SlideShare a Scribd company logo
1 of 36
Download to read offline
SACON
SACON	International	2017
India	|	Bangalore	|	November	10	– 11	|	Hotel	Lalit Ashok
Cyber	Risk	Assessment	– Bayesian	
Network
R	Venkatasubramanian
Head	of	Information	Risk	Management)
Cognizant	Technology	Solutions
SACON 2017
The	Problem	with	Heat	
Maps
(C)	Ramakrishnan	Venkatasubramanian	2017 2
SACON 2017
The	Problem	with	Heat	Maps
• Tony	Cox	Jr.,	(Ph.D.	in	Risk	Analysis	from	MIT),	has	probably	studied	risk	
matrices	more	than	anyone	else
• His	findings:
• “…there	is	not	a	single	study	indicating	that	the	use	of	such	methods	actually	helps	reduce	risks”
• "…the	proliferation	of	such	methods	may	well	be	due	entirely	to	their	perceived	benefits	and	yet	
have	no	objective	value”	
• Risk	matrices	could	even	be	worse	than	randomly	prioritized	risks
• His	conclusion:
• Risk	matrices	are	often	"worse	than	useless"	
3 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
The	Range	Compression	Problem
Risk	A:	Likelihood	is	50%,	impact	is	$9	million	à 50%	*	$9	million	=	$4.5	million
Risk	B:	likelihood	is	60%,	impact	$2	million	à 60%	*	$2	million	=	$1.2	million
Risk	A	>	Risk	B	but	Risk	A	is	Medium	and	B	is	High
4 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Other	Problems	with	Heat	Maps
• The	scales	(buckets)	are	chosen	arbitrary	but	their	choice	impacts	the	response.		
For	example:	on	a	scale	of	1	to	5,	"1"	will	be	chosen	more	often	than	on	a	scale	
of	1-10	even	if	"1"	is	defined	exactly	the	same”
• Interpretations	vary	significantly.	For	example	"Very	likely"	was	found	to	be	
ranging	from	43%	to	99%.
• Sometimes	ordinal	scales	for	likelihood	don't	even	define	the	reference	time	
period	(Like	yearly	etc.).
• Direction	of	scale	(	5	is	high	or	5	is	low	affects	response).
• Anchoring:	Just	thinking	of	a	number	prior	to	analysis	impacts	the	choices.	You	
think	of	a	high	number	you	end	up	choosing	higher	ratings.
• Other	cognitive	biases:	Availability	Heuristics,	Gambler's	Fallacy,	Optimism	
Bias,	Confirmation	Bias,	Framing,	Overconfidence…
5 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Uncertainty,	Probability	&	
Bayes	Theorem
(C)	Ramakrishnan	Venkatasubramanian	2017
Embrace	Uncertainty
6
SACON 2017
• Would	Stock	A	move	up	by	20%	in	the	next	1	year?
• Which	movie	should	we	watch	next?		
• Can	I	come	home	safely?
• From	search	engine	or	online	retailers	perspective:
• Which	web	page	is	D	trying	to	find?	
• Which	link	will	E	click	on?		
• What	kind	of	product	does	F	wish	to	buy?		
• What	gesture	is	G	making?
• Many	others	…
Uncertainty	everywhere
7 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Aleatory	uncertainty	- Uncertainty	that	comes	from	a	random	process.	
• Flipping	a	coin	and	predicting	either	HEADS	or	TAILS	is	aleatory	uncertainty.	
• In	other	words,	the	uncertainty	we	are	observing	is	random,	it	is	part	of	the	natural	processes	of	what	we	
are	observing.
Epistemic	uncertainty	- Uncertainty	that	comes	from	the	lack	of	knowledge.	
• This	lack	of	knowledge	comes	from	many	sources.	Inadequate	understanding	of	the	underlying	processes,	
incomplete	knowledge	of	the	phenomena,	or	imprecise	evaluation	of	the	related	characteristics	are	
common	sources	of	epistemic	uncertainty.
• In	other	words,	we	don't	know	how	this	thing	works	so	there	is	uncertainty	about	its	operation
Types	of	Uncertainty
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
How	can	we	quantify	uncertainty	in	a	principled	way?
PROBABILITY
Two	views	of	probability
• Frequency:	limit	of	infinite	number	of	trials		
• Bayesian:	quantification	of	uncertainty
Handling	Uncertainty
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Probability	vs.	Possibility
• Possibility is	“binary":	something	is	possible	or	it	is	not.
• Probability is	a	continuum	addressing	the	area	between	certainty	and	impossibility.
Risk	management	deals	with	probability	as	it	deals	with	future	events	that	
always	have	some	amount	of	uncertainty.
Probability Possibility
There	is	a	50%	chance	of	rain	
between	10am	and	2pm	today
It’s	possible	it	could	rain	today
The	chance	of	being	killed	by	a	
shark	is	one	in	300	million
It’s	possible	we	could	be	killed	by	
a	shark	when	swimming
10 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Which	of	these	is	the	most	likely	sequence	from	tossing	a	fair	coin	16	times?
T T T T T T T T T T T T T T T T
T H H H H H H H HT T T T T T T
Let’s	Play
11 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
• What	is	the	probability	of	at	least	2	people	out	of	23	having	the	same	birthday?				
• 8%
• 51%
• 2%
• 14%
• What	is	the	chance	of	people	choosing	same	number	from	1	to	100	out	of	20	people?
• 87%
• 51%
• 5%
• 10%
• 1	in	1,000	system	have	vulnerability	say	D	.	A	test	for	vulnerability	D	is	100%	accurate	for	
systems	that	have	the	vulnerability	and	95%	accurate	for	those	not...
Your	system	received	a	positive	test	result.	What	is	the	probability	you	have	vulnerability	D	?
• 95%
• 5%
• 90%
• 2%
Let’s	Play
12 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
The	Rules	of	Probability
Sum	Rule
Product	Rule
Bayes	Theorem
Normalization	Constant
13 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
= 𝑃 𝑥 𝑦 𝑃(𝑦)
𝑃 𝑦 𝑥 =
𝑃 𝑥 𝑦 𝑃(𝑦)
𝑃(𝑥)
prior
𝑃 𝑥, 𝑦 = 𝑃 𝑦 𝑥 𝑃 𝑥
likelihood
posterior
Prior – belief	before	making	a	particular	obs.
Posterior – belief	after	making	the	obs.		Posterior	is	the	
prior	for	the	next	observation
– Intrinsically	incremental
Bayes	Theorem
14 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Now	for	a	Whodunit…
(C)	Ramakrishnan	Venkatasubramanian	2017 15
SACON 2017
A	murder	mystery
A	fiendish	murder	has	been	committed		
Whodunit?
There	are	two	suspects:
• the	Butler
• the	Cook
There	are	three	possible	murder	weapons:
• a	butcher’s	knife
• a	pistol
• a	fireplace	poker
16 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Prior	distribution
Culprit	=	{Butler,	Cook}
P(Culprit)
Butler	has	served	family	well	for	many	years.
Cook	hired	recently,	rumours	of	dodgy	history
P(Culprit = Butler) = 20% P(Culprit = Cook) = 80%
Probabilities add to 100%
17 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Conditional	distribution
Butler	is	ex-army,	keeps	a	gun	in	a	locked	drawer		
Cook	has	access	to	lots	of	knives
Butler	is	older	and	getting	frail
P(Weapon	| Culprit)
Prior		distribution
P(Culprit)
Culprit = {Butler, Cook}
P(Weapon	| Culprit)
Weapon	=	{Pistol,	Knife,
Poker}
Conditional		
distribution
18 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Joint	distribution
What	is	the	probability	that	the	Cook	committed		the	murder	
using	the	Pistol?
P(Culprit	=	Cook)	=	80%
P(Weapon	=	Pistol	|	Culprit	=	Cook)	=	5%
P(Weapon	=	Pistol	,	Culprit	=	Cook)	=	80%	x	5%	=	4%
Likewise	for	the	other	five	combinations	of		Culprit	and	Weapon
19 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Joint	distribution
Product rule𝑃 𝑥, 𝑦 = 𝑃 𝑦 𝑥 𝑃(𝑥)
= 100%
P(Weapon,	Culprit)	=	P(Weapon	|	Culprit) P(Culprit)
Likewise	for	the	other	five	combinations	of		Culprit	and	Weapon
20 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Marginal	distribution	of	Culprit and	weapon
Sum rule
21 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
P(Culprit)
Culprit	=	{Butler, Cook}
P(Weapon	| Culprit)
Weapon	=	{Pistol,	Knife, Poker}
P(Weapon,	Culprit)	=	P(Weapon	|	Culprit) P(Culprit)
Generative model
Generative	model
Murderer Weapon
Cook Knife
Butler Knife
Cook Pistol
Cook Poker
Cook Knife
Butler Pistol
Cook Poker
Cook Knife
Butler Pistol
Cook Knife
… …
22 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Posterior	distribution
We	discover	a	Pistol	at	the	scene	of	the crime
=	20%
=	80%
This	looks	bad	for	the	Butler!
23 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Bayes	Theorem	to	
Probabilistic	Graphical	Model	
(Bayesian	Network)
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
What	is	Bayesian	Network	(BN)?
1. BNs,	also	known	as	belief	networks	(or	Bayes	nets,	for	short),	belong	to	the	family	of	probabilistic	
graphical	models	(PGMs).	
2. These	graphical	structures	are	used	to	represent	knowledge	about	an	uncertain	domain.	
3. PGMs	with	directed	edges	are	generally	called	a	directed	acyclic	graph	(DAG),	which	is	popular	in	
statistics,	machine	learning	and	artificial	intelligence.	
4. “A	BN	is	a	visual	description	of	the	relationships	between	cause	and	effect.	It	is	made	up	of	
nodes	and	arcs,	and	each	node	in	the	network	represents	a	variable,	and	the	arcs	represent	the	
causal	relationships	between	the	variables.”
5. BNs	use	Bayes’	theorem	to	compute	the	probabilities	in	the	model.	
25 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 201726
Why	Bayesian	Network?
Graphs	are	an	intuitive way	of	representing	and	visualising	the	relationships	between
many	variables.	(Examples:	family	trees,	electric	circuit	diagrams,	neural	networks)
A	graph	allows	us	to	abstract	out	the	conditional	independence	relationships	between
the	variables	from	the	details	of	their	parametric	forms.	Thus	we	can	ask	questions	like:
“Is	A	dependent	on	B	given	that	we	know	the	value	of	C	?”	just	by	looking	at	the
graph.
Graphical	models	allow	us	to	define	general	message-passing algorithms	that
implement	Bayesian	inference	efficiently.	Thus	we	can	answer	queries	like	“What
is	P(A|C	=	c)?”	without	enumerating	all	settings	of	all	variables	in	the	model.
Graphical	models	=	statistics	× graph	theory	× computer	science.
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Conditional	Independence	
(Key	to	Exploit	Graph	
Structure)
(C)	Ramakrishnan	Venkatasubramanian	2017 27
SACON 2017
Conditional	Independence
28 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Two	coins
Both heads
{true, false}
Coin 2
{H,T}
Coin 1
{H,T}
p(H)	= 1/2 p(H)	= 1/2
29 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
What	is	the	probability	of	two	heads?
Coin 2
{H,T}
Coin 1
{H,T}
p(H) = 1/2 p(H)	= 1/2
Generative model
Coin 1 T T H H
Coin 2 T H T H
Both heads false false false true
Both heads
{true, false}
p(true)	= 1/4
30 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Reasoning	backwards
Both heads
{true, false}
Coin 2
{H,T}
Coin 1
{H,T}
p(H)	= 1/3
p(H)	= 1/3
false
Inference
Coin 1 T T H
Coin 2 T H T
Both heads false false false tr e
Coin 2
{H,T}
Coin 1
{H,T}
Both	heads
{true,	false}
Coin 1 T T
Coin 2 T H
Both heads false false f
a
T
l
H
se tr e
H
H
u
false
tails p(H)	= 1/2
31
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Reasoning	backwards
Coin 2
{H,T}
Coin 1
{H,T}
p(H)	= 0
Coin 1
Coin 2
Both heads f
a
T
T
lse fal
T
H
se
H
T
false tr e
H
H
u
heads
“Explaining away”
false
Both	heads
{true,	false}
32 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Key	Inference	Algorithms
• The	Sum-Product	(Message	Passing)
• Junction	Tree
• Loopy	Belief	Propagation
• Variational	Message	Passing	
• MCMC
• Etc…
33 (C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Demo
• Bayesian	Update
• Simple	Risk	and	Control	
• ROI/ROSI
• Security	Breach
• Hacking	
• Security	Audit	
(C)	Ramakrishnan	Venkatasubramanian	2017 34
SACON 201735
Key	Takeaways
• Embrace	Uncertainty	using	theory	of	Probability	
• Probabilistic	risk	analysis	methods	inform	actionable	decisions.	
• Only	few	samples	are	required	when	our	uncertainty	is	high
• Domain	Expertise	matters	
For	further	details	refer	my	blogs	in	LinkedIn	and		ISACA	Paper
• https://www.linkedin.com/in/venkatasubramanian-ramakrishnan-5544b9/recent-activity/posts/
• https://www.isaca.org/Journal/Blog/Lists/Posts/Post.aspx?ID=338
Key	takeaways
(C)	Ramakrishnan	Venkatasubramanian	2017
SACON 2017
Thank	you
(C)	Ramakrishnan	Venkatasubramanian	2017 36

More Related Content

Viewers also liked

SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)Priyanka Aash
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Priyanka Aash
 
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)Priyanka Aash
 
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)Priyanka Aash
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)Priyanka Aash
 
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)Priyanka Aash
 
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)Priyanka Aash
 
SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)Priyanka Aash
 
SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)Priyanka Aash
 
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)Priyanka Aash
 
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)Priyanka Aash
 
James Altucher: 40 Alternatives To College
James Altucher: 40 Alternatives To CollegeJames Altucher: 40 Alternatives To College
James Altucher: 40 Alternatives To CollegeJamesAltucher
 
Making Meaningful Maps: Seeing Geography through Cartography
Making Meaningful Maps: Seeing Geography through CartographyMaking Meaningful Maps: Seeing Geography through Cartography
Making Meaningful Maps: Seeing Geography through Cartographyreroth
 
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)Russell Sloboda
 
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...Puppet
 
Ux e o Inconsciente - Odair Faléco
Ux e o Inconsciente - Odair FalécoUx e o Inconsciente - Odair Faléco
Ux e o Inconsciente - Odair FalécoOdair Faléco
 
Writing code you won't hate tomorrow
Writing code you won't hate tomorrowWriting code you won't hate tomorrow
Writing code you won't hate tomorrowRafael Dohms
 

Viewers also liked (20)

SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)SACON - Immutable architecture (Nilanjan De)
SACON - Immutable architecture (Nilanjan De)
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)SACON - Automating SecOps (Murray Goldschmidt)
SACON - Automating SecOps (Murray Goldschmidt)
 
SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)SACON - Threat hunting (Chandra Prakash)
SACON - Threat hunting (Chandra Prakash)
 
SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)SACON - Mobile App Security (Srinath Venkataramani)
SACON - Mobile App Security (Srinath Venkataramani)
 
SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)SACON - Enterprise Security Architecture (Bikash Barai)
SACON - Enterprise Security Architecture (Bikash Barai)
 
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
Sacon - Fresh Thinking IoT (Arnab Chattopadhayay)
 
SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)SACON - Cloud Security Architecture (Moshe Ferber)
SACON - Cloud Security Architecture (Moshe Ferber)
 
SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)SecOps Workshop (Gregory Pickett)
SecOps Workshop (Gregory Pickett)
 
SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)SACON - Windows Forensic (Dr. Phil Polstra)
SACON - Windows Forensic (Dr. Phil Polstra)
 
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)SACON - Threat Hunting Workshop (Shomiron Das Gupta)
SACON - Threat Hunting Workshop (Shomiron Das Gupta)
 
James Altucher: 40 Alternatives To College
James Altucher: 40 Alternatives To CollegeJames Altucher: 40 Alternatives To College
James Altucher: 40 Alternatives To College
 
Making Meaningful Maps: Seeing Geography through Cartography
Making Meaningful Maps: Seeing Geography through CartographyMaking Meaningful Maps: Seeing Geography through Cartography
Making Meaningful Maps: Seeing Geography through Cartography
 
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)
Integration of Risk Assessment and Chemical Characterization (MD&M Minn. 2017)
 
Building websites for all
Building websites for allBuilding websites for all
Building websites for all
 
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...
PuppetConf 2017: Custom Types & Providers: Modeling Modern REST Interfaces an...
 
Ux e o Inconsciente - Odair Faléco
Ux e o Inconsciente - Odair FalécoUx e o Inconsciente - Odair Faléco
Ux e o Inconsciente - Odair Faléco
 
Writing code you won't hate tomorrow
Writing code you won't hate tomorrowWriting code you won't hate tomorrow
Writing code you won't hate tomorrow
 
Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9Audit Risk Assessment Chapter 9
Audit Risk Assessment Chapter 9
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

SACON - Cyber Risk Assessment Using Bayesian Network (R Venkat)