CyCOPS  (I) Pvt. Ltd.
Agenda <ul><li>Who we are? </li></ul><ul><ul><li>Vision </li></ul></ul><ul><ul><li>Team </li></ul></ul><ul><ul><li>Experie...
Who we are? <ul><li>CyCops group based out of Hyderabad was founded in 2008 with the aim of bringing together a team of  h...
“ TO LEAD AND INSPIRE, THROUGH EXCELLENCE IN TRAINING, SERVICES AND RESEARCH TOWARDS THE DEVELOPMENT OF INDIA AS A  SECURE...
Our Team <ul><li>Size: Total team:- 25 </li></ul><ul><li>Prime Practitioners:- 4 </li></ul><ul><li>Krishna Chaitanya Surap...
Experience <ul><li>Trained state cops  (Intelligence Department)  in catching Cyber Criminals. </li></ul><ul><li>Trained  ...
Partnered with IBM <ul><li>CyCOPS is IBM Enterprise Business Partner for its Information Protection, ISS Proventia Securit...
What IBM gives? <ul><li>IBM offers a &quot;Guarantee of Protection&quot; of  $50,000  per security breach when IBM manages...
Partnered with Sipera Systems <ul><li>Unified Communications Security </li></ul><ul><li>Sipera Systems, the leader in real...
What we do?
Services
FINS (Framework on Information Security) “ Security is not something you  buy , it is something you  do ”.
VULPEN  ( VUL nerability Assessment &  PEN etration testing) <ul><li>Vulnerability Assessment & Penetration Testing </li><...
SACT  ( S ecurity  A udit &  C ompliance  T est) <ul><li>Positioning of  ISO 27001 with in an organization </li></ul><ul><...
SADI  (Security Architecture design and implementation) <ul><li>Strategic planning of network layout </li></ul><ul><li>Sec...
Decontamination  <ul><li>Antivirus company detects an infected system every 4.5 seconds </li></ul><ul><li>Do you know that...
Wi-Fi Security <ul><li>Wireless Architecture design and implementation: </li></ul><ul><ul><li>  Deploying wireless plans <...
COFOIN  (Computer Forensics Investigation) <ul><li>Digital Fraud </li></ul><ul><li>IP Theft </li></ul><ul><li>E-Stalking <...
What we Train? <ul><li>CYCOPS  C ertified  S ecurity  T echnician  </li></ul><ul><li>CYCOPS  C ertified  S ecurity  M anag...
What we Train? <ul><li>Intro InfoSec </li></ul><ul><li>Shell Scripting & Programming Basics  </li></ul><ul><li>VULPEN </li...
THANK YOU
Upcoming SlideShare
Loading in …5
×

Cy Cops Company Presentation

572
-1

Published on

CyCOPS (I) Pvt. Ltd. Company Presentation.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
572
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cy Cops Company Presentation

  1. 1. CyCOPS (I) Pvt. Ltd.
  2. 2. Agenda <ul><li>Who we are? </li></ul><ul><ul><li>Vision </li></ul></ul><ul><ul><li>Team </li></ul></ul><ul><ul><li>Experience </li></ul></ul><ul><ul><li>Future Prospects </li></ul></ul><ul><li>What We do? </li></ul><ul><ul><li>FINS </li></ul></ul><ul><ul><li>VULPEN, SACT, SADI, Decontamination, WiFi Sec & COFOIN </li></ul></ul><ul><li>What We Train? </li></ul><ul><li>Research & Development </li></ul><ul><li>Contact Us </li></ul>
  3. 3. Who we are? <ul><li>CyCops group based out of Hyderabad was founded in 2008 with the aim of bringing together a team of highly skilled , technically focused , and uncompromising security professionals. </li></ul><ul><li>CyCops Security is a specialist information security company, with niche technical skills allowing us to deliver high quality penetration testing and other information security related services to our customers. </li></ul>
  4. 4. “ TO LEAD AND INSPIRE, THROUGH EXCELLENCE IN TRAINING, SERVICES AND RESEARCH TOWARDS THE DEVELOPMENT OF INDIA AS A SECURED NATION ”. OUR VISION
  5. 5. Our Team <ul><li>Size: Total team:- 25 </li></ul><ul><li>Prime Practitioners:- 4 </li></ul><ul><li>Krishna Chaitanya Suraparaju </li></ul><ul><li>Lakshmi Kanth Reddy </li></ul><ul><li>Naveen Kumar Singh </li></ul><ul><li>Justin Prasad </li></ul><ul><li>Additional Security Practitioners: 20 </li></ul><ul><li>Certifications we hold:- CISSP, CEH, CHFI, CISA, etc… </li></ul><ul><li>Experience: - All the members of CyCops have got a minimum experience of 3+ years in the field of Information Security. Have working experience with international clientele. </li></ul>
  6. 6. Experience <ul><li>Trained state cops (Intelligence Department) in catching Cyber Criminals. </li></ul><ul><li>Trained Tanzanian Revenue Authority on Ethical Hacking & Computer Forensics Investigation. </li></ul><ul><li>Trained corporates like HSBC, GENPACT, GOOGLE, IBM, Kennametal,CtrlS, Adept Technologies etc… </li></ul><ul><li>Seminars on Information security and Ethical Hacking has been given at places like GMR’s National conference, MIT (Manipal institute of Technology) etc… </li></ul><ul><li>Have experience in deploying IS services at defense organizations like ( RCI, MCEME, Radiant Global, Inc. etc…) </li></ul>
  7. 7. Partnered with IBM <ul><li>CyCOPS is IBM Enterprise Business Partner for its Information Protection, ISS Proventia Security and Managed Security Services. In conjunction with IBM, CyCops designs a fully Managed Service solution that automatically protects business critical data across enterprise and end-user computing infrastructure – either on site or remote data protection. </li></ul><ul><li>This service will also help you to mitigate, monitor and manage the latest security threats and vulnerabilities with the backing of Industry leading ISS X-Force research and development team of 15,000 researchers . </li></ul><ul><li>CyCOPS and IBM commit to working together on joint marketing, collaborative selling and software integration and performance optimization. The relationship will deliver real-time, 24X7X365 security management monitored through dashboards with guaranteed SLA driven data protection. </li></ul>
  8. 8. What IBM gives? <ul><li>IBM offers a &quot;Guarantee of Protection&quot; of $50,000 per security breach when IBM manages your end-to-end security infrastructure. </li></ul><ul><li>IBM has been awarded leadership in Managed Security Services 2007 and 2008: Gartner Magic Quadrant, Forester Wave and Frost & Sullivan. </li></ul><ul><li>IBM invested $1.5 billion in security R&D in 2008. </li></ul><ul><li>IBM's Proventia Intrusion Prevention System (IPS) is the industry leading network security solution that prevents costly security breaches. </li></ul><ul><li>IBM's Managed Security Solutions are backed by the industry leading ISS X-FORCE R&D team, which monitors 4 billion events per day and protects 3,700+ clients across the globe; ensuring that you are pre-empting threats rather than reacting to security breaches. </li></ul>
  9. 9. Partnered with Sipera Systems <ul><li>Unified Communications Security </li></ul><ul><li>Sipera Systems, the leader in real-time UC security, enables enterprises to deploy VoIP and unified communications simply and with confidence while helping service providers protect and offer new IP-based communication services. </li></ul><ul><li>Offered services </li></ul><ul><ul><li>protecting IP PBXs and other devices </li></ul></ul><ul><ul><li>enforcing UC security policies </li></ul></ul><ul><ul><li>authenticating users and devices </li></ul></ul><ul><ul><li>maintaining signaling and media privacy </li></ul></ul><ul><ul><li>addressing deployment issues such as configuration of phones and firewalls, media anchoring and more. </li></ul></ul>
  10. 10. What we do?
  11. 11. Services
  12. 12. FINS (Framework on Information Security) “ Security is not something you buy , it is something you do ”.
  13. 13. VULPEN ( VUL nerability Assessment & PEN etration testing) <ul><li>Vulnerability Assessment & Penetration Testing </li></ul><ul><ul><ul><li>  Automated Vulnerability Scanning Solution </li></ul></ul></ul><ul><ul><ul><li>External Penetration Testing </li></ul></ul></ul><ul><ul><ul><li>Internal Penetration Testing </li></ul></ul></ul><ul><ul><ul><li>Application Testing </li></ul></ul></ul><ul><li>Software's & Techniques: </li></ul><ul><ul><ul><li>No1 Penetration testing & Vulnerability Assessment tool in the world. </li></ul></ul></ul><ul><ul><ul><li>All Open source Tools </li></ul></ul></ul><ul><ul><ul><li>Custom designed 0’day Vulnerabilities </li></ul></ul></ul><ul><ul><ul><li>Self developed scripts etc… </li></ul></ul></ul>
  14. 14. SACT ( S ecurity A udit & C ompliance T est) <ul><li>Positioning of ISO 27001 with in an organization </li></ul><ul><ul><ul><li>  Physical Security </li></ul></ul></ul><ul><ul><ul><li>Access control </li></ul></ul></ul><ul><ul><ul><li>Risk Management </li></ul></ul></ul><ul><ul><ul><li>System Planning </li></ul></ul></ul><ul><ul><ul><li>Data Analysis </li></ul></ul></ul><ul><li>Compliance with standards like (PCI, HIPAA, COBIT, OSSTM , OWASP etc…) </li></ul><ul><ul><li>Advantages: It provides confidence at all levels </li></ul></ul><ul><ul><ul><li>Organization level </li></ul></ul></ul><ul><ul><ul><li>Operation level </li></ul></ul></ul><ul><ul><ul><li>Commercial level </li></ul></ul></ul><ul><ul><ul><li>Legal level </li></ul></ul></ul><ul><ul><ul><li>Financial level </li></ul></ul></ul><ul><ul><ul><li>Human level </li></ul></ul></ul>
  15. 15. SADI (Security Architecture design and implementation) <ul><li>Strategic planning of network layout </li></ul><ul><li>Security policies, standards, and procedures </li></ul><ul><li>Risk assessment </li></ul><ul><li>Disaster recovery strategies </li></ul><ul><li>Business continuity management </li></ul>
  16. 16. Decontamination <ul><li>Antivirus company detects an infected system every 4.5 seconds </li></ul><ul><li>Do you know that 80% of the loss via the internet is caused because of Malware </li></ul><ul><li>27% protected systems are infected by Malware.(Panda) </li></ul><ul><ul><li>Antivirus companies are passive in response </li></ul></ul><ul><ul><li>Example: Confiker virus infected all the major networks before getting reported. </li></ul></ul><ul><ul><li>Variants of confiker infected the UK naval base network even after patches were deployed. </li></ul></ul><ul><ul><li>Organized attacks are being planned keeping in mind a targeted sector. </li></ul></ul><ul><ul><li>Twenty seven percent of the systems are vulnerable even after patches were deployed. </li></ul></ul><ul><li>Software's & Techniques: </li></ul><ul><ul><li>Incident response </li></ul></ul><ul><ul><li>Measures to lower loss in terms of downtime and theft of data </li></ul></ul><ul><ul><li>All Open source Tools </li></ul></ul><ul><ul><li>Reversing malware and designing procedures for its removal </li></ul></ul><ul><ul><li>Custom designed scripts for virus removal </li></ul></ul>
  17. 17. Wi-Fi Security <ul><li>Wireless Architecture design and implementation: </li></ul><ul><ul><li>  Deploying wireless plans </li></ul></ul><ul><ul><li>Site survey and network planning </li></ul></ul><ul><ul><li>Infrastructure hardware and software </li></ul></ul><ul><ul><li>Wireless problem discovery and solutions </li></ul></ul><ul><ul><li>  Securing wireless LAN’s </li></ul></ul><ul><ul><li>Designing and implementing security for wireless LAN’s </li></ul></ul><ul><li>Wireless security: </li></ul><ul><ul><li>Vulpen for wireless </li></ul></ul><ul><ul><li>Custom Firmware for Wireless Penetration Testing </li></ul></ul><ul><ul><li>Implementing wireless IDS </li></ul></ul><ul><ul><li>Implementing user authentication in wireless. </li></ul></ul><ul><ul><li>Deployment of high layer VPN in wireless </li></ul></ul>
  18. 18. COFOIN (Computer Forensics Investigation) <ul><li>Digital Fraud </li></ul><ul><li>IP Theft </li></ul><ul><li>E-Stalking </li></ul><ul><li>Breach of Contract </li></ul><ul><li>Computer Break-ins </li></ul><ul><li>Forgeries </li></ul><ul><li>Murder </li></ul><ul><li>Industrial Espionage </li></ul><ul><li>Theft </li></ul><ul><li>Assault </li></ul><ul><li>Inappropriate Data Duplication </li></ul><ul><li>Unauthorized Data Duplication </li></ul><ul><li>Bankruptcy Data Investigation </li></ul><ul><li>Private Investigation of Personal Computers </li></ul>
  19. 19. What we Train? <ul><li>CYCOPS C ertified S ecurity T echnician </li></ul><ul><li>CYCOPS C ertified S ecurity M anager </li></ul><ul><li>CYCOPS C ertified S ecurity E xpert </li></ul><ul><li>CYCOPS C ertified S ecurity C hief </li></ul><ul><li>In-house Corporate Trainings </li></ul>
  20. 20. What we Train? <ul><li>Intro InfoSec </li></ul><ul><li>Shell Scripting & Programming Basics </li></ul><ul><li>VULPEN </li></ul><ul><li>OS Hardening </li></ul><ul><li>COFOIN </li></ul><ul><li>Reverse Engineering </li></ul><ul><li>WiFi Sec </li></ul><ul><li>SADI </li></ul><ul><li>LOG Analysis </li></ul><ul><li>Incidence Response </li></ul><ul><li>PKI </li></ul><ul><li>Disaster Recovery </li></ul>
  21. 21. THANK YOU

×