan Mukherjee, partner, Boston Consulting Group; and Mahavir Jindal, COO, Amazon Pay India (Photos: Kamlesh Pednekar)
BS Reporter
5 min read Last Updated : Jan 30 2026 | 6:10 AM IST
Despite rapid progress in use cases of artificial intelligence (AI), inherent risks remain. In a panel discussion at the Business Standard BFSI Insight Summit 2025, industry leaders Malcolm Gomes, chief operating officer (COO), IDfy; Mahavir Jindal, COO, Amazon Pay India; and Deep Narayan Mukherjee, partner, Boston Consulting Group; speak to Ajinkya Kawale  about all things cybersecurity. Edited excerpts:
 
How can security architecture be central to operational efficiency and transparency? 
MALCOLM GOMES: The notion of zero trust has been around for a while. It started with NIST (National Institute of Standards and Technology) in the US. At this point, regulators have not mandated it. But it has crept into the thought process of organisations. It is also a space where, what zero trust architecture is, tends to get slightly different answers. It could span everything from how systems are engineered and set up. It could span how integration with third parties happens and how data is shared. The concept is of all-pervasiveness in a bank, or an enterprise across the value chain.
 
What happens to implementation of systems related to cyber-security? 
MAHAVIR JINDAL: In a financial services business, operations have to run in a zero- trust environment. The belief is that threat vectors are evolving at such a rapid scale that zero trust capabilities need to be taken to the next level, and at Amazon this has been absolutely paramount. One way this is implemented is through data. Any data exchange, whether with an external partner or an internal partner, happens in a zero trust environment, which means there is an exchange of keys. Any data, whether static or in motion, is always encrypted at Amazon. 
While a decent job is being done, there is concern about the pace at which threats are evolving. For example, there was a case involving a video call through a deep fake a couple of years back, where an entity lost $25 million. That is the kind of pace at which evolution is now required. While there is a good foundation, there is still a long way to go to address the emerging threat vectors. 
DEEP NARAYAN MUKHERJEE: With a ZT-like architecture, even in cases of exfiltration, where an external entity using malware has infiltrated the organisation, any attempt to move data out would be stopped. There are trade-offs in the speed of internal transactions, but this remains one of the best practices when the objective is to limit the impact of a cyber attack.
 
Beyond just KYC, what more should companies do? 
GOMES: The KYC process has existed for a very long time and has been discussed extensively. What is now being seen are newer trends such as tampered documents. Many of these upstream issues, if not handled correctly, lead to downstream challenges. On the infrastructure side, changes are emerging alongside the advent of the Data Protection Act. Questions around how customer data is received, stored, retained, and shared with employees and third parties are beginning to reshape enterprise practices. There is growing focus on ensuring data is purged once a specific task is completed. 
What areas would require further investment? 
MAHAVIR JINDAL: What is being realised is that KYC is only a gating criterion and is never going to be sufficient. There is a need for more tools that allow continuous monitoring. From a customer protection lens, the focus is on making rapid investments in the ability to continuously monitor accounts at risk, and protect customers when an emerging threat is detected. Another key area requiring investment is the risk created by AI. One growing concern is zero-click threats. As AI systems are now being used at scale, it is critical that outputs generated by these systems protect the organisation and operate within strong guardrails. 
A third concern is customer fraud. Passwords are increasingly ineffective, and OTPs are being compromised at scale. Driving adoption of authentication mechanisms that are resistant to man-in-the-middle attacks is becoming a key priority.
 
What have been the learnings from the past few years related to investments in cyber-security? 
MUKHERJEE: It is difficult to generalise. There are many Indian organisations that, in letter and spirit, give a high priority to cyber-security and make what would be considered the right investments in infrastructure, people, and policies. Outside this pocket of excellence, however, there remains significant scope for improvement. This largely comes down to the payoff profile. When cyber-security is not invested in, or is only addressed at a bare minimum level, a compromise of customer data may not result in a meaningful loss for the organisation. This is where regulators need to play a significant role by imposing penalties that are sufficient to change that calculation. The objective should be to ensure that data breaches or cyber incidents carry a real downside. At the same time, there needs to be balance, avoiding excessive regulatory stringency that mandates an unrealistically high percentage of revenue towards compliance and risks destabilising organisations, or pushing them towards bankruptcy. Such calibrated nudging is still awaited. 
 
In the age of AI and deepfakes, how can organisations and customers ensure awareness? 
JINDAL: Customer awareness is not an easy area. AI tools are now commonly used on desktops and apps, yet the risks associated with their use are often not fully considered. Questions around what is being exposed, or shared are still not top of mind. Educating customers is therefore a long journey, but one that needs to begin now. 
At present, the focus remains at a foundational level, with conversations centred on phishing, and how customers can protect themselves, along with encouraging adoption of two-factor authentication, which some customers still do not use. This makes customer awareness a long pole in risk mitigation.

One subscription. Two world-class reads.

Already subscribed? Log in

Subscribe to read the full story →
*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

Topics :BS Banking AnnualcybersecurityAI technologydata protectionfinancial services

Next Story