SlideShare a Scribd company logo
1 of 16
Download to read offline
THE BUSINESS OF
INFORMATION SECURITY IN INDIA
-Testbytes Software
01https://www.testbytes.net/
1. Introduction...........................................................................................................................................................02
1.1 What’s information security testing?....................................................................................................02
1.2 Rise of information security business in India...................................................................................02
3. Supply for the immense demand........................................................................................................11
4. Inference..................................................................................................................................................................13
5. References......................................................................................................................................................15
3.2 Services by information/cyber security companies........................................................................11
3.1 IT company and recruitment services..................................................................................................11
3.3 Distribution of total number of companies........................................................................................12
3.4 Universities......................................................................................................................................................12
3.5 Online Courses..............................................................................................................................................12
2. The Scarcity, a gold mine for employees.................................................................................03
2.1 Global demand.............................................................................................................................................03
2.2 Demand in India...........................................................................................................................................04
2.3 Hierarchical division of roles in an information security company............................................05
2.4 Major Job requirements in information security industry............................................................06
Table of Contents
2.5A detailed view into the current trends...............................................................................................08
2.6 Certification ISO 27001..............................................................................................................................10
02https://www.testbytes.net/
Stealing information happens frequently in the digital world nowadays. Statistics
states that 95% of the breaches affect government, retail and technology-based
industries.
The most alarming fact about such breaches is that, onceit happens, the devastating
effect of it on any organization can be irreversible and grave.
Reputation, the most valuable aspect to any business is at stake at any point in time.
So protecting it at any cost is cardinal at this juncture of time.
In order to protect, companies are willing to invest a great deal of money.
In this white paper, we are trying to examine the booming business of information
security in India and why a bright future is assured for the candidates who are
working and going to work in this industry.
Research for this white paper has been done by Softbreaks, an IT recruitment service
which offers a complete solution for recruiters, employers, and employees.
Sponsors for the research are,
Redbytes (App Development Company) and Trackschoolbus
(software and hardware providers for complete tracking solution)
1.1 What’s information security testing?
Information security testing is mainly performed on platforms, services, applications,
systems, devices and processes that handle valuable information in a business.
The process is mainly performed with automated tools which can scan and point
out vulnerabilities in a system. It can also mimic attacks to fish out the loopholes.
1.2 Rise of information security business in India
Recent reports revealed that 93% of Indian companies are planning to increase their
IT security spending which is much higher than that of global average. But why?
Within the time span of 2017-2018 more than 22,000 websites were hacked and
1. Introduction
https://www.trackschoolbus.com
https://www.redbytes.in/
03https://www.testbytes.net/
2.1 Global demand
• Cybersecurity business report released on last summer has clearly stated that
the shortage of professional in the field of cyber security is immense. In 2016
alone there was 1 million job opening in the sector and it is expected to rise.
5 million (1.5 million) by 2019
• PARC (PaloAltoResearchcentre)renownedresearchandDevelopment Company
said that by the end of 2019 there will be huge rise in demand of cyber security
professionals. (approximately 6 million globally)
• This imbalance in demand and supply of information/cyber security employees
will increase the monetary benefits of people who are working in this industry
among them 114 were government
websites. Among the hacked websites
493 websites were used to spread
malwares.
Two of the infamous attacks
were,
In2018,hackers gained access to Andheri
Bank accounts by getting hold of the
credentials of an employee, they
managed tosiphonout Rs.97lakh within
no time.
Pune’s Cosmos bank had to face cyber attack
and the hackers managed to steal
Rs. 94 crore by cloning Visa and RuPay
cards.
2. The Scarcity, a gold mine for employees
Statistics
states that 95%
of the breaches affect
government , retail and
technology-based
industries.
04https://www.testbytes.net/
2.2 Demand in India
• Economic Times on Mar 19, 2018 NEW DELHI has reported that India India is
heading towards scarcity of cyber security professionals, specifically at the
leadership level. At Present companies have spiked the salaries by
25%-35% over the past year.
• Thehindubusinessline.com has stated that there is a 150 percent jump in
cyber security roles in the time period of January 2017 and March 2018.
• According to data collected by softbreaks 89% hiring request is by firms
who are building this competency.
• On April 16 2018 QuartzIndia has reported that there are 30,000 vacancies
in cyber/information security industry.
• Factor Daily has reported that there is going to be the requirement of
1 million skilled people by the end of 2020
• The profession is going to be so crucial that chief security officers (CSO) and chief
information security officers (CISOs) will have to report directly to the CEO
not the CIO
93% of Indian companies are
planning to increase their IT
security spending which is much
higher than that of global average.
05https://www.testbytes.net/
2.3 Hierarchical division of roles in an information security company
Abbreviations
SSCP: Systems Security Certified Practitioner
CCSP: Certified Cloud Security Professional
CSSLP: Certified Secure Software Lifecycle Professional
CySA+: CompTIA Cyber Security Analyst
ECES : EC-Council Certified Encryption Specialist
CISSP : Certified Information Systems Security Professional
CCSP : Certified Cloud Security Professional
CISM : Certified Information Security Manager
Security Analyst: He/she should be able to analyse and assess vulnerabilities in
software, hardware and network system. Using appropriate tools a security
analyst should be able to rectify all the vulnerabilities. Implementation of best
practices and recommending solutions is also one of the duties. Complying with
security policies and procedures is a must in information security business. Security
analysts should make sure company procedures and complying with it.
06https://www.testbytes.net/
Security Engineer: Carries out security monitoring, forensic analysis, should trace
out security incidents, log analysis, investigate and utilize new technologies and
should be well-versed with processes and tech to increase security capabilities etc.
Security Architect: Must be in the forefront of a team when it comes to security
system design. He/ she should also be experienced in designing it.
Security Administrator: Installationofhugesecurity systemsacross anorganisation is
the duty of a security administrator.
Security software developer: Software development, traffic analysis, breach
detection, virus/malware/spyware etc. detection etc. are the main duties
of a security software developer
Cryptographer/cryptologist: Encryption of malicious files and understanding it
is the main duty of a cryptographer
Chief Information security officer: A high level position, with main duty to control
and lead the entire information security division
Consultant/specialist: Broad responsibilities which includes protecting networks,
software, data, systems that work against malicious programs, computers etc.
2.4 Major Job requirements in information security industry
Senior consultant – IT consulting – Information Security
Requirement
4 years of experience in information security and related functions such as
IT audits and IT risk management
Certifications required ITIL, PMP , CISA, CISSP, CEH, COBIT, ISO 27001
07https://www.testbytes.net/
Jobdescription–knowledge in industries such as capital markets, telecom, IT/TES etc.
.Impeccable knowledge in security testing methodologies and methodologies
web server security/ firewalls/ networks/PKI/ TCP/ UNIX/ IP etc.
Network / security specialist
Requirement
4 years of experience
Certifications required: CCNP / CCSP / CISSP / CISM
.Job description: should be able to install, configure and administration of network
and security equipment, switches, vulnerability assessment, IS audit, security policy
design, BCP design and implementation, configuration of firewall etc.
Penetration testing engineer
Requires 4+ years of experience
Job description: should be able to identify and validate high quality MSSps. Apart
from that short listing them using effective evaluation methods are also a must
Should also be able to review proposals, visit MSSP websites and recognize
tools etc.
Senior application security analyst
Requires 3 years of experience
Certifications required, SANS, OSCP,GPAN ,OSCE, CREST
.Job description: must be able to review DAST and SAST, experience in dynamic
application security testing tools like IBM, Appscan, HP webinspect, Acunetix,
Burp Professional etc. Ability to maintain standard such as, SANS Top 25, OSSTMM,
PTES, OWASP Top 10 is also recommended. Should have the skill to Consult and
coordinate with project teams for security assessment
08https://www.testbytes.net/
Web Application security analyst – VAPT
Experience required: 3 years
Job description: should beabletohandle manual and automated application tests.
Should well-versed in application technologies and its components. Hands-on
experience of security code review
IT security administrator
Experience required: 1 year
Job description: Should have good knowledge and experience in RSA Archer, PKI,
Nessus and hardware security modules. Experienced with Security frameworks
such as SO27001, ITIL, NIST etc. Ability to develop and implement vulnerability
testing methodologies. Should be able to configure and conduct automated
scanning and limited manual testing. Candidateshouldbeabletoperformapplication
code review and training activities.
2.5 A detailed view into the current demand trends
Below graph is a comparison to the rise of information security companies and jobs
they posted in the period (2015-2018)
09https://www.testbytes.net/
Company size VS jobs posted
City wise breaks up of companies and consultancies
hiring in Information security domain.
The below graph shows a detail view of the company size. For instance, 28.9% of
jobs are posted by the companies with the 51- 200 employees.
10https://www.testbytes.net/
2.6 Certification ISO 27001:
• ISO/IEC 27001 is basically an information security standard devised as a part of
ISO/IEC 27000. The last version of ISO/IEC 27001 was published in the year 2013
however, minor updates were added to it till date. ISO/IEC27001 is published by the
International Organization for Standardization(ISO) and the International Electro
technical Commission(IEC) under the joint ISO and IEC subcommittee,
ISO/IEC JTC 1/SC 27
• The sole purpose of ISO/IEC 27001 istobring information security under management
control and to have certain requirements so that standards can be maintained.
Organisations that meet these requirements will be certified by a body after
a successful audit.
• Soon companies will be forced to acquire this certification as a proof of their standard
and for marketing purposes. This will, in turn, create further job opportunities which
people can leverage of
( in INR )
Current salary analysis for employees working in information/cyber security
• 73% of Information Security Companies do not use job portal for Information
Security jobs as they tried a year back.
11https://www.testbytes.net/
• InIndia,overall189Primary hiring Companies and 192Secondary hiring companies
are present to meet the requirement.
• There are 26 recruitment consultant who are primarily focussed on information
Security and 980 others who serve their clients not as primary focus.
• However, to meet the requirements new talents have to sprout. To make that
possible universities and online learning websites are offering courses on
information/cyber security and lots of people are enrolling in it.
• From our observation, Jobs for Information Security are majorly available in
metropolitan cities of India i.e Bengaluru,Chennai,Pune,Delhi,Hyderabad, Mumbai,
Kolkata, Ahmedabad etc.
3. Supply for the immense demand
3.1 IT company and recruitment services
There are
30,000+ vacancies
in cyber security industry
at present
3.2 Universities
• Seeing the immense potential of the job and the business, technology institutes
like, Galgotias University, Graphic Era University- Dehradun, Chandigarh University,
UPES- Dehradun, BITS- Hyderabad have specialised stream for Information
Security and provide a B.Tech degree forthe same and are the manpower suppliers
for InfoSec in India.
12https://www.testbytes.net/
3.5 Online courses
• Udemy one of biggest online learning website offers a course with the name
Web Security: Common Vulnerabilities andTheir Mitigation. (A guide to dealing
with XSS, session hijacking, XSRF, credential management, SQLi and a whole lot
more). The course will enable a person to understand how web security attacks
works, implement secure coding practices and will know how to write codes
which mitigates security risks.
• Cybrary one of the big shots when it comes to offering online courses. Their
online course on Penetration Testing and Ethical Hacking is very useful for those
who are eager to step their foot into information security. This 19 module course
offers extensive study materials for you to be a good ethical hacker.
3.3 Distribution of total number of companies :
3.4 Services by information/cyber security companies
There are lot of companies that exists at present,
most commonly services they offer are
01. Strategic IT security services
02. Vulnerability Assessment
03. Web Application Penetration Testing
04. Penetration Testing Service
05. Application Security Audits
06. Training & Awareness Program
07. Governance, Risk & Compliance
08. CyberSecurity Operations
09. Data Protection Services
10. Identity & Access Engineering
11. Managed Security Services
12. Cyber Defence
13. Managed Vulnerability Scanning
14. Digital Investigation Services
15. Incident Response Services & SOCs
16. Security Assessment, etc.
13https://www.testbytes.net/
4. Inference
Our research of 4 years has coincided to certain evaluations, here they are
• Billions of dollars are flowing to information/cyber security industry. Organisations
are now well aware of the importance of security.
• Owing to the same reason Information/Cybersecurity is going to be one of the
most prominent industry in the future,
• But the demand is not yet met owing to the scarcity in information security related
employees at the moment
• Because of this scarcity, information security is one of the best career to choose
from at this point of time
• Salary packages, especially for the experienced employees are ascending
• Coursera offers a course with the name Cybersecurity Specialization. It’s a 5
module course which covers major aspects of cyber security
• edX offers a course on network security including intrusion detection, evidence
collection, network auditing, and contingency planning against attacks.
According to data collected by softbreaks 89%
hiring request is by firms who are building this
competency.
14https://www.testbytes.net/
• Courses offered by colleges and online learning plenty anyone who has the
basic knowledge of programming, internet and networking can be a certified
information security employee.
• VAPT (Vulnerability Assessment and Penetration Testing ) is mostlydone using
tools any manual tester who does not want to move toward automation
testing can look at this as a career option.
• Network administrators, server administrators withtheirbackground can pick up
VAPT as up skill action.
• People who are professional performance tester, can also fill up VAPT position
since performance testing is also simulation and reporting
• Customers are asking for certificatewhich can serve as a proof for customers that
the solution which is provided for the services is tested and does not have any
risk of security or vulnerability,
• Professional Association / Professional Organisation can be formed in India for
providing professional (Information Security) Certifications:
Aprofessionalassociation(professionalbody,professionalorganization, or professional
society)ismeantforsafeguarding interests of individuals engaged in that profession
and of course, the public interest.
Other duties ofthebody involve monitoringofprofessional educational programs,
and the updating of skills, and thus perform professional certification to indicate
that a person possesses qualifications in the subject area.
15https://www.testbytes.net/
5. References
https://timesofindia.indiatimes.com/business/india-business/over-22000-indian-websites-hacked-between-apr-2017-jan-2018/articleshow/63203998.cms
https://indianexpress.com/article/india/hackers-siphon-rs-70-lakh-from-ludhiana-businessmans-account-4759208/
http://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html
https://www.businesstoday.in/technology/news/93pc-indian-companies-plan-to-inrease-it-security-spending/story/280717.html
https://cybersecurityventures.com/jobs/
https://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html
https://www.csoonline.com/article/3237675/data-protection/the-cio-should-report-to-the-ciso.html
https://economictimes.indiatimes.com/jobs/cybersecurity-jobs-now-at-a-premium-as-india-goes-digital/articleshow/61347784.cms
https://www.cisco.com/c/dam/m/en_au/cybersecurity-reports/pdfs/at-a-glance.pdf
https://www.udemy.com/comptia-network-cert-n10-007-the-total-course/
https://www.udemy.com/web-security-common-vulnerabilities-and-their-mitigation/?couponCode=LIVE_AND_LEARN
https://www.udemy.com/learn-ethical-hacking-from-scratch/
https://www.simplilearn.com/cyber-security/cissp-certification-training
https://www.isc2.org/Certifications/CISSP
http://www.galgotiasuniversity.edu.in/
https://www.geu.ac.in/content/geu/en.html
http://www.bits-pilani.ac.in/hyderabad/
https://www.upes.ac.in/
Contact Us
65,Brodway Suite,Newyork NY,10006
PH: +1 (212) 744-1256
Kalas road,Vishrantwadi,Pune,
Maharashtra-411015
PH: +918113865000

More Related Content

What's hot

Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage PreventionIRJET Journal
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityDr. Umesh Rao.Hodeghatta
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber SecurityRajathV2
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...IOSRjournaljce
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMAM Publications,India
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain BGA Cyber Security
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorFMA Summits
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2FitCEO, Inc. (FCI)
 

What's hot (19)

Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Strategies for Data Leakage Prevention
Strategies for Data Leakage PreventionStrategies for Data Leakage Prevention
Strategies for Data Leakage Prevention
 
Application of Machine Learning in Cyber Security
Application of Machine Learning in Cyber SecurityApplication of Machine Learning in Cyber Security
Application of Machine Learning in Cyber Security
 
Machine learning in Cyber Security
Machine learning in Cyber SecurityMachine learning in Cyber Security
Machine learning in Cyber Security
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
Study and analysis of E-Governance Information Security (InfoSec) in Indian C...
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain Machine Learning in Cyber Security Domain
Machine Learning in Cyber Security Domain
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2Internet of Things - A Different Kind of Scary v2
Internet of Things - A Different Kind of Scary v2
 

Similar to The Business Of Information Security In India - Testbytes

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company Abdulrahman Alamri
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security OverviewRobert Crane
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxchristiandean12115
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptxInfosectrain3
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 

Similar to The Business Of Information Security In India - Testbytes (20)

How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company The Security and Compliance Plan for Maxistar Medical Supplies Company
The Security and Compliance Plan for Maxistar Medical Supplies Company
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 
Microsoft 365 Security Overview
Microsoft 365 Security OverviewMicrosoft 365 Security Overview
Microsoft 365 Security Overview
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docxISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
ISE 510 Final Project Scenario Background Limetree Inc. is a resea.docx
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
assignmenttutorhelp.com
assignmenttutorhelp.comassignmenttutorhelp.com
assignmenttutorhelp.com
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA  Domain 3 Security Operations and Monitoring.pptxCompTIA CySA  Domain 3 Security Operations and Monitoring.pptx
CompTIA CySA Domain 3 Security Operations and Monitoring.pptx
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 

More from Testbytes

What is Shift Left Testing.pdf
What is Shift Left Testing.pdfWhat is Shift Left Testing.pdf
What is Shift Left Testing.pdfTestbytes
 
Manual testing interview questions and answers
Manual testing interview questions and answersManual testing interview questions and answers
Manual testing interview questions and answersTestbytes
 
Testbytes Delivery Methodology - Updated
Testbytes Delivery Methodology - UpdatedTestbytes Delivery Methodology - Updated
Testbytes Delivery Methodology - UpdatedTestbytes
 
Automation testing interview pdf org
Automation testing interview pdf orgAutomation testing interview pdf org
Automation testing interview pdf orgTestbytes
 
Major cyber attacks on india
Major cyber attacks on indiaMajor cyber attacks on india
Major cyber attacks on indiaTestbytes
 
What is SDET? (Software Development Engineer in Test)
What is SDET? (Software Development Engineer in Test)What is SDET? (Software Development Engineer in Test)
What is SDET? (Software Development Engineer in Test)Testbytes
 
Top Security Testing Companies
Top Security Testing CompaniesTop Security Testing Companies
Top Security Testing CompaniesTestbytes
 
Software Testing Tutorial For Beginners | Testbytes
Software Testing Tutorial For Beginners | TestbytesSoftware Testing Tutorial For Beginners | Testbytes
Software Testing Tutorial For Beginners | TestbytesTestbytes
 
Software Testing Methodologies | Testbytes
Software Testing Methodologies | TestbytesSoftware Testing Methodologies | Testbytes
Software Testing Methodologies | TestbytesTestbytes
 
Software Testing Process | Testbytes
Software Testing Process | TestbytesSoftware Testing Process | Testbytes
Software Testing Process | TestbytesTestbytes
 
Testing a GPS application | Testbytes
Testing a GPS application | TestbytesTesting a GPS application | Testbytes
Testing a GPS application | TestbytesTestbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesTestbytes
 
Top 25 Selenium Interview Questions and Answers 2018
Top 25 Selenium Interview Questions and Answers 2018Top 25 Selenium Interview Questions and Answers 2018
Top 25 Selenium Interview Questions and Answers 2018Testbytes
 
Testbytes Project Delivery Methodology
Testbytes Project Delivery MethodologyTestbytes Project Delivery Methodology
Testbytes Project Delivery MethodologyTestbytes
 
Black Box Testing
Black Box TestingBlack Box Testing
Black Box TestingTestbytes
 
Software Testing Interview Questions
Software Testing Interview QuestionsSoftware Testing Interview Questions
Software Testing Interview QuestionsTestbytes
 
Types of software testing
Types of software testingTypes of software testing
Types of software testingTestbytes
 
11 ways you can find bugs in game testing
11 ways you can find bugs in game testing11 ways you can find bugs in game testing
11 ways you can find bugs in game testingTestbytes
 
Best Automation Testing Tools 2018 | Testbytes
Best Automation Testing Tools 2018 | TestbytesBest Automation Testing Tools 2018 | Testbytes
Best Automation Testing Tools 2018 | TestbytesTestbytes
 
Load Testing Tools | Testbytes
Load Testing Tools | TestbytesLoad Testing Tools | Testbytes
Load Testing Tools | TestbytesTestbytes
 

More from Testbytes (20)

What is Shift Left Testing.pdf
What is Shift Left Testing.pdfWhat is Shift Left Testing.pdf
What is Shift Left Testing.pdf
 
Manual testing interview questions and answers
Manual testing interview questions and answersManual testing interview questions and answers
Manual testing interview questions and answers
 
Testbytes Delivery Methodology - Updated
Testbytes Delivery Methodology - UpdatedTestbytes Delivery Methodology - Updated
Testbytes Delivery Methodology - Updated
 
Automation testing interview pdf org
Automation testing interview pdf orgAutomation testing interview pdf org
Automation testing interview pdf org
 
Major cyber attacks on india
Major cyber attacks on indiaMajor cyber attacks on india
Major cyber attacks on india
 
What is SDET? (Software Development Engineer in Test)
What is SDET? (Software Development Engineer in Test)What is SDET? (Software Development Engineer in Test)
What is SDET? (Software Development Engineer in Test)
 
Top Security Testing Companies
Top Security Testing CompaniesTop Security Testing Companies
Top Security Testing Companies
 
Software Testing Tutorial For Beginners | Testbytes
Software Testing Tutorial For Beginners | TestbytesSoftware Testing Tutorial For Beginners | Testbytes
Software Testing Tutorial For Beginners | Testbytes
 
Software Testing Methodologies | Testbytes
Software Testing Methodologies | TestbytesSoftware Testing Methodologies | Testbytes
Software Testing Methodologies | Testbytes
 
Software Testing Process | Testbytes
Software Testing Process | TestbytesSoftware Testing Process | Testbytes
Software Testing Process | Testbytes
 
Testing a GPS application | Testbytes
Testing a GPS application | TestbytesTesting a GPS application | Testbytes
Testing a GPS application | Testbytes
 
The Business Of Information Security In India - Testbytes
The Business Of Information Security In India - TestbytesThe Business Of Information Security In India - Testbytes
The Business Of Information Security In India - Testbytes
 
Top 25 Selenium Interview Questions and Answers 2018
Top 25 Selenium Interview Questions and Answers 2018Top 25 Selenium Interview Questions and Answers 2018
Top 25 Selenium Interview Questions and Answers 2018
 
Testbytes Project Delivery Methodology
Testbytes Project Delivery MethodologyTestbytes Project Delivery Methodology
Testbytes Project Delivery Methodology
 
Black Box Testing
Black Box TestingBlack Box Testing
Black Box Testing
 
Software Testing Interview Questions
Software Testing Interview QuestionsSoftware Testing Interview Questions
Software Testing Interview Questions
 
Types of software testing
Types of software testingTypes of software testing
Types of software testing
 
11 ways you can find bugs in game testing
11 ways you can find bugs in game testing11 ways you can find bugs in game testing
11 ways you can find bugs in game testing
 
Best Automation Testing Tools 2018 | Testbytes
Best Automation Testing Tools 2018 | TestbytesBest Automation Testing Tools 2018 | Testbytes
Best Automation Testing Tools 2018 | Testbytes
 
Load Testing Tools | Testbytes
Load Testing Tools | TestbytesLoad Testing Tools | Testbytes
Load Testing Tools | Testbytes
 

Recently uploaded

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 

Recently uploaded (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 

The Business Of Information Security In India - Testbytes

  • 1. THE BUSINESS OF INFORMATION SECURITY IN INDIA -Testbytes Software
  • 2. 01https://www.testbytes.net/ 1. Introduction...........................................................................................................................................................02 1.1 What’s information security testing?....................................................................................................02 1.2 Rise of information security business in India...................................................................................02 3. Supply for the immense demand........................................................................................................11 4. Inference..................................................................................................................................................................13 5. References......................................................................................................................................................15 3.2 Services by information/cyber security companies........................................................................11 3.1 IT company and recruitment services..................................................................................................11 3.3 Distribution of total number of companies........................................................................................12 3.4 Universities......................................................................................................................................................12 3.5 Online Courses..............................................................................................................................................12 2. The Scarcity, a gold mine for employees.................................................................................03 2.1 Global demand.............................................................................................................................................03 2.2 Demand in India...........................................................................................................................................04 2.3 Hierarchical division of roles in an information security company............................................05 2.4 Major Job requirements in information security industry............................................................06 Table of Contents 2.5A detailed view into the current trends...............................................................................................08 2.6 Certification ISO 27001..............................................................................................................................10
  • 3. 02https://www.testbytes.net/ Stealing information happens frequently in the digital world nowadays. Statistics states that 95% of the breaches affect government, retail and technology-based industries. The most alarming fact about such breaches is that, onceit happens, the devastating effect of it on any organization can be irreversible and grave. Reputation, the most valuable aspect to any business is at stake at any point in time. So protecting it at any cost is cardinal at this juncture of time. In order to protect, companies are willing to invest a great deal of money. In this white paper, we are trying to examine the booming business of information security in India and why a bright future is assured for the candidates who are working and going to work in this industry. Research for this white paper has been done by Softbreaks, an IT recruitment service which offers a complete solution for recruiters, employers, and employees. Sponsors for the research are, Redbytes (App Development Company) and Trackschoolbus (software and hardware providers for complete tracking solution) 1.1 What’s information security testing? Information security testing is mainly performed on platforms, services, applications, systems, devices and processes that handle valuable information in a business. The process is mainly performed with automated tools which can scan and point out vulnerabilities in a system. It can also mimic attacks to fish out the loopholes. 1.2 Rise of information security business in India Recent reports revealed that 93% of Indian companies are planning to increase their IT security spending which is much higher than that of global average. But why? Within the time span of 2017-2018 more than 22,000 websites were hacked and 1. Introduction https://www.trackschoolbus.com https://www.redbytes.in/
  • 4. 03https://www.testbytes.net/ 2.1 Global demand • Cybersecurity business report released on last summer has clearly stated that the shortage of professional in the field of cyber security is immense. In 2016 alone there was 1 million job opening in the sector and it is expected to rise. 5 million (1.5 million) by 2019 • PARC (PaloAltoResearchcentre)renownedresearchandDevelopment Company said that by the end of 2019 there will be huge rise in demand of cyber security professionals. (approximately 6 million globally) • This imbalance in demand and supply of information/cyber security employees will increase the monetary benefits of people who are working in this industry among them 114 were government websites. Among the hacked websites 493 websites were used to spread malwares. Two of the infamous attacks were, In2018,hackers gained access to Andheri Bank accounts by getting hold of the credentials of an employee, they managed tosiphonout Rs.97lakh within no time. Pune’s Cosmos bank had to face cyber attack and the hackers managed to steal Rs. 94 crore by cloning Visa and RuPay cards. 2. The Scarcity, a gold mine for employees Statistics states that 95% of the breaches affect government , retail and technology-based industries.
  • 5. 04https://www.testbytes.net/ 2.2 Demand in India • Economic Times on Mar 19, 2018 NEW DELHI has reported that India India is heading towards scarcity of cyber security professionals, specifically at the leadership level. At Present companies have spiked the salaries by 25%-35% over the past year. • Thehindubusinessline.com has stated that there is a 150 percent jump in cyber security roles in the time period of January 2017 and March 2018. • According to data collected by softbreaks 89% hiring request is by firms who are building this competency. • On April 16 2018 QuartzIndia has reported that there are 30,000 vacancies in cyber/information security industry. • Factor Daily has reported that there is going to be the requirement of 1 million skilled people by the end of 2020 • The profession is going to be so crucial that chief security officers (CSO) and chief information security officers (CISOs) will have to report directly to the CEO not the CIO 93% of Indian companies are planning to increase their IT security spending which is much higher than that of global average.
  • 6. 05https://www.testbytes.net/ 2.3 Hierarchical division of roles in an information security company Abbreviations SSCP: Systems Security Certified Practitioner CCSP: Certified Cloud Security Professional CSSLP: Certified Secure Software Lifecycle Professional CySA+: CompTIA Cyber Security Analyst ECES : EC-Council Certified Encryption Specialist CISSP : Certified Information Systems Security Professional CCSP : Certified Cloud Security Professional CISM : Certified Information Security Manager Security Analyst: He/she should be able to analyse and assess vulnerabilities in software, hardware and network system. Using appropriate tools a security analyst should be able to rectify all the vulnerabilities. Implementation of best practices and recommending solutions is also one of the duties. Complying with security policies and procedures is a must in information security business. Security analysts should make sure company procedures and complying with it.
  • 7. 06https://www.testbytes.net/ Security Engineer: Carries out security monitoring, forensic analysis, should trace out security incidents, log analysis, investigate and utilize new technologies and should be well-versed with processes and tech to increase security capabilities etc. Security Architect: Must be in the forefront of a team when it comes to security system design. He/ she should also be experienced in designing it. Security Administrator: Installationofhugesecurity systemsacross anorganisation is the duty of a security administrator. Security software developer: Software development, traffic analysis, breach detection, virus/malware/spyware etc. detection etc. are the main duties of a security software developer Cryptographer/cryptologist: Encryption of malicious files and understanding it is the main duty of a cryptographer Chief Information security officer: A high level position, with main duty to control and lead the entire information security division Consultant/specialist: Broad responsibilities which includes protecting networks, software, data, systems that work against malicious programs, computers etc. 2.4 Major Job requirements in information security industry Senior consultant – IT consulting – Information Security Requirement 4 years of experience in information security and related functions such as IT audits and IT risk management Certifications required ITIL, PMP , CISA, CISSP, CEH, COBIT, ISO 27001
  • 8. 07https://www.testbytes.net/ Jobdescription–knowledge in industries such as capital markets, telecom, IT/TES etc. .Impeccable knowledge in security testing methodologies and methodologies web server security/ firewalls/ networks/PKI/ TCP/ UNIX/ IP etc. Network / security specialist Requirement 4 years of experience Certifications required: CCNP / CCSP / CISSP / CISM .Job description: should be able to install, configure and administration of network and security equipment, switches, vulnerability assessment, IS audit, security policy design, BCP design and implementation, configuration of firewall etc. Penetration testing engineer Requires 4+ years of experience Job description: should be able to identify and validate high quality MSSps. Apart from that short listing them using effective evaluation methods are also a must Should also be able to review proposals, visit MSSP websites and recognize tools etc. Senior application security analyst Requires 3 years of experience Certifications required, SANS, OSCP,GPAN ,OSCE, CREST .Job description: must be able to review DAST and SAST, experience in dynamic application security testing tools like IBM, Appscan, HP webinspect, Acunetix, Burp Professional etc. Ability to maintain standard such as, SANS Top 25, OSSTMM, PTES, OWASP Top 10 is also recommended. Should have the skill to Consult and coordinate with project teams for security assessment
  • 9. 08https://www.testbytes.net/ Web Application security analyst – VAPT Experience required: 3 years Job description: should beabletohandle manual and automated application tests. Should well-versed in application technologies and its components. Hands-on experience of security code review IT security administrator Experience required: 1 year Job description: Should have good knowledge and experience in RSA Archer, PKI, Nessus and hardware security modules. Experienced with Security frameworks such as SO27001, ITIL, NIST etc. Ability to develop and implement vulnerability testing methodologies. Should be able to configure and conduct automated scanning and limited manual testing. Candidateshouldbeabletoperformapplication code review and training activities. 2.5 A detailed view into the current demand trends Below graph is a comparison to the rise of information security companies and jobs they posted in the period (2015-2018)
  • 10. 09https://www.testbytes.net/ Company size VS jobs posted City wise breaks up of companies and consultancies hiring in Information security domain. The below graph shows a detail view of the company size. For instance, 28.9% of jobs are posted by the companies with the 51- 200 employees.
  • 11. 10https://www.testbytes.net/ 2.6 Certification ISO 27001: • ISO/IEC 27001 is basically an information security standard devised as a part of ISO/IEC 27000. The last version of ISO/IEC 27001 was published in the year 2013 however, minor updates were added to it till date. ISO/IEC27001 is published by the International Organization for Standardization(ISO) and the International Electro technical Commission(IEC) under the joint ISO and IEC subcommittee, ISO/IEC JTC 1/SC 27 • The sole purpose of ISO/IEC 27001 istobring information security under management control and to have certain requirements so that standards can be maintained. Organisations that meet these requirements will be certified by a body after a successful audit. • Soon companies will be forced to acquire this certification as a proof of their standard and for marketing purposes. This will, in turn, create further job opportunities which people can leverage of ( in INR ) Current salary analysis for employees working in information/cyber security • 73% of Information Security Companies do not use job portal for Information Security jobs as they tried a year back.
  • 12. 11https://www.testbytes.net/ • InIndia,overall189Primary hiring Companies and 192Secondary hiring companies are present to meet the requirement. • There are 26 recruitment consultant who are primarily focussed on information Security and 980 others who serve their clients not as primary focus. • However, to meet the requirements new talents have to sprout. To make that possible universities and online learning websites are offering courses on information/cyber security and lots of people are enrolling in it. • From our observation, Jobs for Information Security are majorly available in metropolitan cities of India i.e Bengaluru,Chennai,Pune,Delhi,Hyderabad, Mumbai, Kolkata, Ahmedabad etc. 3. Supply for the immense demand 3.1 IT company and recruitment services There are 30,000+ vacancies in cyber security industry at present 3.2 Universities • Seeing the immense potential of the job and the business, technology institutes like, Galgotias University, Graphic Era University- Dehradun, Chandigarh University, UPES- Dehradun, BITS- Hyderabad have specialised stream for Information Security and provide a B.Tech degree forthe same and are the manpower suppliers for InfoSec in India.
  • 13. 12https://www.testbytes.net/ 3.5 Online courses • Udemy one of biggest online learning website offers a course with the name Web Security: Common Vulnerabilities andTheir Mitigation. (A guide to dealing with XSS, session hijacking, XSRF, credential management, SQLi and a whole lot more). The course will enable a person to understand how web security attacks works, implement secure coding practices and will know how to write codes which mitigates security risks. • Cybrary one of the big shots when it comes to offering online courses. Their online course on Penetration Testing and Ethical Hacking is very useful for those who are eager to step their foot into information security. This 19 module course offers extensive study materials for you to be a good ethical hacker. 3.3 Distribution of total number of companies : 3.4 Services by information/cyber security companies There are lot of companies that exists at present, most commonly services they offer are 01. Strategic IT security services 02. Vulnerability Assessment 03. Web Application Penetration Testing 04. Penetration Testing Service 05. Application Security Audits 06. Training & Awareness Program 07. Governance, Risk & Compliance 08. CyberSecurity Operations 09. Data Protection Services 10. Identity & Access Engineering 11. Managed Security Services 12. Cyber Defence 13. Managed Vulnerability Scanning 14. Digital Investigation Services 15. Incident Response Services & SOCs 16. Security Assessment, etc.
  • 14. 13https://www.testbytes.net/ 4. Inference Our research of 4 years has coincided to certain evaluations, here they are • Billions of dollars are flowing to information/cyber security industry. Organisations are now well aware of the importance of security. • Owing to the same reason Information/Cybersecurity is going to be one of the most prominent industry in the future, • But the demand is not yet met owing to the scarcity in information security related employees at the moment • Because of this scarcity, information security is one of the best career to choose from at this point of time • Salary packages, especially for the experienced employees are ascending • Coursera offers a course with the name Cybersecurity Specialization. It’s a 5 module course which covers major aspects of cyber security • edX offers a course on network security including intrusion detection, evidence collection, network auditing, and contingency planning against attacks. According to data collected by softbreaks 89% hiring request is by firms who are building this competency.
  • 15. 14https://www.testbytes.net/ • Courses offered by colleges and online learning plenty anyone who has the basic knowledge of programming, internet and networking can be a certified information security employee. • VAPT (Vulnerability Assessment and Penetration Testing ) is mostlydone using tools any manual tester who does not want to move toward automation testing can look at this as a career option. • Network administrators, server administrators withtheirbackground can pick up VAPT as up skill action. • People who are professional performance tester, can also fill up VAPT position since performance testing is also simulation and reporting • Customers are asking for certificatewhich can serve as a proof for customers that the solution which is provided for the services is tested and does not have any risk of security or vulnerability, • Professional Association / Professional Organisation can be formed in India for providing professional (Information Security) Certifications: Aprofessionalassociation(professionalbody,professionalorganization, or professional society)ismeantforsafeguarding interests of individuals engaged in that profession and of course, the public interest. Other duties ofthebody involve monitoringofprofessional educational programs, and the updating of skills, and thus perform professional certification to indicate that a person possesses qualifications in the subject area.
  • 16. 15https://www.testbytes.net/ 5. References https://timesofindia.indiatimes.com/business/india-business/over-22000-indian-websites-hacked-between-apr-2017-jan-2018/articleshow/63203998.cms https://indianexpress.com/article/india/hackers-siphon-rs-70-lakh-from-ludhiana-businessmans-account-4759208/ http://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html https://www.businesstoday.in/technology/news/93pc-indian-companies-plan-to-inrease-it-security-spending/story/280717.html https://cybersecurityventures.com/jobs/ https://www.csoonline.com/article/2953258/it-careers/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html https://www.csoonline.com/article/3237675/data-protection/the-cio-should-report-to-the-ciso.html https://economictimes.indiatimes.com/jobs/cybersecurity-jobs-now-at-a-premium-as-india-goes-digital/articleshow/61347784.cms https://www.cisco.com/c/dam/m/en_au/cybersecurity-reports/pdfs/at-a-glance.pdf https://www.udemy.com/comptia-network-cert-n10-007-the-total-course/ https://www.udemy.com/web-security-common-vulnerabilities-and-their-mitigation/?couponCode=LIVE_AND_LEARN https://www.udemy.com/learn-ethical-hacking-from-scratch/ https://www.simplilearn.com/cyber-security/cissp-certification-training https://www.isc2.org/Certifications/CISSP http://www.galgotiasuniversity.edu.in/ https://www.geu.ac.in/content/geu/en.html http://www.bits-pilani.ac.in/hyderabad/ https://www.upes.ac.in/ Contact Us 65,Brodway Suite,Newyork NY,10006 PH: +1 (212) 744-1256 Kalas road,Vishrantwadi,Pune, Maharashtra-411015 PH: +918113865000