This is official DSCI podcast channel dedicated on cyber security and privacy. Use this RSS feed link in iTunes and other Podcast players: http://podcast.dsci.in/feed/

October 11, 2017

Exploring the contours of Cyber Security Industry Building

00:0000:00

This podcast focusses on the potential, Cyber Security offers in terms of industry development. In the current scenario, organizations across the globe are cashing in on the opportunity of building innovative products and services and exporting them to different geographies. Also, investment into R&D has increased substantially. Trends like these and more are shaping the industry development agenda. The NASSCOM Cyber Security growth roadmap report pegs the industry to be worth USD 35 billion by the year 2025.

 

A focussed, dedicated and dynamic approach is imperative to accomplish this vision. Global firms are setting up their IT/ Cyber Security subsidiaries in India (also called GICs), indigenous security product companies are developing niche solutions, leading security firms are setting up their R&D bases in the country. It is vital to study all such tracks of industry development and propel actions in each.

 

It is also time to step up collaboration between Industry, academia and government by virtue of establishing Cyber Security clusters that will be working dedicatedly on the industry building agenda. This session was hosted in Best Practices Meet 2017. Click here to know more: https://www.dsci.in/BPM2017/

 

The points discussed herein are:

  • Role of commercialization, technology transfer, innovation and co-creation
  • The latest trends, developments and initiatives in terms of Cyber Security Industry Development – How to consolidate this further?
  • Analysing the key tracks of Industry building and the imperatives of each.
  • Bottlenecks – Can Industry, Government and academia come together?
  • Feasibility of having Cyber Security clusters in the country

 

Join us at AISS 2017 to explore how the Cyber Security industry is shaping up and the efforts needed to take it further. Register now! Visit: https://www.dsci.in/aiss-2017/

September 18, 2017

Data Science for Cyber Security - the Next Cassandra!

00:0000:00

Data Science is evolving as the next big thing to extract knowledge or insights from data in various forms. This podcast delves deep into the Myths and Realities of Data Science, the know-hows about building a Data Science organisation, and largely how to leverage Data Science for Cyber Security in the coming future.

This session was hosted in Best Practices Meet 2017. Click here to know more: https://www.dsci.in/BPM2017/

September 11, 2017

Starting your own Cyber Security Services Co: Interaction with Chiranshu Ahuja

00:0000:00

Chiranshu Ahuja, CEO and President of CR Risk Advisory Services, left his corporate job in 2014 to explore his fortune in cyber security entrepreneurship.

Data Security Council of India interacted with Chiranshu on his experience of setting up security services company. In the interaction, he delved into his past to reveal us what it takes to set up your own security company. His experience gives us the glimpse of security market ecosystem in the country. He comments on Indian security buyers and tells that foreign market especially middle east and the US are much open to working with small, but niche companies. His company earns most of the revenue in foreign market, which Chiranshu believes would change little bit as market in India is opening up. He believes that the demand of security services is still to satisfy compliance mandate than addressing real risks.

Cyber Security industry building is a key mandate and focus of DSCI. Chiranshu throws some light on how the industry is evolving and what is the scope for small niche service providers in that.

September 4, 2017

GDPR - Taking a deep dive into the implementation aspect

00:0000:00

The General Data Protection Regulation (GDPR) has significantly upped the ante when it comes to liabilities and penalties. There are various guidelines notified and mandated by GDPR which has direct liabilities onto the organizations (of any kind processing the personal data of EU residents).

Some of them worth mentioning are data breach notifications, identifying lead supervisory authorities, conducting Privacy Impact Analysis (PIA) as desired by supervisory authorities, notifying and explaining the individuals on how to exercise their rights, etc.

In order to comply with these, organizations have started not only reviewing the paperwork such as their policies, privacy programs, processes involving PI, contracts with vendors as well service providers, etc. but also have started focussing on various technical measures and defined rules/configurations of tools/technologies required to implement what is written on documents.

This session was hosted in Best Practices Meet 2017. Click here to know more: https://www.dsci.in/BPM2017/

August 28, 2017

Beyond Firewalls - New Age Risk Management Solutions

00:0000:00

Beyond Firewalls- The Risk Management Solutions

This podcast discusses an interesting topic of what can be beyond firewalls to secure the cyber world. In the light of recent cyberattacks, it is eminent that we need security layers apart from basic anti-viruses and firewalls. That’s when cyber insurance comes to rescue!

The market for cyber insurance across the globe is rapidly evolving. Adoption of cyber insurance is gaining traction rapidly, given rapid advancement in cyber security threat landscape and increasing cyberattacks such as ransomware on the organizations.

Cyber insurance not only helps curb losses through liability transfer but also helps in promoting adoption of preventive measures in return for more coverage and motivate to implement best practices as premiums are determined based on the level of protection.

The coverage and scope of cyber insurance, and various scenarios on how it could be invoked was discussed by participants in Best Practices Meet 2017. Visit link to know more: https://www.dsci.in/BPM2017/

February 3, 2017

Biometrics driving digitization & inclusion

00:0000:00

With Increased digitization of banking services, growth in the biometrics market in BSFI sector seems inevitable. The increased use of smart devices and smartphones and tablets have led a digital reformation of the banking sector. The BFSI sector is one of the prominent users of portable devices for digital payments and cashless financial transactions. With the growing transaction volumes and the introduction of new digital payment solutions, the banking sector is challenged with the need to keep the magnitude of fraudulent activities low, without compromising on the convenience of the customers. 

On one hand this is expected to widen the net of financial inclusion, on the other, it is also suspected to engender some credible Cyber Security challenges. A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These attacks are intended to either circumvent the security afforded by the system or to deter the normal functioning of the system. Circumvention, Denial of Service, Collusion, repudiation among others are some of the key challenges that need focussed attention of the Security community of the country.

Please use RSS feed link in iTunes and other Podcast players, to get this podcast on your phone - RSS feed link: http://podcast.dsci.in/feed/

Watch it on youtube: https://www.youtube.com/watch?v=4te2KBOHGl4 

January 17, 2017

Big Hacks…Imagining the extent of damage in connected public infrastructure

00:0000:00

Cybercriminals are focusing on public infrastructure to disrupt services and cause mayhem as new targets are emerging and expanding throughout the world. The difficulty of estimating the actual cost of damages from a cyber-attack adds complexity to planning for critical infrastructure protection. The effect on public infrastructure could be a power outage, like we saw last year in Ukraine. Or, it could be something more serious like a Chernobyl-style catastrophe at a nuclear plant

Security of Public Infrastructure in the Age of IoT and Ransomware

Critical infrastructure such as electric and water utilities are being temporarily shut down as ransomware plagues corporate systems, causing hours of downtime. The health industry has also fallen victim to these cyber-extortion techniques. The risks go beyond operability, financial losses and credibility. Cyberattacks on industrial systems can cross the line into threatening human lives.

Companies spend a disproportionate amount on prevention, and that leaves nothing for dealing with detection and response after there's a breach. With Gartner predicting 6.4 billion connected devices by the end of this year, and upward of 21 billion connected devices by 2020, the risk of a hacker attacking public infrastructure will only get worse with time.

Please use RSS feed link in iTunes and other Podcast players, to get this podcast on your phone - RSS feed link: http://podcast.dsci.in/feed/

Watch it on youtube: https://www.youtube.com/watch?v=OEk96NOId98 

January 17, 2017

Design for devices, things, contexts & personal preferences

00:0000:00

Rampant movement of digitization is pushing imaginations of product designers to all new sort of devices emerging and things that are getting on the Internet. The contexts of customer, which are increasingly available in the form of digital records, are attracting the attention of designers. The ideas of “designing for commute” are being experimented by various sectors; finance sector is leading among them. Possible efforts are made for designing and providing experiences to the customer as per their preferences. In the process, systems are increasingly getting open. Increasing number of devices are participating in executing the transactions. Operations and protocols driving things are getting exposed to the external world. Tremendous amount of personal data is made available and exchanged for taking business decisions. Underlying core applications are being retrofitted for supporting this innovation. This is opening up the otherwise closed systems to multiple possibilities of attacks. Apart from their exposure to contemporary attacks, they are creating avenues for specially crafted targeted attacks.

Please use RSS feed link in iTunes and other Podcast players, to get this podcast on your phone - RSS feed link: http://podcast.dsci.in/feed/

Watch it on youtube: https://www.youtube.com/watch?v=A28QmvqPAtM 

March 22, 2016

Security Use cases: What Works and What Not ?

00:0000:00

The emergence of cyber security startups has continued unabated, as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing, innovative attackers. The expertise of these new organizations range from various improvements to encryption products to analyzing the wealth of security-incident data, gathered from networks to gear, that detects potentially malicious wireless activity of Internet of Things (IoT) devices.

 

But is expertise with a killer idea the only success criteria? Organizations in this space have increased substantially over the past few years. Of these, those which started from incubation centers in academic institutions have been able to self-sustaining a very short span of time. Others have grown and reached out to different geographies with their products and  captured a significant market share, while the rest did not see the light of the day.

 

Various features such as scalability of existing capabilities and the ability to diversify the array of solutions offered to the stakeholders, holds the key to the survival and expansion of Security Product companies. Innovation to meet the market demand in efficient and effective manner is another critical factor for the success of some of the organizations.

 

Curiosity raises a question as to  why something works and the other doesn’t? What are the key drivers and factors for success?

 

Budding entrepreneurs when embarking on this journey, may find the panel’s deliberation on these questions and valuable experience sharing, extremely insightful and beneficial.

  

Ashish Tandon, CEO, Indusface, Bikash Barai, Cigital, Dhruv Khanna, CEO, Data Resolve participated in this discussion. The discussion was moderated by Vinayak Godse, Senior Director – Data Protection, DSCI at the Annual Information Security Summit (AISS) 2015.

 

Please use RSS feed link in iTunes and other Podcast players, to get this podcast on your phone - RSS feed link: http://podcast.dsci.in/feed/


Watch it on youtube: https://www.youtube.com/watch?v=8xvPwK7KVQM

March 4, 2016

Complex Challenges of Internet, Mobile & e-Commerce

00:0000:00

Internet is a key engine for economic and socialdevelopment today. It is not just about communication now, but it is about business,governance and innovation. The contribution ofmobile phones as the main Internet access point in rural India has grown to 60%in 2015.


In this session, panelists have discussed on the challenges that online intermediaries face as they work towards securing a trustworthyenvironment for transactions and information sharing.


Mr. Murugavel Janakiraman, CEO,Bharat Matrimony, Mr. Sumit Somani, Sr. Manager, PayTM, Mr. Sandip Beri, Partner, Shardul Amarchand Mangaldas, Mr Ashish Chandra, General Counsel, Snapdeal participated in this discussion. This discussion was moderatedby Ms. Bishakha Bhattacharya, Sr. Director, NASSCOM in Annual Information Security Summit, 2015.


Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link: http://podcast.dsci.in/feed/


Watch it on youtube: https://www.youtube.com/watch?v=1ZCDypYzsTI