SlideShare uma empresa Scribd logo
1 de 11
© www.IndiaIndian Thoughts in
I N F I N I T E C H A N N E L S T O W A T C H
A N D S E C U R E
It is critical and can be destructive...
Yet few seem to be serious about it...
Some things that you wanted to know but did not know whom to ask.. , or, things you knew
but did not have in place to provide the desired, or required, level of safeguards
June 20, 2013
© www.IndiaIndian Thoughts in
Life‟s Dimensions
• Earth – we live on
• Water – is the
elixir of life
• Air – we
breathe to live
© www.IndiaIndian Thoughts in
Internet: The Fourth Dimension
Normal
doesn‟t
apply
anymore!
© www.IndiaIndian Thoughts in
Awareness and Training
• Is your IS team “aware” ----
about security
• Is your IS team “trained” --- to
respond, audit, controls testing
• Awareness is clubbed with
Training and handled by the
Training or HR team and gets a
backseat
Training and
Awareness
have
different
objectives
and MUST
BE TREATED
DIFERENTLY
© www.IndiaIndian Thoughts in
Awareness is the most
abused term in the
Information Security
lexicon. Every ‘expert’
swears this as the best
and most effective
antidote for InfoSec
ills, but a few have
walked the talk or
done something
constructive. Awareness
© www.IndiaIndian Thoughts in
Living in Denial
COMMON REFRAINS
• It cannot happen to
me
• I am too small a
business with no data
of value why will
anyone be interested
in me
• I cannot afford
Information Security
COMMON CLAIMS
• We are fully prepared
and have
EVERYTHING in
place
• I am big and strong
and we have the best
systems and devices
in place we are hack-
proof
• We have a million
dollar budget and
have hired the best
© www.IndiaIndian Thoughts in
Inadequate Response
• Messed up between being aware and trained
• Living in Denial end up being over-protected
or under-protected
• In event of an Incident – the response is
• Chaotic
• Too many cooks and a doomed broth in the making
• Respond and go back to „normal‟ life
• Knee-jerk budget bonanza
• Costs ~ zero learning …
© www.IndiaIndian Thoughts in
Indian Thoughts…
• Create a practical and user-friendly IS
environment so you are not on everyone‟s
“$hi** list”
• Don‟t forget to plan and then follow it
• Do not cross the Lakshman Rekha … Polices
and rules are for compliance by all
• Skillset and knowledge must be complete
when responding to an incident – do not follow
Abhimanyu‟s example
• Senior management is your Achilles heel
• Being certified does not give you divine
protection there are more devils than gods in
today‟s age!
© www.IndiaIndian Thoughts in
I N F I N I T E C H A N N E L S T O W A T C H
A N D S E C U R E
www.indiawatch.in
INFO@INDIAWATCH.IN
+91.9769890505
© www.IndiaIndian Thoughts in
Dinesh O
Bareja
CISA, CISM, ITIL,
ERM, Cert IPR,
BS7799 (LA)
• Information Security enthusiast,
observer, analyst, learner, practitioner
and evangelist. Wannabe photographer
and published author. Opinionated
blogger and writer on Information
Security.
• Cyber Surveillance Advisor – CYBER
DEFENCE RESEARCH CENTRE,
JHARKHAND POLICE
• Analyst - INDIAWATCH
• Principal Advisor, PYRAMID CYBER
SECURITY & FORENSICS PVT LTD
• BOMBAY STOCK EXCHANGE
• OPEN SECURITY ALLIANCE
• Co-Founder, INDIAN HONEYNET
PROJECT
© www.IndiaIndian Thoughts in
India centric research firm that endeavours to be
ahead in knowledge, intelligence and thought
Specialize in Management & Security of
Information and Data as related to People,
Processes and Technologies
Provides strategic and tactical thought
leadership to government, public and private
institutions
Welcomes opportunities to contribute in the
interest of national security, public safety and
resilience
About

Mais conteúdo relacionado

Destaque

Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Dinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

Destaque (8)

Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
Governance in Cybercrime and Cybersecurity orgns - final distribution Organiz...
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Semelhante a Indian Thoughts in Information Security

Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English editionChuan Lin
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
“Safety Culture” As Means of Improving Business Performance
“Safety Culture” As Means of Improving Business Performance“Safety Culture” As Means of Improving Business Performance
“Safety Culture” As Means of Improving Business PerformancePECB
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...International Institute for Learning
 
Senior finances presentation
Senior finances  presentationSenior finances  presentation
Senior finances presentationOlympicSrCare
 
MBA presentation 112612 v3
MBA presentation 112612 v3MBA presentation 112612 v3
MBA presentation 112612 v3Bill Crowe
 
What's Your Financial Operating System?
What's Your Financial Operating System?What's Your Financial Operating System?
What's Your Financial Operating System?Lisa Duke
 
Safety Basics for the Non-Safety Professional [Live Session]
Safety Basics for the Non-Safety Professional [Live Session]Safety Basics for the Non-Safety Professional [Live Session]
Safety Basics for the Non-Safety Professional [Live Session]HNI Risk Services
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceEvan Francen
 
Steve Weissman - 5 Keys to Managing Information as an Asset
Steve Weissman - 5 Keys to Managing Information as an Asset�Steve Weissman - 5 Keys to Managing Information as an Asset�
Steve Weissman - 5 Keys to Managing Information as an AssetARMA International
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
Understanding Soft Risk in Volunteer Engagement
Understanding Soft Risk in Volunteer EngagementUnderstanding Soft Risk in Volunteer Engagement
Understanding Soft Risk in Volunteer EngagementVolunteerMatch
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Building resilience and managing in dynamic unpredictable challenging times, ...
Building resilience and managing in dynamic unpredictable challenging times, ...Building resilience and managing in dynamic unpredictable challenging times, ...
Building resilience and managing in dynamic unpredictable challenging times, ...Association for Project Management
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 

Semelhante a Indian Thoughts in Information Security (20)

Great Learning & Information Security - English edition
Great Learning & Information Security - English editionGreat Learning & Information Security - English edition
Great Learning & Information Security - English edition
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
Be Virtual but Be Visible
Be Virtual but Be VisibleBe Virtual but Be Visible
Be Virtual but Be Visible
 
“Safety Culture” As Means of Improving Business Performance
“Safety Culture” As Means of Improving Business Performance“Safety Culture” As Means of Improving Business Performance
“Safety Culture” As Means of Improving Business Performance
 
D gonzalez issa_wis_2014
D gonzalez issa_wis_2014D gonzalez issa_wis_2014
D gonzalez issa_wis_2014
 
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
The Scorpion and the Frog - Sink or Swim: Stakeholder Management to Keep You ...
 
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
Principles of Holistic Information Governance - Presented to ARMA Edmonton Ja...
 
Senior finances presentation
Senior finances  presentationSenior finances  presentation
Senior finances presentation
 
MBA presentation 112612 v3
MBA presentation 112612 v3MBA presentation 112612 v3
MBA presentation 112612 v3
 
What's Your Financial Operating System?
What's Your Financial Operating System?What's Your Financial Operating System?
What's Your Financial Operating System?
 
Safety Basics for the Non-Safety Professional [Live Session]
Safety Basics for the Non-Safety Professional [Live Session]Safety Basics for the Non-Safety Professional [Live Session]
Safety Basics for the Non-Safety Professional [Live Session]
 
financial Literacy.pptx
financial Literacy.pptxfinancial Literacy.pptx
financial Literacy.pptx
 
TIES 2013 Education Technology Conference
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
 
Steve Weissman - 5 Keys to Managing Information as an Asset
Steve Weissman - 5 Keys to Managing Information as an Asset�Steve Weissman - 5 Keys to Managing Information as an Asset�
Steve Weissman - 5 Keys to Managing Information as an Asset
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Understanding Soft Risk in Volunteer Engagement
Understanding Soft Risk in Volunteer EngagementUnderstanding Soft Risk in Volunteer Engagement
Understanding Soft Risk in Volunteer Engagement
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Building resilience and managing in dynamic unpredictable challenging times, ...
Building resilience and managing in dynamic unpredictable challenging times, ...Building resilience and managing in dynamic unpredictable challenging times, ...
Building resilience and managing in dynamic unpredictable challenging times, ...
 
Safety Forum
Safety ForumSafety Forum
Safety Forum
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 

Mais de Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Mais de Dinesh O Bareja (9)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Último

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Último (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Indian Thoughts in Information Security

  • 1. © www.IndiaIndian Thoughts in I N F I N I T E C H A N N E L S T O W A T C H A N D S E C U R E It is critical and can be destructive... Yet few seem to be serious about it... Some things that you wanted to know but did not know whom to ask.. , or, things you knew but did not have in place to provide the desired, or required, level of safeguards June 20, 2013
  • 2. © www.IndiaIndian Thoughts in Life‟s Dimensions • Earth – we live on • Water – is the elixir of life • Air – we breathe to live
  • 3. © www.IndiaIndian Thoughts in Internet: The Fourth Dimension Normal doesn‟t apply anymore!
  • 4. © www.IndiaIndian Thoughts in Awareness and Training • Is your IS team “aware” ---- about security • Is your IS team “trained” --- to respond, audit, controls testing • Awareness is clubbed with Training and handled by the Training or HR team and gets a backseat Training and Awareness have different objectives and MUST BE TREATED DIFERENTLY
  • 5. © www.IndiaIndian Thoughts in Awareness is the most abused term in the Information Security lexicon. Every ‘expert’ swears this as the best and most effective antidote for InfoSec ills, but a few have walked the talk or done something constructive. Awareness
  • 6. © www.IndiaIndian Thoughts in Living in Denial COMMON REFRAINS • It cannot happen to me • I am too small a business with no data of value why will anyone be interested in me • I cannot afford Information Security COMMON CLAIMS • We are fully prepared and have EVERYTHING in place • I am big and strong and we have the best systems and devices in place we are hack- proof • We have a million dollar budget and have hired the best
  • 7. © www.IndiaIndian Thoughts in Inadequate Response • Messed up between being aware and trained • Living in Denial end up being over-protected or under-protected • In event of an Incident – the response is • Chaotic • Too many cooks and a doomed broth in the making • Respond and go back to „normal‟ life • Knee-jerk budget bonanza • Costs ~ zero learning …
  • 8. © www.IndiaIndian Thoughts in Indian Thoughts… • Create a practical and user-friendly IS environment so you are not on everyone‟s “$hi** list” • Don‟t forget to plan and then follow it • Do not cross the Lakshman Rekha … Polices and rules are for compliance by all • Skillset and knowledge must be complete when responding to an incident – do not follow Abhimanyu‟s example • Senior management is your Achilles heel • Being certified does not give you divine protection there are more devils than gods in today‟s age!
  • 9. © www.IndiaIndian Thoughts in I N F I N I T E C H A N N E L S T O W A T C H A N D S E C U R E www.indiawatch.in INFO@INDIAWATCH.IN +91.9769890505
  • 10. © www.IndiaIndian Thoughts in Dinesh O Bareja CISA, CISM, ITIL, ERM, Cert IPR, BS7799 (LA) • Information Security enthusiast, observer, analyst, learner, practitioner and evangelist. Wannabe photographer and published author. Opinionated blogger and writer on Information Security. • Cyber Surveillance Advisor – CYBER DEFENCE RESEARCH CENTRE, JHARKHAND POLICE • Analyst - INDIAWATCH • Principal Advisor, PYRAMID CYBER SECURITY & FORENSICS PVT LTD • BOMBAY STOCK EXCHANGE • OPEN SECURITY ALLIANCE • Co-Founder, INDIAN HONEYNET PROJECT
  • 11. © www.IndiaIndian Thoughts in India centric research firm that endeavours to be ahead in knowledge, intelligence and thought Specialize in Management & Security of Information and Data as related to People, Processes and Technologies Provides strategic and tactical thought leadership to government, public and private institutions Welcomes opportunities to contribute in the interest of national security, public safety and resilience About

Notas do Editor

  1. We will take a look at Infosec from our local point of view. Some practices and some concerns that raise perpetual red flags that may be visible or not !
  2. The baby boomers and earlier generations grew up aware of three dimensions in life –Gen X, Y and those yet to come live in the fourth dimension 1. The rules of one dimension do not apply to the other two. Example – the rules of breathing in water are different from that in air or for creatures that live inside the earth…
  3. While the Gen X’s and Y’s walk into this new dimension from birth, their learning and education is still old-world. That is three dimensional This is the paradox of today’s world. It’s like when Ford came up with Model T and everyone wondered why have a carriage that you have to drive to a gas-station to refuel when you have a horse carriage which is oh-so-convenient. The horse is in the stable, attached to your home, eats hay all day long and all you need to do is hitch it to the carriage and flick a whip or shout something unintelligible.
  4. [opening line] HOWEVER MUCH ONE MAY TALK ABOUT AWARENESS AND TRAINING, IT WILL ALWAYS BE LESS THAN THAT REQUIRED[takeaway]Education and learning. You can be educated but you have to be on a different plane to be considered learned by your peers. In the same manner – you may be trained but not aware and you may be aware but not trained !So you are aware that when you machine slows down for no reason it may be infected but you may not have the training to investigate and clean, which is when you call the office Systems Engineer. He / she will be aware of the sensitive work you perform for your employer but is not trained for that work !
  5. This is a quote, as the earlier one, from our report on Information Security Concerns for India – Top 3 Report for 2013. It is a compilation of concerns in the IS domain for 2013 as submitted by respondents to a survey we had put up.
  6. One primary observation, through interactions with numerous clients – CxO’s and their IS managers has that many of them are living in denial. Maybe it is a manifestation of our culture that gives us strength from our immense faith in divine intervention.But then again even among those living in denial – there are the Naysayers and the Yaysayers - (I think this depends on the divinity that has intervened !)
  7. Living in denial, in the real world, has real consequences. The fallout is dangerous and is inevitable. The actual effect of this risky behaviour results in inadequate response to threat / risk events. And the results are .
  8. Our first report was on Top5 Information Security Concerns for India for 2013 We believe if one manages Information and Technology well, Security will be in place. One pursues Security as the be all and end all but this is really incorrect strategy – you are chasing a goal without having studied the how – when – where – why Working with government in India and overseas for