SlideShare a Scribd company logo
K J Somaiya Institute of Management, India
CEPAR 9th Annual International
Conference
Cyber Security –Need of the hour
Nanda Mohan Shenoy
Feb 4th 2023
1
K J Somaiya Institute of Management, India
Cyber-The Top Technological Risk
2
K J Somaiya Institute of Management, India 3
578 ransomware
attacks each
minute.
55260 username
and password
attacks
One Minute Impact
K J Somaiya Institute of Management, India
Davos-2023
4
K J Somaiya Institute of Management, India
Russia China North
Korea
Cyber Warfare
5
K J Somaiya Institute of Management, India
India Story
6
K J Somaiya Institute of Management, India 7
India Story
7
K J Somaiya Institute of Management, India 8
2021
52,974 incidents of cyber crimes in 2021
Cyber Crime Statistics
8
K J Somaiya Institute of Management, India
The Secretary, Ministry of Electronics and Information Technology
(MeitY), Shri Alkesh Kumar Sharma inaugurated the G20 Cyber Security
Exercise and Drill for more than 400 domestic and international
participants under India’s G20 presidency, here yesterday.
The Indian Computer Emergency Response Team (CERT-In) conducted this
Cyber Security Exercise and drill in hybrid mode (Physical and Virtual)
where international participants from more than 12 countries joined
through online mode while domestic participants from diverse sectors such
as Finance, Education, Telecom, Ports & Shipping, Energy, IT/ITeS and
others attended in-person as well as in virtual mode.
International Co-operation
9
K J Somaiya Institute of Management, India
Protection
10
K J Somaiya Institute of Management, India
क्लिक कर
11
Fundamental Principle
11
K J Somaiya Institute of Management, India
https://cybercrime.gov.in/
“Since the inception of Citizen
Financial Cyber Fraud Reporting and
Management System, more than 6
lakh complaints have been registered
till December 12, 2022, and in more
than 1.11 lakh complaints so far, the
financial amount of more than Rs188
crore have been saved,” Teni said in
a written reply to BJP MPs Tejasvi
Surya and Pratap Simha.
CFCRM
12
K J Somaiya Institute of Management, India
▪ What is wonder?
▪ Day after day countless people
die. Yet the living wish to live
forever. O Lord, what can be a
greater wonder
▪ Day after day countless cyber
attacks happen . Yet the Top
Management thinks that their
organisation will not be
attacked. O Lord, what can be a
greater wonder than this
Conclusion
13
13
K J Somaiya Institute of Management, India
Thank You
simsr.somaiya.edu
14

More Related Content

Similar to CEPAR Conference _20230204.pdf

Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
journal ijrtem
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
ShivamSharma909
 
Fee management system
Fee management systemFee management system
Fee management system
Cyber Security Infotech Pvt. Ltd.
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
IAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
IAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
IAEME Publication
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arising
IAEME Publication
 
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENTNOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
Bobby Murugesan
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
sadique_ghitm
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Dr. Amarjeet Singh
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
Sandeep Shukla
 
Latest technology news
Latest technology newsLatest technology news
Latest technology news
VARIndiaManishYadav
 
Varindia var india
Varindia var indiaVarindia var india
Varindia var india
VARIndiaManishYadav
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
paperpublications3
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
Chinatu Uzuegbu
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
Gyan Research And Analytics
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
eletseditorial
 
Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016
Rajiv Bajaj
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
Ashish Jhalani
 

Similar to CEPAR Conference _20230204.pdf (20)

Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Fee management system
Fee management systemFee management system
Fee management system
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arising
 
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENTNOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
NOTES FOR CYBER SECURITY INITIATIVES BY THE INDIAN GOVERNMENT
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Latest technology news
Latest technology newsLatest technology news
Latest technology news
 
Varindia var india
Varindia var indiaVarindia var india
Varindia var india
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 

More from Nanda Mohan Shenoy

Srimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdfSrimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdf
Nanda Mohan Shenoy
 
D07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdfD07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdfD06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdfD05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdfD04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdfD03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdfD02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
D01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdfD01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdf
Nanda Mohan Shenoy
 
09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx
Nanda Mohan Shenoy
 
03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf
Nanda Mohan Shenoy
 
02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf
Nanda Mohan Shenoy
 
Digitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedbackDigitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedback
Nanda Mohan Shenoy
 
IS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptxIS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptx
Nanda Mohan Shenoy
 
F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6
Nanda Mohan Shenoy
 

More from Nanda Mohan Shenoy (20)

Srimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdfSrimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdf
 
D07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdfD07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdf
 
D06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdfD06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdf
 
D05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdfD05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdf
 
D04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdfD04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdf
 
D03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdfD03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdf
 
D02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdfD02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdf
 
D01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdfD01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdf
 
09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf
 
08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf
 
07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf
 
06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf
 
05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf
 
04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx
 
03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf
 
02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf
 
01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf
 
Digitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedbackDigitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedback
 
IS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptxIS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptx
 
F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6
 

Recently uploaded

Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
maigasapphire
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
ZachWylie3
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
Priyanka Aash
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
bellared2
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
Bhajan Mehta
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
SelfMade bd
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
siddu769252
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
FIDO Alliance
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
SubhamMandal40
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
softsuave
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
DianaGray10
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
KIRAN KV
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
Zilliz
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
Arpan Buwa
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
David Wilson
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
DianaGray10
 

Recently uploaded (20)

Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
Girls Call Churchgate 9910780858 Provide Best And Top Girl Service And No1 in...
 
Camunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptxCamunda Chapter NY Meetup July 2024.pptx
Camunda Chapter NY Meetup July 2024.pptx
 
Finetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and DefendingFinetuning GenAI For Hacking and Defending
Finetuning GenAI For Hacking and Defending
 
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
Russian Girls Call Navi Mumbai 🎈🔥9920725232 🔥💋🎈 Provide Best And Top Girl Ser...
 
Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17Mule Experience Hub and Release Channel with Java 17
Mule Experience Hub and Release Channel with Java 17
 
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdfLeadMagnet IQ Review:  Unlock the Secret to Effortless Traffic and Leads.pdf
LeadMagnet IQ Review: Unlock the Secret to Effortless Traffic and Leads.pdf
 
Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024Generative AI Reasoning Tech Talk - July 2024
Generative AI Reasoning Tech Talk - July 2024
 
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
UX Webinar Series: Essentials for Adopting Passkeys as the Foundation of your...
 
Sonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdfSonkoloniya documentation - ONEprojukti.pdf
Sonkoloniya documentation - ONEprojukti.pdf
 
Step-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From ScratchStep-By-Step Process to Develop a Mobile App From Scratch
Step-By-Step Process to Develop a Mobile App From Scratch
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision MakingConnector Corner: Leveraging Snowflake Integration for Smarter Decision Making
Connector Corner: Leveraging Snowflake Integration for Smarter Decision Making
 
kk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdfkk vathada _digital transformation frameworks_2024.pdf
kk vathada _digital transformation frameworks_2024.pdf
 
It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...It's your unstructured data: How to get your GenAI app to production (and spe...
It's your unstructured data: How to get your GenAI app to production (and spe...
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and CitiesThe Impact of the Internet of Things (IoT) on Smart Homes and Cities
The Impact of the Internet of Things (IoT) on Smart Homes and Cities
 
Mastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for SuccessMastering OnlyFans Clone App Development: Key Strategies for Success
Mastering OnlyFans Clone App Development: Key Strategies for Success
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3Communications Mining Series - Zero to Hero - Session 3
Communications Mining Series - Zero to Hero - Session 3
 

CEPAR Conference _20230204.pdf

  • 1. K J Somaiya Institute of Management, India CEPAR 9th Annual International Conference Cyber Security –Need of the hour Nanda Mohan Shenoy Feb 4th 2023 1
  • 2. K J Somaiya Institute of Management, India Cyber-The Top Technological Risk 2
  • 3. K J Somaiya Institute of Management, India 3 578 ransomware attacks each minute. 55260 username and password attacks One Minute Impact
  • 4. K J Somaiya Institute of Management, India Davos-2023 4
  • 5. K J Somaiya Institute of Management, India Russia China North Korea Cyber Warfare 5
  • 6. K J Somaiya Institute of Management, India India Story 6
  • 7. K J Somaiya Institute of Management, India 7 India Story 7
  • 8. K J Somaiya Institute of Management, India 8 2021 52,974 incidents of cyber crimes in 2021 Cyber Crime Statistics 8
  • 9. K J Somaiya Institute of Management, India The Secretary, Ministry of Electronics and Information Technology (MeitY), Shri Alkesh Kumar Sharma inaugurated the G20 Cyber Security Exercise and Drill for more than 400 domestic and international participants under India’s G20 presidency, here yesterday. The Indian Computer Emergency Response Team (CERT-In) conducted this Cyber Security Exercise and drill in hybrid mode (Physical and Virtual) where international participants from more than 12 countries joined through online mode while domestic participants from diverse sectors such as Finance, Education, Telecom, Ports & Shipping, Energy, IT/ITeS and others attended in-person as well as in virtual mode. International Co-operation 9
  • 10. K J Somaiya Institute of Management, India Protection 10
  • 11. K J Somaiya Institute of Management, India क्लिक कर 11 Fundamental Principle 11
  • 12. K J Somaiya Institute of Management, India https://cybercrime.gov.in/ “Since the inception of Citizen Financial Cyber Fraud Reporting and Management System, more than 6 lakh complaints have been registered till December 12, 2022, and in more than 1.11 lakh complaints so far, the financial amount of more than Rs188 crore have been saved,” Teni said in a written reply to BJP MPs Tejasvi Surya and Pratap Simha. CFCRM 12
  • 13. K J Somaiya Institute of Management, India ▪ What is wonder? ▪ Day after day countless people die. Yet the living wish to live forever. O Lord, what can be a greater wonder ▪ Day after day countless cyber attacks happen . Yet the Top Management thinks that their organisation will not be attacked. O Lord, what can be a greater wonder than this Conclusion 13 13
  • 14. K J Somaiya Institute of Management, India Thank You simsr.somaiya.edu 14