SlideShare a Scribd company logo
1 of 50
Cyber Safety for Kids
Presented By
Colonel Vijay Kumar Verma
M.Tech (IT) Gold Medal, B.Tech (CSE) Gold Medal
PMP, CISA, CISSP, CHFI,ITIL
VP & Head of Cyber Security Operations Center
Reliance Jio
CISO Platform | Kids Task Force | www.cisoplatform.com | Sep 2018
Disclaimer: The pictures in presentation are from open source domain.
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Are you using ?
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Are you using ?
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Agenda
CISO Platform
Kids Cyber Security Task Force
 CISO Platform is a global community of Information Security Executives with 4k+ CISOs and 40k+ subscribers.
 The vision of the community is collaborate and create impactful “community goods”
 Kid’s Cyber-safety Task Force is a part of CISO Platform community initiative to help build a safer world for
the younger generation.
CISO Platform | Kids Task Force | www.cisoplatform.com | Sep 2018
Task Force Today
 Anuprita Daga
 Neha Vachhani
 Sudarshan Singh
 Prianshu Khandwala
 Col VK Verma
Introduction
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Understand Cyber World
Strangers or Friends ?
Aug 2018 | Ver 1.0 Col VK Verma
You are Alone in Cyber World…
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety in Physical World
Known Bad Elements
Public Space
(> 12 Ft)
Social Space
(4-12 Ft)
Personal Space
(2-4 Ft)
Intimate Space
(< 2 Ft)
Parents, Intimate Friend
You and God
Friends, Relatives
Strangers
Acquaintances
Trust Builds Up
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Circles : Where to reach for help
Circle of Safety
Teachers
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Image Edit : Morphing
Pictures
Video and Audio
can be easily edited.
Embarrass
Blackmail
Create fake identity
Social Engineering
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Cyber world : Fake Identities | Strangers
They can
• become YOU ( Identity theft)
• Find YOU (Cyber World  Physical World)
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Merging Cyber with Physical World
Public Space
(> 12 Ft)
Social Space
(4-12 Ft)
Personal Space
(2-4 Ft)
Intimate Space
(< 2 Ft)
Friends, Relatives
Strangers
Acquaintances
Known Bad Elements
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Cyber World : Top Risks
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Respect Age Restrictions : For own Good
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Social Media : Posts
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Social Media : Posts
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Posting pictures on Internet ..
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Reach out to your Safe Heaven
Circle of Safety
Teachers
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Bullying 1
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
How to stop Cyber Bullying ?
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Which apps are safe ?
https://smartsocial.com/app-guide-parents-teachers/
 Respect age restriction guidelines
 All apps in Google Play store are not safe.
 Shared Apps via links/SMS – BIG NO
 Control App Permissions
 Install Antivirus
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
How much screen time is enough ?
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
3 C’s for Parents
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Questions Please ….
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Quiz : Attractive offers 1
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Quiz : What is safe ? 2
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Social Engineering 3
What’s wrong in chat ?
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Online Gaming 4
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
What is being done in chat ? 5
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
What emails to open ? 6
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Which one is correct ? 7
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Which E-mail link is genuine ? 8
AA
B
C
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Which password is safe ? 9
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
What process is being depicted below ? 10
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Internet Profile 11
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Privacy Settings 12
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Handling friend requests ? 13
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
What do we do with people we meet online ? 14
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
What to do ? 15
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Cyber Safety Pledge
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Pledge #1
Circle of Safety
Teachers
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Pledge #2
Circle of Safety
Teachers
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Circles : Where to reach for help #3
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Pledge #4
CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma
Disclaimer: The pictures in presentation are from open source domain.
Safety Pledge #5
I will not allow technology to enslave me and ...
… maintain a healthy balance between
study, outdoor play, family and online time.
Thanks !!!
CISO Platform | Kids Task Force | Sep 2018
Disclaimer: The pictures in presentation are from open source domain.
Aug 2018 | Ver 1.0 Col VK Verma
Disclaimer
Many of the images that have been used in this presentation are Royalty Free images which
are fully permitted to use. Other images have been sourced directly from the Public
domain, from were in most cases it is unclear whether copyright has been explicitly
claimed. The intention is to combine information that has been placed in the public domain
together with images that have been placed in the public domain to create a visually and
intellectually pleasing whole. The intention is not to infringe any artist’s copyright, whether
written or visual. I do not claim ownership of any image that has been freely obtained from
the public domain. In the event that I have freely obtained an image or quotation that has
been placed in the public domain and in doing so have inadvertently used a copyrighted
image without the copyright holder’s express permission, I ask that the copyright holder
writes to me directly at vkverma.cal@gmail.com, upon which I will contact the copyright
holder to request full written permission to use the quote or images. In absence of such
permission, the said image in question will be removed from this presentation.
This presentation is aimed at bringing awareness regarding cyber safety among kids and is
not being used for any commercial purpose.

More Related Content

What's hot

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety SlideshareLawrence Fine
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPointWebwise
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overviewJohn Woodring
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015KanelandSvihlik
 
Internet Safety Communicating Openly
Internet Safety Communicating OpenlyInternet Safety Communicating Openly
Internet Safety Communicating Openlyjohnp
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021Mark Kor
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminarsEmmanuel Arthur
 
Parenting post primary (3)
Parenting post primary (3)Parenting post primary (3)
Parenting post primary (3)Webwise
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018KanelandSvihlik
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 

What's hot (20)

Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Online Safety
Online SafetyOnline Safety
Online Safety
 
Internet Safety Slideshare
Internet Safety SlideshareInternet Safety Slideshare
Internet Safety Slideshare
 
Safer Internet Day PowerPoint
Safer Internet Day PowerPointSafer Internet Day PowerPoint
Safer Internet Day PowerPoint
 
Cyber Safe Parenting
Cyber Safe ParentingCyber Safe Parenting
Cyber Safe Parenting
 
Cybersafety overview
Cybersafety overviewCybersafety overview
Cybersafety overview
 
Team black
Team blackTeam black
Team black
 
Internet safety presentation 2015
Internet safety presentation 2015Internet safety presentation 2015
Internet safety presentation 2015
 
Internet Safety Communicating Openly
Internet Safety Communicating OpenlyInternet Safety Communicating Openly
Internet Safety Communicating Openly
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Media etiquette 2021
Media etiquette 2021Media etiquette 2021
Media etiquette 2021
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Digital parenting seminars
Digital parenting seminarsDigital parenting seminars
Digital parenting seminars
 
Parenting post primary (3)
Parenting post primary (3)Parenting post primary (3)
Parenting post primary (3)
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 

Similar to Kids Cyber Safety Pilot @APS, Colaba, Mumbai

The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020NSC42 Ltd
 
Opinion Essay University Education Should Be Free
Opinion Essay University Education Should Be FreeOpinion Essay University Education Should Be Free
Opinion Essay University Education Should Be FreeCynthia Harder
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNSC42 Ltd
 
Social Engineering for Fun and Profit Lessons from the SECTF
Social Engineering for Fun and ProfitLessons from the SECTFSocial Engineering for Fun and ProfitLessons from the SECTF
Social Engineering for Fun and Profit Lessons from the SECTFPositive Hack Days
 
UX for Security: Power of Design
UX for Security: Power of DesignUX for Security: Power of Design
UX for Security: Power of DesignAme Elliott
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Cori Faklaris
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSIMeetup
 
Hidden Gems of the Sitefinity API Webinar
Hidden Gems of the Sitefinity API WebinarHidden Gems of the Sitefinity API Webinar
Hidden Gems of the Sitefinity API WebinarChris Eargle
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipSonya Engelen
 
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011Marco Marinucci
 
Testing in the Dark
Testing in the DarkTesting in the Dark
Testing in the DarkTechWell
 
Labuildwebsiteseptember5
Labuildwebsiteseptember5Labuildwebsiteseptember5
Labuildwebsiteseptember5Thinkful
 
SxSW 2015 - The Human Brain Vs. Innovation Overload
SxSW 2015 -  The Human Brain Vs. Innovation OverloadSxSW 2015 -  The Human Brain Vs. Innovation Overload
SxSW 2015 - The Human Brain Vs. Innovation OverloadJay Wilson
 
A personal view from republicamp
A personal view from republicampA personal view from republicamp
A personal view from republicampIan Forrester
 
Virtual and augmented reality in education
Virtual and augmented reality in educationVirtual and augmented reality in education
Virtual and augmented reality in educationJisc
 
Understanding the Past; Being Honest about the Present; Planning for the Future
Understanding the Past; Being Honest about the Present; Planning for the FutureUnderstanding the Past; Being Honest about the Present; Planning for the Future
Understanding the Past; Being Honest about the Present; Planning for the Futurelisbk
 
Go Beyond Analytics: Putting Insights Into Action
Go Beyond Analytics: Putting Insights Into ActionGo Beyond Analytics: Putting Insights Into Action
Go Beyond Analytics: Putting Insights Into ActionAIIM International
 
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016Craig Rispin
 

Similar to Kids Cyber Safety Pilot @APS, Colaba, Mumbai (20)

The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020The security phoenix - from the ashes of DEV-OPS Appsec California 2020
The security phoenix - from the ashes of DEV-OPS Appsec California 2020
 
Opinion Essay University Education Should Be Free
Opinion Essay University Education Should Be FreeOpinion Essay University Education Should Be Free
Opinion Essay University Education Should Be Free
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
Social Engineering for Fun and Profit Lessons from the SECTF
Social Engineering for Fun and ProfitLessons from the SECTFSocial Engineering for Fun and ProfitLessons from the SECTF
Social Engineering for Fun and Profit Lessons from the SECTF
 
UX for Security: Power of Design
UX for Security: Power of DesignUX for Security: Power of Design
UX for Security: Power of Design
 
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
Social Cybersecurity: Ideas for Nudging Secure Behaviors Through Social Influ...
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Hidden Gems of the Sitefinity API Webinar
Hidden Gems of the Sitefinity API WebinarHidden Gems of the Sitefinity API Webinar
Hidden Gems of the Sitefinity API Webinar
 
Online Colaboration & Digital citizenship
Online Colaboration & Digital citizenshipOnline Colaboration & Digital citizenship
Online Colaboration & Digital citizenship
 
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011The secret sauce of  Silicon Valley - Marco Marinucci, Jul 2011
The secret sauce of Silicon Valley - Marco Marinucci, Jul 2011
 
Testing in the Dark
Testing in the DarkTesting in the Dark
Testing in the Dark
 
Labuildwebsiteseptember5
Labuildwebsiteseptember5Labuildwebsiteseptember5
Labuildwebsiteseptember5
 
SxSW 2015 - The Human Brain Vs. Innovation Overload
SxSW 2015 -  The Human Brain Vs. Innovation OverloadSxSW 2015 -  The Human Brain Vs. Innovation Overload
SxSW 2015 - The Human Brain Vs. Innovation Overload
 
Real time action localization
Real time action localizationReal time action localization
Real time action localization
 
A personal view from republicamp
A personal view from republicampA personal view from republicamp
A personal view from republicamp
 
Virtual and augmented reality in education
Virtual and augmented reality in educationVirtual and augmented reality in education
Virtual and augmented reality in education
 
Understanding the Past; Being Honest about the Present; Planning for the Future
Understanding the Past; Being Honest about the Present; Planning for the FutureUnderstanding the Past; Being Honest about the Present; Planning for the Future
Understanding the Past; Being Honest about the Present; Planning for the Future
 
Go Beyond Analytics: Putting Insights Into Action
Go Beyond Analytics: Putting Insights Into ActionGo Beyond Analytics: Putting Insights Into Action
Go Beyond Analytics: Putting Insights Into Action
 
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
Entrepreneurs' Organization NZ - Craig Rispin Keynote - 2 Aug 2016
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

Kids Cyber Safety Pilot @APS, Colaba, Mumbai

  • 1. Cyber Safety for Kids Presented By Colonel Vijay Kumar Verma M.Tech (IT) Gold Medal, B.Tech (CSE) Gold Medal PMP, CISA, CISSP, CHFI,ITIL VP & Head of Cyber Security Operations Center Reliance Jio CISO Platform | Kids Task Force | www.cisoplatform.com | Sep 2018 Disclaimer: The pictures in presentation are from open source domain.
  • 2. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Are you using ?
  • 3. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Are you using ?
  • 4. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Agenda
  • 5. CISO Platform Kids Cyber Security Task Force  CISO Platform is a global community of Information Security Executives with 4k+ CISOs and 40k+ subscribers.  The vision of the community is collaborate and create impactful “community goods”  Kid’s Cyber-safety Task Force is a part of CISO Platform community initiative to help build a safer world for the younger generation. CISO Platform | Kids Task Force | www.cisoplatform.com | Sep 2018 Task Force Today  Anuprita Daga  Neha Vachhani  Sudarshan Singh  Prianshu Khandwala  Col VK Verma
  • 7. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Understand Cyber World Strangers or Friends ?
  • 8. Aug 2018 | Ver 1.0 Col VK Verma You are Alone in Cyber World…
  • 9. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety in Physical World Known Bad Elements Public Space (> 12 Ft) Social Space (4-12 Ft) Personal Space (2-4 Ft) Intimate Space (< 2 Ft) Parents, Intimate Friend You and God Friends, Relatives Strangers Acquaintances Trust Builds Up
  • 10. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Circles : Where to reach for help Circle of Safety Teachers
  • 11. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Image Edit : Morphing Pictures Video and Audio can be easily edited. Embarrass Blackmail Create fake identity Social Engineering
  • 12. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Cyber world : Fake Identities | Strangers They can • become YOU ( Identity theft) • Find YOU (Cyber World  Physical World)
  • 13. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Merging Cyber with Physical World Public Space (> 12 Ft) Social Space (4-12 Ft) Personal Space (2-4 Ft) Intimate Space (< 2 Ft) Friends, Relatives Strangers Acquaintances Known Bad Elements
  • 14. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Cyber World : Top Risks
  • 15. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Respect Age Restrictions : For own Good
  • 16. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Social Media : Posts
  • 17. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Social Media : Posts
  • 18. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Posting pictures on Internet ..
  • 19. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Reach out to your Safe Heaven Circle of Safety Teachers
  • 20. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Bullying 1
  • 21. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain.
  • 22. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. How to stop Cyber Bullying ?
  • 23. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Which apps are safe ? https://smartsocial.com/app-guide-parents-teachers/  Respect age restriction guidelines  All apps in Google Play store are not safe.  Shared Apps via links/SMS – BIG NO  Control App Permissions  Install Antivirus
  • 24. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. How much screen time is enough ?
  • 25. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. 3 C’s for Parents
  • 26. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Questions Please ….
  • 27. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain.
  • 28. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Quiz : Attractive offers 1
  • 29. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Quiz : What is safe ? 2
  • 30. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Social Engineering 3 What’s wrong in chat ?
  • 31. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Online Gaming 4
  • 32. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. What is being done in chat ? 5
  • 33. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. What emails to open ? 6
  • 34. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Which one is correct ? 7
  • 35. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Which E-mail link is genuine ? 8 AA B C
  • 36. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Which password is safe ? 9
  • 37. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. What process is being depicted below ? 10
  • 38. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Internet Profile 11
  • 39. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Privacy Settings 12
  • 40. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Handling friend requests ? 13
  • 41. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. What do we do with people we meet online ? 14
  • 42. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. What to do ? 15
  • 43. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Cyber Safety Pledge
  • 44. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Pledge #1 Circle of Safety Teachers
  • 45. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Pledge #2 Circle of Safety Teachers
  • 46. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Circles : Where to reach for help #3
  • 47. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Pledge #4
  • 48. CISO Platform | www.cisoplatform.com | Kids Task Force | Sep 2018 Col VK Verma Disclaimer: The pictures in presentation are from open source domain. Safety Pledge #5 I will not allow technology to enslave me and ... … maintain a healthy balance between study, outdoor play, family and online time.
  • 49. Thanks !!! CISO Platform | Kids Task Force | Sep 2018 Disclaimer: The pictures in presentation are from open source domain.
  • 50. Aug 2018 | Ver 1.0 Col VK Verma Disclaimer Many of the images that have been used in this presentation are Royalty Free images which are fully permitted to use. Other images have been sourced directly from the Public domain, from were in most cases it is unclear whether copyright has been explicitly claimed. The intention is to combine information that has been placed in the public domain together with images that have been placed in the public domain to create a visually and intellectually pleasing whole. The intention is not to infringe any artist’s copyright, whether written or visual. I do not claim ownership of any image that has been freely obtained from the public domain. In the event that I have freely obtained an image or quotation that has been placed in the public domain and in doing so have inadvertently used a copyrighted image without the copyright holder’s express permission, I ask that the copyright holder writes to me directly at vkverma.cal@gmail.com, upon which I will contact the copyright holder to request full written permission to use the quote or images. In absence of such permission, the said image in question will be removed from this presentation. This presentation is aimed at bringing awareness regarding cyber safety among kids and is not being used for any commercial purpose.