SlideShare uma empresa Scribd logo
1 de 12
Information Security Assessments
Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis, Report & Briefing..
Copy rights reserved www.hkit.in
Information Security Assessments
In this rapidly evolving IT sector and our dependence on computers
in all aspect of our business and the even more dependence on the
internet usage, security becomes the vital key in safe guarding
our data from pilferage and misuse.
There are many software and hardware available in the market to protect our computers
and its data but very often the user is not advised correctly from his application stand point,
be it in choosing the right Hardware, Software, Networking Etc.
Hence we over spend and underutilize and still have very unstable IT Infrastructure
susceptible to Data Pilferage and Abuse
Copy rights reserved www.hkit.in
HK IT’s expert consultation offers enterprises/academic/NGO’s the cost effective
consultations on IT end to end solutions.
HK IT Solution’s information security services protect your business from Data breaches,
negative publicity, damaged credibility and disruption of services.
We deliver world-class offerings, security knowledge and experience to provide you
with comprehensive information security.
SOX/ISO/COBIT/HIPAA Standards
Clienteles in India / Overseas
Our Expertize
Copy rights reserved www.hkit.in
Technology, Services, Support and Training
Our offerings combine unmatched technology, services, support and training
from Highly certified security experts.
That means
• no more managing multiple vendors,
• no more juggling disparate services
• and no more worrying about the security of your data and business.
With our track record of success, it means more time for your organization to focus on other
operational areas, while we focus on information security excellence for you and your organization.
Copy rights reserved www.hkit.in
Dr. THENNARASU.E (Harsha) PhD
Researcher Information Security on High End
Applications
Information Security Assessment & Cybercrimes
investigator
Member of DSCI (Data Security Council of India)
Trainer Certified Ethical Hacker
Overseas Auditing Experience
Guest Lecturing (Universities, Colleges)
Guest Speaker of Innovating for India Seminar
Technical Committee Member, SIT
Dr. CHANDRASEKAR UMAPATHY (PhD, IIM)
OWASP Chennai Chapter Lead
Sri Lanka OWASP Chapter Mentor
Invited Trainer at OWASP India conference.
Cloud Alliance Security Chennai Chapter Lead.
Reviewer of ISACA CRISC Review Manual 2011.
Cloud Security Alliance – Control Matrix Co-
Author
ISACA Best Trainer for the Year 2011-2012
Our IT Security Specialists
Mr. V. RAJENDRAN
President of Cyber Society of India
Certified ISO 27001 Lead Auditor
conducted many ISO 9000 series and 27001 audits
Practising Cyber Crime, Banking and Cyber Law related cases
Authored the book on "IT Security" for Indian Institute of
Banking and Finance
Subject matter expert & Trainer for Tamil Nadu Police academic
Pursuing PhD in the area of Cyber Crime in Banks
Mr. TS. RAGHUNATHAN
Certified security professional by Cisco, Cyberoam, Watch guard,
etc.,
Practitioner Information & Network Security assessments/audits
VA/PT specialist
Certified Ethical Hacker
12 year experience in Information & Network Security Domains
Visiting Professor HTC ITMR for Information SecurityCopy rights reserved www.hkit.in
• IT Infrastructure Audits
• Breach Assessments
• Server Audits
• Application Assessments
• Network Audit
• Vulnerable Assessment/ Penetration test
• Data center Assessment
• Web Server Audit
• Power Audit
• Gap Analysis/Risk Assessments
IT Assessments / Audits
Copy rights reserved www.hkit.in
5000+ users IT Infrastructure Audited by HK IT security experts
HK-Training and Audit
Copy rights reserved www.hkit.in
Copy rights reserved www.hkit.in
Case Study
Case 1: Aravind Eye Hospitals
Challenge: Huge Internet Bandwidth requirement, continuous network drops, non availability of IT when there are emergency, impact on
productivity
Post Audit Benefit: Audit report revealed all improper configurations, vulnerabilities from internal & external , decreased downtime,
Patched all Internal & external vulnerabilities
Case 2: KMCH (Kovai Medical Centre & Hospitals) (similar case study on Dr. MGR medical college & hospitals)
Challenge: IT infrastructure issues, Network chocking, huge internet bandwidth consumptions, applications assessment, compliance,
security from internal & external threats
Post Audit Benefit: identified all vulnerabilities and designed security design as per top management expectations, resolved network
problems, patched for internal & external threats , firewall policies fine tuned, bandwidth utilizations optimized.
Copy rights reserved www.hkit.in
Case Study
Case 3: (SIT- Siddaganga Institute of Technology)
Challenge: 5000+ workstations with 7000+ users, huge internet bandwidth requirement and incur huge expenses. Lacking on IT policies, Network Drops,
application vulnerabilities.
Post Audit Benefit: IT auditing revealed network protocol and design lacking issues and IT policies implemented, saved 13.5 lacs on internet bandwidth
upgrade
Case 4:
Challenge: Voltamp Oman Transformers manufacturer LLC has got huge setup in multiple geographical locations in Oman, facing insecurity on their CAD
Designs which is billion dollar worth, also the client don’t have efficient logging system and no mechanism was available to find culprits when there are cyber
crimes....
Post Audit Benefit: Million $ benefit by the organization. Their CAD designing have been secured with strongest Information security design, which gave
them more business security and protect from business rivals, the client is ready & prepared for ISO certifications.
HK Association
Clientele
Copy rights reserved www.hkit.in
Our CSR Initiative to generate revenue for NGO
E-waste Collection Program for Supporting Senior Citizens
Dignity Foundation
In partner with
Copy rights reserved www.hkit.in
www.hkit.in
Thank you
Copy rights reserved www.hkit.in

Mais conteúdo relacionado

Mais procurados

cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project TopicsMatlab Simulation
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 

Mais procurados (20)

Cyber security
Cyber securityCyber security
Cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security Research Project Topics
Cyber Security Research Project TopicsCyber Security Research Project Topics
Cyber Security Research Project Topics
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Cyber security
Cyber securityCyber security
Cyber security
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
cyber security
cyber securitycyber security
cyber security
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Cyber security
Cyber securityCyber security
Cyber security
 

Destaque

Rfid tech for library | تحديد الهوية بموجات الراديو
Rfid tech for library | تحديد الهوية بموجات الراديوRfid tech for library | تحديد الهوية بموجات الراديو
Rfid tech for library | تحديد الهوية بموجات الراديوTrans Gulf information technology
 
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Mohammed Almeshekah
 
Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgEric Vanderburg
 
نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةTrans Gulf information technology
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولabayazed
 
Managing System Security
Managing System SecurityManaging System Security
Managing System SecurityPIREH
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلوماتTrans Gulf information technology
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات Trans Gulf information technology
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securitySherief Elmetwali
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1emad tawfeek
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
information security
information securityinformation security
information securityMoamen Ayyad
 
Security of the database
Security of the databaseSecurity of the database
Security of the databasePratik Tamgadge
 

Destaque (20)

Rfid tech for library | تحديد الهوية بموجات الراديو
Rfid tech for library | تحديد الهوية بموجات الراديوRfid tech for library | تحديد الهوية بموجات الراديو
Rfid tech for library | تحديد الهوية بموجات الراديو
 
نظام إدارة مؤسسات تعليم القران
نظام إدارة مؤسسات تعليم القراننظام إدارة مؤسسات تعليم القران
نظام إدارة مؤسسات تعليم القران
 
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- The...
 
محاولة تأريخ لعلم الأجرام عبر الأنترنت
محاولة تأريخ لعلم الأجرام عبر الأنترنت محاولة تأريخ لعلم الأجرام عبر الأنترنت
محاولة تأريخ لعلم الأجرام عبر الأنترنت
 
حجية الدليل الرقمي وموقع المشروع اليبي
حجية الدليل الرقمي وموقع المشروع اليبيحجية الدليل الرقمي وموقع المشروع اليبي
حجية الدليل الرقمي وموقع المشروع اليبي
 
Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric Vanderburg
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
نظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليميةنظام إدارة المؤسسات التدربية التعليمية
نظام إدارة المؤسسات التدربية التعليمية
 
منهجية قانون الانترنيت
منهجية قانون الانترنيتمنهجية قانون الانترنيت
منهجية قانون الانترنيت
 
قضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبرانيقضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبراني
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
 
افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات افاق المعرفة- نظام ادارة المكتبات
افاق المعرفة- نظام ادارة المكتبات
 
مسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبيمسودة مشروع قانون المعاملات الالكترونية الليبي
مسودة مشروع قانون المعاملات الالكترونية الليبي
 
إختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It securityإختبارات في أمن المعلومات It security
إختبارات في أمن المعلومات It security
 
شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1شبكات و أمن المعلومات 1
شبكات و أمن المعلومات 1
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
information security
information securityinformation security
information security
 
Security of the database
Security of the databaseSecurity of the database
Security of the database
 

Semelhante a Information security presentation

Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxAmrit Chhetri
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart buildingDuncan Purves
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security ManagementMITSDEDistance
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeNational Retail Federation
 

Semelhante a Information security presentation (20)

Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1Hki tsecuritysolutionsv1.1
Hki tsecuritysolutionsv1.1
 
HK IT Security Consultant Profile
HK IT Security Consultant ProfileHK IT Security Consultant Profile
HK IT Security Consultant Profile
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
Inicio security
Inicio securityInicio security
Inicio security
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptxRole Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
Role Of Forensic Triage In Cyber Security Trends 2022-UPDATED.pptx
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Information Technology Security Management
Information Technology Security ManagementInformation Technology Security Management
Information Technology Security Management
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 

Último

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Information security presentation

  • 1. Information Security Assessments Requirement Study and Situation Analysis, Risk Identification, Vulnerability Scan, Data Analysis, Report & Briefing.. Copy rights reserved www.hkit.in
  • 2. Information Security Assessments In this rapidly evolving IT sector and our dependence on computers in all aspect of our business and the even more dependence on the internet usage, security becomes the vital key in safe guarding our data from pilferage and misuse. There are many software and hardware available in the market to protect our computers and its data but very often the user is not advised correctly from his application stand point, be it in choosing the right Hardware, Software, Networking Etc. Hence we over spend and underutilize and still have very unstable IT Infrastructure susceptible to Data Pilferage and Abuse Copy rights reserved www.hkit.in
  • 3. HK IT’s expert consultation offers enterprises/academic/NGO’s the cost effective consultations on IT end to end solutions. HK IT Solution’s information security services protect your business from Data breaches, negative publicity, damaged credibility and disruption of services. We deliver world-class offerings, security knowledge and experience to provide you with comprehensive information security. SOX/ISO/COBIT/HIPAA Standards Clienteles in India / Overseas Our Expertize Copy rights reserved www.hkit.in
  • 4. Technology, Services, Support and Training Our offerings combine unmatched technology, services, support and training from Highly certified security experts. That means • no more managing multiple vendors, • no more juggling disparate services • and no more worrying about the security of your data and business. With our track record of success, it means more time for your organization to focus on other operational areas, while we focus on information security excellence for you and your organization. Copy rights reserved www.hkit.in
  • 5. Dr. THENNARASU.E (Harsha) PhD Researcher Information Security on High End Applications Information Security Assessment & Cybercrimes investigator Member of DSCI (Data Security Council of India) Trainer Certified Ethical Hacker Overseas Auditing Experience Guest Lecturing (Universities, Colleges) Guest Speaker of Innovating for India Seminar Technical Committee Member, SIT Dr. CHANDRASEKAR UMAPATHY (PhD, IIM) OWASP Chennai Chapter Lead Sri Lanka OWASP Chapter Mentor Invited Trainer at OWASP India conference. Cloud Alliance Security Chennai Chapter Lead. Reviewer of ISACA CRISC Review Manual 2011. Cloud Security Alliance – Control Matrix Co- Author ISACA Best Trainer for the Year 2011-2012 Our IT Security Specialists Mr. V. RAJENDRAN President of Cyber Society of India Certified ISO 27001 Lead Auditor conducted many ISO 9000 series and 27001 audits Practising Cyber Crime, Banking and Cyber Law related cases Authored the book on "IT Security" for Indian Institute of Banking and Finance Subject matter expert & Trainer for Tamil Nadu Police academic Pursuing PhD in the area of Cyber Crime in Banks Mr. TS. RAGHUNATHAN Certified security professional by Cisco, Cyberoam, Watch guard, etc., Practitioner Information & Network Security assessments/audits VA/PT specialist Certified Ethical Hacker 12 year experience in Information & Network Security Domains Visiting Professor HTC ITMR for Information SecurityCopy rights reserved www.hkit.in
  • 6. • IT Infrastructure Audits • Breach Assessments • Server Audits • Application Assessments • Network Audit • Vulnerable Assessment/ Penetration test • Data center Assessment • Web Server Audit • Power Audit • Gap Analysis/Risk Assessments IT Assessments / Audits Copy rights reserved www.hkit.in
  • 7. 5000+ users IT Infrastructure Audited by HK IT security experts HK-Training and Audit Copy rights reserved www.hkit.in
  • 8. Copy rights reserved www.hkit.in Case Study Case 1: Aravind Eye Hospitals Challenge: Huge Internet Bandwidth requirement, continuous network drops, non availability of IT when there are emergency, impact on productivity Post Audit Benefit: Audit report revealed all improper configurations, vulnerabilities from internal & external , decreased downtime, Patched all Internal & external vulnerabilities Case 2: KMCH (Kovai Medical Centre & Hospitals) (similar case study on Dr. MGR medical college & hospitals) Challenge: IT infrastructure issues, Network chocking, huge internet bandwidth consumptions, applications assessment, compliance, security from internal & external threats Post Audit Benefit: identified all vulnerabilities and designed security design as per top management expectations, resolved network problems, patched for internal & external threats , firewall policies fine tuned, bandwidth utilizations optimized.
  • 9. Copy rights reserved www.hkit.in Case Study Case 3: (SIT- Siddaganga Institute of Technology) Challenge: 5000+ workstations with 7000+ users, huge internet bandwidth requirement and incur huge expenses. Lacking on IT policies, Network Drops, application vulnerabilities. Post Audit Benefit: IT auditing revealed network protocol and design lacking issues and IT policies implemented, saved 13.5 lacs on internet bandwidth upgrade Case 4: Challenge: Voltamp Oman Transformers manufacturer LLC has got huge setup in multiple geographical locations in Oman, facing insecurity on their CAD Designs which is billion dollar worth, also the client don’t have efficient logging system and no mechanism was available to find culprits when there are cyber crimes.... Post Audit Benefit: Million $ benefit by the organization. Their CAD designing have been secured with strongest Information security design, which gave them more business security and protect from business rivals, the client is ready & prepared for ISO certifications.
  • 10. HK Association Clientele Copy rights reserved www.hkit.in
  • 11. Our CSR Initiative to generate revenue for NGO E-waste Collection Program for Supporting Senior Citizens Dignity Foundation In partner with Copy rights reserved www.hkit.in
  • 12. www.hkit.in Thank you Copy rights reserved www.hkit.in