SlideShare a Scribd company logo
Growing need for cyber security
©2018 GAVS Technologies Confidential 2
o What is cyber security?
o Cyber Security Coverage Areas
o Areas susceptible to cyber attacks
o Damages due to cybercrime
o Use Cases
o Future planning for cyber security
o Future growth of cyber security
o Cybersecurity talent by geography
o Conclusion
o About GAVS
Table of Contents
©2018 GAVS Technologies Confidential 3
What is
cyber
security?
Cyber security is a procedure of protecting computers,
networks, programs and data from unauthorized entree. It
hinges on a technology with multiple layers of protection
while educating its users with smart cyber defense choices
in the process.
©2018 GAVS Technologies Confidential 4
Cyber Security Coverage Areas
©2018 GAVS Technologies Confidential 5
Deep web and dark web conceals data that promotes cybercrime
New software codes
World’s growing digital content
Implantable medical devices (IMDs) - cardioverter defibrillators (ICD)
deep brain neurostimulators
pacemakers
insulin pumps
Wireless router
Websites of educational institutions
Areas susceptible to cyber attacks
©2018 GAVS Technologies Confidential 6
Damages due to cybercrime
©2018 GAVS Technologies Confidential 7
Use Cases: 6TB of data theft
Hackers stole 6TB of data from a
leading software enterprise. The stolen
data contained documents related to
FBI, NASA, the aerospace industry and
data on an oil company.
©2018 GAVS Technologies Confidential 8
Use Cases:
WannaCry’s attack on
12 May 2017
The ransomware known as WannaCry
(WannaCrypt, WanaCrypt0r 2.0,
Wanna Decryptor) attacked a leading
IT enterprise’s operating system on 12
May 2017 and affected more than
3,00,000 computers in over 150
countries.
©2018 GAVS Technologies Confidential 9
Use Cases: Petya’s
attack on June 2017
Ransomware Petya attacked the banking
sectors on June 2017. It mainly impacted
countries like; Russia, Ukraine, Spain,
Britain, France and India.
©2018 GAVS Technologies Confidential 10
Use Cases: zeroday attack on April 2019
Wipro received 4.8 million alerts
from its cybersecurity team on
potential breaches throughout
2018. Recently, there was a
zeroday attack on Wipro’s IT
system which is assumed to have
been already compromised.
©2018 GAVS Technologies Confidential 11
Use Cases: Ransomware virus attack on January 2017
oIn January 2017, four hospitals of Bart’s Health Trust in East
London experienced ransomware virus attack. Also last year,
one such hacker hacked multiple healthcare databases across
America and compromised information worth £368,000.
Source: Secondary Research
©2018 GAVS Technologies Confidential 12
Future planning for cyber security
o Replace proactive defense by reactive defense
o Regular backup of files
o Increase awareness among employees and customers about cybercrime and how to detect and
defend a threat
o Both device and application should be kept updated
o Only https://URLs should be used
©2018 GAVS Technologies Confidential 13
Future growth of cyber security
Source: Secondary Research
©2018 GAVS Technologies Confidential 14
Cybersecurity talent by geography
Source: Gartner
©2018 GAVS Technologies Confidential 15
Conclusion
The cybersecurity market is anticipated to expand from USD 152.71 billion in 2018 to USD 248.26
billion by 2023, at a Compound Annual Growth Rate (CAGR) of 10.2% during 2018–2023. Strict
data protection, cloud-based solutions and mounting cyber terrorism are largely contributing
towards the growth of cyber security.
Source: Secondary Research
©2018 GAVS Technologies Confidential 16
About GAVS
GAVS Technologies (GAVS) is a global IT services & solutions provider enabling digital
transformation through automation-led IT infrastructure solutions. At GAVS, we are trying to
enable a Zero Incident EnterpriseTM
through discovering, monitoring, analyzing, learning,
proactive detection and remediation of incidents.
Our AIOps based TechOps platform that enables proactive detection and remediation of
incidents helping organizations drive towards a Zero Incident EnterpriseTM
;
enhances accuracy of IT Ops by 90%
reduces incidents by 40%
reduces MTTR by 60%
reduces overall IT operations cost by 50%.
www.gavstech.com
inquiry@gavstech.com

More Related Content

What's hot

Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE - ATT&CKcon
 
Managing security risks in today's digital era
Managing security risks in today's digital eraManaging security risks in today's digital era
Managing security risks in today's digital era
Singtel
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the Inevitable
OmoniyiAnimasaun
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Black Duck by Synopsys
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Black Duck by Synopsys
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
HilalHarris
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
Rahul Neel Mani
 
Charting the Course Through Disruption with CSA Research
Charting the Course Through Disruption with CSA ResearchCharting the Course Through Disruption with CSA Research
Charting the Course Through Disruption with CSA Research
Carolina Ozán
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
jxyz
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
M2M Alliance e.V.
 
IT Security News & Case Studies
IT Security News & Case StudiesIT Security News & Case Studies
IT Security News & Case Studies
Dani Wannous
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Black Duck by Synopsys
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
TechSci Research
 
Cyber response to insider threats 3.1
Cyber response to insider threats 3.1Cyber response to insider threats 3.1
Cyber response to insider threats 3.1
David Spinks
 
McAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris YoungMcAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris Young
scoopnewsgroup
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
North Texas Chapter of the ISSA
 

What's hot (20)

Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Managing security risks in today's digital era
Managing security risks in today's digital eraManaging security risks in today's digital era
Managing security risks in today's digital era
 
Preparing for the Inevitable
Preparing for the InevitablePreparing for the Inevitable
Preparing for the Inevitable
 
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...Open Source Insight:  Top Picks for Black Hat,  GDPR & Open Source Webinar,  ...
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Open Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk ManagementOpen Source Insight:  NotPetya Strikes,  Patching Is Vital for Risk Management
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
 
THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY THE SIGNIFICANCE OF CYBERSECURITY
THE SIGNIFICANCE OF CYBERSECURITY
 
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the ServerThe Perimeter Security Retreat: Fall Back, Fall Back to the Server
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
 
Charting the Course Through Disruption with CSA Research
Charting the Course Through Disruption with CSA ResearchCharting the Course Through Disruption with CSA Research
Charting the Course Through Disruption with CSA Research
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
IT Security News & Case Studies
IT Security News & Case StudiesIT Security News & Case Studies
IT Security News & Case Studies
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
Cyber response to insider threats 3.1
Cyber response to insider threats 3.1Cyber response to insider threats 3.1
Cyber response to insider threats 3.1
 
McAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris YoungMcAfee's Commitment to Innovation - Chris Young
McAfee's Commitment to Innovation - Chris Young
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 

Similar to Growing need for cyber security

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
Research On Global Markets
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
Haltdos
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
Ulf Mattsson
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Cognizant
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
SrikanthRaju7
 
Emerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdfEmerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdf
Ciente
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
IT Company Dubai
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
SrikanthRaju7
 
Emerging Trends in Application Security
Emerging Trends in Application Security Emerging Trends in Application Security
Emerging Trends in Application Security
Synopsys Software Integrity Group
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
GGV Capital
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
R-Style Lab
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
acinfotec
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
Behnaz Aria
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
Dr. Raghavendra GS
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
IRJET Journal
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
Ulf Mattsson
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Similar to Growing need for cyber security (20)

Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Global Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDosGlobal Cyber Attacks report 2018 - 2019 | HaltDos
Global Cyber Attacks report 2018 - 2019 | HaltDos
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Emerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdfEmerging Cybersecurity Trends.pdf
Emerging Cybersecurity Trends.pdf
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019Strategies to combat new, innovative cyber threats in 2019
Strategies to combat new, innovative cyber threats in 2019
 
Emerging Trends in Application Security
Emerging Trends in Application Security Emerging Trends in Application Security
Emerging Trends in Application Security
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Cloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard SlideCloud Security & Privacy Standard Slide
Cloud Security & Privacy Standard Slide
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 

More from GAVS Technologies

AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
GAVS Technologies
 
AI-led Operations Management | GAVS Technologies
AI-led Operations Management | GAVS TechnologiesAI-led Operations Management | GAVS Technologies
AI-led Operations Management | GAVS Technologies
GAVS Technologies
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinking
GAVS Technologies
 
VDI for Remote Working
VDI for Remote WorkingVDI for Remote Working
VDI for Remote Working
GAVS Technologies
 
Chatbot and its importance in AI setup
Chatbot and its importance in AI setupChatbot and its importance in AI setup
Chatbot and its importance in AI setup
GAVS Technologies
 
AI and its impact on app competitiveness
AI and its impact on app competitivenessAI and its impact on app competitiveness
AI and its impact on app competitiveness
GAVS Technologies
 
The future of machine learning platform
The future of machine learning platformThe future of machine learning platform
The future of machine learning platform
GAVS Technologies
 
Impact of network analytics in it ops
Impact of network analytics in it opsImpact of network analytics in it ops
Impact of network analytics in it ops
GAVS Technologies
 
The future of hybrid IT models
The future of hybrid IT modelsThe future of hybrid IT models
The future of hybrid IT models
GAVS Technologies
 
What chatbots will do for your enterprise?
What chatbots will do for your enterprise?What chatbots will do for your enterprise?
What chatbots will do for your enterprise?
GAVS Technologies
 
The future of AIOps
The future of AIOpsThe future of AIOps
The future of AIOps
GAVS Technologies
 
Intelligent digital mesh leading the top 10 strategic technology trends for 2018
Intelligent digital mesh leading the top 10 strategic technology trends for 2018Intelligent digital mesh leading the top 10 strategic technology trends for 2018
Intelligent digital mesh leading the top 10 strategic technology trends for 2018
GAVS Technologies
 
GAVS & Artha Forum event ! Chennai
GAVS & Artha Forum event ! ChennaiGAVS & Artha Forum event ! Chennai
GAVS & Artha Forum event ! Chennai
GAVS Technologies
 
Cloud Services
Cloud ServicesCloud Services
Cloud Services
GAVS Technologies
 
Software Quality Assurance Infographic
Software Quality Assurance InfographicSoftware Quality Assurance Infographic
Software Quality Assurance Infographic
GAVS Technologies
 
Datacenter Services
Datacenter ServicesDatacenter Services
Datacenter Services
GAVS Technologies
 

More from GAVS Technologies (16)

AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
AI-led Digital Transformation in Healthcare IT - Consulting Solutions & Servi...
 
AI-led Operations Management | GAVS Technologies
AI-led Operations Management | GAVS TechnologiesAI-led Operations Management | GAVS Technologies
AI-led Operations Management | GAVS Technologies
 
Design Thinking
Design ThinkingDesign Thinking
Design Thinking
 
VDI for Remote Working
VDI for Remote WorkingVDI for Remote Working
VDI for Remote Working
 
Chatbot and its importance in AI setup
Chatbot and its importance in AI setupChatbot and its importance in AI setup
Chatbot and its importance in AI setup
 
AI and its impact on app competitiveness
AI and its impact on app competitivenessAI and its impact on app competitiveness
AI and its impact on app competitiveness
 
The future of machine learning platform
The future of machine learning platformThe future of machine learning platform
The future of machine learning platform
 
Impact of network analytics in it ops
Impact of network analytics in it opsImpact of network analytics in it ops
Impact of network analytics in it ops
 
The future of hybrid IT models
The future of hybrid IT modelsThe future of hybrid IT models
The future of hybrid IT models
 
What chatbots will do for your enterprise?
What chatbots will do for your enterprise?What chatbots will do for your enterprise?
What chatbots will do for your enterprise?
 
The future of AIOps
The future of AIOpsThe future of AIOps
The future of AIOps
 
Intelligent digital mesh leading the top 10 strategic technology trends for 2018
Intelligent digital mesh leading the top 10 strategic technology trends for 2018Intelligent digital mesh leading the top 10 strategic technology trends for 2018
Intelligent digital mesh leading the top 10 strategic technology trends for 2018
 
GAVS & Artha Forum event ! Chennai
GAVS & Artha Forum event ! ChennaiGAVS & Artha Forum event ! Chennai
GAVS & Artha Forum event ! Chennai
 
Cloud Services
Cloud ServicesCloud Services
Cloud Services
 
Software Quality Assurance Infographic
Software Quality Assurance InfographicSoftware Quality Assurance Infographic
Software Quality Assurance Infographic
 
Datacenter Services
Datacenter ServicesDatacenter Services
Datacenter Services
 

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Growing need for cyber security

  • 1. Growing need for cyber security
  • 2. ©2018 GAVS Technologies Confidential 2 o What is cyber security? o Cyber Security Coverage Areas o Areas susceptible to cyber attacks o Damages due to cybercrime o Use Cases o Future planning for cyber security o Future growth of cyber security o Cybersecurity talent by geography o Conclusion o About GAVS Table of Contents
  • 3. ©2018 GAVS Technologies Confidential 3 What is cyber security? Cyber security is a procedure of protecting computers, networks, programs and data from unauthorized entree. It hinges on a technology with multiple layers of protection while educating its users with smart cyber defense choices in the process.
  • 4. ©2018 GAVS Technologies Confidential 4 Cyber Security Coverage Areas
  • 5. ©2018 GAVS Technologies Confidential 5 Deep web and dark web conceals data that promotes cybercrime New software codes World’s growing digital content Implantable medical devices (IMDs) - cardioverter defibrillators (ICD) deep brain neurostimulators pacemakers insulin pumps Wireless router Websites of educational institutions Areas susceptible to cyber attacks
  • 6. ©2018 GAVS Technologies Confidential 6 Damages due to cybercrime
  • 7. ©2018 GAVS Technologies Confidential 7 Use Cases: 6TB of data theft Hackers stole 6TB of data from a leading software enterprise. The stolen data contained documents related to FBI, NASA, the aerospace industry and data on an oil company.
  • 8. ©2018 GAVS Technologies Confidential 8 Use Cases: WannaCry’s attack on 12 May 2017 The ransomware known as WannaCry (WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) attacked a leading IT enterprise’s operating system on 12 May 2017 and affected more than 3,00,000 computers in over 150 countries.
  • 9. ©2018 GAVS Technologies Confidential 9 Use Cases: Petya’s attack on June 2017 Ransomware Petya attacked the banking sectors on June 2017. It mainly impacted countries like; Russia, Ukraine, Spain, Britain, France and India.
  • 10. ©2018 GAVS Technologies Confidential 10 Use Cases: zeroday attack on April 2019 Wipro received 4.8 million alerts from its cybersecurity team on potential breaches throughout 2018. Recently, there was a zeroday attack on Wipro’s IT system which is assumed to have been already compromised.
  • 11. ©2018 GAVS Technologies Confidential 11 Use Cases: Ransomware virus attack on January 2017 oIn January 2017, four hospitals of Bart’s Health Trust in East London experienced ransomware virus attack. Also last year, one such hacker hacked multiple healthcare databases across America and compromised information worth £368,000. Source: Secondary Research
  • 12. ©2018 GAVS Technologies Confidential 12 Future planning for cyber security o Replace proactive defense by reactive defense o Regular backup of files o Increase awareness among employees and customers about cybercrime and how to detect and defend a threat o Both device and application should be kept updated o Only https://URLs should be used
  • 13. ©2018 GAVS Technologies Confidential 13 Future growth of cyber security Source: Secondary Research
  • 14. ©2018 GAVS Technologies Confidential 14 Cybersecurity talent by geography Source: Gartner
  • 15. ©2018 GAVS Technologies Confidential 15 Conclusion The cybersecurity market is anticipated to expand from USD 152.71 billion in 2018 to USD 248.26 billion by 2023, at a Compound Annual Growth Rate (CAGR) of 10.2% during 2018–2023. Strict data protection, cloud-based solutions and mounting cyber terrorism are largely contributing towards the growth of cyber security. Source: Secondary Research
  • 16. ©2018 GAVS Technologies Confidential 16 About GAVS GAVS Technologies (GAVS) is a global IT services & solutions provider enabling digital transformation through automation-led IT infrastructure solutions. At GAVS, we are trying to enable a Zero Incident EnterpriseTM through discovering, monitoring, analyzing, learning, proactive detection and remediation of incidents. Our AIOps based TechOps platform that enables proactive detection and remediation of incidents helping organizations drive towards a Zero Incident EnterpriseTM ; enhances accuracy of IT Ops by 90% reduces incidents by 40% reduces MTTR by 60% reduces overall IT operations cost by 50%.