SlideShare a Scribd company logo
The South Asian Cyber Security Landscape PostSnowden
Introduction – Yours truly…
• Independent Cyber Security Analyst
• Specialization: the cyber security landscapes of the wider Middle
East, Central Asia, and Indian Subcontinent
• Former staff member at iDefense, Inc., now independent
• Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik,
Hindi, Urdu, and German
• Interest in hacking and computers since childhood…
• Research: chronicle evolution of cyber security landscape in
Middle East, Subcontinent, and Central Asia, as objectively
and neutrally as possible
• Better understanding through comparative analysis –
especially geopolitical and socio-economic contexts driving
these cyber security landscapes!
The South Asian Cyber Security Landscape PostSnowden
The Edward Snowden revelations of massive scale espionage
activities conducted by the US’ NSA and other intelligence agencies
continues to have profound effects on the collective cyber security
landscape of the entire world.
This includes of course the South Asian cyber security
landscape…
The South Asian Cyber Security Landscape PostSnowden
The Snowden revelations seem to be working
like a giant catalyst stimulating wider global
cyber security arms race…

“National internets” in which countries can better
enforce their respective laws, controls, and
sovereignty in general…
Discussion of fully domestic internet infrastructure
that ensure transmitted data does not leave
respective national borders!
Examples:
“Internetz”
The Iranian “halal internet”…
Etc. etc. …
The South Asian Cyber Security Landscape PostSnowden
A number of countries working on their own internet surveillance
programs, much like PRISM…
• India working on National Cyber Coordination Centre
• Said to target metadata more than actual content, with only
metadata of concern or interest flagged for later content
analysis
• Controversial in India itself; calls for oversight, better privacy
laws, etc. likely to intensify
Pakistan itself taking similar action -- talk of beefing up PKCERT, put
in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues…
Talk of possible treaties between India and Pakistan preventing
targeting of nuclear installations, etc. - likely wishful thinking…
The South Asian Cyber Security Landscape PostSnowden
More “state actor” hacker groups likely to proliferate in South Asia,
along the lines of what we already see in the Middle East…

Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter,
Tango, Washington Post, Al-Jazeera, any news outlets it perceives as
against Bashar Al-Asad…
The South Asian Cyber Security Landscape PostSnowden

Syria’s closest regional political ally is Iran, with wide-ranging military
security cooperation ongoing between both countries…

Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad
military; in 2012, Deutsche Welle publishes claim of Iran Information
Ministry cyber security assistance to Syria.
The Cyber Security Landscapes of the Middle East and
the Indian Subcontinent: A Brief Comparative Analysis
Base ingredients for this to happen are already present…
The South Asian Cyber Security Landscape PostSnowden
Brazil, Russia, India, China, and South Africa (BRICS countries)
recently had a meeting in which they expressed their desire to
decrease reliance across the board on US sourced internet
technology…
• Drive for greater technological independence in India long-time part
of Indian political discourse!
• Huawei!
• Snowden revelations likely to accelerate these efforts, though
results of these efforts likely not forthcoming overnight…
Snowden revelations have indicated that US is targeting China's
Tsinghua university, one of China's leading research and
development universities…
• Snowden revelations confirm not altogether unknown fact:
essentially, everybody spying against everybody!
The South Asian Cyber Security Landscape PostSnowden
Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among
Middle Easter hacker Groups! Snowden revelations will definitely accelerate this
trend…

… but translations of the Hebrew
captions revealed nonsense words,
strongly suggesting a forgery.

The SEA itself soon denied having
done the attack in a Twitter release…

Headlines ensued in June 2013 that the Syrian
Electronic Army had succeeded in breaching a
SCADA system at a water and electricity utility
station in Haifa, Israel…
The South Asian Cyber Security Landscape PostSnowden
Conclusions…
• Snowden revelations to accelerate global cyber arms race
dramatically!
• New national cyber espionage programs of various kinds will
proliferate all over the world, surprises likely forthcoming…
• Commercial companies specializing in cyber espionage likely to
proliferate
• Some headquartered in countries with lax or nonexistent cyber
laws, to safeguard offensive cyber espionage from legal
pursuit…
• “National” or “indigenous” internets will get fairly significant impetus,
especially for ensuring route of data not to cross systems in US or
other outside country
• Of ancillary importance here: TLDs able to be made using nonEnglish characters
• To some limited degree, Balkanization of internet? Debatable,
uncertain…
• Essentially, cyber IN-security is the new normal.
The South Asian Cyber Security Landscape PostSnowden

…

More Related Content

What's hot

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
Adv Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
ideaflashed
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Abdul Rehman
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
Dinesh O Bareja
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
Sameer Paradia
 

What's hot (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Viewers also liked

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao Pãulo
PwC Russia
 
Graphene
GrapheneGraphene
Graphene
durairaj6893
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentation
Pollypo
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and uses
Uj17
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility
Jeffrey Funk
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
Lawrence kok
 
What Is Graphene?
What Is Graphene?What Is Graphene?
What Is Graphene?
Agora Financial
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
Lawrence kok
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronics
Chinmay Chepurwar
 
Synthesis of graphene
Synthesis of grapheneSynthesis of graphene
Synthesis of graphene
APRATIM KHANDELWAL
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsMoeez Shem
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applications
Arpit Agarwal
 

Viewers also liked (13)

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao Pãulo
 
Graphene
GrapheneGraphene
Graphene
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentation
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and uses
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
 
What Is Graphene?
What Is Graphene?What Is Graphene?
What Is Graphene?
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronics
 
Synthesis of graphene
Synthesis of grapheneSynthesis of graphene
Synthesis of graphene
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applications
 
Graphene
GrapheneGraphene
Graphene
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applications
 

Similar to ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
Brett L. Scott
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
Kunihiro Maeda
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
Stefano Maccaglia
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
Christina Berger
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptx
AkashTomar739930
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Alireza Ghahrood
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
Leslie Lee
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
Simoun Ung
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
Jim Geovedi
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
Mohamed N. El-Guindy
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
Michele Chubirka
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATIONKelli Waxman
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
Benjamin Ang
 
Snarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdfSnarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdf
Yury Chemerkin
 

Similar to ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
114-116
114-116114-116
114-116
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptx
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATION
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Snarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdfSnarky Security. Digest. 2024-04. Pro.pdf
Snarky Security. Digest. 2024-04. Pro.pdf
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

  • 1. The South Asian Cyber Security Landscape PostSnowden Introduction – Yours truly… • Independent Cyber Security Analyst • Specialization: the cyber security landscapes of the wider Middle East, Central Asia, and Indian Subcontinent • Former staff member at iDefense, Inc., now independent • Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik, Hindi, Urdu, and German • Interest in hacking and computers since childhood… • Research: chronicle evolution of cyber security landscape in Middle East, Subcontinent, and Central Asia, as objectively and neutrally as possible • Better understanding through comparative analysis – especially geopolitical and socio-economic contexts driving these cyber security landscapes!
  • 2. The South Asian Cyber Security Landscape PostSnowden The Edward Snowden revelations of massive scale espionage activities conducted by the US’ NSA and other intelligence agencies continues to have profound effects on the collective cyber security landscape of the entire world. This includes of course the South Asian cyber security landscape…
  • 3. The South Asian Cyber Security Landscape PostSnowden The Snowden revelations seem to be working like a giant catalyst stimulating wider global cyber security arms race… “National internets” in which countries can better enforce their respective laws, controls, and sovereignty in general… Discussion of fully domestic internet infrastructure that ensure transmitted data does not leave respective national borders! Examples: “Internetz” The Iranian “halal internet”… Etc. etc. …
  • 4. The South Asian Cyber Security Landscape PostSnowden A number of countries working on their own internet surveillance programs, much like PRISM… • India working on National Cyber Coordination Centre • Said to target metadata more than actual content, with only metadata of concern or interest flagged for later content analysis • Controversial in India itself; calls for oversight, better privacy laws, etc. likely to intensify Pakistan itself taking similar action -- talk of beefing up PKCERT, put in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues… Talk of possible treaties between India and Pakistan preventing targeting of nuclear installations, etc. - likely wishful thinking…
  • 5. The South Asian Cyber Security Landscape PostSnowden More “state actor” hacker groups likely to proliferate in South Asia, along the lines of what we already see in the Middle East… Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter, Tango, Washington Post, Al-Jazeera, any news outlets it perceives as against Bashar Al-Asad…
  • 6. The South Asian Cyber Security Landscape PostSnowden Syria’s closest regional political ally is Iran, with wide-ranging military security cooperation ongoing between both countries… Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad military; in 2012, Deutsche Welle publishes claim of Iran Information Ministry cyber security assistance to Syria.
  • 7. The Cyber Security Landscapes of the Middle East and the Indian Subcontinent: A Brief Comparative Analysis Base ingredients for this to happen are already present…
  • 8. The South Asian Cyber Security Landscape PostSnowden Brazil, Russia, India, China, and South Africa (BRICS countries) recently had a meeting in which they expressed their desire to decrease reliance across the board on US sourced internet technology… • Drive for greater technological independence in India long-time part of Indian political discourse! • Huawei! • Snowden revelations likely to accelerate these efforts, though results of these efforts likely not forthcoming overnight… Snowden revelations have indicated that US is targeting China's Tsinghua university, one of China's leading research and development universities… • Snowden revelations confirm not altogether unknown fact: essentially, everybody spying against everybody!
  • 9. The South Asian Cyber Security Landscape PostSnowden Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among Middle Easter hacker Groups! Snowden revelations will definitely accelerate this trend… … but translations of the Hebrew captions revealed nonsense words, strongly suggesting a forgery. The SEA itself soon denied having done the attack in a Twitter release… Headlines ensued in June 2013 that the Syrian Electronic Army had succeeded in breaching a SCADA system at a water and electricity utility station in Haifa, Israel…
  • 10. The South Asian Cyber Security Landscape PostSnowden Conclusions… • Snowden revelations to accelerate global cyber arms race dramatically! • New national cyber espionage programs of various kinds will proliferate all over the world, surprises likely forthcoming… • Commercial companies specializing in cyber espionage likely to proliferate • Some headquartered in countries with lax or nonexistent cyber laws, to safeguard offensive cyber espionage from legal pursuit… • “National” or “indigenous” internets will get fairly significant impetus, especially for ensuring route of data not to cross systems in US or other outside country • Of ancillary importance here: TLDs able to be made using nonEnglish characters • To some limited degree, Balkanization of internet? Debatable, uncertain… • Essentially, cyber IN-security is the new normal.
  • 11. The South Asian Cyber Security Landscape PostSnowden …

Editor's Notes

  1. http://www.dev-point.com/vb/t286148.html