SlideShare a Scribd company logo
In association with Presented by Supported by 
IMMEDIATE ACTION 
NEEDED TO TIGHTEN UP 
Ambarish Deshpande, MD - India & SAARC, Blue Coat 
SEPT 19, 2014 Hotel Digital Security Seminar
Presented by 
In association with 
Supported by 
Ambarish Deshpande 
Ambarish has 19 successful years of 
building teams, driving market 
expansion and putting successful 
channel strategies in place. 
A leading cyber security voice, he 
has worked at McAfee, Symantec, 
IronPort, Samsonite and JVC. 
He is a graduate of the University of 
Mumbai with a post graduate degree 
in management from NMIMS, 
Mumbai. 
By X Events Hospitality (www.x-events.in) 
2 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by
Presented by 
In association with 
Supported by 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
4
Presented by 
In association with 
Supported by 
Shifting attack strategies 
¨ Hacktivism 
¨ State-sponsored attacks 
¨ IP attacks/breaches 
PROFIT DRIVEN 
¨ Cyber criminals are 
becoming organized 
¨ Underground economy 
exists to support 
cybercrime 
SHIFTING METHODS 
• Exploiting both technical 
and human weaknesses 
MORE THAN $$ 
TARGETS 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
In the absence of security 
education or experience, 
people (employees, users, 
customers, …) naturally make 
poor security decisions with 
technology 
Corollary: Systems needs to be easy to use 
securely and difficult to use insecurely 
Presented by 
In association with 
Supported by 
Murphy’s Law 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
90% of companies had a breach in the last 24 months 
Prevention is not enough… …Need Retrospective 
Investigation 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Encrypted traffic exploding 
¨ Encryption integral to Cloud Computing 
¤ E-commerce, Web apps, email 
and VPNs. 
¤ Sharepoint, Salesforce.com, SAP, 
Oracle, WebEx, Windows Update, 
Google business apps (Gmail, 
docs, sites), Instant Messaging 
¨ SSL ~25-70% of Traffic 
¨ Network / Security Appliances blind to 
contents within SSL 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Embracing new technologies 
Empowered Users are increasing 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Reduce time-to-detection 
Initial Attack to Compromise Initial Compromise to Discovery 
weeks 
2% Seconds 
11% Minutes 
Days 
13% 
Hours 
60% 
13% 
84% 
Years 
4% 
Months 
62% 
Hours 
9% 
Days 
11% 
Weeks 
12% 
78% 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Fortify security to prepare for new technology initiatives 
Presented by 
In association with 
Supported by 
Mobile apps 
Mobile devices 
Social media 
SaaS 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Fortify security to prepare for new technology initiatives 
Mobile apps 
Mobile devices 
Social media 
SaaS 
SSL Visibility 
Content Analysis 
Malware Analysis 
Security Analytics 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Fortify security to prepare for new technology initiatives 
Presented by 
In association with 
Supported by 
Mobile apps 
Mobile devices 
Social media 
SaaS 
SSL Visibility 
Content Analysis 
Malware Analysis 
Security Analytics 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Most dreaded questions from the CXO’S 
Who did this to us ? 
How did they do it ? 
What systems and data were 
affected ? 
Can we be sure it is over ? 
Can it happen again ? 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Blue Coat’s lifecycle defense for business assurance 
Presented by 
In association with 
Supported by 
Incident 
Resolution 
Investigate & 
Remediate Breach 
Threat Profiling 
& Eradication 
Ongoing 
Operations 
Detect & Protect 
Block All 
Known Threats 
GLOBAL 
INTELLIGENC 
E 
NETWORK 
Incident 
Containment 
Analyze & Mitigate 
Novel Threat 
Interpretation 
Days 
13 
% 
weeks 
2% 
Seconds 
11 
% 
Hours 
60% 
Minutes 
13 
% 
84 
% 
Years 
4% 
Months 
62% 
Hours 
9% 
Days 
11% 
Weeks 
12% 
78 
% 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
Revisiting assumptions 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
Presented by 
In association with 
Supported by 
About us 
HATT is India's young and premium 
community for CXOs from the 
Hospitality, Healthcare, Aviation, Travel 
and Tourism industries. 
o With over 1,000 members across 
India, we are now poised to expand 
globally with a presence in South East 
Asia and the Middle East by 2016. 
www.hattforum.com 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
17 
X Events manages & supports events 
exclusively for the hospitality & travel 
industries. 
o Our USP is that we are hoteliers 
by training. We focus on the two 
most important aspects of an 
event; content quality and impact. 
o We do it because we believe in it. 
www.x-events.in 
By X Events Hospitality (www.x-events.in) 
FB/hattforum
Presented by 
In association with 
Supported by 
Our host – Brian Pereira 
Brian is a veteran technology 
journalist with two decades of 
experience. He has served as 
editor for two magazines: CHIP 
and InformationWeek India. 
He is a respected speaker & host 
at conferences worldwide. 
In his current role at Hannover 
Milano Fairs India, Brian serves 
as project head for CeBIT 
Global Conferences, 
the world's largest ICT fair that 
will debut in India this November, 
in Bangalore. 
By X Events Hospitality (www.x-events.in) 
18 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
19 
Five expert speakers 
1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, 
CEO, SecurBay Services. 
2. The immediate action needed to tighten up (Priority list, cost, internal policies) 
- Ambarish Deshpande, MD - India & SAARC, Blue Coat 
3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, 
Seclore 
4. How to build a business case & get the management's attention - Dhananjay 
Rokde, CISO, Cox & Kings Group. 
5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk 
Services, Deloitte India. 
By X Events Hospitality (www.x-events.in) 
The seminar schedule
Presented by 
In association with 
Supported by 
Our sponsors & supporters 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
20 
Thank You
In association with Presented by Supported by 
HOTEL DIGITAL SECURITY SEMINAR 
SEPT 19, 2014 www.x-events.in

More Related Content

Similar to Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)

Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...XEventsHospitality
 
The latest threats on digital security -
The latest threats on digital security  - The latest threats on digital security  -
The latest threats on digital security - Santosh Satam
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodSalil Kumar Subramony
 
India's Most Inventive Network Security Service Providers in 2023.pdf
India's Most Inventive Network Security Service Providers in 2023.pdfIndia's Most Inventive Network Security Service Providers in 2023.pdf
India's Most Inventive Network Security Service Providers in 2023.pdfinsightssuccess2
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)Barry Newman
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdfinsightssuccess2
 
India security conclave brochure 2016
India security conclave brochure 2016India security conclave brochure 2016
India security conclave brochure 2016Cruxcreative
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019Merry D'souza
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfCIO Look Magazine
 

Similar to Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14) (20)

Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar...
 
The latest threats on digital security -
The latest threats on digital security  - The latest threats on digital security  -
The latest threats on digital security -
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017Insights success the 10 most trusted cyber security companies in 2nd nov 2017
Insights success the 10 most trusted cyber security companies in 2nd nov 2017
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
 
Veracode CISO Round Table
Veracode CISO Round TableVeracode CISO Round Table
Veracode CISO Round Table
 
Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
 
India's Most Inventive Network Security Service Providers in 2023.pdf
India's Most Inventive Network Security Service Providers in 2023.pdfIndia's Most Inventive Network Security Service Providers in 2023.pdf
India's Most Inventive Network Security Service Providers in 2023.pdf
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
AfriSecure Info Pack (5)
AfriSecure Info Pack (5)AfriSecure Info Pack (5)
AfriSecure Info Pack (5)
 
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
The Most Trusted Cyber Threat Solution Providers in India  2023.pdfThe Most Trusted Cyber Threat Solution Providers in India  2023.pdf
The Most Trusted Cyber Threat Solution Providers in India 2023.pdf
 
India security conclave brochure 2016
India security conclave brochure 2016India security conclave brochure 2016
India security conclave brochure 2016
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
Marlabs corporate deck july 2018
Marlabs corporate deck july 2018Marlabs corporate deck july 2018
Marlabs corporate deck july 2018
 
The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019The 10 most recommended bio metric companies to watch in 2019
The 10 most recommended bio metric companies to watch in 2019
 
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdfThe Most Trustworthy Enterprise Security Solution Providers of India.pdf
The Most Trustworthy Enterprise Security Solution Providers of India.pdf
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...Product School
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 

Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)

  • 1. In association with Presented by Supported by IMMEDIATE ACTION NEEDED TO TIGHTEN UP Ambarish Deshpande, MD - India & SAARC, Blue Coat SEPT 19, 2014 Hotel Digital Security Seminar
  • 2. Presented by In association with Supported by Ambarish Deshpande Ambarish has 19 successful years of building teams, driving market expansion and putting successful channel strategies in place. A leading cyber security voice, he has worked at McAfee, Symantec, IronPort, Samsonite and JVC. He is a graduate of the University of Mumbai with a post graduate degree in management from NMIMS, Mumbai. By X Events Hospitality (www.x-events.in) 2 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 3. Presented by In association with Supported by
  • 4. Presented by In association with Supported by By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 4
  • 5. Presented by In association with Supported by Shifting attack strategies ¨ Hacktivism ¨ State-sponsored attacks ¨ IP attacks/breaches PROFIT DRIVEN ¨ Cyber criminals are becoming organized ¨ Underground economy exists to support cybercrime SHIFTING METHODS • Exploiting both technical and human weaknesses MORE THAN $$ TARGETS By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 6. In the absence of security education or experience, people (employees, users, customers, …) naturally make poor security decisions with technology Corollary: Systems needs to be easy to use securely and difficult to use insecurely Presented by In association with Supported by Murphy’s Law By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 7. Presented by In association with Supported by 90% of companies had a breach in the last 24 months Prevention is not enough… …Need Retrospective Investigation By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 8. Presented by In association with Supported by Encrypted traffic exploding ¨ Encryption integral to Cloud Computing ¤ E-commerce, Web apps, email and VPNs. ¤ Sharepoint, Salesforce.com, SAP, Oracle, WebEx, Windows Update, Google business apps (Gmail, docs, sites), Instant Messaging ¨ SSL ~25-70% of Traffic ¨ Network / Security Appliances blind to contents within SSL By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 9. Presented by In association with Supported by Embracing new technologies Empowered Users are increasing By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 10. Presented by In association with Supported by Reduce time-to-detection Initial Attack to Compromise Initial Compromise to Discovery weeks 2% Seconds 11% Minutes Days 13% Hours 60% 13% 84% Years 4% Months 62% Hours 9% Days 11% Weeks 12% 78% By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 11. Fortify security to prepare for new technology initiatives Presented by In association with Supported by Mobile apps Mobile devices Social media SaaS By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 12. Presented by In association with Supported by Fortify security to prepare for new technology initiatives Mobile apps Mobile devices Social media SaaS SSL Visibility Content Analysis Malware Analysis Security Analytics By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 13. Fortify security to prepare for new technology initiatives Presented by In association with Supported by Mobile apps Mobile devices Social media SaaS SSL Visibility Content Analysis Malware Analysis Security Analytics By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 14. Presented by In association with Supported by Most dreaded questions from the CXO’S Who did this to us ? How did they do it ? What systems and data were affected ? Can we be sure it is over ? Can it happen again ? By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 15. Blue Coat’s lifecycle defense for business assurance Presented by In association with Supported by Incident Resolution Investigate & Remediate Breach Threat Profiling & Eradication Ongoing Operations Detect & Protect Block All Known Threats GLOBAL INTELLIGENC E NETWORK Incident Containment Analyze & Mitigate Novel Threat Interpretation Days 13 % weeks 2% Seconds 11 % Hours 60% Minutes 13 % 84 % Years 4% Months 62% Hours 9% Days 11% Weeks 12% 78 % By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 16. Presented by In association with Supported by Revisiting assumptions By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in)
  • 17. Presented by In association with Supported by About us HATT is India's young and premium community for CXOs from the Hospitality, Healthcare, Aviation, Travel and Tourism industries. o With over 1,000 members across India, we are now poised to expand globally with a presence in South East Asia and the Middle East by 2016. www.hattforum.com Hotel Digital Security Seminar & Webinar, Sept 19, 2014 17 X Events manages & supports events exclusively for the hospitality & travel industries. o Our USP is that we are hoteliers by training. We focus on the two most important aspects of an event; content quality and impact. o We do it because we believe in it. www.x-events.in By X Events Hospitality (www.x-events.in) FB/hattforum
  • 18. Presented by In association with Supported by Our host – Brian Pereira Brian is a veteran technology journalist with two decades of experience. He has served as editor for two magazines: CHIP and InformationWeek India. He is a respected speaker & host at conferences worldwide. In his current role at Hannover Milano Fairs India, Brian serves as project head for CeBIT Global Conferences, the world's largest ICT fair that will debut in India this November, in Bangalore. By X Events Hospitality (www.x-events.in) 18 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 19. Presented by In association with Supported by Hotel Digital Security Seminar & Webinar, Sept 19, 2014 19 Five expert speakers 1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, CEO, SecurBay Services. 2. The immediate action needed to tighten up (Priority list, cost, internal policies) - Ambarish Deshpande, MD - India & SAARC, Blue Coat 3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, Seclore 4. How to build a business case & get the management's attention - Dhananjay Rokde, CISO, Cox & Kings Group. 5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk Services, Deloitte India. By X Events Hospitality (www.x-events.in) The seminar schedule
  • 20. Presented by In association with Supported by Our sponsors & supporters By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 20 Thank You
  • 21. In association with Presented by Supported by HOTEL DIGITAL SECURITY SEMINAR SEPT 19, 2014 www.x-events.in