SlideShare a Scribd company logo
Get ahead of cybersecurity
Tiffy Isaac,
Partner, EY LLP
Page 2
Agenda
► Introduction
► The cyber threat landscape
► What are organizations doing?
► Get ahead of cybercrime
Page 3
Introduction
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems
and sensors, interacting with it to generate meaningful results and convenience to the end-user community.
New
business
opportunit
ies
Improved
decision-
making
Safety
and
security
Improved
citizen
experience
Cost
reductions
Potential for
business
revenue
growth
Opportunities does IoT offer?
What will be future…
The ever-expanding IoT world
Smart life Smart mobility
Smart city Smart manufacturing
Page 4
Some facts…
The cloud provides a platform for IoT to flourish, however, there are still many challenges.
With the plethora of data that they will hold, storage servers will have to be updated and secured all
the time.
According to industry estimates,
machine-to-machine communications
alone will generate approximately
US$900 billion in revenues by 2020.
India is planning to invest approximately
US$11 billion for developing 100 smart
cities. A draft policy framework document
of IoT was released in October 2014 by
the Indian government.
The interconnectivity of people, devices and organizations opens up new vulnerabilities.
$
New technologies, regulatory pressure and changing business requirements call for more security
measures.
Per EY’s 17th Global Information Security Survey 2014, which captures the responses of 1,825 C-
suite leaders and information security and IT executives/managers - 56% of respondents say that it
is “unlikely or highly unlikely” that their organization would be able to detect a sophisticated attack.
Page 5
IOT will affect different business sectors
Healthcare
Personal information that could tell medics not
only about individuals’ medical history, but also
about potential diseases
Sensors and microcomputers fitted in the
human body that could monitor health
conditions and even alarm emergency
services in case of any distress
.
Education
IoT in the education sector has already
started to make the conventional education
system more automated
Internet-enabled remote classrooms will be a
milestone for developing countries, making
deep penetration in areas where setting up a
traditional school infrastructure is not possible.
.
Financial Services
Financial services are already leveraging the
internet for many of their services.
Improvement in digital infrastructure and IoT-
enabled products could further lead the growth of
the financial sector, with innovations, such as smart
wearable and smart monitoring devices, helping
customers to keep better track of their money.
Telcos
Telcos could face a surge in data usage due
to IoT-enabled devices, thus raising their
ARPU (average revenue per user), while on
the other hand, they will also have to deal with
some concerns, such as privacy and
infrastructure security.
Page 6
E.g. Connected car and cyber security
Context
Triggers
Question
Response
How can automotive sector organization keep up with the changing
vulnerability landscape, while many are lagging in establishing
foundational cybersecurity practices?
Traditional IT security
measures are no longer
enough
Research shows that attacks
on vehicles are possible
Today’s attackers are
organized, well funded,
patient and sophisticated
key imperatives need to be followed by the
automotive industry to embrace connectivity, and
at the same time ensure IT security
Automakers launch several connectivity offerings, the
interconnectivity of people, devices and organizations
opens up new vulnerabilities. However, …
Page 7
Recent academic research and dummy hacking trials on connected
cars have shaken the confidence of regulators and consumers
Details of hacking Action taken by the
automaker/affected brand
Brand
affected
A team from the Defense Advanced Research Projects
Agency (DARPA), demonstrated how it was able to wirelessly
hack into the computer systems and take over several
functions, including the brakes of a Chevrolet Impala during a
controlled situation
GM is developing a fix for its OnStar
telematics system in light of the
cyberattack
ADAC, a German motoring association, found they could lock
and unlock car doors by mimicking mobile communications
and sending signals to a SIM card installed in affected
vehicles
BMW sent over-the-air out software
patches to the 2.2 million cars
equipped with Connected Drive to
prevent similar breakages in future
Sources: News articles, EY analysis
Recent examples of dummy hacking by researchers
Page 8
The cyber threat landscape
Page 9
EY GISS 2014 results: “Who or what do you consider the
most likely source of an attack?”
41%
46%
27%
53%
14%
12%
10%
35%
57%
Lone wolf hacker
Hacktivists
State sponsored attacker
Criminal syndicates
Other business partner
Supplier
Customer
External contractor working on our site
Employee
Respondents were asked to choose all that apply.
Page 10
EY GISS 2014 results: “Which threats & vulnerabilities have
increased your risk exposure over the last 12 months?”
Respondents were asked to select any five of these items, with 1 as the highest priority, down to 5 as their lowest priority
Page 11
The roadblocks facing today’s organizations
43%
of respondents say that their organization’s total
information security budget will stay approximately the
same in the coming 12 months and a further 5% said
that their budget will actually decrease.
53%
of organizations say that lack of skilled resources
is one of the main obstacles that challenge their
information security.
Roadblock 1 — Lack of agility
Roadblock 2 — Lack of budget
Roadblock 3 — Lack of cybersecurity skills
Page 12
It is not easy to get ahead of cybercrime
Getting aheadCybersecurity
function
Page 13
What are organizations doing?
Page 14
What are organizations doing?
► Designing and implementing a cyber threat intelligence strategy to support strategic
business decisions and leverage the value of security
► Defining and encompassing the organizations extended cybersecurity ecosystem,
including partners, suppliers, services and business networks
► Know your Crown Jewels - Taking a cyber economic approach — understanding your
vital assets and their value, and investing specifically in their protection
► Use forensic data analytics and cyber threat intelligence to analyze and anticipate
where the likely threats are coming from and when, increasing your readiness
Page 15
How do you get ahead of cybercrime?
… A 3-stage improvement process
To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement
process:
► Activate (a foundational approach)
► Organizations need to establish and improve the solid foundations of their cybersecurity)
► Adapt (a dynamic approach)
► Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to
be able to adapt to changing requirements)
► Anticipate (a proactive approach)
► Organizations need to make efforts to predict what is coming so they can be better prepared for the
inevitable cyber attacks)
Page 16
Activate. Adapt. Anticipate. Where are you?
Activate Adapt Anticipate
Page 17
Activate: the need to establish foundations
Organizations in this level
can only deal with threats
in a world without change
Page 18
Adapt: a dynamic approach
If an organization
doesn’t adapt, its
cybersecurity
foundation will quickly
be obsolete.
Page 19
Anticipate: a proactive state of readiness
‘Anticipate’ means embracing cybersecurity as a core aspect of the
business and being in a proactive state of readiness
value
Page 20
Vital to foundational cybersecurity –
a Security Operations Center
A Security Operations Center (SOC) centralizes, structures and coordinates the processes and
technology that support the Information Security function. It is therefore concerning that:
► Over 40% of organizations surveyed do not have a SOC.
Of those that do:
► Over half of respondents did not know how well their SOC met business operations’ needs
► Over 50% do not know how their SOC stays up to date with the latest threats
► The technology infrastructure and endpoints of the SOC need to be improved.
If more of the benefits of a SOC were being realized, then the general ability of an organization to protect
itself in even the most basic functions would start to deliver benefits.
37%
say that real time insight on
cyber risk is not available.
42%
of organizations do not have
a SOC.
33%
4%
13%
13%
25%
12%
Unknown
Longer than 1 day
Within 1 day
Within 4 hours
Within 1 hour
Within 10 minutes
EY GISS 2014 results: How long on average does it
take for your SOC to initiate an investigation on
discovered/ alerted incidents?
Page 21
…..get ahead of cybercrime
Page 22
Take the initiative to get ahead of cybercrime
Thank you….
Page 23
Focus on 3 As…
1. Conduct a cyber threat assessment
and design an implementation
roadmap
2. Get Board-level support for a
security transformation
3. Review and update security policies,
procedures and supporting
standards
► Implement an information
security management system
4. Establish a Security Operations
Center (SOC)
► Develop monitoring and incident
response procedures
5. Design and implement cybersecurity
controls
► Assess the effectiveness of data
loss prevention and identity and
access management processes.
► Harden the security of IT assets.
6. Test business continuity plans and
incident response procedures
1. Design and implement a
transformation program
► Get external help in designing
the program, and providing
program management.
2. Decide what to keep in-house and
what to outsource
3. Define a RACI matrix for
cybersecurity
4. Define the organization’s
ecosystem
► Make moves to eliminate or
lessen potential security gaps
in your interaction with third
parties
5. Introduce cybersecurity awareness
training for employees
1. Design and implement a cyber threat
intelligence strategy
► Use threat intelligence to support
strategic business decisions
2. Define and encompass the
organization’s extended cybersecurity
ecosystem
► Define RACI and trust models
and enact cooperation, sharing
capabilities where advantageous
3. Take a cyber economic approach
► Understand the value of your
most vital cyber assets
4. Use forensics and analytics
► Use the latest technical tools to
analyze where the likely threats
are coming from and when
5. Ensure everyone understands what’s
happening
► Strong governance, user controls
and regular communications
Adapt - take action to improve
and transform
Anticipate: take action -
and get ahead
Activate: the need to establish
foundations

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
cyber crime
cyber crimecyber crime
cyber crime
Nauman Ali
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
Varun Mathur
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Greater Noida Institute Of Technology
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
Kunal Sinha
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
Phil Agcaoili
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
Saman Sara
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
John Palfreyman
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
Fettah Kurtulus
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 

Viewers also liked

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
IBMGovernmentCA
 
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crimeDanish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Kevin Duffey
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
Jacqueline Fick
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
Saurabh Kheni
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
Jacqueline Fick
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
Defence and Security Accelerator
 
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Kevin Duffey
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
asafeiran
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organization
asafeiran
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
Heimdal Security
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Keith Kraus
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
asafeiran
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
Shahid Hussain Raja
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Bill Harpley
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Knowledge Group
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
Bill Harpley
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
Tripwire
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
Ramiro Cid
 
Agriculture Robot report
Agriculture Robot reportAgriculture Robot report
Agriculture Robot report
Radhe Chauhan
 

Viewers also liked (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
 
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crimeDanish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organization
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Agriculture Robot report
Agriculture Robot reportAgriculture Robot report
Agriculture Robot report
 

Similar to Get Ahead of Cyber Security by Tiffy Issac, Partner EY India

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
ebuc
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
Ulf Mattsson
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
International Federation of Accountants
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
FinTech Consortium
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
Samantha Wagner
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
Kevin Leffew
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
Self
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
Cognizant
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
DIGITALCONFEX
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 

Similar to Get Ahead of Cyber Security by Tiffy Issac, Partner EY India (20)

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 

More from Rahul Neel Mani

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
Rahul Neel Mani
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
Rahul Neel Mani
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
Rahul Neel Mani
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
Rahul Neel Mani
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
Rahul Neel Mani
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Rahul Neel Mani
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Rahul Neel Mani
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Rahul Neel Mani
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
Rahul Neel Mani
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
Rahul Neel Mani
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
Rahul Neel Mani
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
Rahul Neel Mani
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
Rahul Neel Mani
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
Rahul Neel Mani
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Rahul Neel Mani
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
Rahul Neel Mani
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Rahul Neel Mani
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
Rahul Neel Mani
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
Rahul Neel Mani
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
Rahul Neel Mani
 

More from Rahul Neel Mani (20)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India

  • 1. Get ahead of cybersecurity Tiffy Isaac, Partner, EY LLP
  • 2. Page 2 Agenda ► Introduction ► The cyber threat landscape ► What are organizations doing? ► Get ahead of cybercrime
  • 3. Page 3 Introduction Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. New business opportunit ies Improved decision- making Safety and security Improved citizen experience Cost reductions Potential for business revenue growth Opportunities does IoT offer? What will be future… The ever-expanding IoT world Smart life Smart mobility Smart city Smart manufacturing
  • 4. Page 4 Some facts… The cloud provides a platform for IoT to flourish, however, there are still many challenges. With the plethora of data that they will hold, storage servers will have to be updated and secured all the time. According to industry estimates, machine-to-machine communications alone will generate approximately US$900 billion in revenues by 2020. India is planning to invest approximately US$11 billion for developing 100 smart cities. A draft policy framework document of IoT was released in October 2014 by the Indian government. The interconnectivity of people, devices and organizations opens up new vulnerabilities. $ New technologies, regulatory pressure and changing business requirements call for more security measures. Per EY’s 17th Global Information Security Survey 2014, which captures the responses of 1,825 C- suite leaders and information security and IT executives/managers - 56% of respondents say that it is “unlikely or highly unlikely” that their organization would be able to detect a sophisticated attack.
  • 5. Page 5 IOT will affect different business sectors Healthcare Personal information that could tell medics not only about individuals’ medical history, but also about potential diseases Sensors and microcomputers fitted in the human body that could monitor health conditions and even alarm emergency services in case of any distress . Education IoT in the education sector has already started to make the conventional education system more automated Internet-enabled remote classrooms will be a milestone for developing countries, making deep penetration in areas where setting up a traditional school infrastructure is not possible. . Financial Services Financial services are already leveraging the internet for many of their services. Improvement in digital infrastructure and IoT- enabled products could further lead the growth of the financial sector, with innovations, such as smart wearable and smart monitoring devices, helping customers to keep better track of their money. Telcos Telcos could face a surge in data usage due to IoT-enabled devices, thus raising their ARPU (average revenue per user), while on the other hand, they will also have to deal with some concerns, such as privacy and infrastructure security.
  • 6. Page 6 E.g. Connected car and cyber security Context Triggers Question Response How can automotive sector organization keep up with the changing vulnerability landscape, while many are lagging in establishing foundational cybersecurity practices? Traditional IT security measures are no longer enough Research shows that attacks on vehicles are possible Today’s attackers are organized, well funded, patient and sophisticated key imperatives need to be followed by the automotive industry to embrace connectivity, and at the same time ensure IT security Automakers launch several connectivity offerings, the interconnectivity of people, devices and organizations opens up new vulnerabilities. However, …
  • 7. Page 7 Recent academic research and dummy hacking trials on connected cars have shaken the confidence of regulators and consumers Details of hacking Action taken by the automaker/affected brand Brand affected A team from the Defense Advanced Research Projects Agency (DARPA), demonstrated how it was able to wirelessly hack into the computer systems and take over several functions, including the brakes of a Chevrolet Impala during a controlled situation GM is developing a fix for its OnStar telematics system in light of the cyberattack ADAC, a German motoring association, found they could lock and unlock car doors by mimicking mobile communications and sending signals to a SIM card installed in affected vehicles BMW sent over-the-air out software patches to the 2.2 million cars equipped with Connected Drive to prevent similar breakages in future Sources: News articles, EY analysis Recent examples of dummy hacking by researchers
  • 8. Page 8 The cyber threat landscape
  • 9. Page 9 EY GISS 2014 results: “Who or what do you consider the most likely source of an attack?” 41% 46% 27% 53% 14% 12% 10% 35% 57% Lone wolf hacker Hacktivists State sponsored attacker Criminal syndicates Other business partner Supplier Customer External contractor working on our site Employee Respondents were asked to choose all that apply.
  • 10. Page 10 EY GISS 2014 results: “Which threats & vulnerabilities have increased your risk exposure over the last 12 months?” Respondents were asked to select any five of these items, with 1 as the highest priority, down to 5 as their lowest priority
  • 11. Page 11 The roadblocks facing today’s organizations 43% of respondents say that their organization’s total information security budget will stay approximately the same in the coming 12 months and a further 5% said that their budget will actually decrease. 53% of organizations say that lack of skilled resources is one of the main obstacles that challenge their information security. Roadblock 1 — Lack of agility Roadblock 2 — Lack of budget Roadblock 3 — Lack of cybersecurity skills
  • 12. Page 12 It is not easy to get ahead of cybercrime Getting aheadCybersecurity function
  • 13. Page 13 What are organizations doing?
  • 14. Page 14 What are organizations doing? ► Designing and implementing a cyber threat intelligence strategy to support strategic business decisions and leverage the value of security ► Defining and encompassing the organizations extended cybersecurity ecosystem, including partners, suppliers, services and business networks ► Know your Crown Jewels - Taking a cyber economic approach — understanding your vital assets and their value, and investing specifically in their protection ► Use forensic data analytics and cyber threat intelligence to analyze and anticipate where the likely threats are coming from and when, increasing your readiness
  • 15. Page 15 How do you get ahead of cybercrime? … A 3-stage improvement process To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement process: ► Activate (a foundational approach) ► Organizations need to establish and improve the solid foundations of their cybersecurity) ► Adapt (a dynamic approach) ► Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to be able to adapt to changing requirements) ► Anticipate (a proactive approach) ► Organizations need to make efforts to predict what is coming so they can be better prepared for the inevitable cyber attacks)
  • 16. Page 16 Activate. Adapt. Anticipate. Where are you? Activate Adapt Anticipate
  • 17. Page 17 Activate: the need to establish foundations Organizations in this level can only deal with threats in a world without change
  • 18. Page 18 Adapt: a dynamic approach If an organization doesn’t adapt, its cybersecurity foundation will quickly be obsolete.
  • 19. Page 19 Anticipate: a proactive state of readiness ‘Anticipate’ means embracing cybersecurity as a core aspect of the business and being in a proactive state of readiness value
  • 20. Page 20 Vital to foundational cybersecurity – a Security Operations Center A Security Operations Center (SOC) centralizes, structures and coordinates the processes and technology that support the Information Security function. It is therefore concerning that: ► Over 40% of organizations surveyed do not have a SOC. Of those that do: ► Over half of respondents did not know how well their SOC met business operations’ needs ► Over 50% do not know how their SOC stays up to date with the latest threats ► The technology infrastructure and endpoints of the SOC need to be improved. If more of the benefits of a SOC were being realized, then the general ability of an organization to protect itself in even the most basic functions would start to deliver benefits. 37% say that real time insight on cyber risk is not available. 42% of organizations do not have a SOC. 33% 4% 13% 13% 25% 12% Unknown Longer than 1 day Within 1 day Within 4 hours Within 1 hour Within 10 minutes EY GISS 2014 results: How long on average does it take for your SOC to initiate an investigation on discovered/ alerted incidents?
  • 21. Page 21 …..get ahead of cybercrime
  • 22. Page 22 Take the initiative to get ahead of cybercrime Thank you….
  • 23. Page 23 Focus on 3 As… 1. Conduct a cyber threat assessment and design an implementation roadmap 2. Get Board-level support for a security transformation 3. Review and update security policies, procedures and supporting standards ► Implement an information security management system 4. Establish a Security Operations Center (SOC) ► Develop monitoring and incident response procedures 5. Design and implement cybersecurity controls ► Assess the effectiveness of data loss prevention and identity and access management processes. ► Harden the security of IT assets. 6. Test business continuity plans and incident response procedures 1. Design and implement a transformation program ► Get external help in designing the program, and providing program management. 2. Decide what to keep in-house and what to outsource 3. Define a RACI matrix for cybersecurity 4. Define the organization’s ecosystem ► Make moves to eliminate or lessen potential security gaps in your interaction with third parties 5. Introduce cybersecurity awareness training for employees 1. Design and implement a cyber threat intelligence strategy ► Use threat intelligence to support strategic business decisions 2. Define and encompass the organization’s extended cybersecurity ecosystem ► Define RACI and trust models and enact cooperation, sharing capabilities where advantageous 3. Take a cyber economic approach ► Understand the value of your most vital cyber assets 4. Use forensics and analytics ► Use the latest technical tools to analyze where the likely threats are coming from and when 5. Ensure everyone understands what’s happening ► Strong governance, user controls and regular communications Adapt - take action to improve and transform Anticipate: take action - and get ahead Activate: the need to establish foundations