Monday, May 5, 2008

Welcome to Information Security

Welcome to Information Security

In context of the e-world, the statement, 'We are the source' holds so good. Doesn't it?!
More than anything else what matters for me, or for any individual for that matter, is the parameters which defines and controls the accessibility to my information. The 'Who, How, When and What' are the factors that enables me to enact and manage Confidentiality, Integrity and Availability (aka CIA) of my private-space on this Matrix.

During my management studies I got good insights on Information Security and Auditing, which until then was the other side of the globe which I never explored, neither I was aware of. Interestingly but yes we were a batch of 8 odd students (out of 375!) who decided to specialize in Systems despite the doubt (read as fact) that we not going to enjoy much of college-management's considerations. But no regerts we had a good time enjoying ourself and limited ourself to few but good faculties.

My gist for Information Security (iSec) started with Mr Shailesh Jadhav and was further paced up by interactions with Aparna and Ashok Tamalirasan. Though it became a desire the day I was not able to make it to E&Y. For me it was never about the company or the brand or the perks that somebody offers (liar ?!) , BUT its about GETTING what you WANT and holding it TIGHT in your hands that gives you the sense of Accomplishment, the very same which I use to feel after scoring good runs for my side during gully cricket.

So, here's a new journey, a new start, new people, a different world, and above all new learnings
to earn. This blog is going to be a repository of my encounters, milestones, failures, success, fun & frills in this 'lesser-known-to-me' world of iSec.

You are Welcome!