SlideShare a Scribd company logo
1 of 7
A Practical View to
Information Security
Anil Chopra
Group Editor
PCQuest and CIOL.com
Some Recent Cyber Crime Activities
Rs. 63 Lakhs of an NRI’s Fixed Deposits defrauded via fake
emails sent to a leading public sector bank's branch in
India
Former director of reputed educational institute gets duped of
Rs. 19 Lakhs; Fraudster de-activates victim’s SIM to avoid
detection and transfers funds.
Rs. 17 Lakhs of fraudulent transfers done from a small
company’s accounts; Fraudster changes mobile number of the
victim’s KYC details by what appears to be an ‘insider’s job’.
Financial Sector perceived as most vulnerable
to fraud and faces the max number of threats
Source: CyberMedia Research
More Survey Findings on InfoSec
• There’s a growing need to focus
on internal threats
• 56% of CIOs in India feel that it’s
because of employee unawareness
• 37% feel that it’s due to open
vulnerabilities
• Security is the key challenge to
adopting Enterprise Mobility.
• Fixing known system
vulnerabilities is a given.
-E&Y CIO survey, 2014
• CIOs/CTOs at an overall level feel that
security would be top external IT
spending project in 2014–15. About
51% CIO/CTOs have indicated they’re
likely to spend in this area, way ahead
of Virtualization (39%) and ERP (35%)
-CMR CIO Survey 2014
• Detected security incidents
up by 25% over last year
•Average financial costs of
incidents up 18%
-GSISS 2014 by PwC
The Learnings
• Nobody’s Safe!
• Organizations are ending up paying huge sums of money in legal
cases, loosing their reputation and credibility, thanks to security
incidents.
• There’s a need to make information security a board room agenda
• Business Implications, Global cybercrime, changing profile of employees, and
risks with outsourced partners are some of the concerns to be addressed
• New techniques are emerging for cyber fraud
• Attacks have become more complicated, and so have the IT and
business environments
Some Best Practices
• Organizations should not be ignoring the basics while
framing their security policies, like regular training, revisiting
all policies, creating continuous awareness, etc.
• Policies and practices for basic protection must be
maintained, e.g. patches and updates, secure passwords,
updates anti-virus, etc.
• Security processes and technology adoption must keep pace
with rising number and complexity of threats
• Maintain inventory of all devices and software on your
network
Thank You!
www.pcquest.com, www.ciol.com
anilc@cybermedia.co.in

More Related Content

Viewers also liked

Antes de usarlos, entendamos a los Influencers
Antes de usarlos, entendamos a los InfluencersAntes de usarlos, entendamos a los Influencers
Antes de usarlos, entendamos a los InfluencersÓscar Solano Brenes
 
Liquid Journals - Intro and RoadMap
Liquid Journals - Intro and RoadMapLiquid Journals - Intro and RoadMap
Liquid Journals - Intro and RoadMapAliaksandr Birukou
 
дети войны
дети войныдети войны
дети войныmonolite
 
Conferenza Venezia IUAV 2010
Conferenza Venezia IUAV 2010Conferenza Venezia IUAV 2010
Conferenza Venezia IUAV 2010Renzo Carlucci
 
Research and Planning
Research and PlanningResearch and Planning
Research and Planningguestae5007f
 
My Friend And I Picture Text Dictionary
My Friend And I Picture Text DictionaryMy Friend And I Picture Text Dictionary
My Friend And I Picture Text Dictionaryjim mager
 
Mundial fifa sudafrica 2010(1)
Mundial fifa sudafrica 2010(1)Mundial fifa sudafrica 2010(1)
Mundial fifa sudafrica 2010(1)Analía Genauer
 
Assistive Technology Web Quest
Assistive Technology Web QuestAssistive Technology Web Quest
Assistive Technology Web Questguestc3e244c
 
An Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOAAn Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOAAliaksandr Birukou
 
Benefits Of Collaborative E Learning
Benefits Of Collaborative E LearningBenefits Of Collaborative E Learning
Benefits Of Collaborative E LearningWilson Araromi
 
How Open Is Open?
How Open Is Open?How Open Is Open?
How Open Is Open?Ian White
 
Morigi massimo 15102011_b
Morigi massimo 15102011_bMorigi massimo 15102011_b
Morigi massimo 15102011_bRenzo Carlucci
 

Viewers also liked (15)

Antes de usarlos, entendamos a los Influencers
Antes de usarlos, entendamos a los InfluencersAntes de usarlos, entendamos a los Influencers
Antes de usarlos, entendamos a los Influencers
 
Liquid Journals - Intro and RoadMap
Liquid Journals - Intro and RoadMapLiquid Journals - Intro and RoadMap
Liquid Journals - Intro and RoadMap
 
Russell Simmons Ppt
Russell Simmons PptRussell Simmons Ppt
Russell Simmons Ppt
 
дети войны
дети войныдети войны
дети войны
 
Conferenza Venezia IUAV 2010
Conferenza Venezia IUAV 2010Conferenza Venezia IUAV 2010
Conferenza Venezia IUAV 2010
 
Research and Planning
Research and PlanningResearch and Planning
Research and Planning
 
My Friend And I Picture Text Dictionary
My Friend And I Picture Text DictionaryMy Friend And I Picture Text Dictionary
My Friend And I Picture Text Dictionary
 
Mundial fifa sudafrica 2010(1)
Mundial fifa sudafrica 2010(1)Mundial fifa sudafrica 2010(1)
Mundial fifa sudafrica 2010(1)
 
Assistive Technology Web Quest
Assistive Technology Web QuestAssistive Technology Web Quest
Assistive Technology Web Quest
 
An Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOAAn Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOA
 
Benefits Of Collaborative E Learning
Benefits Of Collaborative E LearningBenefits Of Collaborative E Learning
Benefits Of Collaborative E Learning
 
Accessible Blackboard Part 2
Accessible Blackboard Part 2Accessible Blackboard Part 2
Accessible Blackboard Part 2
 
Siteco Learnlight
Siteco LearnlightSiteco Learnlight
Siteco Learnlight
 
How Open Is Open?
How Open Is Open?How Open Is Open?
How Open Is Open?
 
Morigi massimo 15102011_b
Morigi massimo 15102011_bMorigi massimo 15102011_b
Morigi massimo 15102011_b
 

More from Anil Chopra

Artificial intelligence: From Science Fiction to Reality
Artificial intelligence: From Science Fiction to RealityArtificial intelligence: From Science Fiction to Reality
Artificial intelligence: From Science Fiction to RealityAnil Chopra
 
Data Driven Digital Transformation
Data Driven Digital TransformationData Driven Digital Transformation
Data Driven Digital TransformationAnil Chopra
 
Getting Ready for Industry 4.0
Getting Ready for Industry 4.0Getting Ready for Industry 4.0
Getting Ready for Industry 4.0Anil Chopra
 
Flash: The Future of Storage
Flash: The Future of StorageFlash: The Future of Storage
Flash: The Future of StorageAnil Chopra
 
Time for a Cloud Security Strategy
Time for a Cloud Security StrategyTime for a Cloud Security Strategy
Time for a Cloud Security StrategyAnil Chopra
 
The way forward for bfsi in the era of disruption
The way forward for bfsi in the era of disruptionThe way forward for bfsi in the era of disruption
The way forward for bfsi in the era of disruptionAnil Chopra
 
Integrating AI & Cognitive into your Business Strategy
Integrating AI & Cognitive into your Business StrategyIntegrating AI & Cognitive into your Business Strategy
Integrating AI & Cognitive into your Business StrategyAnil Chopra
 
Towards a Service Oriented IT Infrastructure
Towards a Service Oriented IT InfrastructureTowards a Service Oriented IT Infrastructure
Towards a Service Oriented IT InfrastructureAnil Chopra
 
Next Generation Traffic: Is Your Network Ready?
Next Generation Traffic: Is Your Network Ready?Next Generation Traffic: Is Your Network Ready?
Next Generation Traffic: Is Your Network Ready?Anil Chopra
 
Big Data Usage Survey
Big Data Usage SurveyBig Data Usage Survey
Big Data Usage SurveyAnil Chopra
 
PCQuest CIO Tech Priorities Survey 2014
PCQuest CIO Tech Priorities Survey 2014PCQuest CIO Tech Priorities Survey 2014
PCQuest CIO Tech Priorities Survey 2014Anil Chopra
 

More from Anil Chopra (12)

Artificial intelligence: From Science Fiction to Reality
Artificial intelligence: From Science Fiction to RealityArtificial intelligence: From Science Fiction to Reality
Artificial intelligence: From Science Fiction to Reality
 
Data Driven Digital Transformation
Data Driven Digital TransformationData Driven Digital Transformation
Data Driven Digital Transformation
 
Getting Ready for Industry 4.0
Getting Ready for Industry 4.0Getting Ready for Industry 4.0
Getting Ready for Industry 4.0
 
Flash: The Future of Storage
Flash: The Future of StorageFlash: The Future of Storage
Flash: The Future of Storage
 
Time for a Cloud Security Strategy
Time for a Cloud Security StrategyTime for a Cloud Security Strategy
Time for a Cloud Security Strategy
 
The way forward for bfsi in the era of disruption
The way forward for bfsi in the era of disruptionThe way forward for bfsi in the era of disruption
The way forward for bfsi in the era of disruption
 
Integrating AI & Cognitive into your Business Strategy
Integrating AI & Cognitive into your Business StrategyIntegrating AI & Cognitive into your Business Strategy
Integrating AI & Cognitive into your Business Strategy
 
Towards a Service Oriented IT Infrastructure
Towards a Service Oriented IT InfrastructureTowards a Service Oriented IT Infrastructure
Towards a Service Oriented IT Infrastructure
 
Next Generation Traffic: Is Your Network Ready?
Next Generation Traffic: Is Your Network Ready?Next Generation Traffic: Is Your Network Ready?
Next Generation Traffic: Is Your Network Ready?
 
The Dell Way
The Dell WayThe Dell Way
The Dell Way
 
Big Data Usage Survey
Big Data Usage SurveyBig Data Usage Survey
Big Data Usage Survey
 
PCQuest CIO Tech Priorities Survey 2014
PCQuest CIO Tech Priorities Survey 2014PCQuest CIO Tech Priorities Survey 2014
PCQuest CIO Tech Priorities Survey 2014
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

A practical view to information security

  • 1. A Practical View to Information Security Anil Chopra Group Editor PCQuest and CIOL.com
  • 2. Some Recent Cyber Crime Activities Rs. 63 Lakhs of an NRI’s Fixed Deposits defrauded via fake emails sent to a leading public sector bank's branch in India Former director of reputed educational institute gets duped of Rs. 19 Lakhs; Fraudster de-activates victim’s SIM to avoid detection and transfers funds. Rs. 17 Lakhs of fraudulent transfers done from a small company’s accounts; Fraudster changes mobile number of the victim’s KYC details by what appears to be an ‘insider’s job’.
  • 3. Financial Sector perceived as most vulnerable to fraud and faces the max number of threats Source: CyberMedia Research
  • 4. More Survey Findings on InfoSec • There’s a growing need to focus on internal threats • 56% of CIOs in India feel that it’s because of employee unawareness • 37% feel that it’s due to open vulnerabilities • Security is the key challenge to adopting Enterprise Mobility. • Fixing known system vulnerabilities is a given. -E&Y CIO survey, 2014 • CIOs/CTOs at an overall level feel that security would be top external IT spending project in 2014–15. About 51% CIO/CTOs have indicated they’re likely to spend in this area, way ahead of Virtualization (39%) and ERP (35%) -CMR CIO Survey 2014 • Detected security incidents up by 25% over last year •Average financial costs of incidents up 18% -GSISS 2014 by PwC
  • 5. The Learnings • Nobody’s Safe! • Organizations are ending up paying huge sums of money in legal cases, loosing their reputation and credibility, thanks to security incidents. • There’s a need to make information security a board room agenda • Business Implications, Global cybercrime, changing profile of employees, and risks with outsourced partners are some of the concerns to be addressed • New techniques are emerging for cyber fraud • Attacks have become more complicated, and so have the IT and business environments
  • 6. Some Best Practices • Organizations should not be ignoring the basics while framing their security policies, like regular training, revisiting all policies, creating continuous awareness, etc. • Policies and practices for basic protection must be maintained, e.g. patches and updates, secure passwords, updates anti-virus, etc. • Security processes and technology adoption must keep pace with rising number and complexity of threats • Maintain inventory of all devices and software on your network