SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
Get ahead of cybersecurity
Tiffy Isaac,
Partner, EY LLP
Page 2
Agenda
► Introduction
► The cyber threat landscape
► What are organizations doing?
► Get ahead of cybercrime
Page 3
Introduction
Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems
and sensors, interacting with it to generate meaningful results and convenience to the end-user community.
New
business
opportunit
ies
Improved
decision-
making
Safety
and
security
Improved
citizen
experience
Cost
reductions
Potential for
business
revenue
growth
Opportunities does IoT offer?
What will be future…
The ever-expanding IoT world
Smart life Smart mobility
Smart city Smart manufacturing
Page 4
Some facts…
The cloud provides a platform for IoT to flourish, however, there are still many challenges.
With the plethora of data that they will hold, storage servers will have to be updated and secured all
the time.
According to industry estimates,
machine-to-machine communications
alone will generate approximately
US$900 billion in revenues by 2020.
India is planning to invest approximately
US$11 billion for developing 100 smart
cities. A draft policy framework document
of IoT was released in October 2014 by
the Indian government.
The interconnectivity of people, devices and organizations opens up new vulnerabilities.
$
New technologies, regulatory pressure and changing business requirements call for more security
measures.
Per EY’s 17th Global Information Security Survey 2014, which captures the responses of 1,825 C-
suite leaders and information security and IT executives/managers - 56% of respondents say that it
is “unlikely or highly unlikely” that their organization would be able to detect a sophisticated attack.
Page 5
IOT will affect different business sectors
Healthcare
Personal information that could tell medics not
only about individuals’ medical history, but also
about potential diseases
Sensors and microcomputers fitted in the
human body that could monitor health
conditions and even alarm emergency
services in case of any distress
.
Education
IoT in the education sector has already
started to make the conventional education
system more automated
Internet-enabled remote classrooms will be a
milestone for developing countries, making
deep penetration in areas where setting up a
traditional school infrastructure is not possible.
.
Financial Services
Financial services are already leveraging the
internet for many of their services.
Improvement in digital infrastructure and IoT-
enabled products could further lead the growth of
the financial sector, with innovations, such as smart
wearable and smart monitoring devices, helping
customers to keep better track of their money.
Telcos
Telcos could face a surge in data usage due
to IoT-enabled devices, thus raising their
ARPU (average revenue per user), while on
the other hand, they will also have to deal with
some concerns, such as privacy and
infrastructure security.
Page 6
E.g. Connected car and cyber security
Context
Triggers
Question
Response
How can automotive sector organization keep up with the changing
vulnerability landscape, while many are lagging in establishing
foundational cybersecurity practices?
Traditional IT security
measures are no longer
enough
Research shows that attacks
on vehicles are possible
Today’s attackers are
organized, well funded,
patient and sophisticated
key imperatives need to be followed by the
automotive industry to embrace connectivity, and
at the same time ensure IT security
Automakers launch several connectivity offerings, the
interconnectivity of people, devices and organizations
opens up new vulnerabilities. However, …
Page 7
Recent academic research and dummy hacking trials on connected
cars have shaken the confidence of regulators and consumers
Details of hacking Action taken by the
automaker/affected brand
Brand
affected
A team from the Defense Advanced Research Projects
Agency (DARPA), demonstrated how it was able to wirelessly
hack into the computer systems and take over several
functions, including the brakes of a Chevrolet Impala during a
controlled situation
GM is developing a fix for its OnStar
telematics system in light of the
cyberattack
ADAC, a German motoring association, found they could lock
and unlock car doors by mimicking mobile communications
and sending signals to a SIM card installed in affected
vehicles
BMW sent over-the-air out software
patches to the 2.2 million cars
equipped with Connected Drive to
prevent similar breakages in future
Sources: News articles, EY analysis
Recent examples of dummy hacking by researchers
Page 8
The cyber threat landscape
Page 9
EY GISS 2014 results: “Who or what do you consider the
most likely source of an attack?”
41%
46%
27%
53%
14%
12%
10%
35%
57%
Lone wolf hacker
Hacktivists
State sponsored attacker
Criminal syndicates
Other business partner
Supplier
Customer
External contractor working on our site
Employee
Respondents were asked to choose all that apply.
Page 10
EY GISS 2014 results: “Which threats & vulnerabilities have
increased your risk exposure over the last 12 months?”
Respondents were asked to select any five of these items, with 1 as the highest priority, down to 5 as their lowest priority
Page 11
The roadblocks facing today’s organizations
43%
of respondents say that their organization’s total
information security budget will stay approximately the
same in the coming 12 months and a further 5% said
that their budget will actually decrease.
53%
of organizations say that lack of skilled resources
is one of the main obstacles that challenge their
information security.
Roadblock 1 — Lack of agility
Roadblock 2 — Lack of budget
Roadblock 3 — Lack of cybersecurity skills
Page 12
It is not easy to get ahead of cybercrime
Getting aheadCybersecurity
function
Page 13
What are organizations doing?
Page 14
What are organizations doing?
► Designing and implementing a cyber threat intelligence strategy to support strategic
business decisions and leverage the value of security
► Defining and encompassing the organizations extended cybersecurity ecosystem,
including partners, suppliers, services and business networks
► Know your Crown Jewels - Taking a cyber economic approach — understanding your
vital assets and their value, and investing specifically in their protection
► Use forensic data analytics and cyber threat intelligence to analyze and anticipate
where the likely threats are coming from and when, increasing your readiness
Page 15
How do you get ahead of cybercrime?
… A 3-stage improvement process
To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement
process:
► Activate (a foundational approach)
► Organizations need to establish and improve the solid foundations of their cybersecurity)
► Adapt (a dynamic approach)
► Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to
be able to adapt to changing requirements)
► Anticipate (a proactive approach)
► Organizations need to make efforts to predict what is coming so they can be better prepared for the
inevitable cyber attacks)
Page 16
Activate. Adapt. Anticipate. Where are you?
Activate Adapt Anticipate
Page 17
Activate: the need to establish foundations
Organizations in this level
can only deal with threats
in a world without change
Page 18
Adapt: a dynamic approach
If an organization
doesn’t adapt, its
cybersecurity
foundation will quickly
be obsolete.
Page 19
Anticipate: a proactive state of readiness
‘Anticipate’ means embracing cybersecurity as a core aspect of the
business and being in a proactive state of readiness
value
Page 20
Vital to foundational cybersecurity –
a Security Operations Center
A Security Operations Center (SOC) centralizes, structures and coordinates the processes and
technology that support the Information Security function. It is therefore concerning that:
► Over 40% of organizations surveyed do not have a SOC.
Of those that do:
► Over half of respondents did not know how well their SOC met business operations’ needs
► Over 50% do not know how their SOC stays up to date with the latest threats
► The technology infrastructure and endpoints of the SOC need to be improved.
If more of the benefits of a SOC were being realized, then the general ability of an organization to protect
itself in even the most basic functions would start to deliver benefits.
37%
say that real time insight on
cyber risk is not available.
42%
of organizations do not have
a SOC.
33%
4%
13%
13%
25%
12%
Unknown
Longer than 1 day
Within 1 day
Within 4 hours
Within 1 hour
Within 10 minutes
EY GISS 2014 results: How long on average does it
take for your SOC to initiate an investigation on
discovered/ alerted incidents?
Page 21
…..get ahead of cybercrime
Page 22
Take the initiative to get ahead of cybercrime
Thank you….
Page 23
Focus on 3 As…
1. Conduct a cyber threat assessment
and design an implementation
roadmap
2. Get Board-level support for a
security transformation
3. Review and update security policies,
procedures and supporting
standards
► Implement an information
security management system
4. Establish a Security Operations
Center (SOC)
► Develop monitoring and incident
response procedures
5. Design and implement cybersecurity
controls
► Assess the effectiveness of data
loss prevention and identity and
access management processes.
► Harden the security of IT assets.
6. Test business continuity plans and
incident response procedures
1. Design and implement a
transformation program
► Get external help in designing
the program, and providing
program management.
2. Decide what to keep in-house and
what to outsource
3. Define a RACI matrix for
cybersecurity
4. Define the organization’s
ecosystem
► Make moves to eliminate or
lessen potential security gaps
in your interaction with third
parties
5. Introduce cybersecurity awareness
training for employees
1. Design and implement a cyber threat
intelligence strategy
► Use threat intelligence to support
strategic business decisions
2. Define and encompass the
organization’s extended cybersecurity
ecosystem
► Define RACI and trust models
and enact cooperation, sharing
capabilities where advantageous
3. Take a cyber economic approach
► Understand the value of your
most vital cyber assets
4. Use forensics and analytics
► Use the latest technical tools to
analyze where the likely threats
are coming from and when
5. Ensure everyone understands what’s
happening
► Strong governance, user controls
and regular communications
Adapt - take action to improve
and transform
Anticipate: take action -
and get ahead
Activate: the need to establish
foundations

Mais conteúdo relacionado

Mais procurados

Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!Asma Hossain
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and securitynikunjandy
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital ageSaman Sara
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 

Mais procurados (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
cyber crime
cyber crimecyber crime
cyber crime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 

Destaque

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeIBMGovernmentCA
 
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crimeDanish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crimeKevin Duffey
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012Jacqueline Fick
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentationsDefence and Security Accelerator
 
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...Kevin Duffey
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelasafeiran
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organizationasafeiran
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security RisksHeimdal Security
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investmentsasafeiran
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FutureShahid Hussain Raja
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesBill Harpley
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017Ramiro Cid
 
Agriculture Robot report
Agriculture Robot reportAgriculture Robot report
Agriculture Robot reportRadhe Chauhan
 

Destaque (20)

Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
 
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crimeDanish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
Danish National Cyber Crime Centre - Kim Aarenstrup - how to fight cyber crime
 
Cyber training 23 5 2012
Cyber training 23 5 2012Cyber training 23 5 2012
Cyber training 23 5 2012
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations27 Nov 2013 Cyber defence CDE themed competition presentations
27 Nov 2013 Cyber defence CDE themed competition presentations
 
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
Danish Centre for Cyber Security - Thomas Kristmar - CEOs leading recovery in...
 
How the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S modelHow the balanced scorecard complements the McKinsey 7-S model
How the balanced scorecard complements the McKinsey 7-S model
 
Structure is not organization
Structure is not organizationStructure is not organization
Structure is not organization
 
10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks10 Critical Corporate Cyber Security Risks
10 Critical Corporate Cyber Security Risks
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Mckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative InvestmentsMckinsey company - Capturing the next wave of growth in alternative Investments
Mckinsey company - Capturing the next wave of growth in alternative Investments
 
Political Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and FuturePolitical Economy of Pakistan: Past,Present and Future
Political Economy of Pakistan: Past,Present and Future
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 
Cyber security threats for 2017
Cyber security threats for 2017Cyber security threats for 2017
Cyber security threats for 2017
 
Agriculture Robot report
Agriculture Robot reportAgriculture Robot report
Agriculture Robot report
 

Semelhante a Get Ahead of Cyber Security by Tiffy Issac, Partner EY India

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechFinTech Consortium
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportSamantha Wagner
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer Self
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 

Semelhante a Get Ahead of Cyber Security by Tiffy Issac, Partner EY India (20)

Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspektiBiznesa infrastruktūras un datu drošības juridiskie aspekti
Biznesa infrastruktūras un datu drošības juridiskie aspekti
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
The Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTechThe Singapore FinTech Consortium - Introduction to InsurTech
The Singapore FinTech Consortium - Introduction to InsurTech
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Internet threats- How to protect the Africa consumer
 Internet threats- How to protect the Africa consumer  Internet threats- How to protect the Africa consumer
Internet threats- How to protect the Africa consumer
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 

Mais de Rahul Neel Mani

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 ReportRahul Neel Mani
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeRahul Neel Mani
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Rahul Neel Mani
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, MumbaiRahul Neel Mani
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 Rahul Neel Mani
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Rahul Neel Mani
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Rahul Neel Mani
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Rahul Neel Mani
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseRahul Neel Mani
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricRahul Neel Mani
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Rahul Neel Mani
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016Rahul Neel Mani
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarRahul Neel Mani
 

Mais de Rahul Neel Mani (20)

7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
7th Annual DynamicCISO Summit & Excellence Awards 2020 Report
 
TweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital InitiativeTweetChat - A Grey Head Digital Initiative
TweetChat - A Grey Head Digital Initiative
 
Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017Cybersecurity: Glimpses from the 2017
Cybersecurity: Glimpses from the 2017
 
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
5th Annual DynamicCISO Summit 9-10 March 2018, Mumbai
 
CIO Productivity Conclave 2017
CIO Productivity Conclave 2017 CIO Productivity Conclave 2017
CIO Productivity Conclave 2017
 
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
Being a Digital Industrial By Anthony Thomas, Group Chief Information Officer...
 
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
Key Imperatives for the CIO in Digital Age By Lalatendu Das Digital VP, Assoc...
 
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
Traversing the Digital Vortex, Lux Rao, Director & Leader, Digital Transforma...
 
Sumit dhar
Sumit dharSumit dhar
Sumit dhar
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cyber Crime Management
Cyber Crime ManagementCyber Crime Management
Cyber Crime Management
 
ABC of Infosec
ABC of InfosecABC of Infosec
ABC of Infosec
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Get the Basics Right
Get the Basics RightGet the Basics Right
Get the Basics Right
 
Upgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security FabricUpgrading Your Firewall? Its Time for an Inline Security Fabric
Upgrading Your Firewall? Its Time for an Inline Security Fabric
 
Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom? Is Cyber Security the Elephant in the Boardroom?
Is Cyber Security the Elephant in the Boardroom?
 
CIO Productivity Conclave 2016
CIO Productivity Conclave 2016CIO Productivity Conclave 2016
CIO Productivity Conclave 2016
 
Take Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva KumarTake Control of Your Imaging and Printing: Siva Kumar
Take Control of Your Imaging and Printing: Siva Kumar
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 

Último (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

Get Ahead of Cyber Security by Tiffy Issac, Partner EY India

  • 1. Get ahead of cybersecurity Tiffy Isaac, Partner, EY LLP
  • 2. Page 2 Agenda ► Introduction ► The cyber threat landscape ► What are organizations doing? ► Get ahead of cybercrime
  • 3. Page 3 Introduction Internet of Things “IoT” can be defined as physical objects that connect to the internet through embedded systems and sensors, interacting with it to generate meaningful results and convenience to the end-user community. New business opportunit ies Improved decision- making Safety and security Improved citizen experience Cost reductions Potential for business revenue growth Opportunities does IoT offer? What will be future… The ever-expanding IoT world Smart life Smart mobility Smart city Smart manufacturing
  • 4. Page 4 Some facts… The cloud provides a platform for IoT to flourish, however, there are still many challenges. With the plethora of data that they will hold, storage servers will have to be updated and secured all the time. According to industry estimates, machine-to-machine communications alone will generate approximately US$900 billion in revenues by 2020. India is planning to invest approximately US$11 billion for developing 100 smart cities. A draft policy framework document of IoT was released in October 2014 by the Indian government. The interconnectivity of people, devices and organizations opens up new vulnerabilities. $ New technologies, regulatory pressure and changing business requirements call for more security measures. Per EY’s 17th Global Information Security Survey 2014, which captures the responses of 1,825 C- suite leaders and information security and IT executives/managers - 56% of respondents say that it is “unlikely or highly unlikely” that their organization would be able to detect a sophisticated attack.
  • 5. Page 5 IOT will affect different business sectors Healthcare Personal information that could tell medics not only about individuals’ medical history, but also about potential diseases Sensors and microcomputers fitted in the human body that could monitor health conditions and even alarm emergency services in case of any distress . Education IoT in the education sector has already started to make the conventional education system more automated Internet-enabled remote classrooms will be a milestone for developing countries, making deep penetration in areas where setting up a traditional school infrastructure is not possible. . Financial Services Financial services are already leveraging the internet for many of their services. Improvement in digital infrastructure and IoT- enabled products could further lead the growth of the financial sector, with innovations, such as smart wearable and smart monitoring devices, helping customers to keep better track of their money. Telcos Telcos could face a surge in data usage due to IoT-enabled devices, thus raising their ARPU (average revenue per user), while on the other hand, they will also have to deal with some concerns, such as privacy and infrastructure security.
  • 6. Page 6 E.g. Connected car and cyber security Context Triggers Question Response How can automotive sector organization keep up with the changing vulnerability landscape, while many are lagging in establishing foundational cybersecurity practices? Traditional IT security measures are no longer enough Research shows that attacks on vehicles are possible Today’s attackers are organized, well funded, patient and sophisticated key imperatives need to be followed by the automotive industry to embrace connectivity, and at the same time ensure IT security Automakers launch several connectivity offerings, the interconnectivity of people, devices and organizations opens up new vulnerabilities. However, …
  • 7. Page 7 Recent academic research and dummy hacking trials on connected cars have shaken the confidence of regulators and consumers Details of hacking Action taken by the automaker/affected brand Brand affected A team from the Defense Advanced Research Projects Agency (DARPA), demonstrated how it was able to wirelessly hack into the computer systems and take over several functions, including the brakes of a Chevrolet Impala during a controlled situation GM is developing a fix for its OnStar telematics system in light of the cyberattack ADAC, a German motoring association, found they could lock and unlock car doors by mimicking mobile communications and sending signals to a SIM card installed in affected vehicles BMW sent over-the-air out software patches to the 2.2 million cars equipped with Connected Drive to prevent similar breakages in future Sources: News articles, EY analysis Recent examples of dummy hacking by researchers
  • 8. Page 8 The cyber threat landscape
  • 9. Page 9 EY GISS 2014 results: “Who or what do you consider the most likely source of an attack?” 41% 46% 27% 53% 14% 12% 10% 35% 57% Lone wolf hacker Hacktivists State sponsored attacker Criminal syndicates Other business partner Supplier Customer External contractor working on our site Employee Respondents were asked to choose all that apply.
  • 10. Page 10 EY GISS 2014 results: “Which threats & vulnerabilities have increased your risk exposure over the last 12 months?” Respondents were asked to select any five of these items, with 1 as the highest priority, down to 5 as their lowest priority
  • 11. Page 11 The roadblocks facing today’s organizations 43% of respondents say that their organization’s total information security budget will stay approximately the same in the coming 12 months and a further 5% said that their budget will actually decrease. 53% of organizations say that lack of skilled resources is one of the main obstacles that challenge their information security. Roadblock 1 — Lack of agility Roadblock 2 — Lack of budget Roadblock 3 — Lack of cybersecurity skills
  • 12. Page 12 It is not easy to get ahead of cybercrime Getting aheadCybersecurity function
  • 13. Page 13 What are organizations doing?
  • 14. Page 14 What are organizations doing? ► Designing and implementing a cyber threat intelligence strategy to support strategic business decisions and leverage the value of security ► Defining and encompassing the organizations extended cybersecurity ecosystem, including partners, suppliers, services and business networks ► Know your Crown Jewels - Taking a cyber economic approach — understanding your vital assets and their value, and investing specifically in their protection ► Use forensic data analytics and cyber threat intelligence to analyze and anticipate where the likely threats are coming from and when, increasing your readiness
  • 15. Page 15 How do you get ahead of cybercrime? … A 3-stage improvement process To get ahead of cybercrime we suggest that organizations adopt a 3-stage improvement process: ► Activate (a foundational approach) ► Organizations need to establish and improve the solid foundations of their cybersecurity) ► Adapt (a dynamic approach) ► Because organizations are constantly changing and cyber threats are evolving, cybersecurity needs to be able to adapt to changing requirements) ► Anticipate (a proactive approach) ► Organizations need to make efforts to predict what is coming so they can be better prepared for the inevitable cyber attacks)
  • 16. Page 16 Activate. Adapt. Anticipate. Where are you? Activate Adapt Anticipate
  • 17. Page 17 Activate: the need to establish foundations Organizations in this level can only deal with threats in a world without change
  • 18. Page 18 Adapt: a dynamic approach If an organization doesn’t adapt, its cybersecurity foundation will quickly be obsolete.
  • 19. Page 19 Anticipate: a proactive state of readiness ‘Anticipate’ means embracing cybersecurity as a core aspect of the business and being in a proactive state of readiness value
  • 20. Page 20 Vital to foundational cybersecurity – a Security Operations Center A Security Operations Center (SOC) centralizes, structures and coordinates the processes and technology that support the Information Security function. It is therefore concerning that: ► Over 40% of organizations surveyed do not have a SOC. Of those that do: ► Over half of respondents did not know how well their SOC met business operations’ needs ► Over 50% do not know how their SOC stays up to date with the latest threats ► The technology infrastructure and endpoints of the SOC need to be improved. If more of the benefits of a SOC were being realized, then the general ability of an organization to protect itself in even the most basic functions would start to deliver benefits. 37% say that real time insight on cyber risk is not available. 42% of organizations do not have a SOC. 33% 4% 13% 13% 25% 12% Unknown Longer than 1 day Within 1 day Within 4 hours Within 1 hour Within 10 minutes EY GISS 2014 results: How long on average does it take for your SOC to initiate an investigation on discovered/ alerted incidents?
  • 21. Page 21 …..get ahead of cybercrime
  • 22. Page 22 Take the initiative to get ahead of cybercrime Thank you….
  • 23. Page 23 Focus on 3 As… 1. Conduct a cyber threat assessment and design an implementation roadmap 2. Get Board-level support for a security transformation 3. Review and update security policies, procedures and supporting standards ► Implement an information security management system 4. Establish a Security Operations Center (SOC) ► Develop monitoring and incident response procedures 5. Design and implement cybersecurity controls ► Assess the effectiveness of data loss prevention and identity and access management processes. ► Harden the security of IT assets. 6. Test business continuity plans and incident response procedures 1. Design and implement a transformation program ► Get external help in designing the program, and providing program management. 2. Decide what to keep in-house and what to outsource 3. Define a RACI matrix for cybersecurity 4. Define the organization’s ecosystem ► Make moves to eliminate or lessen potential security gaps in your interaction with third parties 5. Introduce cybersecurity awareness training for employees 1. Design and implement a cyber threat intelligence strategy ► Use threat intelligence to support strategic business decisions 2. Define and encompass the organization’s extended cybersecurity ecosystem ► Define RACI and trust models and enact cooperation, sharing capabilities where advantageous 3. Take a cyber economic approach ► Understand the value of your most vital cyber assets 4. Use forensics and analytics ► Use the latest technical tools to analyze where the likely threats are coming from and when 5. Ensure everyone understands what’s happening ► Strong governance, user controls and regular communications Adapt - take action to improve and transform Anticipate: take action - and get ahead Activate: the need to establish foundations