Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations

Dinesh O Bareja
Dinesh O BarejaCISA, CISM, ITIL, Cyber Insurance, Strategy & Govt Policy, Awareness, Certified Incident Response (GCHQ)
Governance in
CyberCrime Investigation
&
Cyber Security
Organizations
On
Dec. 07, 2013

At
The Palladium, Mumbai

Presented At
CyberAttack 2013
Security Conference

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK 2014, Mumbai

By

Dinesh O. Bareja
Information Security &
Management Advisor
Distribution Version
• This presentation has been optimized for distribution which means that animation panes have
been deleted and expanded so that the slides with animation do not appear with unreadable
clutter
• The images that have been used are sourced freely from the Internet using multiple search
resources. Our logic is that if your creations are searchable then they are usable for
representation AND we never use any such images in our commercial works
• All our works that are put up as ‘distribution’ versions are published under Creative Commons
license and are non-commercial – these are available for download from common document
sites on the internet or from our website
• If some images are deleted the slide will show the hyperlink to it and you can follow the link to
see the image. This is done if I have received an objection or a take-down notice from the
copyright owner
• I/We make every effort to include a link or name to the copyright owner of the image(s) that
have been used in this presentation and please accept our sincere apologies in case any image
has not been individually acknowledged
• Copyright notices or watermarks are not removed from images or text which are not
purchased, however, we may say that practically all text is our own creation
• Inspite of all the above and other declarations, if you have objections to the use (as owner of
any of the IP used in this presentation / paper) you may please send an email to us and we
shall remove the same right away (please do remember to include your communication
coordinates and the URL where you spotted this infringement

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
A Brief Introduction
Dinesh O Bareja
• Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd
• Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch)
• Member IGRC – Bombay Stock Exchange
• COO – Open Security Alliance

Enterprise & Government Policy Development;
Cyber Security Strategy and Design Architect;
Current State Maturity Assessment & Optimization;
Digital Forensics, Cloud Forensics and Security;

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Setting The Context..
Thinking .. Strategizing … Planning should be done
when you are in square one

However it is better late than never:
Stop Take stock Create a going-ahead plan
Restart from where you stopped

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Context…

Taking stock of our current situation:

It is about time the Information Security community
woke up to voice the weakness in governance in
our government’s thinking on national cyber
security
And

The increasing inability to control (cyber) related
incidents with the looming threats of cyber war /
terrorism / espionage / crime
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Or (in the near future)… Face

Annihilation
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Context

Defining the three key terms in our title to set the
context (from Wikipedia and Dinesh’speedia

• Governance: That which defines expectations, grants power or

verifies performance. Is a system by which entities are directed and
controlled and a governance structure specifies the distribution of rights
and responsibilities among different stakeholders. It is the process or a part
of decision-making and the process by which leadership is established and
decisions are implemented (or not implemented)

• Cybercrime Investigation Organizations: Are primarily law
enforcement organizations and such bodies that are engaged in
investigating and controlling cyber crime.

• Cybersecurity Organizations: Intelligence services, offensive and
defensive solution development and delivery, sector specific entities like
Telecom CERT etc, cyber command wings of defence forces and such
organizations that are outside the ambit of being termed a LEA.

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
We
Need
To

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
My Plan is to Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths in
Planned Security Organizations

Why

do we need to structure a
centralized command governance
for Cyber Security across the nation
(or states) when we already have our
Cyber-thanas, CERTs, NTRO-NCIIPC,
DIARA and more

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths
• Centralized system provides strategic, tactical,
operational and administrative control
• Need-to-know Data Access and Distribution Policy
• Central Information Library and Knowledgebase
• Politics-free Inter-Disciplinary dependencies
• Common goals across all stakeholders
• Quick response capability
• Enhanced intelligence and capability sharing
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths
• Standardized response by organizations across the
nation states provide harmony in operations
• Resources, capacities, capabilities can be shared
• Crisis communication is controlled and effective

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - CDRC
• Jointly setup by Jharkhand State and Jharkhand
Police (special branch)
• Located in PHQ it is the authority in the state for
cybercrime and cyber security related information,
advisories, investigation – QUICK RESPONSE
• Engaged in citizen awareness outreach, critical
infrastructure protection, training etc
• Connects with the InfoSec community, LEA and
security establishments across the country …
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Change Gives No Choices
Hopefully
not a major
incident

http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/
Governance in CyberCrime Investigation
& Cyber Security Organizations

Period of
ignorance on
the power trip

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai

Enlightenment
dawns on the
lawmakers
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Traditional Entities
• Cyber Thana, Cybercell, Cyber Lab, FSL
• Police, BSF, ITBP, CID, CBI, EOW, SFIO, IT
• CERT, Sectoral CERT, NTRO, NCSC, NIA, IB, NCIIPC
• Army, Air Force, Navy
• My personal list has a count of about 60
organizations which are (in some way or the
other) connected to the aims of cybercrime /
cybesecurity control
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
But, we have..
• The same problems which face any traditional
entity

• Lack of sharing
• Blame it on the enemy-of-the-day
• High spending
• Generally go around in circles do nothing
• Lack of capability / skills / resources
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
If you don’t believe me I hope
you will believe someone who
was more intelligent than me !

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Why Traditional Can’t Survive
• Borders and jurisdictions are porous
• Speed of decision making and communication is
the need of the hour second (it will soon be the
need of he nanosecond)
• A single crime may be committed from multiple
locations at the same time
• Attacks and malicious activity can be initiated by
individuals, groups or nations…. Who attacks
whom is unknown!
• Every one in the team has to be a hacker… etc!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
What is Needed
• Organization Agility
• Thought Leadership
• Planned Operations and Response
• Acceptance of knowledge as power
• Budget and support for growth
• Reality – a child can be the adversary
• … etc!

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
FUDsters Trolls Carpetbaggers
and Scalawags abound
http://horrorfilmaesthetics.blogspot.in/2011_06_01_archive.html

As with any new frontier one will
find the settlers along with the
charlatans, the con men, the
criminal minded and others.

The internet is no different… there
are scamsters, crackers, business
people, phishers, bankers,
bloggers, settlers etc…
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
FUDsters Trolls Carpetbaggers
and Scalawags abound
• Organizations and Governments are shooting
themselves in the foot
• False expectations are created to believe that the
largest organization has the best solution
(qualification - 200 crore turnover for past 3 years)
• Vendors present snazzy catalogs and are generally
people who know everything about anything
• Analyst opinion is considered to be gold standard
• Auditors are trained to never give the true picture
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
The Quantum of Risk
grows exponentially when
one is stuck in the past

Just hope to get unstuck quick!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Buyers live in the old mindset
• Insurance company seeking Risk Management
framework – QC is Rs 200 cr profit making
company for past 3 years
• Bank seeking IS support services sets the QC at Rs
100cr .. profit making, in past 3 years
• Company hiring a Security Manager expects the
person to have all certifications and skills in audit,
technology, forensics, communication, application
development, business continuity, malware etc

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Hiring Managers live in their
personal heaven

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Where do they think they will
get value

How do they expect to secure
their organizations if they
leave out the world
Just hope to get unstuck quick!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Now Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Current State of Cyber Security
Governance - worldwide
• Multiple organizations are established by different
departments of Government, Law Enforcement,
Defence Forces, Large Enterprises
• Each of them is doing “their own thing” to protect
their turf (assets, perimeter, technologies)
• Every one is a de facto expert claiming to have the
most wonderful system in place after God’s
creation
• Chaos and confusion reign supreme and it is
evident in the continued bashing of the domain
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Current State of Cyber Security
Governance - worldwide
• Each looks at cybersecurity as an extension of their
own present function – so the Naval team looks at
threats to their own naval installations and the
Police is only concerned with cybercrime
• Capabilities are being created in silos which do
not communicate or may do so at the MHA
sponsored senior officer meetings
• And what do we have in the end..

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Silos
• Absence of Inter-State Information Sharing among
LEA and others
• Everyone is going their own way
• State of the Art purchases

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Traditional Entities
• My personal list has a count of about 60
organizations which are (in some way or the
other) connected to the aims of cybercrime /
cybesecurity control
• A listing will come up in the next slide

• These organization names have been taken from
news / media reports so it is in public domain (no
secrets are disclosed!)
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
What Org Structure

What We Need
What We Have
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Organization
Soup

CERT-In

Computer Emeregency Response Team

CHCIT

Cyber and Hi-Tech Crime Investigation and Training Center

NIC

National Informatics Center

NTRO

National Technical Research Organization
Cyber Regulation Advisory Committee

General Weapons and
Electronics Systems
Engineering Establishment

NCSC

DIARA

Defense Information and
Research Agency

CMS

Central Monitoring System

DIA

Defence Intelligence Agency

NCSF

National Cyber Security Framework

WESEE

National Cyber Security Commissioner

Cyber Coordination Center

Cyber Security Board

Special Operations
Command

Cyber Security Board - Cyber Security Coordinators

Strategic Forces Command

NCCC

National Cyber Coordination Centre

CERT-Navy

NSCS

National Security Council Secretariat

NCCC

National Cyber Coordination Centre

NSAB

National Security Advisory Board

CERT-Army

CERT-AirForce
Cyber Operations Centre
(NTRO with Armed Forces)
Governance in CyberCrime Investigation
& Cyber Security Organizations

National Information Security Authority

NCIIPC

National Critical Information Infrastructure Protection
Committee

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Organization
Soup

National Intelligence Board

SSTCG

Strategic Security Technology Coordination Group

MAC

Multi Agency Centre
Joint Cipher Bureau

CDRC

Cyber Defence Research Centre, Jharkhand

Scientific Advisory Group

Cyber Suraksha Cell, Guajarat

Indian Stastistical Institute

Special Operations Group, Gujarat

Cipher Committee

Cyberdome, Kerala Police

Scientific Advisor to Raksha Mantri

DSCI

Data Security Council of India

IISc

Indian Institute of Science, Bangalore

ISAC

Information Sharing and Analysis Centre

CSI

Computer Society of India

Telecom Security Council of India
NATGRID

National Security Database
IDRBT

Institute for Development and Research in
Banking Technology

IBA

Indian Banks Association

RBI

Crimes and Criminal Tracking Network and System
NCTC was to weld together multiple intelligence
databases:

NJDG

Indian Cyber Army

CCTNS

NCTC

Deccan Hackers

National Intelligence Grid

National Judicial Data Grid

TETC

Telecom Testing and Security Certification Centre

Reserve Bank of India

TRAI
DOT

CBI's Bank Securities and Fraud Cell
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Our Score = 60+
• The country should have been on the top of the
Cyber capability index worldwide

• We would not having this conference.. Rather …
the topic would have been different
• Nations and individuals would have to think twice
to face up to us – no website defacements or data
breach

What We Have

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
• To respond to an attack by air the Air Force is
called, on land it is the Army and the Navy at sea

Who do we call upon for an
attack through the internet

• How do 60+ agencies coordinate with each other
• How can a planned response be launched in the
absence of a central coordinator….
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
• Worldwide – other countries are no
better
• No wonder attacks are on the rise
and everyone is hurting bad

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Taking a Look At

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Disadvantages / Challenges
• Increased risk of incompetent response when
faced with a challenge
• Uncontrolled purchases expenditure
• Head in the sand bliss
• Wasteful expenditure in the absence of
competence or capability
• The only certainty – defeat at the hands of anyone
with a computer and malicious intent

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - NDMA
• Central Disaster Management agency
• Body of Knowledge and expertise
• Ensures regular drills and exercises
• Follows national level standard processes
• National mandate to coordinate and guide all
states in their response and management setup
• Recent Success – Orissa (Phailin) and AP (Lehar)
• Challenge - communication, post-incident
response
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - NDMA
• Before the NDMA • Many deaths
• Unorganized response
• Could we ever evacuate
• Of course NDMA did not spring up overnight – it
was formed in December 2005 and has come a
long way

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Taking a Look At

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Cyber Security must be entrusted (at national level)
to one authority and organization
• PMO / President should be designated as C-in-C as
this is a frontier, a battleground
• Cybercrime, Terrorism, War, Attacks, Espionage,
Reputation, Information Exchange, Development
of Offensive Capabilities et al cannot be decided
upon by the NCSC

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Commander in Chief
PM / President

Second Line of Command (Operational and Strategic)
NSA

NCSC

Defence
Chief of Staff

CERT

Head of
Intelligence

MHA

LEA, Industry
Rep & Bodies

Cyber Security Organizations and Organizations with Cyber Command Centers
State Cyber
Security Centers

Sectoral CERTs

NTRO(cyber)
NCIIPC

IB, RAW, NIA,
DIA

Academia
Participants

Defense CERTs,
DIA, DRDO etc

CyberCrime
Police Stations

CCTNS,
NATGRID

Information &
Data Library

Online
Battalions

Continuing
Education &
Training

General areas
n.e.s.

Control and Operational Areas (national and state level)
Capacity
Building

Capability
Building

Education
and Training

Citizen
Outreach

Sectoral
Departments

Critical
Infrastructure

International
Relations

Policy &
Regulations

Offensive and
Defensive

Intelligence
Gathering

Knowledge
Repository

Domestic
Relationships

Risk
Advisories

Research and
Development

Public Private
Partnership

Public
Relations

Talent
Identification

Security
Clearance

Think Tank

Testing
Group

Responsible
Disclosure

Reporting and
Measurement

Audit, Risk,
Technology

Field Organizations and Teams
CERT
Incident
Response

Awareness,
Education,
Training

Governance in CyberCrime Investigation
& Cyber Security Organizations

Skill
Development

Developers

Embedded
Cyber
Patrollers

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Organization will be responsible for every aspect
of cyber security
•
•
•
•
•
•
•

Policy and regulations
Advisories and Information sharing systems
State level organizations – mandate and operations
Cyber Defense Command
Armed Forces cyber security organizations
National and sectoral CERT
National Critical Infrastructure Protection

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Build capacity and capability
• Secure national and state infrastructure
• Raise awareness of cybersecurity needs
• Learn what is coming up – or what will come
• So who will own this defence organization ? MHA
or MOD ?

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
This is a peek into
the Future
what’s coming up
ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
BAD

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Dinesh O. Bareja,
CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM

• Professional Positions
•
•
•
•

Pyramid Cyber Security & Forensics (Principal Advisor)
Open Security Alliance (Principal and CEO)
Jharkhand Police (Cyber Security Advisor)
Indian Honeynet Project (Co Founder)

• Professional skills and special interest areas
• Security Consulting and Advisory services for IS Architecture, Analysis,
Optimization..
• Technologies: SOC, DLP, IRM, SIEM…
• Practices: Incident Response, SAM, Forensics, Regulatory guidance..
• Community: mentoring, training, citizen outreach, India research..
• Opinioned Blogger, occasional columnist, wannabe photographer
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Contact Information
E dinesh@opensecurityalliance.org

@bizsprite

+91.9769890505

dineshobareja

L: http://in.linkedin.com/in/dineshbareja

dineshobareja

References
http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/

Acknowledgements & Disclaimer
Various resources on the internet have been referred to contribute to the information
presented. Images have been acknowledged (above) where possible. Any company names,
brand names, trade marks are mentioned only to facilitate understanding of the message
being communicated - no claim is made to establish any sort of relation (exclusive or
otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this
would be wholly unintentional, and objections may please be communicated to us for
remediation of the erroneous action(s).
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
1 of 56

Recommended

Cybersecurity Roadmap Development for Executives by
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesKrist Davood - Principal - CIO
1.3K views30 slides
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi... by
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
1.7K views22 slides
Security architecture by
Security architectureSecurity architecture
Security architectureDuncan Unwin
8.9K views37 slides
Cybersecurity by
CybersecurityCybersecurity
CybersecuritySanjana Agarwal
1.1K views31 slides
NIST cybersecurity framework by
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
990 views11 slides
Zero Trust Model Presentation by
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model PresentationGowdhaman Jothilingam
12.2K views19 slides

More Related Content

What's hot

Security Operation Center - Design & Build by
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
95.1K views41 slides
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri... by
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
2.5K views16 slides
Cybersecurity Risk Management Program and Your Organization by
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
723 views58 slides
Lessons Learned from the NIST CSF by
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSFDigital Bond
3.4K views29 slides
Adopting A Zero-Trust Model. Google Did It, Can You? by
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
1.5K views25 slides
Security Awareness Training by Fortinet by
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by FortinetAtlantic Training, LLC.
16.3K views57 slides

What's hot(20)

Security Operation Center - Design & Build by Sameer Paradia
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
Sameer Paradia 95.1K views
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri... by Edureka!
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!2.5K views
Cybersecurity Risk Management Program and Your Organization by McKonly & Asbury, LLP
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
Lessons Learned from the NIST CSF by Digital Bond
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
Digital Bond3.4K views
Adopting A Zero-Trust Model. Google Did It, Can You? by Zscaler
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler1.5K views
CISSP 8th edition 2018.pdf by TanishaPatil4
CISSP 8th edition 2018.pdfCISSP 8th edition 2018.pdf
CISSP 8th edition 2018.pdf
TanishaPatil4167 views
Information Security Awareness Training by Wilfrid Laurier University by Atlantic Training, LLC.
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Zero Trust Framework for Network Security​ by AlgoSec
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
AlgoSec2.5K views
The Board and Cyber Security by FireEye, Inc.
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
FireEye, Inc.10.7K views
Cyber Security Governance by Priyanka Aash
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash2.4K views
Building an effective Information Security Roadmap by Elliott Franklin
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
Elliott Franklin27.1K views
Zero Trust Model by Yash
Zero Trust ModelZero Trust Model
Zero Trust Model
Yash 952 views
Threat modeling web application: a case study by Antonio Fontes
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
Antonio Fontes11.4K views
Cybersecurity trends - What to expect in 2023 by PECB
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB 2.7K views
cyber security presentation.pptx by kishore golla
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
kishore golla11.7K views

Viewers also liked

Compliance Awareness by
Compliance AwarenessCompliance Awareness
Compliance AwarenessDinesh O Bareja
5.3K views28 slides
Information Security It's All About Compliance by
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
13.1K views37 slides
Business - IT Alignment Increases Value Of IT by
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
10.6K views49 slides
Bug Bounty Programs : Good for Government by
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
2.4K views48 slides
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India by
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
2.9K views56 slides
Mind Your Manners On Linked In by
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
1.7K views26 slides

Viewers also liked(16)

Information Security It's All About Compliance by Dinesh O Bareja
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
Dinesh O Bareja13.1K views
Business - IT Alignment Increases Value Of IT by Dinesh O Bareja
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
Dinesh O Bareja10.6K views
Bug Bounty Programs : Good for Government by Dinesh O Bareja
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
Dinesh O Bareja2.4K views
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India by Dinesh O Bareja
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Dinesh O Bareja2.9K views
Mind Your Manners On Linked In by Dinesh O Bareja
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
Dinesh O Bareja1.7K views
Incident Response Requires Superhumans by Dinesh O Bareja
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
Dinesh O Bareja2.6K views
Indian Thoughts in Information Security by Dinesh O Bareja
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
Dinesh O Bareja1.5K views
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations by Dinesh O Bareja
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Dinesh O Bareja1.2K views
Information Security Management Education Program - Concept Document by Dinesh O Bareja
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
Dinesh O Bareja9K views
Community Disaster Incident Response by Dinesh O Bareja
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
Dinesh O Bareja1.4K views
ISE - InfoSec Essentials .. an introduction by Dinesh O Bareja
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
Dinesh O Bareja1.3K views
Common Sense 101 - so much to learn about CS by Dinesh O Bareja
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
Dinesh O Bareja6K views

Similar to Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations

Your cyber security webinar by
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
711 views26 slides
How to build a cyber threat intelligence program by
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
4.4K views55 slides
GRC Dynamics in Securing Cloud by
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudNoman Bari PMP,CISSP,CCSP,AWSx4,CISM,CISA
43 views24 slides
CSIRT_16_Jun by
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_JunCandan BOLUKBAS
1.4K views54 slides
Your cyber security webinar by
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
540 views26 slides
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı? by
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
4.8K views54 slides

Similar to Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations (20)

Your cyber security webinar by Intergen
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Intergen711 views
How to build a cyber threat intelligence program by Mark Arena
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena4.4K views
Your cyber security webinar by Empired
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
Empired540 views
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı? by BGA Cyber Security
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA Cyber Security4.8K views
BATbern48_How Zero Trust can help your organisation keep safe.pdf by BATbern
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern321 views
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni... by Denim Group
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Denim Group2.5K views
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt by John D. Johnson
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson1.2K views
security and assurance lecture jan 14 by subramanian K
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
subramanian K1.1K views
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy by Stephanie McVitty
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty298 views
Combating Cyber Crimes Proactively.pdf by Chinatu Uzuegbu
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
Chinatu Uzuegbu29 views
Cybersecurity Best Practices in Financial Services by John Rapa
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
John Rapa765 views
Kmicro Cybersecurity Offerings 2020 by Manuel Guillen
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
Manuel Guillen43 views
Cyber security and demonstration of security tools by Vicky Fernandes
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
Vicky Fernandes2.5K views
securityattackvectorsslidesharefinal-160405191759.pdf by ssuser6c59cb
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
ssuser6c59cb3 views
Cybersecurity Attack Vectors: How to Protect Your Organization by TriCorps Technologies
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization

More from Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers by
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
302 views36 slides
Cybersecurity 2.0 by
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0Dinesh O Bareja
302 views61 slides
Basics in IT Audit and Application Control Testing by
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
4.5K views53 slides
Can Cyber Insurance Enforce Change in Enterprise GRC by
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
581 views16 slides
Finance and Accounting professionals to bridge the gap with IT by
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
230 views35 slides
Bug Bounty Hunter's Manifesto V1.0 by
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
2.3K views4 slides

More from Dinesh O Bareja(9)

WFH Cybersecurity Basics Employees and Employers by Dinesh O Bareja
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
Dinesh O Bareja302 views
Basics in IT Audit and Application Control Testing by Dinesh O Bareja
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
Dinesh O Bareja4.5K views
Can Cyber Insurance Enforce Change in Enterprise GRC by Dinesh O Bareja
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
Dinesh O Bareja581 views
Finance and Accounting professionals to bridge the gap with IT by Dinesh O Bareja
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
Dinesh O Bareja230 views
Bug Bounty Hunter's Manifesto V1.0 by Dinesh O Bareja
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
Dinesh O Bareja2.3K views
India Top5 Information Security Concerns 2013 by Dinesh O Bareja
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
Dinesh O Bareja1.6K views
OSA - Internet Security in India by Dinesh O Bareja
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
Dinesh O Bareja657 views
20100224 Presentation at RGIT Mumbai - Information Security Awareness by Dinesh O Bareja
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Dinesh O Bareja2.6K views

Recently uploaded

Black and White Modern Science Presentation.pptx by
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptxmaryamkhalid2916
16 views21 slides
Kyo - Functional Scala 2023.pdf by
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
298 views92 slides
Five Things You SHOULD Know About Postman by
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About PostmanPostman
30 views43 slides
Lilypad @ Labweek, Istanbul, 2023.pdf by
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdfAlly339821
9 views45 slides
Attacking IoT Devices from a Web Perspective - Linux Day by
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day Simone Onofri
15 views68 slides
Top 10 Strategic Technologies in 2024: AI and Automation by
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
18 views14 slides

Recently uploaded(20)

Black and White Modern Science Presentation.pptx by maryamkhalid2916
Black and White Modern Science Presentation.pptxBlack and White Modern Science Presentation.pptx
Black and White Modern Science Presentation.pptx
maryamkhalid291616 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman30 views
Lilypad @ Labweek, Istanbul, 2023.pdf by Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier39 views
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 views
From chaos to control: Managing migrations and Microsoft 365 with ShareGate! by sammart93
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
From chaos to control: Managing migrations and Microsoft 365 with ShareGate!
sammart939 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views

Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations

  • 1. Governance in CyberCrime Investigation & Cyber Security Organizations On Dec. 07, 2013 At The Palladium, Mumbai Presented At CyberAttack 2013 Security Conference Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK 2014, Mumbai By Dinesh O. Bareja Information Security & Management Advisor
  • 2. Distribution Version • This presentation has been optimized for distribution which means that animation panes have been deleted and expanded so that the slides with animation do not appear with unreadable clutter • The images that have been used are sourced freely from the Internet using multiple search resources. Our logic is that if your creations are searchable then they are usable for representation AND we never use any such images in our commercial works • All our works that are put up as ‘distribution’ versions are published under Creative Commons license and are non-commercial – these are available for download from common document sites on the internet or from our website • If some images are deleted the slide will show the hyperlink to it and you can follow the link to see the image. This is done if I have received an objection or a take-down notice from the copyright owner • I/We make every effort to include a link or name to the copyright owner of the image(s) that have been used in this presentation and please accept our sincere apologies in case any image has not been individually acknowledged • Copyright notices or watermarks are not removed from images or text which are not purchased, however, we may say that practically all text is our own creation • Inspite of all the above and other declarations, if you have objections to the use (as owner of any of the IP used in this presentation / paper) you may please send an email to us and we shall remove the same right away (please do remember to include your communication coordinates and the URL where you spotted this infringement Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 3. A Brief Introduction Dinesh O Bareja • Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd • Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch) • Member IGRC – Bombay Stock Exchange • COO – Open Security Alliance Enterprise & Government Policy Development; Cyber Security Strategy and Design Architect; Current State Maturity Assessment & Optimization; Digital Forensics, Cloud Forensics and Security; Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 4. Setting The Context.. Thinking .. Strategizing … Planning should be done when you are in square one However it is better late than never: Stop Take stock Create a going-ahead plan Restart from where you stopped Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 5. Context… Taking stock of our current situation: It is about time the Information Security community woke up to voice the weakness in governance in our government’s thinking on national cyber security And The increasing inability to control (cyber) related incidents with the looming threats of cyber war / terrorism / espionage / crime Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 6. Or (in the near future)… Face Annihilation Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 7. Context Defining the three key terms in our title to set the context (from Wikipedia and Dinesh’speedia • Governance: That which defines expectations, grants power or verifies performance. Is a system by which entities are directed and controlled and a governance structure specifies the distribution of rights and responsibilities among different stakeholders. It is the process or a part of decision-making and the process by which leadership is established and decisions are implemented (or not implemented) • Cybercrime Investigation Organizations: Are primarily law enforcement organizations and such bodies that are engaged in investigating and controlling cyber crime. • Cybersecurity Organizations: Intelligence services, offensive and defensive solution development and delivery, sector specific entities like Telecom CERT etc, cyber command wings of defence forces and such organizations that are outside the ambit of being termed a LEA. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 8. We Need To Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 9. My Plan is to Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 10. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 11. Relevance and Strengths in Planned Security Organizations Why do we need to structure a centralized command governance for Cyber Security across the nation (or states) when we already have our Cyber-thanas, CERTs, NTRO-NCIIPC, DIARA and more Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 12. Relevance and Strengths • Centralized system provides strategic, tactical, operational and administrative control • Need-to-know Data Access and Distribution Policy • Central Information Library and Knowledgebase • Politics-free Inter-Disciplinary dependencies • Common goals across all stakeholders • Quick response capability • Enhanced intelligence and capability sharing Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 13. Relevance and Strengths • Standardized response by organizations across the nation states provide harmony in operations • Resources, capacities, capabilities can be shared • Crisis communication is controlled and effective Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 14. One Bright Example - CDRC • Jointly setup by Jharkhand State and Jharkhand Police (special branch) • Located in PHQ it is the authority in the state for cybercrime and cyber security related information, advisories, investigation – QUICK RESPONSE • Engaged in citizen awareness outreach, critical infrastructure protection, training etc • Connects with the InfoSec community, LEA and security establishments across the country … Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 15. Change Gives No Choices Hopefully not a major incident http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/ Governance in CyberCrime Investigation & Cyber Security Organizations Period of ignorance on the power trip CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai Enlightenment dawns on the lawmakers
  • 16. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 17. Traditional Entities • Cyber Thana, Cybercell, Cyber Lab, FSL • Police, BSF, ITBP, CID, CBI, EOW, SFIO, IT • CERT, Sectoral CERT, NTRO, NCSC, NIA, IB, NCIIPC • Army, Air Force, Navy • My personal list has a count of about 60 organizations which are (in some way or the other) connected to the aims of cybercrime / cybesecurity control Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 18. But, we have.. • The same problems which face any traditional entity • Lack of sharing • Blame it on the enemy-of-the-day • High spending • Generally go around in circles do nothing • Lack of capability / skills / resources Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 19. If you don’t believe me I hope you will believe someone who was more intelligent than me ! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 20. Why Traditional Can’t Survive • Borders and jurisdictions are porous • Speed of decision making and communication is the need of the hour second (it will soon be the need of he nanosecond) • A single crime may be committed from multiple locations at the same time • Attacks and malicious activity can be initiated by individuals, groups or nations…. Who attacks whom is unknown! • Every one in the team has to be a hacker… etc! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 21. What is Needed • Organization Agility • Thought Leadership • Planned Operations and Response • Acceptance of knowledge as power • Budget and support for growth • Reality – a child can be the adversary • … etc! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 22. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 23. FUDsters Trolls Carpetbaggers and Scalawags abound http://horrorfilmaesthetics.blogspot.in/2011_06_01_archive.html As with any new frontier one will find the settlers along with the charlatans, the con men, the criminal minded and others. The internet is no different… there are scamsters, crackers, business people, phishers, bankers, bloggers, settlers etc… Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 24. FUDsters Trolls Carpetbaggers and Scalawags abound • Organizations and Governments are shooting themselves in the foot • False expectations are created to believe that the largest organization has the best solution (qualification - 200 crore turnover for past 3 years) • Vendors present snazzy catalogs and are generally people who know everything about anything • Analyst opinion is considered to be gold standard • Auditors are trained to never give the true picture Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 25. The Quantum of Risk grows exponentially when one is stuck in the past Just hope to get unstuck quick! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 26. Buyers live in the old mindset • Insurance company seeking Risk Management framework – QC is Rs 200 cr profit making company for past 3 years • Bank seeking IS support services sets the QC at Rs 100cr .. profit making, in past 3 years • Company hiring a Security Manager expects the person to have all certifications and skills in audit, technology, forensics, communication, application development, business continuity, malware etc Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 27. Hiring Managers live in their personal heaven Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 28. Where do they think they will get value How do they expect to secure their organizations if they leave out the world Just hope to get unstuck quick! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 29. Now Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 30. Current State of Cyber Security Governance - worldwide • Multiple organizations are established by different departments of Government, Law Enforcement, Defence Forces, Large Enterprises • Each of them is doing “their own thing” to protect their turf (assets, perimeter, technologies) • Every one is a de facto expert claiming to have the most wonderful system in place after God’s creation • Chaos and confusion reign supreme and it is evident in the continued bashing of the domain Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 31. Current State of Cyber Security Governance - worldwide • Each looks at cybersecurity as an extension of their own present function – so the Naval team looks at threats to their own naval installations and the Police is only concerned with cybercrime • Capabilities are being created in silos which do not communicate or may do so at the MHA sponsored senior officer meetings • And what do we have in the end.. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 32. Silos • Absence of Inter-State Information Sharing among LEA and others • Everyone is going their own way • State of the Art purchases Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 33. Traditional Entities • My personal list has a count of about 60 organizations which are (in some way or the other) connected to the aims of cybercrime / cybesecurity control • A listing will come up in the next slide • These organization names have been taken from news / media reports so it is in public domain (no secrets are disclosed!) Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 34. What Org Structure What We Need What We Have Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 35. Organization Soup CERT-In Computer Emeregency Response Team CHCIT Cyber and Hi-Tech Crime Investigation and Training Center NIC National Informatics Center NTRO National Technical Research Organization Cyber Regulation Advisory Committee General Weapons and Electronics Systems Engineering Establishment NCSC DIARA Defense Information and Research Agency CMS Central Monitoring System DIA Defence Intelligence Agency NCSF National Cyber Security Framework WESEE National Cyber Security Commissioner Cyber Coordination Center Cyber Security Board Special Operations Command Cyber Security Board - Cyber Security Coordinators Strategic Forces Command NCCC National Cyber Coordination Centre CERT-Navy NSCS National Security Council Secretariat NCCC National Cyber Coordination Centre NSAB National Security Advisory Board CERT-Army CERT-AirForce Cyber Operations Centre (NTRO with Armed Forces) Governance in CyberCrime Investigation & Cyber Security Organizations National Information Security Authority NCIIPC National Critical Information Infrastructure Protection Committee CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 36. Organization Soup National Intelligence Board SSTCG Strategic Security Technology Coordination Group MAC Multi Agency Centre Joint Cipher Bureau CDRC Cyber Defence Research Centre, Jharkhand Scientific Advisory Group Cyber Suraksha Cell, Guajarat Indian Stastistical Institute Special Operations Group, Gujarat Cipher Committee Cyberdome, Kerala Police Scientific Advisor to Raksha Mantri DSCI Data Security Council of India IISc Indian Institute of Science, Bangalore ISAC Information Sharing and Analysis Centre CSI Computer Society of India Telecom Security Council of India NATGRID National Security Database IDRBT Institute for Development and Research in Banking Technology IBA Indian Banks Association RBI Crimes and Criminal Tracking Network and System NCTC was to weld together multiple intelligence databases: NJDG Indian Cyber Army CCTNS NCTC Deccan Hackers National Intelligence Grid National Judicial Data Grid TETC Telecom Testing and Security Certification Centre Reserve Bank of India TRAI DOT CBI's Bank Securities and Fraud Cell Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 37. Our Score = 60+ • The country should have been on the top of the Cyber capability index worldwide • We would not having this conference.. Rather … the topic would have been different • Nations and individuals would have to think twice to face up to us – no website defacements or data breach What We Have Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 38. • To respond to an attack by air the Air Force is called, on land it is the Army and the Navy at sea Who do we call upon for an attack through the internet • How do 60+ agencies coordinate with each other • How can a planned response be launched in the absence of a central coordinator…. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 39. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 40. • Worldwide – other countries are no better • No wonder attacks are on the rise and everyone is hurting bad Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 41. Taking a Look At Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 42. Disadvantages / Challenges • Increased risk of incompetent response when faced with a challenge • Uncontrolled purchases expenditure • Head in the sand bliss • Wasteful expenditure in the absence of competence or capability • The only certainty – defeat at the hands of anyone with a computer and malicious intent Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 43. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 44. One Bright Example - NDMA • Central Disaster Management agency • Body of Knowledge and expertise • Ensures regular drills and exercises • Follows national level standard processes • National mandate to coordinate and guide all states in their response and management setup • Recent Success – Orissa (Phailin) and AP (Lehar) • Challenge - communication, post-incident response Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 45. One Bright Example - NDMA • Before the NDMA • Many deaths • Unorganized response • Could we ever evacuate • Of course NDMA did not spring up overnight – it was formed in December 2005 and has come a long way Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 46. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 47. Taking a Look At Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 48. Way Ahead • Cyber Security must be entrusted (at national level) to one authority and organization • PMO / President should be designated as C-in-C as this is a frontier, a battleground • Cybercrime, Terrorism, War, Attacks, Espionage, Reputation, Information Exchange, Development of Offensive Capabilities et al cannot be decided upon by the NCSC Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 49. Commander in Chief PM / President Second Line of Command (Operational and Strategic) NSA NCSC Defence Chief of Staff CERT Head of Intelligence MHA LEA, Industry Rep & Bodies Cyber Security Organizations and Organizations with Cyber Command Centers State Cyber Security Centers Sectoral CERTs NTRO(cyber) NCIIPC IB, RAW, NIA, DIA Academia Participants Defense CERTs, DIA, DRDO etc CyberCrime Police Stations CCTNS, NATGRID Information & Data Library Online Battalions Continuing Education & Training General areas n.e.s. Control and Operational Areas (national and state level) Capacity Building Capability Building Education and Training Citizen Outreach Sectoral Departments Critical Infrastructure International Relations Policy & Regulations Offensive and Defensive Intelligence Gathering Knowledge Repository Domestic Relationships Risk Advisories Research and Development Public Private Partnership Public Relations Talent Identification Security Clearance Think Tank Testing Group Responsible Disclosure Reporting and Measurement Audit, Risk, Technology Field Organizations and Teams CERT Incident Response Awareness, Education, Training Governance in CyberCrime Investigation & Cyber Security Organizations Skill Development Developers Embedded Cyber Patrollers CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 50. Way Ahead • Organization will be responsible for every aspect of cyber security • • • • • • • Policy and regulations Advisories and Information sharing systems State level organizations – mandate and operations Cyber Defense Command Armed Forces cyber security organizations National and sectoral CERT National Critical Infrastructure Protection Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 51. Way Ahead • Build capacity and capability • Secure national and state infrastructure • Raise awareness of cybersecurity needs • Learn what is coming up – or what will come • So who will own this defence organization ? MHA or MOD ? Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 52. This is a peek into the Future what’s coming up ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 53. BAD Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 54. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 55. Dinesh O. Bareja, CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM • Professional Positions • • • • Pyramid Cyber Security & Forensics (Principal Advisor) Open Security Alliance (Principal and CEO) Jharkhand Police (Cyber Security Advisor) Indian Honeynet Project (Co Founder) • Professional skills and special interest areas • Security Consulting and Advisory services for IS Architecture, Analysis, Optimization.. • Technologies: SOC, DLP, IRM, SIEM… • Practices: Incident Response, SAM, Forensics, Regulatory guidance.. • Community: mentoring, training, citizen outreach, India research.. • Opinioned Blogger, occasional columnist, wannabe photographer Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 56. Contact Information E dinesh@opensecurityalliance.org @bizsprite +91.9769890505 dineshobareja L: http://in.linkedin.com/in/dineshbareja dineshobareja References http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/ Acknowledgements & Disclaimer Various resources on the internet have been referred to contribute to the information presented. Images have been acknowledged (above) where possible. Any company names, brand names, trade marks are mentioned only to facilitate understanding of the message being communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this would be wholly unintentional, and objections may please be communicated to us for remediation of the erroneous action(s). Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai