This is official DSCI podcast channel dedicated on cyber security and privacy. Use this RSS feed link in iTunes and other Podcast players: http://podcast.dsci.in/feed/

March 22, 2016

Security Use cases: What Works and What Not ?

00:0000:00

The emergence of cyber security startups has continued unabated, as entrepreneurs vie for corporate customers seeking new technologies to battle ever increasing, innovative attackers. The expertise of these new organizations range from various improvements to encryption products to analyzing the wealth of security-incident data, gathered from networks to gear, that detects potentially malicious wireless activity of Internet of Things (IoT) devices.

 

But is expertise with a killer idea the only success criteria? Organizations in this space have increased substantially over the past few years. Of these, those which started from incubation centers in academic institutions have been able to self-sustaining a very short span of time. Others have grown and reached out to different geographies with their products and  captured a significant market share, while the rest did not see the light of the day.

 

Various features such as scalability of existing capabilities and the ability to diversify the array of solutions offered to the stakeholders, holds the key to the survival and expansion of Security Product companies. Innovation to meet the market demand in efficient and effective manner is another critical factor for the success of some of the organizations.

 

Curiosity raises a question as to  why something works and the other doesn’t? What are the key drivers and factors for success?

 

Budding entrepreneurs when embarking on this journey, may find the panel’s deliberation on these questions and valuable experience sharing, extremely insightful and beneficial.

  

Ashish Tandon, CEO, Indusface, Bikash Barai, Cigital, Dhruv Khanna, CEO, Data Resolve participated in this discussion. The discussion was moderated by Vinayak Godse, Senior Director – Data Protection, DSCI at the Annual Information Security Summit (AISS) 2015.

 

Please use RSS feed link in iTunes and other Podcast players, to get this podcast on your phone - RSS feed link: http://podcast.dsci.in/feed/


Watch it on youtube: https://www.youtube.com/watch?v=8xvPwK7KVQM

March 4, 2016

Complex Challenges of Internet, Mobile & e-Commerce

00:0000:00

Internet is a key engine for economic and socialdevelopment today. It is not just about communication now, but it is about business,governance and innovation. The contribution ofmobile phones as the main Internet access point in rural India has grown to 60%in 2015.


In this session, panelists have discussed on the challenges that online intermediaries face as they work towards securing a trustworthyenvironment for transactions and information sharing.


Mr. Murugavel Janakiraman, CEO,Bharat Matrimony, Mr. Sumit Somani, Sr. Manager, PayTM, Mr. Sandip Beri, Partner, Shardul Amarchand Mangaldas, Mr Ashish Chandra, General Counsel, Snapdeal participated in this discussion. This discussion was moderatedby Ms. Bishakha Bhattacharya, Sr. Director, NASSCOM in Annual Information Security Summit, 2015.


Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link: http://podcast.dsci.in/feed/


Watch it on youtube: https://www.youtube.com/watch?v=1ZCDypYzsTI


February 12, 2016

Augmentation of Capabilities to Counter Multifarious & Advanced Threats

00:0000:00


Today, multifarious and advanced threats are prevalent across the globe. These sophisticated attacks have adversely impacted many large organizations from different industry sectors such as government, finance, technology, media and chemical sectors. These attacks are typically crystalized by group of sponsored, dedicated and highly sophisticated attackers who target governments and organizations to steal sensitive data either to gain competitive edge or to disrupt critical infrastructure.

Technology alone is no silver bullet to defend against these sophisticated attacks. In such a scenario what should be done? How can one prepare to remain ahead of its adversaries? Whether the security capabilities need to be amplified by effective security practices and governance. The panel discussion will focus on the effective strategies from boardroom to shop floor to combat these advanced threats.

Mr. Riyaz Tambe, Head of Systems Engineering, India and SAARC, Palo Alto Networks, Mr. S.S. Sarma, Additional Director, Cert-In, Mr. T. Venkateswaran, Chief Manager – Info Security, PNB, Mr. Sanjay Aurora, MD – APAC, DarkTrace participated in this discussion. This discussion was moderated by Mr. D.S. Khatavkar (Atul), Vice President (IT GRC), AGC Networks  in Annual Information Security Summit, 2015.

Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link: http://podcast.dsci.in/feed/

January 11, 2016

Privacy Profession: Climbing Many Ladders at a Time

00:0000:00


Companies are hiring professionals to help them decode the challenges related with data collection and privacy. Customers are lobbying behind organizations to be more transparent in the way their information is managed and secured. Regulatory bodies are also realizing the need to provide adequate protection to consumers to safeguard their privacy. This raises many questions for enterprises and individuals around the privacy as profession. This session discusses all the aspects for privacy profession from Drivers, Skills required, Curriculum, Certifications to Job roles and Salaries for the privacy professionals. Original session was recorded on 16-December-2015.

Mr. Trevor Hughes, CEO, IAPP (via Skype),  Prof. Ponnurangam K., IIIT Delhi, Mr. Satyanandan A., Associate VP–Risk Management & Data Privacy Officer, Bharti AXA General Insurance, Mr. Rakshit Dhamija, CISO & Director – IT Admn., iGate Global Solutions participated in this discussion. This discussion was moderated by Mr. Mr. Abhishek Bansal, Principal Consultant, DSCI in Annual Information Security Summit, 2015.

Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link: http://podcast.dsci.in/feed/ 

January 11, 2016

Manjhi Moment to Break Legacy Mountain of Identity Management

00:0000:00


Identities and credentials are a primary target for hackers and criminals. The capability of Legacy IAM systems to effectively address the constantly evolving requirements of today's mobile and cloud-based environments is limited. Organizations need to approach identity, security and compliance from a holistic perspective, and adopt solutions that are as agile.

Mr. Pankaj Dikshit, SVP (IT), GSTN, Mr. Sudeep Das, SE Manager – India & SAARC, RSA & Mr. Mitesh Thakkar, CEO, Adoroi participated in the discussion. The discussion was moderated by Mr. Ashutosh Jain, CISO, Axis Bank in Annual Information Security Summit, 2015 in New Delhi.

Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link:http://podcast.dsci.in/feed/ 

January 11, 2016

Automating Security – Threat to Security Profession ?

00:0000:00


Machine learning is now driving the transition of the machines from decision supporting age to self-deciding age. It’s increasingly advocated for security as the number of permutations and combinations and contexts that are required to take security decision are increasing multi-fold. Many security solutions are now talk of AI capabilities. It’s said that this revolution will severely affect the rise of security profession. Would it hamper the numbers projected to emphasize the rising security skill demand? Would it also impact the existing professionals? This special feature of the AISS would delve into the trends of security automation to evaluate how it will impact the security profession.

David Shearer, CEO, ISC2, Shrikant Shitole, MD, Symantec India and Sapan Talwar, Head IT Security, Adobe participated in this discussion. This discussion was moderated by Vinayak Godse, Senior Director, DSCI in Annual Information Security Summit, 2015.

Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link:http://podcast.dsci.in/feed/  

January 11, 2016

Answers to Cyber Kill Chain

00:0000:00


Despite state of art security solution deployments, today many organizations such as Target, Sony, Office of Personnel Management, and Home Depot are still getting breached. Concept of “Cyber Kill Chain” entails to intelligent defense of the network, charting tendencies, recording statistical anomalies via latest intrusion detection technologies. An Intrusion centric concept with major focus on malware detection and prevention. This session discusses what an organisation should do to protect their crown jewels. Original session was recorded on 16-December-2015.

Mr. Alok Vijayant, Director –Cyber Security Operations, NTRO, Mr. Gigi Joseph, CISO, BARC, Mr. Amit Sharma, Addl. Director, DRDO and Mr. Samarendra Kumar, GM –Group IT Security, InterGlobe Technologies participated in this discussion. This discussion was moderated by Mr. Sameer Ratolikar, CISO, HDFC Bank, in Annual Information Security Summit, 2015.

Please use RSS feed link in iTunes and other Podcast players to get this podcast on your phone- RSS feed link:http://podcast.dsci.in/feed/