ETCISO Company Cyber Security Posture

indiatimes.com

ETCISO.in tracks and covers whatever matters in the IT Security Industry through news, opinion and analysis. Whether it is information on security technologies, threat vectors, vulnerabilities, threat mitigation and cyber risk and compliance or cyber attacks and other developments - we have all the information needs of the modern CISO covered.

ETCISO Company Details

Linkedin ID:

etciso

Employees number:

1 employees

Number of followers:

11702

NAICS:

519

Industry Type:

Internet Publishing

Homepage:

indiatimes.com

IP Addresses:

Scan still pending

Company ID:

ETC_1139510

Scan Status:

In-progress

AI scoreETCISO Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreETCISO Global Score
blurone
Ailogo

ETCISO Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

ETCISO Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
ETCISORansomware75404/2023ETC221331223Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: ETCISO was targeted by the ransomware attack which exposed clients personal identifiable information sensitive financial information such as customer Id's, bank account numbers and the dates they opened on real time gross settlement national electronics fund transfer, branch codes were also compromised. Fullerton India also states that it "significantly enhanced its security environment for future expansion" by collaborating with leading international experts. The sample dataset that was given with ETCISO also includes bank credit transactions and borrower CIBIL records.

ETCISO Company Subsidiaries

SubsidiaryImage

ETCISO.in tracks and covers whatever matters in the IT Security Industry through news, opinion and analysis. Whether it is information on security technologies, threat vectors, vulnerabilities, threat mitigation and cyber risk and compliance or cyber attacks and other developments - we have all the information needs of the modern CISO covered.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=etciso' -H 'apikey: YOUR_API_KEY_HERE'
newsone

ETCISO Cyber Security News

2025-07-02T07:00:00.000Z
Guarding the Digital Fortress

As the digital transformation of India's financial sector accelerates, the Chief Information Security Officer (CISO) has evolved from aย ...

2025-04-16T07:00:00.000Z
ETCISO SecuFest 2025: Where cybersecurity found its culture code

Over four thoughtfully curated days, 120+ cybersecurity leadersโ€”including 22+ CISOs from across sectorsโ€”gathered not just to talk strategy butย ...

2025-02-13T08:00:00.000Z
ETCISO Secufest 2025: Navigating cybersecurity in the age of intelligence

You need to fight intelligence with intelligence to predict, prevent, protect and plan all at once. ETCISO Secufest 2025 presents theย ...

2025-05-21T03:30:00.000Z
Cisco study reveals alarming deficiencies in cybersecurity readiness in India

Cybersecurity readiness remains alarmingly low as only 7% of organizations in India have achieved a mature level of readiness.

2025-05-27T07:00:00.000Z
HackSky: Kaspersky, MIT bengaluru launch national cybersecurity showdown

An active call for students, coders, & cyber enthusiasts to tackle real-world threats in a 48-hour hackathon.

2024-09-21T07:00:00.000Z
Top Indian CISOs decode the blueprint for enterprise cybersecurity

CISOs share their views on the current hurdles and essential elements of a strong cybersecurity strategy.

2024-06-28T07:00:00.000Z
ETCISO Decrypt 2024 explores intersection of AI and cybersecurity

The event kicked off with an impactful announcement by Muqbil Ahmar, Executive Editor of ETCISO, who highlighted the substantial globalย ...

2024-07-25T07:00:00.000Z
Budget, budget everywhere, but no cyber funds in sight!

โ€œAccording to the WEF, cybersecurity is one of the top 10 global risks. Regulators should mandate organizations to spend a certain percentage ofย ...

2023-06-23T07:00:00.000Z
ETCISO Decrypt 2023: Unveiling cybersecurity's next frontier

Bringing together cybersecurity experts from various domains, ETCISO Decrypt 2023 concluded its successful run at ITC Maratha in Mumbai onย ...

similarCompanies

ETCISO Similar Companies

Equinix

Equinix (Nasdaq: EQIX) is the worldโ€™s digital infrastructure companyโ„ข, enabling digital leaders to harness a trusted platform to bring together and interconnect the foundational infrastructure that powers their success. Equinix enables todayโ€™s businesses to access all the right places, partners and

Mercado Libre

Founded in 1999 and headquartered in Buenos Aires, Argentina, Mercado Libre is Latin Americaโ€™s leading e-commerce technology company. Through its primary platforms, MercadoLibre.com and MercadoPago.com, it provides solutions to individuals and companies buying, selling, advertising, and paying for

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ETCISO CyberSecurity History Information

How many cyber incidents has ETCISO faced?

Total Incidents: According to Rankiteo, ETCISO has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at ETCISO?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

How does ETCISO detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with leading international experts.

Incident Details

Can you provide details on each incident?

Incident : Ransomware Attack

Title: ETCISO Ransomware Attack

Description: ETCISO was targeted by a ransomware attack which exposed clients' personal identifiable information and sensitive financial information such as customer IDs, bank account numbers, and the dates they opened on real-time gross settlement national electronics fund transfer. Branch codes were also compromised.

Type: Ransomware Attack

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware Attack ETC221331223

Data Compromised: customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions, borrower CIBIL records

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are personal identifiable information and sensitive financial information.

Which entities were affected by each incident?

Incident : Ransomware Attack ETC221331223

Entity Type: Company

Industry: Financial Services

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware Attack ETC221331223

Third Party Assistance: leading international experts

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through leading international experts.

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware Attack ETC221331223

Type of Data Compromised: personal identifiable information, sensitive financial information

Personally Identifiable Information: customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes

Lessons Learned and Recommendations

What lessons were learned from each incident?

Incident : Ransomware Attack ETC221331223

Lessons Learned: ETCISO significantly enhanced its security environment for future expansion.

What are the key lessons learned from past incidents?

Key Lessons Learned: The key lessons learned from past incidents are ETCISO significantly enhanced its security environment for future expansion.

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as leading international experts.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions and borrower CIBIL records.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was leading international experts.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions and borrower CIBIL records.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was ETCISO significantly enhanced its security environment for future expansion.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge