
ETCISO Company Cyber Security Posture
indiatimes.comETCISO.in tracks and covers whatever matters in the IT Security Industry through news, opinion and analysis. Whether it is information on security technologies, threat vectors, vulnerabilities, threat mitigation and cyber risk and compliance or cyber attacks and other developments - we have all the information needs of the modern CISO covered.
ETCISO Company Details
etciso
1 employees
11702
519
Internet Publishing
indiatimes.com
Scan still pending
ETC_1139510
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

ETCISO Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
ETCISO Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
ETCISO | Ransomware | 75 | 4 | 04/2023 | ETC221331223 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: ETCISO was targeted by the ransomware attack which exposed clients personal identifiable information sensitive financial information such as customer Id's, bank account numbers and the dates they opened on real time gross settlement national electronics fund transfer, branch codes were also compromised. Fullerton India also states that it "significantly enhanced its security environment for future expansion" by collaborating with leading international experts. The sample dataset that was given with ETCISO also includes bank credit transactions and borrower CIBIL records. |
ETCISO Company Subsidiaries

ETCISO.in tracks and covers whatever matters in the IT Security Industry through news, opinion and analysis. Whether it is information on security technologies, threat vectors, vulnerabilities, threat mitigation and cyber risk and compliance or cyber attacks and other developments - we have all the information needs of the modern CISO covered.
Access Data Using Our API

Get company history
.png)
ETCISO Cyber Security News
Guarding the Digital Fortress
As the digital transformation of India's financial sector accelerates, the Chief Information Security Officer (CISO) has evolved from aย ...
ETCISO SecuFest 2025: Where cybersecurity found its culture code
Over four thoughtfully curated days, 120+ cybersecurity leadersโincluding 22+ CISOs from across sectorsโgathered not just to talk strategy butย ...
ETCISO Secufest 2025: Navigating cybersecurity in the age of intelligence
You need to fight intelligence with intelligence to predict, prevent, protect and plan all at once. ETCISO Secufest 2025 presents theย ...
Cisco study reveals alarming deficiencies in cybersecurity readiness in India
Cybersecurity readiness remains alarmingly low as only 7% of organizations in India have achieved a mature level of readiness.
HackSky: Kaspersky, MIT bengaluru launch national cybersecurity showdown
An active call for students, coders, & cyber enthusiasts to tackle real-world threats in a 48-hour hackathon.
Top Indian CISOs decode the blueprint for enterprise cybersecurity
CISOs share their views on the current hurdles and essential elements of a strong cybersecurity strategy.
ETCISO Decrypt 2024 explores intersection of AI and cybersecurity
The event kicked off with an impactful announcement by Muqbil Ahmar, Executive Editor of ETCISO, who highlighted the substantial globalย ...
Budget, budget everywhere, but no cyber funds in sight!
โAccording to the WEF, cybersecurity is one of the top 10 global risks. Regulators should mandate organizations to spend a certain percentage ofย ...
ETCISO Decrypt 2023: Unveiling cybersecurity's next frontier
Bringing together cybersecurity experts from various domains, ETCISO Decrypt 2023 concluded its successful run at ITC Maratha in Mumbai onย ...

ETCISO Similar Companies

Equinix
Equinix (Nasdaq: EQIX) is the worldโs digital infrastructure companyโข, enabling digital leaders to harness a trusted platform to bring together and interconnect the foundational infrastructure that powers their success. Equinix enables todayโs businesses to access all the right places, partners and

Mercado Libre
Founded in 1999 and headquartered in Buenos Aires, Argentina, Mercado Libre is Latin Americaโs leading e-commerce technology company. Through its primary platforms, MercadoLibre.com and MercadoPago.com, it provides solutions to individuals and companies buying, selling, advertising, and paying for

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
ETCISO CyberSecurity History Information
How many cyber incidents has ETCISO faced?
Total Incidents: According to Rankiteo, ETCISO has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at ETCISO?
Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.
How does ETCISO detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with leading international experts.
Incident Details
Can you provide details on each incident?

Incident : Ransomware Attack
Title: ETCISO Ransomware Attack
Description: ETCISO was targeted by a ransomware attack which exposed clients' personal identifiable information and sensitive financial information such as customer IDs, bank account numbers, and the dates they opened on real-time gross settlement national electronics fund transfer. Branch codes were also compromised.
Type: Ransomware Attack
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware Attack ETC221331223
Data Compromised: customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions, borrower CIBIL records
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are personal identifiable information and sensitive financial information.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware Attack ETC221331223
Third Party Assistance: leading international experts
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through leading international experts.
Data Breach Information
What type of data was compromised in each breach?

Incident : Ransomware Attack ETC221331223
Type of Data Compromised: personal identifiable information, sensitive financial information
Personally Identifiable Information: customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes
Lessons Learned and Recommendations
What lessons were learned from each incident?

Incident : Ransomware Attack ETC221331223
Lessons Learned: ETCISO significantly enhanced its security environment for future expansion.
What are the key lessons learned from past incidents?
Key Lessons Learned: The key lessons learned from past incidents are ETCISO significantly enhanced its security environment for future expansion.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as leading international experts.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions and borrower CIBIL records.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was leading international experts.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were customer IDs, bank account numbers, dates they opened on real-time gross settlement national electronics fund transfer, branch codes, bank credit transactions and borrower CIBIL records.
Lessons Learned and Recommendations
What was the most significant lesson learned from past incidents?
Most Significant Lesson Learned: The most significant lesson learned from past incidents was ETCISO significantly enhanced its security environment for future expansion.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
