1 of 103

SECURITY

Overview

Preparedness for future…

2 of 103

Have you felt Cyber Insecurity?

3 of 103

Can we fathom out of

the challenge?

4 of 103

5 of 103

Police IT

Ecosystem

How IT Systems work?

6 of 103

7 of 103

Who are the best adopters of technology?

8 of 103

One of its kind

Who will take a call?

9 of 103

Zero Day

at the heart of it all

10 of 103

11 of 103

12 of 103

12

May 16, 2018

Curiosity

Monetary Gain

National Security

Espionage,�Political Activism

The sophistication of cyber threats, attackers and motives are rapidly escalating.

Motive

1995 – 2005

1st Decade of the Commercial Internet

Revenge

Script-kiddies or hackers using tools, web-based “how-to’s”

Insiders, using inside information

Organized Crime, Hackers and Crackers using sophisticated tools

Competitors, Hacktivists

Nation-state Actors; Targeted Attacks / Advanced Persistent Threat

2005 – 2015

2nd Decade of the Commercial Internet

Adversary

*X-Force Research - 2013

13 of 103

Getting hacked in the new normal.

Sanjay Sahay

Data Manipulation

14 of 103

Digital Iron Dome

Massive attack on Israel’s National Electricity Grid

15 of 103

The World's First Digital Weapon

16 of 103

Precision is the key

Outstanding Coding and Testing

Absolute Game Changer

9/11

17 of 103

18 of 103

19 of 103

This recent undated satellite image provided by Space Imaging/Inta SpaceTurk shows the once-secret Natanz nuclear complex in Natanz, Iran, about 150 miles south of Tehran.

20 of 103

21 of 103

  • WannaCry

  • Petya

  • Bad Rabbit

22 of 103

23 of 103

Baltimore

24 of 103

Encryption

25 of 103

26 of 103

Fortune 500 companies��97% has been hacked!� �

27 of 103

Internet of things!

Global Information Grid

A very vulnerable one!

28 of 103

Cloud the most happening place

How secure are we?

29 of 103

Cloud Computing�

Results of IDC survey ranks Security 74.6% as the biggest challenge

30 of 103

Web of Profits

Global Cyber Crime is worth $1.5 trillion a year

  • $ 860 bn from illicit / illegal online markets

  • $ 500 bn from intellectual property thefts

  • $ 160 bn from data trading

  • $ 1.6 bn from crimeware - as - a – service

  • $ 1bn from ransomware

31 of 103

Web of Profits

  • Platform Criminality mirroring platform capitalism of the companies like Uber & Amazon where data is the commodity

  • From business to economy

  • Legitimate / illegitimate intertwined

  • Money laundering, drugs, trafficking & terrorism

32 of 103

Web of Profits

Some services and products:

  • Zero – day Adobe exploits ($30,000)

  • Zero – day ios exploit ($250,000)

  • Malware exploit kit ($200-$600 per exploit)

  • Blackhole expoit kit ($700 a month or $1500 a year)

33 of 103

cyber is the world!

from pace maker to nuclear power plants

from text documents to the hybrid cloud

34 of 103

We live in a digitally porous world!

35 of 103

“If builders built buildings the way programmers wrote programs, then the first woodpecker that came along would destroy civilization.”

-Weinberg's Second Law

36 of 103

Weakest link

The human factor!

37 of 103

Insider Threat

The lone wolves of the Cyber Age!

38 of 103

I

N

S

I

D

E

R

S

Tough Challenge

39 of 103

39

May 16, 2018

End user didn’t think before clicking

Weak password/default password in use

Insecure configuration

Use of legacy or un-patched hardware or software

Lack of basic network security protection

The top 5 reasons why attacks are related to system hygiene or user knowledge.

1

2

3

4

5

40 of 103

Where should you start?

These three controls can help you address the top vulnerabilities and begin to reduce risk.

Build a �risk-aware culture

Protect the network & end-points

Automate security hygiene & manage incidents with intelligence

41 of 103

DATA

is at the center of our universe

42 of 103

Data Brokers

43 of 103

44 of 103

Resilience

What the System Ought to Provide

45 of 103

Ubiquitous Surveillance

Military - Internet Complex

Corporate

46 of 103

Surveillance

Govt / Business Corporations

  • Covert

  • Automatic

  • Ubiquitous

47 of 103

FBI

VS

48 of 103

World at crossroads…

Internal Security

External Security

Counter Terrorism

Rogue States

Cyber War

Money Laundering

Underworld

Underground Economy

Naxalism

Data Brokers

Hacktivists

49 of 103

World at crossroads…

And the IT companies themselves!!!

Privacy has no meaning

More data, more money!

Everything for a price

50 of 103

51 of 103

I

N

S

I

D

E

R

H

A

C

K

T

I

V

I

S

T

S

52 of 103

I

S

I

S

VS

53 of 103

The Malware Story

  • Criminals & Virus writers outinnovating and outmaneuvering the anti-virus industry

  • First information

  • Detection rate

  • “time – to – detection lag”

  • “out of their leagues in their own game”

54 of 103

Asymmetric Warfare – A new form

  • 2009 Iraq-$45 billion drone and satellite surveillance system

  • Skygrabber-$25.95

the costing

55 of 103

Attribution

56 of 103

MLAT

BUDAPEST COVENTION

57 of 103

58 of 103

The Dark Net

59 of 103

60 of 103

The Internet provides a delivery system for the pathological states of mind

61 of 103

Crime Inc.

62 of 103

Crime as a service!

Payment mechanism in place!

63 of 103

Information Sharing!

64 of 103

Where will the Cyber Security Professionals come from?

65 of 103

It’s a refrain being heard for the past 18 months the world over: “We need more skilled people for our security team.”

66 of 103

global cybersecurity workforce will have more than

  • 1.5 million unfilled positions by 2020

  • a $101 billion opportunity by 2020

67 of 103

68 of 103

69 of 103

NIST Special Publication 800-181

National Initiative for Cybersecurity Education (NICE)

Cybersecurity Workforce Framework

Federal Information Security Modernization Act (FISMA) of 2014

70 of 103

a partnership between government, academia, and the private sector working to energize and promote a robust network and an ecosystem of cybersecurity education, training, and workforce development.

71 of 103

cultivating an integrated cybersecurity workforce that is globally competitive from hire to retire

72 of 103

Cyber Security

How different?

73 of 103

in its simplest sense, allows each human being to be left alone in a core which is inviolable.

74 of 103

75 of 103

A WORLD HELD HOSTAGE !

76 of 103

D

A

T

A

77 of 103

78 of 103

79 of 103

80 of 103

81 of 103

82 of 103

83 of 103

84 of 103

85 of 103

86 of 103

87 of 103

White Paper of the Committee of Experts on a Data Protection Framework for India

88 of 103

  • Technology agnosticism

  • Holistic application

  • Informed consent

  • Data minimisation

  • Controller accountability

  • Structured enforcement

  • Deterrent penalties

K

E

Y

P

R

I

N

C

I

P

L

E

S

89 of 103

90 of 103

Indicators

  • Articulation & publication of a National Cyber Security Strategy

  • Does the country have an operational Computer Emergency Response Team (CERT) or Cyber Security Incident Response Team (CSIRT)

  • Has the country demonstrated commitment to protect against cyber crime

91 of 103

Indicators

  • Does the country have an information sharing mechanism

  • Is the country investing in cyber security basic & applied research & funding cyber security initiatives broadly

92 of 103

  • What Cyber Security functions do we perform?

  • What is role?

93 of 103

  • Standards

  • Uniformity

  • Certification

  • Audit

94 of 103

  • Hardware

  • Software

  • Network

  • Data Center

  • Cloud

95 of 103

How much of cyber crime investigation we are equipped to handle?

96 of 103

Silk Road Investigation

San Bernardino Case

WannaCry

Petya

97 of 103

Talent

98 of 103

99 of 103

100 of 103

Only Hands On is On!

101 of 103

There’s no reason

that the good guys can’t be the same !!!.

The bad guys are smart, well equipped, and determined.

102 of 103

As Steve Job’s said we are at the crossroads of technology and humanities. Technology is racing to become the mankind’s DNA. Transformational changes demand transformational answers. Digital is the only way forward. What matters is grey matter in a knowledge driven world. Together we can and together we will find a method in the digital madness.

The way forward

103 of 103

Thank you