Tait appoints Chief Information Security Officer

Tait Communications is increasing the resources it is devoting to information security, with the appointment of Ashish Dutta to the role of Chief Information Security Officer. Ashish, who has been with Tait since 2012, is an ISACA CISM®-certified Information Security Manager with significant experience in the positioning, delivery and management of ICT managed services and information security.

Our Managed Services division recently had its certification under ISO27001 reconfirmed. The international best-practice standard is for information security standards globally. Tait first reached compliance with the standard in 2013-14 and was first certified by external audit in January 2016. Annual audits since then have successfully resulted in re-certification.

“Expectations from the market verticals we serve are continually evolving and information security is one area where we are seeing increasing customer demand for best-practice performance,” Ashish says. “We also see this in the wider commercial regulatory sphere, with changes like Europe’s recent improvements to data privacy for citizens – the General Data Protection Regulation – being a good example.

“At Tait, we’ve always had a strong security culture, with a high degree of awareness among our people and commercial partners,” he says. “We aim to continue this and ensure we gain and retain all appropriate accreditations and that good security practices remain integral to our way of working in our offices, systems and products. Gaining certification under ISO27001 for our managed services business is an example of that determination.”


Read more on what network operators need to understand about cyber security in our White Paper “Critical Infrastructure Security Guide 1“. This guide provides information on the importance of cyber security on our communications networks, and introduces important concepts and ideas, as you begin to strengthen and secure your network.

This guide can be read in conjunction with “Critical Infrastructure Security Guide 2“.

Leave a Reply

Your email address will not be published. Required fields are marked *