SlideShare uma empresa Scribd logo
1 de 27
Baixar para ler offline
Managing Frequently Overlooked Risks
& Threats (FORTS) in Corporations
Dinesh O Bareja
• Where Risks & Threats come from
• “Biggies” in the RaT Lists
• (Generally) Overlooked RaTs
• Course Correction Options
• Case Studies

Copenhagen Compliance, Mumbai.
October 08,2013
Present day RaTs usually arise from …
•
•
•
•
•

Non-compliance
Competition
People, Processes, Technology Weaknesses
Ignorance, Errors, Accidents
Manual Controls

Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013
Top 10 Enterprise Security Predictions

1. Targeted Attacks
2. Signed malware
4. Non-Windows attacks
5. Ransomware
6. Impact of changing regulations
7. Need for incident response
8. Security Process Automation
9. Connected Devices
10. Bring Your Own Application
(BYOA)

Copenhagen Compliance, Mumbai.
October 08,2013
However, today I am not
here to talk about the ‘big’
bad stuff
Why !
Because every InfoSec
effort is made to secure the
enterprise from tsunamis, Today’s focus
tidal waves, pandemics etc is on this little
guy and his
small friends
Copenhagen Compliance, Mumbai.
October 08,2013
The story of the ant felling an elephant is part
of folklore and may be true.
Human tendency is to shut down risk antennae
when faced with unfamiliar scenarios.
These are explained with cute explanations like
“unknown knowns”, “black swans”, “pig out of
the sty”
All this time destiny / fate / fatality will be
staring in the face but still you don’t buy
insurance
Copenhagen Compliance, Mumbai.
October 08,2013
Hardening
Configuration
Patch Mgt
Incident
DR

Anti Piracy: Software License Management

VAPT

Encryption (Voice/Data)

Mobile Computing

Data Classification

Home Computing

Spear Phishing
Secure Software Development

Privilege User and God
Management
Background Checks, Exit Programs

Copenhagen Compliance, Mumbai.
October 08,2013
• Asset Management (disposal):
– Photocopier hard drive goes out during maintenance
– Recirculation and trade-in of assets

• Background Check:
– InfoSec consultant is an unknown person who is provided access
to all crown jewels
– Simple NDAs
– Guards (on premises and in cash-vans)

• God’s and Godmen:
– SysAdmin / DataAdmin / DLP Admin is an unknown entrusted
with safekeeping
– DLP Admin – someone who has to power to read all mails

• 1
Copenhagen Compliance, Mumbai.
October 08,2013
• Blind Faith in Technology:
– Logs are collected but not read; one is safe because
the appliance did not give an alert
– Complacence after implementation of security
technology
– InfoSec consultant provided advice is always correct

• Me, My Machine at my Home
• Overlooking Social Media
• Awareness and Training is a common function
leading to lack of awareness culture
Copenhagen Compliance, Mumbai.
October 08,2013
• Not mentioned in this RaT list
– Hardware backdoors
– Software backdoors
– State Monitoring (PRISM, IMS)
– Information Sharing
– Passwords

Copenhagen Compliance, Mumbai.
October 08,2013
• Include cost-to-enterprise in risk assessment
• Prioritize risk icebergs based on impact size
rather than just hype and bug PR
• Start a bug bounty program and enable 24x7
network testing (nearly) free-of-cost

Copenhagen Compliance, Mumbai.
October 08,2013
• Re-look at those itsy bitsy pieces of technology
feel-good paraphernalia around the
organization: fingerprint readers, access cards,
certificate on your wall
• Reach out to the ethical InfoSec community

Copenhagen Compliance, Mumbai.
October 08,2013
It has happened to the best and to the
biggest – Governments, corporations,
individuals
They have all been felled by an unknown
blackhat, or some virus / APT, or by virtue
of non-compliance or overlooking the
‘small’ stuff
Some recovered, some died – but one
thing is common: all suffered a big dent in
their reputation plus financial losses and
significant setbacks in their business.
Copenhagen Compliance, Mumbai.
October 08,2013
•
•
•
•

Up to 12,000 laptops are lost in United States airports each week
Between 65 and 70 percent of lost laptops are never reclaimed
Most laptops are lost at security checkpoints
53 percent of business travelers surveyed carry sensitive corporate
information on their laptop
• 65 percent of those who carry confidential information have not
taken steps to protect it while traveling
• 42 percent of respondents say they do not back up their data
- Lost Laptop and Business Traveler Study by Dell and the Ponemon Institute
The first study of its kind by wsa carried out in the first half of 2008. The Ponemon Institute surveyed 106 United
States airports and over 800 business travelers to understand the frequency with which laptops are lost in
airports and the steps business travelers are taking to protect sensitive information on corporate systems.

Copenhagen Compliance, Mumbai.
October 08,2013
•
•
•
•
•
•
•

•
SONY
•
RSA
•
Boeing
Lockheed Martin•
HB Gary
•
PMO
Navy, Air Force
•

Laptop Story
Terry Childs
License story
Chairman’s
statement
Aramco + Iran’s
Nuclear Facility
US Banks

Copenhagen Compliance, Mumbai.
October 08,2013
Terry Childs
Judge ordered former city worker who locked San
Francisco out of its main computer network for 12
days in 2008 to pay nearly $1.5 million in restitution
Prosecutors said.' Keep in mind the network never
went down and no user services were denied, and
given that Terry Childs was the only one who had
admin access (for years prior) it is difficult to
understand how they came up in $1.5 million in
costs

In June 2008, he was arrested on computer
crime charges for refusing to divulge the passwords
to San Francisco's FiberWAN system to his
supervisors.
After being arrested he was held on $5 million
bail. He is also accused of tampering with the
network and subversively avoiding auditing checks

Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013
March 2000 :
• WINTECH COMPUTERS circa late 90’s
'I want to be the Bill
Gates of India's
170 operational centers all over the
computer education
country, nearly 1,700 employees, and at
industry.'
least 40 students per institute
– Murtuza Mathani,
Wintech CEO.
Raid carried out on the company in
September 2000 by Mumbai Police and
officials a private investigating firm.
Wintech Computers had no license to teach May 2001:
Oracle® software
Mathani's
whereabouts
The Rest is History
unknown

Copenhagen Compliance, Mumbai.
October 08,2013
There are many ‘small’ things lying around with enough
power to trip your organization
If you have not yet assimilated information security and
management into the mainstream of your business…
wake up !

Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013
There are many ‘small’ things lying around with enough
power to trip your organization
If you have not yet assimilated information security and
management into the mainstream of your business…
wake up !
Plough the InfoSec field deeper, as deep as can do!
Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013
•

Professional Positions

–
–
–
–
•

Open Security Alliance (Principal and CEO)
Jharkhand Police (Cyber Surveillance Advisor)
Pyramid Cyber Security & Forensics (Principal Advisor)
Indian Honeynet Project (Co Founder)

Professional skills and special interest areas

– Security Consulting and Advisory services for IS Strategy, Architecture,
Analysis, Policy Development, Optimization
– Technologies: SOC, DLP, IRM, SIEM…
– Practices: Incident Response, SAM, Forensics, Regulatory guidance..
– Community: mentoring, training, citizen outreach, India research..
•

Blogger, Occasional columnist, wannabe photographer, research & survey

Copenhagen Compliance, Mumbai.
October 08,2013
Contact Information
E: dinesh@opensecurityalliance.org

T: +91.9769890505

Twitter: @bizsprite

Facebook: dineshobareja

L: http://in.linkedin.com/in/dineshbareja

Acknowledgements & Disclaimer
Various resources on the internet have been referred to contribute to the information presented.
Images have been acknowledged where possible and if we have infringed on your rights it is
unintentional – we assure you the removal immediately on being notified. The use of company
names, brand names, trade marks are only to facilitate understanding of the message being
communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the
author(s), unless otherwise mentioned. Apologies for any infraction, as this would be wholly
unintentional, and objections may please be communicated to us for remediation of the
erroneous action(s).

Copenhagen Compliance, Mumbai.
October 08,2013
Copenhagen Compliance, Mumbai.
October 08,2013

Mais conteúdo relacionado

Mais procurados

2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesPaige Rasid
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaZsolt Nemeth
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityRahul Tyagi
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain SecurityICSA, LLC
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictZsolt Nemeth
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityMastel Indonesia
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017NRC
 

Mais procurados (20)

Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in AfricaThe Realities and Challenges of Cyber Crime and Cyber Security in Africa
The Realities and Challenges of Cyber Crime and Cyber Security in Africa
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Cyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe SecurityCyber Risk Quantification for Employees | Safe Security
Cyber Risk Quantification for Employees | Safe Security
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Outlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber SecurityOutlook Briefing 2016: Cyber Security
Outlook Briefing 2016: Cyber Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 

Destaque

Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

Destaque (10)

Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Semelhante a Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 

Semelhante a Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations (20)

Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Ijnsa050215
Ijnsa050215Ijnsa050215
Ijnsa050215
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 

Mais de Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Mais de Dinesh O Bareja (8)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Último

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Último (20)

Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations

  • 1. Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations Dinesh O Bareja
  • 2. • Where Risks & Threats come from • “Biggies” in the RaT Lists • (Generally) Overlooked RaTs • Course Correction Options • Case Studies Copenhagen Compliance, Mumbai. October 08,2013
  • 3. Present day RaTs usually arise from … • • • • • Non-compliance Competition People, Processes, Technology Weaknesses Ignorance, Errors, Accidents Manual Controls Copenhagen Compliance, Mumbai. October 08,2013
  • 6. Top 10 Enterprise Security Predictions 1. Targeted Attacks 2. Signed malware 4. Non-Windows attacks 5. Ransomware 6. Impact of changing regulations 7. Need for incident response 8. Security Process Automation 9. Connected Devices 10. Bring Your Own Application (BYOA) Copenhagen Compliance, Mumbai. October 08,2013
  • 7. However, today I am not here to talk about the ‘big’ bad stuff Why ! Because every InfoSec effort is made to secure the enterprise from tsunamis, Today’s focus tidal waves, pandemics etc is on this little guy and his small friends Copenhagen Compliance, Mumbai. October 08,2013
  • 8. The story of the ant felling an elephant is part of folklore and may be true. Human tendency is to shut down risk antennae when faced with unfamiliar scenarios. These are explained with cute explanations like “unknown knowns”, “black swans”, “pig out of the sty” All this time destiny / fate / fatality will be staring in the face but still you don’t buy insurance Copenhagen Compliance, Mumbai. October 08,2013
  • 9. Hardening Configuration Patch Mgt Incident DR Anti Piracy: Software License Management VAPT Encryption (Voice/Data) Mobile Computing Data Classification Home Computing Spear Phishing Secure Software Development Privilege User and God Management Background Checks, Exit Programs Copenhagen Compliance, Mumbai. October 08,2013
  • 10. • Asset Management (disposal): – Photocopier hard drive goes out during maintenance – Recirculation and trade-in of assets • Background Check: – InfoSec consultant is an unknown person who is provided access to all crown jewels – Simple NDAs – Guards (on premises and in cash-vans) • God’s and Godmen: – SysAdmin / DataAdmin / DLP Admin is an unknown entrusted with safekeeping – DLP Admin – someone who has to power to read all mails • 1 Copenhagen Compliance, Mumbai. October 08,2013
  • 11. • Blind Faith in Technology: – Logs are collected but not read; one is safe because the appliance did not give an alert – Complacence after implementation of security technology – InfoSec consultant provided advice is always correct • Me, My Machine at my Home • Overlooking Social Media • Awareness and Training is a common function leading to lack of awareness culture Copenhagen Compliance, Mumbai. October 08,2013
  • 12. • Not mentioned in this RaT list – Hardware backdoors – Software backdoors – State Monitoring (PRISM, IMS) – Information Sharing – Passwords Copenhagen Compliance, Mumbai. October 08,2013
  • 13. • Include cost-to-enterprise in risk assessment • Prioritize risk icebergs based on impact size rather than just hype and bug PR • Start a bug bounty program and enable 24x7 network testing (nearly) free-of-cost Copenhagen Compliance, Mumbai. October 08,2013
  • 14. • Re-look at those itsy bitsy pieces of technology feel-good paraphernalia around the organization: fingerprint readers, access cards, certificate on your wall • Reach out to the ethical InfoSec community Copenhagen Compliance, Mumbai. October 08,2013
  • 15. It has happened to the best and to the biggest – Governments, corporations, individuals They have all been felled by an unknown blackhat, or some virus / APT, or by virtue of non-compliance or overlooking the ‘small’ stuff Some recovered, some died – but one thing is common: all suffered a big dent in their reputation plus financial losses and significant setbacks in their business. Copenhagen Compliance, Mumbai. October 08,2013
  • 16. • • • • Up to 12,000 laptops are lost in United States airports each week Between 65 and 70 percent of lost laptops are never reclaimed Most laptops are lost at security checkpoints 53 percent of business travelers surveyed carry sensitive corporate information on their laptop • 65 percent of those who carry confidential information have not taken steps to protect it while traveling • 42 percent of respondents say they do not back up their data - Lost Laptop and Business Traveler Study by Dell and the Ponemon Institute The first study of its kind by wsa carried out in the first half of 2008. The Ponemon Institute surveyed 106 United States airports and over 800 business travelers to understand the frequency with which laptops are lost in airports and the steps business travelers are taking to protect sensitive information on corporate systems. Copenhagen Compliance, Mumbai. October 08,2013
  • 17. • • • • • • • • SONY • RSA • Boeing Lockheed Martin• HB Gary • PMO Navy, Air Force • Laptop Story Terry Childs License story Chairman’s statement Aramco + Iran’s Nuclear Facility US Banks Copenhagen Compliance, Mumbai. October 08,2013
  • 18. Terry Childs Judge ordered former city worker who locked San Francisco out of its main computer network for 12 days in 2008 to pay nearly $1.5 million in restitution Prosecutors said.' Keep in mind the network never went down and no user services were denied, and given that Terry Childs was the only one who had admin access (for years prior) it is difficult to understand how they came up in $1.5 million in costs In June 2008, he was arrested on computer crime charges for refusing to divulge the passwords to San Francisco's FiberWAN system to his supervisors. After being arrested he was held on $5 million bail. He is also accused of tampering with the network and subversively avoiding auditing checks Copenhagen Compliance, Mumbai. October 08,2013
  • 20. March 2000 : • WINTECH COMPUTERS circa late 90’s 'I want to be the Bill Gates of India's 170 operational centers all over the computer education country, nearly 1,700 employees, and at industry.' least 40 students per institute – Murtuza Mathani, Wintech CEO. Raid carried out on the company in September 2000 by Mumbai Police and officials a private investigating firm. Wintech Computers had no license to teach May 2001: Oracle® software Mathani's whereabouts The Rest is History unknown Copenhagen Compliance, Mumbai. October 08,2013
  • 21. There are many ‘small’ things lying around with enough power to trip your organization If you have not yet assimilated information security and management into the mainstream of your business… wake up ! Copenhagen Compliance, Mumbai. October 08,2013
  • 23. There are many ‘small’ things lying around with enough power to trip your organization If you have not yet assimilated information security and management into the mainstream of your business… wake up ! Plough the InfoSec field deeper, as deep as can do! Copenhagen Compliance, Mumbai. October 08,2013
  • 25. • Professional Positions – – – – • Open Security Alliance (Principal and CEO) Jharkhand Police (Cyber Surveillance Advisor) Pyramid Cyber Security & Forensics (Principal Advisor) Indian Honeynet Project (Co Founder) Professional skills and special interest areas – Security Consulting and Advisory services for IS Strategy, Architecture, Analysis, Policy Development, Optimization – Technologies: SOC, DLP, IRM, SIEM… – Practices: Incident Response, SAM, Forensics, Regulatory guidance.. – Community: mentoring, training, citizen outreach, India research.. • Blogger, Occasional columnist, wannabe photographer, research & survey Copenhagen Compliance, Mumbai. October 08,2013
  • 26. Contact Information E: dinesh@opensecurityalliance.org T: +91.9769890505 Twitter: @bizsprite Facebook: dineshobareja L: http://in.linkedin.com/in/dineshbareja Acknowledgements & Disclaimer Various resources on the internet have been referred to contribute to the information presented. Images have been acknowledged where possible and if we have infringed on your rights it is unintentional – we assure you the removal immediately on being notified. The use of company names, brand names, trade marks are only to facilitate understanding of the message being communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this would be wholly unintentional, and objections may please be communicated to us for remediation of the erroneous action(s). Copenhagen Compliance, Mumbai. October 08,2013