SlideShare a Scribd company logo
1 of 10
+
Security for (Indian)
Startups
Manjula Sridhar
+ Agenda !
 Why and When does it matter ?
 Real Security Needs v/s FUD !
 Case Studies !
 Take Away !
+ Why Security ?
Most folk’s attitude towards security is
similar to that of exercise and diet.
Startups are no different
may be even worse !
+ When is Security Relevant ?
 Enabler to Business
 Payments and allied services (all online ordering ones)
 E-commerce
 Legal/Regulation mandated
 Healthcare, Legal
 Banking and Finance
 Prudent / Good to have (Privacy, Bad PR)
 Facebook, linkedin
 Portals
+ FUD is irrelevant to Startups
 Limited Budget or No budget.
 Focus is on getting up and running
somehow.
 Any publicity is a good publicity (Have
heard cases where founders
themselves planted fraud stories)
+ Case Study 1 : A well-known cab
company
 Technology Hack
 Well publicized event of an ethical hacker hacking the API
due to lack of Authentication and encryption.
 He was able to access the servers/DB as well as the credit
card info of the customers stored there.
 He also claimed he could recharge his mobile wallet.
 Huge negative publicity ensued and the cab company issued
a clarification saying it is only their test bed and not
production system that stores the actual customer data etc.
 Social Engineering
 Driver collecting the money multiple times for the incentives.
+ Case Study 2 : A Legal Process
Outsourcing company
 A LPO startup with Indo-US operations dealing with a patent
case in US.
 Disgruntled ex-employee got a document (supposedly stored)
in a secure vault (and only available for viewing) sent a mail
through fake email to the opposite party of the legal case
claiming to be in possession of the document.
 The opposing party did the right thing and showed it to the
judge and the judge froze the case and ordered the LPO to
address the issues.
 The client cancelled the contract and they had to struggle to
show that they indeed followed all the process.
+ What is the bare minimum security
?
 Authentication
 Encryption (https)
 Backup / Disaster recovery
 Logs
 Fraud Management
 Compliance and Certificate
 Software Development Security
 Privacy
+ Prudent View
 Security is continuous process.
 Best infrastructure and technology doesn’t guarantee no
hacking as weak processes and people issues may defeat
them.
 Security is a stance; it is best to have one and prepare for the
eventualities rather than get caught in the attacks and then
scramble.
 The stance after understanding the detailed risk profile could
be
 Cross it when it comes,
 Mitigate and continuously reduce
 Insure against.
Which one is yours ?
+
Thanks
contact@argbyte.com

More Related Content

What's hot

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadIBM Security
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Proofpoint
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesSlideTeam
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...Nicolas Beyer
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsPing Identity
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?centralohioissa
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...IBM Security
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliabilitycaca1009
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 

What's hot (20)

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Zero Trust Networks
Zero Trust NetworksZero Trust Networks
Zero Trust Networks
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
 
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation SlidesCyber Security For Organization Proposal Powerpoint Presentation Slides
Cyber Security For Organization Proposal Powerpoint Presentation Slides
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Topic11
Topic11Topic11
Topic11
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Security&reliability
Security&reliabilitySecurity&reliability
Security&reliability
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 

Viewers also liked

Saas aroundio-iimb
Saas aroundio-iimbSaas aroundio-iimb
Saas aroundio-iimbKesava Reddy
 
2016 cloudnine iimb startup 7
2016 cloudnine iimb startup 72016 cloudnine iimb startup 7
2016 cloudnine iimb startup 7Kesava Reddy
 
Decoding Term Sheet by N. Srikanth of Veda Corporate Advisors
Decoding Term Sheet by N. Srikanth of Veda Corporate AdvisorsDecoding Term Sheet by N. Srikanth of Veda Corporate Advisors
Decoding Term Sheet by N. Srikanth of Veda Corporate AdvisorsKesava Reddy
 
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMBValuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMBKesava Reddy
 
Stock based compensations design for startups
Stock based compensations design for startupsStock based compensations design for startups
Stock based compensations design for startupsKesava Reddy
 
Iimb 4startups appknox
Iimb   4startups appknoxIimb   4startups appknox
Iimb 4startups appknoxKesava Reddy
 
Botmetric iim preso may 7v2
Botmetric iim preso may 7v2Botmetric iim preso may 7v2
Botmetric iim preso may 7v2Kesava Reddy
 
Lean for startup IIMB NSRCEL
Lean for startup IIMB NSRCEL Lean for startup IIMB NSRCEL
Lean for startup IIMB NSRCEL Kesava Reddy
 
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad VenturesTerm Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad VenturesKesava Reddy
 
ESOPS for Startups by Ms. Neela Badami
ESOPS for Startups by Ms. Neela Badami ESOPS for Startups by Ms. Neela Badami
ESOPS for Startups by Ms. Neela Badami Kesava Reddy
 
HR ForStartups_SuperSeva
HR ForStartups_SuperSevaHR ForStartups_SuperSeva
HR ForStartups_SuperSevaKesava Reddy
 
Pitching4 startups
Pitching4 startups Pitching4 startups
Pitching4 startups Kesava Reddy
 
Growth for startups mastkalandar
Growth for startups mastkalandarGrowth for startups mastkalandar
Growth for startups mastkalandarKesava Reddy
 
HR ForStartups_Kuliza
HR ForStartups_KulizaHR ForStartups_Kuliza
HR ForStartups_KulizaKesava Reddy
 
Media for start-ups By N Ravi Shankar of AimHigh consulting
Media for start-ups By N Ravi Shankar of AimHigh consultingMedia for start-ups By N Ravi Shankar of AimHigh consulting
Media for start-ups By N Ravi Shankar of AimHigh consultingKesava Reddy
 
HR ForStartups_zipdial
HR ForStartups_zipdialHR ForStartups_zipdial
HR ForStartups_zipdialKesava Reddy
 

Viewers also liked (20)

Saas aroundio-iimb
Saas aroundio-iimbSaas aroundio-iimb
Saas aroundio-iimb
 
hiver
hiverhiver
hiver
 
2016 cloudnine iimb startup 7
2016 cloudnine iimb startup 72016 cloudnine iimb startup 7
2016 cloudnine iimb startup 7
 
Decoding Term Sheet by N. Srikanth of Veda Corporate Advisors
Decoding Term Sheet by N. Srikanth of Veda Corporate AdvisorsDecoding Term Sheet by N. Srikanth of Veda Corporate Advisors
Decoding Term Sheet by N. Srikanth of Veda Corporate Advisors
 
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMBValuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
 
Effectual funding
Effectual fundingEffectual funding
Effectual funding
 
Stock based compensations design for startups
Stock based compensations design for startupsStock based compensations design for startups
Stock based compensations design for startups
 
Iimb 4startups appknox
Iimb   4startups appknoxIimb   4startups appknox
Iimb 4startups appknox
 
Botmetric iim preso may 7v2
Botmetric iim preso may 7v2Botmetric iim preso may 7v2
Botmetric iim preso may 7v2
 
Lean for startup IIMB NSRCEL
Lean for startup IIMB NSRCEL Lean for startup IIMB NSRCEL
Lean for startup IIMB NSRCEL
 
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad VenturesTerm Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
 
Cloud for-startup
Cloud for-startupCloud for-startup
Cloud for-startup
 
ESOPS for Startups by Ms. Neela Badami
ESOPS for Startups by Ms. Neela Badami ESOPS for Startups by Ms. Neela Badami
ESOPS for Startups by Ms. Neela Badami
 
Ask primer
Ask primerAsk primer
Ask primer
 
HR ForStartups_SuperSeva
HR ForStartups_SuperSevaHR ForStartups_SuperSeva
HR ForStartups_SuperSeva
 
Pitching4 startups
Pitching4 startups Pitching4 startups
Pitching4 startups
 
Growth for startups mastkalandar
Growth for startups mastkalandarGrowth for startups mastkalandar
Growth for startups mastkalandar
 
HR ForStartups_Kuliza
HR ForStartups_KulizaHR ForStartups_Kuliza
HR ForStartups_Kuliza
 
Media for start-ups By N Ravi Shankar of AimHigh consulting
Media for start-ups By N Ravi Shankar of AimHigh consultingMedia for start-ups By N Ravi Shankar of AimHigh consulting
Media for start-ups By N Ravi Shankar of AimHigh consulting
 
HR ForStartups_zipdial
HR ForStartups_zipdialHR ForStartups_zipdial
HR ForStartups_zipdial
 

Similar to Manjula security for startups

The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantJohn Bedrick
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium PartnersDAVID BERGH
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for NonprofitsNPowerCR
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackSusan Kennedy
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
 

Similar to Manjula security for startups (20)

The Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being CompliantThe Difference Between Being Secure And Being Compliant
The Difference Between Being Secure And Being Compliant
 
Common sense security by Fortium Partners
Common sense security by Fortium PartnersCommon sense security by Fortium Partners
Common sense security by Fortium Partners
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Cosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of ByodCosac 2013 Legal Aspects of Byod
Cosac 2013 Legal Aspects of Byod
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Case 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docxCase 11. What exactly occurred Twitter is one of popular soci.docx
Case 11. What exactly occurred Twitter is one of popular soci.docx
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Heartland
HeartlandHeartland
Heartland
 
Potential Advantages Of An Insider Attack
Potential Advantages Of An Insider AttackPotential Advantages Of An Insider Attack
Potential Advantages Of An Insider Attack
 
IT security : a five-legged sheep
IT security : a five-legged sheepIT security : a five-legged sheep
IT security : a five-legged sheep
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfThe Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
 

More from Kesava Reddy

The Effectual Way of Starting A Startup.
The Effectual Way of Starting A Startup.The Effectual Way of Starting A Startup.
The Effectual Way of Starting A Startup.Kesava Reddy
 
EMPLOYEE TO ENTREPRNEUR : Prepare to Plunge
EMPLOYEE  TO  ENTREPRNEUR : Prepare to PlungeEMPLOYEE  TO  ENTREPRNEUR : Prepare to Plunge
EMPLOYEE TO ENTREPRNEUR : Prepare to PlungeKesava Reddy
 
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor DigitalDigital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor DigitalKesava Reddy
 
Marketing & Branding for Startups
Marketing & Branding for StartupsMarketing & Branding for Startups
Marketing & Branding for StartupsKesava Reddy
 
Marketing For Startups
Marketing For StartupsMarketing For Startups
Marketing For StartupsKesava Reddy
 
Pitching4 startups oct 2015 nbd 01
Pitching4 startups oct 2015 nbd 01Pitching4 startups oct 2015 nbd 01
Pitching4 startups oct 2015 nbd 01Kesava Reddy
 
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...Kesava Reddy
 
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014 PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014 Kesava Reddy
 
Open Source For Start-ups, Prof. Rahul De
Open Source For Start-ups, Prof. Rahul DeOpen Source For Start-ups, Prof. Rahul De
Open Source For Start-ups, Prof. Rahul DeKesava Reddy
 
Sales For Startups- Prof. Ramesh Venkateswaran-March 08
Sales For Startups- Prof. Ramesh Venkateswaran-March 08Sales For Startups- Prof. Ramesh Venkateswaran-March 08
Sales For Startups- Prof. Ramesh Venkateswaran-March 08Kesava Reddy
 
Managing startup equity (Equity For Startups)
Managing startup equity (Equity For Startups)Managing startup equity (Equity For Startups)
Managing startup equity (Equity For Startups)Kesava Reddy
 
Cloud computing for startups
Cloud computing for startupsCloud computing for startups
Cloud computing for startupsKesava Reddy
 
Media For Startups: Understanding media relations
Media For Startups: Understanding media relationsMedia For Startups: Understanding media relations
Media For Startups: Understanding media relationsKesava Reddy
 

More from Kesava Reddy (13)

The Effectual Way of Starting A Startup.
The Effectual Way of Starting A Startup.The Effectual Way of Starting A Startup.
The Effectual Way of Starting A Startup.
 
EMPLOYEE TO ENTREPRNEUR : Prepare to Plunge
EMPLOYEE  TO  ENTREPRNEUR : Prepare to PlungeEMPLOYEE  TO  ENTREPRNEUR : Prepare to Plunge
EMPLOYEE TO ENTREPRNEUR : Prepare to Plunge
 
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor DigitalDigital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
 
Marketing & Branding for Startups
Marketing & Branding for StartupsMarketing & Branding for Startups
Marketing & Branding for Startups
 
Marketing For Startups
Marketing For StartupsMarketing For Startups
Marketing For Startups
 
Pitching4 startups oct 2015 nbd 01
Pitching4 startups oct 2015 nbd 01Pitching4 startups oct 2015 nbd 01
Pitching4 startups oct 2015 nbd 01
 
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
 
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014 PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
 
Open Source For Start-ups, Prof. Rahul De
Open Source For Start-ups, Prof. Rahul DeOpen Source For Start-ups, Prof. Rahul De
Open Source For Start-ups, Prof. Rahul De
 
Sales For Startups- Prof. Ramesh Venkateswaran-March 08
Sales For Startups- Prof. Ramesh Venkateswaran-March 08Sales For Startups- Prof. Ramesh Venkateswaran-March 08
Sales For Startups- Prof. Ramesh Venkateswaran-March 08
 
Managing startup equity (Equity For Startups)
Managing startup equity (Equity For Startups)Managing startup equity (Equity For Startups)
Managing startup equity (Equity For Startups)
 
Cloud computing for startups
Cloud computing for startupsCloud computing for startups
Cloud computing for startups
 
Media For Startups: Understanding media relations
Media For Startups: Understanding media relationsMedia For Startups: Understanding media relations
Media For Startups: Understanding media relations
 

Recently uploaded

Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 

Recently uploaded (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 

Manjula security for startups

  • 2. + Agenda !  Why and When does it matter ?  Real Security Needs v/s FUD !  Case Studies !  Take Away !
  • 3. + Why Security ? Most folk’s attitude towards security is similar to that of exercise and diet. Startups are no different may be even worse !
  • 4. + When is Security Relevant ?  Enabler to Business  Payments and allied services (all online ordering ones)  E-commerce  Legal/Regulation mandated  Healthcare, Legal  Banking and Finance  Prudent / Good to have (Privacy, Bad PR)  Facebook, linkedin  Portals
  • 5. + FUD is irrelevant to Startups  Limited Budget or No budget.  Focus is on getting up and running somehow.  Any publicity is a good publicity (Have heard cases where founders themselves planted fraud stories)
  • 6. + Case Study 1 : A well-known cab company  Technology Hack  Well publicized event of an ethical hacker hacking the API due to lack of Authentication and encryption.  He was able to access the servers/DB as well as the credit card info of the customers stored there.  He also claimed he could recharge his mobile wallet.  Huge negative publicity ensued and the cab company issued a clarification saying it is only their test bed and not production system that stores the actual customer data etc.  Social Engineering  Driver collecting the money multiple times for the incentives.
  • 7. + Case Study 2 : A Legal Process Outsourcing company  A LPO startup with Indo-US operations dealing with a patent case in US.  Disgruntled ex-employee got a document (supposedly stored) in a secure vault (and only available for viewing) sent a mail through fake email to the opposite party of the legal case claiming to be in possession of the document.  The opposing party did the right thing and showed it to the judge and the judge froze the case and ordered the LPO to address the issues.  The client cancelled the contract and they had to struggle to show that they indeed followed all the process.
  • 8. + What is the bare minimum security ?  Authentication  Encryption (https)  Backup / Disaster recovery  Logs  Fraud Management  Compliance and Certificate  Software Development Security  Privacy
  • 9. + Prudent View  Security is continuous process.  Best infrastructure and technology doesn’t guarantee no hacking as weak processes and people issues may defeat them.  Security is a stance; it is best to have one and prepare for the eventualities rather than get caught in the attacks and then scramble.  The stance after understanding the detailed risk profile could be  Cross it when it comes,  Mitigate and continuously reduce  Insure against. Which one is yours ?