SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Governance in
CyberCrime Investigation
&
Cyber Security
Organizations
On
Dec. 07, 2013

At
The Palladium, Mumbai

Presented At
CyberAttack 2013
Security Conference

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK 2014, Mumbai

By

Dinesh O. Bareja
Information Security &
Management Advisor
Distribution Version
• This presentation has been optimized for distribution which means that animation panes have
been deleted and expanded so that the slides with animation do not appear with unreadable
clutter
• The images that have been used are sourced freely from the Internet using multiple search
resources. Our logic is that if your creations are searchable then they are usable for
representation AND we never use any such images in our commercial works
• All our works that are put up as ‘distribution’ versions are published under Creative Commons
license and are non-commercial – these are available for download from common document
sites on the internet or from our website
• If some images are deleted the slide will show the hyperlink to it and you can follow the link to
see the image. This is done if I have received an objection or a take-down notice from the
copyright owner
• I/We make every effort to include a link or name to the copyright owner of the image(s) that
have been used in this presentation and please accept our sincere apologies in case any image
has not been individually acknowledged
• Copyright notices or watermarks are not removed from images or text which are not
purchased, however, we may say that practically all text is our own creation
• Inspite of all the above and other declarations, if you have objections to the use (as owner of
any of the IP used in this presentation / paper) you may please send an email to us and we
shall remove the same right away (please do remember to include your communication
coordinates and the URL where you spotted this infringement

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
A Brief Introduction
Dinesh O Bareja
• Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd
• Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch)
• Member IGRC – Bombay Stock Exchange
• COO – Open Security Alliance

Enterprise & Government Policy Development;
Cyber Security Strategy and Design Architect;
Current State Maturity Assessment & Optimization;
Digital Forensics, Cloud Forensics and Security;

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Setting The Context..
Thinking .. Strategizing … Planning should be done
when you are in square one

However it is better late than never:
Stop Take stock Create a going-ahead plan
Restart from where you stopped

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Context…

Taking stock of our current situation:

It is about time the Information Security community
woke up to voice the weakness in governance in
our government’s thinking on national cyber
security
And

The increasing inability to control (cyber) related
incidents with the looming threats of cyber war /
terrorism / espionage / crime
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Or (in the near future)… Face

Annihilation
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Context

Defining the three key terms in our title to set the
context (from Wikipedia and Dinesh’speedia

• Governance: That which defines expectations, grants power or

verifies performance. Is a system by which entities are directed and
controlled and a governance structure specifies the distribution of rights
and responsibilities among different stakeholders. It is the process or a part
of decision-making and the process by which leadership is established and
decisions are implemented (or not implemented)

• Cybercrime Investigation Organizations: Are primarily law
enforcement organizations and such bodies that are engaged in
investigating and controlling cyber crime.

• Cybersecurity Organizations: Intelligence services, offensive and
defensive solution development and delivery, sector specific entities like
Telecom CERT etc, cyber command wings of defence forces and such
organizations that are outside the ambit of being termed a LEA.

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
We
Need
To

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
My Plan is to Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths in
Planned Security Organizations

Why

do we need to structure a
centralized command governance
for Cyber Security across the nation
(or states) when we already have our
Cyber-thanas, CERTs, NTRO-NCIIPC,
DIARA and more

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths
• Centralized system provides strategic, tactical,
operational and administrative control
• Need-to-know Data Access and Distribution Policy
• Central Information Library and Knowledgebase
• Politics-free Inter-Disciplinary dependencies
• Common goals across all stakeholders
• Quick response capability
• Enhanced intelligence and capability sharing
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Relevance and Strengths
• Standardized response by organizations across the
nation states provide harmony in operations
• Resources, capacities, capabilities can be shared
• Crisis communication is controlled and effective

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - CDRC
• Jointly setup by Jharkhand State and Jharkhand
Police (special branch)
• Located in PHQ it is the authority in the state for
cybercrime and cyber security related information,
advisories, investigation – QUICK RESPONSE
• Engaged in citizen awareness outreach, critical
infrastructure protection, training etc
• Connects with the InfoSec community, LEA and
security establishments across the country …
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Change Gives No Choices
Hopefully
not a major
incident

http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/
Governance in CyberCrime Investigation
& Cyber Security Organizations

Period of
ignorance on
the power trip

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai

Enlightenment
dawns on the
lawmakers
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Traditional Entities
• Cyber Thana, Cybercell, Cyber Lab, FSL
• Police, BSF, ITBP, CID, CBI, EOW, SFIO, IT
• CERT, Sectoral CERT, NTRO, NCSC, NIA, IB, NCIIPC
• Army, Air Force, Navy
• My personal list has a count of about 60
organizations which are (in some way or the
other) connected to the aims of cybercrime /
cybesecurity control
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
But, we have..
• The same problems which face any traditional
entity

• Lack of sharing
• Blame it on the enemy-of-the-day
• High spending
• Generally go around in circles do nothing
• Lack of capability / skills / resources
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
If you don’t believe me I hope
you will believe someone who
was more intelligent than me !

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Why Traditional Can’t Survive
• Borders and jurisdictions are porous
• Speed of decision making and communication is
the need of the hour second (it will soon be the
need of he nanosecond)
• A single crime may be committed from multiple
locations at the same time
• Attacks and malicious activity can be initiated by
individuals, groups or nations…. Who attacks
whom is unknown!
• Every one in the team has to be a hacker… etc!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
What is Needed
• Organization Agility
• Thought Leadership
• Planned Operations and Response
• Acceptance of knowledge as power
• Budget and support for growth
• Reality – a child can be the adversary
• … etc!

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
FUDsters Trolls Carpetbaggers
and Scalawags abound
http://horrorfilmaesthetics.blogspot.in/2011_06_01_archive.html

As with any new frontier one will
find the settlers along with the
charlatans, the con men, the
criminal minded and others.

The internet is no different… there
are scamsters, crackers, business
people, phishers, bankers,
bloggers, settlers etc…
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
FUDsters Trolls Carpetbaggers
and Scalawags abound
• Organizations and Governments are shooting
themselves in the foot
• False expectations are created to believe that the
largest organization has the best solution
(qualification - 200 crore turnover for past 3 years)
• Vendors present snazzy catalogs and are generally
people who know everything about anything
• Analyst opinion is considered to be gold standard
• Auditors are trained to never give the true picture
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
The Quantum of Risk
grows exponentially when
one is stuck in the past

Just hope to get unstuck quick!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Buyers live in the old mindset
• Insurance company seeking Risk Management
framework – QC is Rs 200 cr profit making
company for past 3 years
• Bank seeking IS support services sets the QC at Rs
100cr .. profit making, in past 3 years
• Company hiring a Security Manager expects the
person to have all certifications and skills in audit,
technology, forensics, communication, application
development, business continuity, malware etc

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Hiring Managers live in their
personal heaven

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Where do they think they will
get value

How do they expect to secure
their organizations if they
leave out the world
Just hope to get unstuck quick!
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Now Lets Talk About

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Current State of Cyber Security
Governance - worldwide
• Multiple organizations are established by different
departments of Government, Law Enforcement,
Defence Forces, Large Enterprises
• Each of them is doing “their own thing” to protect
their turf (assets, perimeter, technologies)
• Every one is a de facto expert claiming to have the
most wonderful system in place after God’s
creation
• Chaos and confusion reign supreme and it is
evident in the continued bashing of the domain
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Current State of Cyber Security
Governance - worldwide
• Each looks at cybersecurity as an extension of their
own present function – so the Naval team looks at
threats to their own naval installations and the
Police is only concerned with cybercrime
• Capabilities are being created in silos which do
not communicate or may do so at the MHA
sponsored senior officer meetings
• And what do we have in the end..

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Silos
• Absence of Inter-State Information Sharing among
LEA and others
• Everyone is going their own way
• State of the Art purchases

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Traditional Entities
• My personal list has a count of about 60
organizations which are (in some way or the
other) connected to the aims of cybercrime /
cybesecurity control
• A listing will come up in the next slide

• These organization names have been taken from
news / media reports so it is in public domain (no
secrets are disclosed!)
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
What Org Structure

What We Need
What We Have
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Organization
Soup

CERT-In

Computer Emeregency Response Team

CHCIT

Cyber and Hi-Tech Crime Investigation and Training Center

NIC

National Informatics Center

NTRO

National Technical Research Organization
Cyber Regulation Advisory Committee

General Weapons and
Electronics Systems
Engineering Establishment

NCSC

DIARA

Defense Information and
Research Agency

CMS

Central Monitoring System

DIA

Defence Intelligence Agency

NCSF

National Cyber Security Framework

WESEE

National Cyber Security Commissioner

Cyber Coordination Center

Cyber Security Board

Special Operations
Command

Cyber Security Board - Cyber Security Coordinators

Strategic Forces Command

NCCC

National Cyber Coordination Centre

CERT-Navy

NSCS

National Security Council Secretariat

NCCC

National Cyber Coordination Centre

NSAB

National Security Advisory Board

CERT-Army

CERT-AirForce
Cyber Operations Centre
(NTRO with Armed Forces)
Governance in CyberCrime Investigation
& Cyber Security Organizations

National Information Security Authority

NCIIPC

National Critical Information Infrastructure Protection
Committee

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Organization
Soup

National Intelligence Board

SSTCG

Strategic Security Technology Coordination Group

MAC

Multi Agency Centre
Joint Cipher Bureau

CDRC

Cyber Defence Research Centre, Jharkhand

Scientific Advisory Group

Cyber Suraksha Cell, Guajarat

Indian Stastistical Institute

Special Operations Group, Gujarat

Cipher Committee

Cyberdome, Kerala Police

Scientific Advisor to Raksha Mantri

DSCI

Data Security Council of India

IISc

Indian Institute of Science, Bangalore

ISAC

Information Sharing and Analysis Centre

CSI

Computer Society of India

Telecom Security Council of India
NATGRID

National Security Database
IDRBT

Institute for Development and Research in
Banking Technology

IBA

Indian Banks Association

RBI

Crimes and Criminal Tracking Network and System
NCTC was to weld together multiple intelligence
databases:

NJDG

Indian Cyber Army

CCTNS

NCTC

Deccan Hackers

National Intelligence Grid

National Judicial Data Grid

TETC

Telecom Testing and Security Certification Centre

Reserve Bank of India

TRAI
DOT

CBI's Bank Securities and Fraud Cell
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Our Score = 60+
• The country should have been on the top of the
Cyber capability index worldwide

• We would not having this conference.. Rather …
the topic would have been different
• Nations and individuals would have to think twice
to face up to us – no website defacements or data
breach

What We Have

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
• To respond to an attack by air the Air Force is
called, on land it is the Army and the Navy at sea

Who do we call upon for an
attack through the internet

• How do 60+ agencies coordinate with each other
• How can a planned response be launched in the
absence of a central coordinator….
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
• Worldwide – other countries are no
better
• No wonder attacks are on the rise
and everyone is hurting bad

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Taking a Look At

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Disadvantages / Challenges
• Increased risk of incompetent response when
faced with a challenge
• Uncontrolled purchases expenditure
• Head in the sand bliss
• Wasteful expenditure in the absence of
competence or capability
• The only certainty – defeat at the hands of anyone
with a computer and malicious intent

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - NDMA
• Central Disaster Management agency
• Body of Knowledge and expertise
• Ensures regular drills and exercises
• Follows national level standard processes
• National mandate to coordinate and guide all
states in their response and management setup
• Recent Success – Orissa (Phailin) and AP (Lehar)
• Challenge - communication, post-incident
response
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
One Bright Example - NDMA
• Before the NDMA • Many deaths
• Unorganized response
• Could we ever evacuate
• Of course NDMA did not spring up overnight – it
was formed in December 2005 and has come a
long way

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Taking a Look At

Why
don’t
we

• Relevance and strengths of planned security
organizations
• Why traditional security entities are not relevant
against new-age challenges
• The demand and growth of know-it-alls and the
ignorant experts
• Existing organization structure of Cyber Security
Forces, Capability at national and state level
• Disadvantages and challenges arising out of
present organization structures
• Way Ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Cyber Security must be entrusted (at national level)
to one authority and organization
• PMO / President should be designated as C-in-C as
this is a frontier, a battleground
• Cybercrime, Terrorism, War, Attacks, Espionage,
Reputation, Information Exchange, Development
of Offensive Capabilities et al cannot be decided
upon by the NCSC

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Commander in Chief
PM / President

Second Line of Command (Operational and Strategic)
NSA

NCSC

Defence
Chief of Staff

CERT

Head of
Intelligence

MHA

LEA, Industry
Rep & Bodies

Cyber Security Organizations and Organizations with Cyber Command Centers
State Cyber
Security Centers

Sectoral CERTs

NTRO(cyber)
NCIIPC

IB, RAW, NIA,
DIA

Academia
Participants

Defense CERTs,
DIA, DRDO etc

CyberCrime
Police Stations

CCTNS,
NATGRID

Information &
Data Library

Online
Battalions

Continuing
Education &
Training

General areas
n.e.s.

Control and Operational Areas (national and state level)
Capacity
Building

Capability
Building

Education
and Training

Citizen
Outreach

Sectoral
Departments

Critical
Infrastructure

International
Relations

Policy &
Regulations

Offensive and
Defensive

Intelligence
Gathering

Knowledge
Repository

Domestic
Relationships

Risk
Advisories

Research and
Development

Public Private
Partnership

Public
Relations

Talent
Identification

Security
Clearance

Think Tank

Testing
Group

Responsible
Disclosure

Reporting and
Measurement

Audit, Risk,
Technology

Field Organizations and Teams
CERT
Incident
Response

Awareness,
Education,
Training

Governance in CyberCrime Investigation
& Cyber Security Organizations

Skill
Development

Developers

Embedded
Cyber
Patrollers

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Organization will be responsible for every aspect
of cyber security
•
•
•
•
•
•
•

Policy and regulations
Advisories and Information sharing systems
State level organizations – mandate and operations
Cyber Defense Command
Armed Forces cyber security organizations
National and sectoral CERT
National Critical Infrastructure Protection

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Way Ahead
• Build capacity and capability
• Secure national and state infrastructure
• Raise awareness of cybersecurity needs
• Learn what is coming up – or what will come
• So who will own this defence organization ? MHA
or MOD ?

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
This is a peek into
the Future
what’s coming up
ahead
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
BAD

Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Dinesh O. Bareja,
CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM

• Professional Positions
•
•
•
•

Pyramid Cyber Security & Forensics (Principal Advisor)
Open Security Alliance (Principal and CEO)
Jharkhand Police (Cyber Security Advisor)
Indian Honeynet Project (Co Founder)

• Professional skills and special interest areas
• Security Consulting and Advisory services for IS Architecture, Analysis,
Optimization..
• Technologies: SOC, DLP, IRM, SIEM…
• Practices: Incident Response, SAM, Forensics, Regulatory guidance..
• Community: mentoring, training, citizen outreach, India research..
• Opinioned Blogger, occasional columnist, wannabe photographer
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai
Contact Information
E dinesh@opensecurityalliance.org

@bizsprite

+91.9769890505

dineshobareja

L: http://in.linkedin.com/in/dineshbareja

dineshobareja

References
http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/

Acknowledgements & Disclaimer
Various resources on the internet have been referred to contribute to the information
presented. Images have been acknowledged (above) where possible. Any company names,
brand names, trade marks are mentioned only to facilitate understanding of the message
being communicated - no claim is made to establish any sort of relation (exclusive or
otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this
would be wholly unintentional, and objections may please be communicated to us for
remediation of the erroneous action(s).
Governance in CyberCrime Investigation
& Cyber Security Organizations

CYBER ATTACK Mumbai
CYBER ATTACK 2014,2014, Mumbai

Weitere ähnliche Inhalte

Was ist angesagt?

Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixJorge Orchilles
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixFrode Hommedal
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 

Was ist angesagt? (20)

Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Adversary Emulation and the C2 Matrix
Adversary Emulation and the C2 MatrixAdversary Emulation and the C2 Matrix
Adversary Emulation and the C2 Matrix
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
The Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence MatrixThe Cyber Threat Intelligence Matrix
The Cyber Threat Intelligence Matrix
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Indonesia National Cyber Security Strategy
Indonesia National Cyber Security StrategyIndonesia National Cyber Security Strategy
Indonesia National Cyber Security Strategy
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 

Andere mochten auch

Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentDinesh O Bareja
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Dinesh O Bareja
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 

Andere mochten auch (16)

Compliance Awareness
Compliance AwarenessCompliance Awareness
Compliance Awareness
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Bug Bounty Programs : Good for Government
Bug Bounty Programs : Good for GovernmentBug Bounty Programs : Good for Government
Bug Bounty Programs : Good for Government
 
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, IndiaGovernance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
Governance and IoT Cyber Risks - presented at Defcon-OWASP Lucknow, India
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document Information Security Management Education Program - Concept Document
Information Security Management Education Program - Concept Document
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 

Ähnlich wie Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations

Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarIntergen
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence programMark Arena
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinarEmpired
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA Cyber Security
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...Denim Group
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14subramanian K
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesJohn Rapa
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦Infosec train
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦priyanshamadhwal2
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfinfosecTrain
 

Ähnlich wie Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations (20)

Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
BGA SOME/SOC Etkinliği - Kurumsal SOME’ler için SOC Modeli Nasıl Olmalı?
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
Threat Modeling for System Builders and System Breakers - Dan Cornell of Deni...
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
security and assurance lecture jan 14
security and assurance lecture jan 14security and assurance lecture jan 14
security and assurance lecture jan 14
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
𝐋𝐚𝐭𝐞𝐬𝐭 𝐂𝐨𝐦𝐩𝐓𝐈𝐀 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲+ 𝐒𝐘𝟎-𝟕𝟎𝟏 𝐄𝐱𝐚𝐦
 
Security+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdfSecurity+ SY0-701 CERTIFICATION TRAINING.pdf
Security+ SY0-701 CERTIFICATION TRAINING.pdf
 

Mehr von Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

Mehr von Dinesh O Bareja (9)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Kürzlich hochgeladen

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Kürzlich hochgeladen (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Governance in Cybercrime and Cybersecurity orgns - final distribution Organizations

  • 1. Governance in CyberCrime Investigation & Cyber Security Organizations On Dec. 07, 2013 At The Palladium, Mumbai Presented At CyberAttack 2013 Security Conference Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK 2014, Mumbai By Dinesh O. Bareja Information Security & Management Advisor
  • 2. Distribution Version • This presentation has been optimized for distribution which means that animation panes have been deleted and expanded so that the slides with animation do not appear with unreadable clutter • The images that have been used are sourced freely from the Internet using multiple search resources. Our logic is that if your creations are searchable then they are usable for representation AND we never use any such images in our commercial works • All our works that are put up as ‘distribution’ versions are published under Creative Commons license and are non-commercial – these are available for download from common document sites on the internet or from our website • If some images are deleted the slide will show the hyperlink to it and you can follow the link to see the image. This is done if I have received an objection or a take-down notice from the copyright owner • I/We make every effort to include a link or name to the copyright owner of the image(s) that have been used in this presentation and please accept our sincere apologies in case any image has not been individually acknowledged • Copyright notices or watermarks are not removed from images or text which are not purchased, however, we may say that practically all text is our own creation • Inspite of all the above and other declarations, if you have objections to the use (as owner of any of the IP used in this presentation / paper) you may please send an email to us and we shall remove the same right away (please do remember to include your communication coordinates and the URL where you spotted this infringement Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 3. A Brief Introduction Dinesh O Bareja • Principal Advisor – Pyramid Cyber Security & Forensic Pvt Ltd • Cyber Surveillance Advisor – Cyber Defense Research Centre (Jharkhand Police – Special Branch) • Member IGRC – Bombay Stock Exchange • COO – Open Security Alliance Enterprise & Government Policy Development; Cyber Security Strategy and Design Architect; Current State Maturity Assessment & Optimization; Digital Forensics, Cloud Forensics and Security; Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 4. Setting The Context.. Thinking .. Strategizing … Planning should be done when you are in square one However it is better late than never: Stop Take stock Create a going-ahead plan Restart from where you stopped Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 5. Context… Taking stock of our current situation: It is about time the Information Security community woke up to voice the weakness in governance in our government’s thinking on national cyber security And The increasing inability to control (cyber) related incidents with the looming threats of cyber war / terrorism / espionage / crime Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 6. Or (in the near future)… Face Annihilation Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 7. Context Defining the three key terms in our title to set the context (from Wikipedia and Dinesh’speedia • Governance: That which defines expectations, grants power or verifies performance. Is a system by which entities are directed and controlled and a governance structure specifies the distribution of rights and responsibilities among different stakeholders. It is the process or a part of decision-making and the process by which leadership is established and decisions are implemented (or not implemented) • Cybercrime Investigation Organizations: Are primarily law enforcement organizations and such bodies that are engaged in investigating and controlling cyber crime. • Cybersecurity Organizations: Intelligence services, offensive and defensive solution development and delivery, sector specific entities like Telecom CERT etc, cyber command wings of defence forces and such organizations that are outside the ambit of being termed a LEA. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 8. We Need To Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 9. My Plan is to Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 10. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 11. Relevance and Strengths in Planned Security Organizations Why do we need to structure a centralized command governance for Cyber Security across the nation (or states) when we already have our Cyber-thanas, CERTs, NTRO-NCIIPC, DIARA and more Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 12. Relevance and Strengths • Centralized system provides strategic, tactical, operational and administrative control • Need-to-know Data Access and Distribution Policy • Central Information Library and Knowledgebase • Politics-free Inter-Disciplinary dependencies • Common goals across all stakeholders • Quick response capability • Enhanced intelligence and capability sharing Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 13. Relevance and Strengths • Standardized response by organizations across the nation states provide harmony in operations • Resources, capacities, capabilities can be shared • Crisis communication is controlled and effective Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 14. One Bright Example - CDRC • Jointly setup by Jharkhand State and Jharkhand Police (special branch) • Located in PHQ it is the authority in the state for cybercrime and cyber security related information, advisories, investigation – QUICK RESPONSE • Engaged in citizen awareness outreach, critical infrastructure protection, training etc • Connects with the InfoSec community, LEA and security establishments across the country … Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 15. Change Gives No Choices Hopefully not a major incident http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/ Governance in CyberCrime Investigation & Cyber Security Organizations Period of ignorance on the power trip CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai Enlightenment dawns on the lawmakers
  • 16. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 17. Traditional Entities • Cyber Thana, Cybercell, Cyber Lab, FSL • Police, BSF, ITBP, CID, CBI, EOW, SFIO, IT • CERT, Sectoral CERT, NTRO, NCSC, NIA, IB, NCIIPC • Army, Air Force, Navy • My personal list has a count of about 60 organizations which are (in some way or the other) connected to the aims of cybercrime / cybesecurity control Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 18. But, we have.. • The same problems which face any traditional entity • Lack of sharing • Blame it on the enemy-of-the-day • High spending • Generally go around in circles do nothing • Lack of capability / skills / resources Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 19. If you don’t believe me I hope you will believe someone who was more intelligent than me ! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 20. Why Traditional Can’t Survive • Borders and jurisdictions are porous • Speed of decision making and communication is the need of the hour second (it will soon be the need of he nanosecond) • A single crime may be committed from multiple locations at the same time • Attacks and malicious activity can be initiated by individuals, groups or nations…. Who attacks whom is unknown! • Every one in the team has to be a hacker… etc! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 21. What is Needed • Organization Agility • Thought Leadership • Planned Operations and Response • Acceptance of knowledge as power • Budget and support for growth • Reality – a child can be the adversary • … etc! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 22. Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 23. FUDsters Trolls Carpetbaggers and Scalawags abound http://horrorfilmaesthetics.blogspot.in/2011_06_01_archive.html As with any new frontier one will find the settlers along with the charlatans, the con men, the criminal minded and others. The internet is no different… there are scamsters, crackers, business people, phishers, bankers, bloggers, settlers etc… Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 24. FUDsters Trolls Carpetbaggers and Scalawags abound • Organizations and Governments are shooting themselves in the foot • False expectations are created to believe that the largest organization has the best solution (qualification - 200 crore turnover for past 3 years) • Vendors present snazzy catalogs and are generally people who know everything about anything • Analyst opinion is considered to be gold standard • Auditors are trained to never give the true picture Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 25. The Quantum of Risk grows exponentially when one is stuck in the past Just hope to get unstuck quick! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 26. Buyers live in the old mindset • Insurance company seeking Risk Management framework – QC is Rs 200 cr profit making company for past 3 years • Bank seeking IS support services sets the QC at Rs 100cr .. profit making, in past 3 years • Company hiring a Security Manager expects the person to have all certifications and skills in audit, technology, forensics, communication, application development, business continuity, malware etc Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 27. Hiring Managers live in their personal heaven Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 28. Where do they think they will get value How do they expect to secure their organizations if they leave out the world Just hope to get unstuck quick! Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 29. Now Lets Talk About Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 30. Current State of Cyber Security Governance - worldwide • Multiple organizations are established by different departments of Government, Law Enforcement, Defence Forces, Large Enterprises • Each of them is doing “their own thing” to protect their turf (assets, perimeter, technologies) • Every one is a de facto expert claiming to have the most wonderful system in place after God’s creation • Chaos and confusion reign supreme and it is evident in the continued bashing of the domain Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 31. Current State of Cyber Security Governance - worldwide • Each looks at cybersecurity as an extension of their own present function – so the Naval team looks at threats to their own naval installations and the Police is only concerned with cybercrime • Capabilities are being created in silos which do not communicate or may do so at the MHA sponsored senior officer meetings • And what do we have in the end.. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 32. Silos • Absence of Inter-State Information Sharing among LEA and others • Everyone is going their own way • State of the Art purchases Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 33. Traditional Entities • My personal list has a count of about 60 organizations which are (in some way or the other) connected to the aims of cybercrime / cybesecurity control • A listing will come up in the next slide • These organization names have been taken from news / media reports so it is in public domain (no secrets are disclosed!) Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 34. What Org Structure What We Need What We Have Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 35. Organization Soup CERT-In Computer Emeregency Response Team CHCIT Cyber and Hi-Tech Crime Investigation and Training Center NIC National Informatics Center NTRO National Technical Research Organization Cyber Regulation Advisory Committee General Weapons and Electronics Systems Engineering Establishment NCSC DIARA Defense Information and Research Agency CMS Central Monitoring System DIA Defence Intelligence Agency NCSF National Cyber Security Framework WESEE National Cyber Security Commissioner Cyber Coordination Center Cyber Security Board Special Operations Command Cyber Security Board - Cyber Security Coordinators Strategic Forces Command NCCC National Cyber Coordination Centre CERT-Navy NSCS National Security Council Secretariat NCCC National Cyber Coordination Centre NSAB National Security Advisory Board CERT-Army CERT-AirForce Cyber Operations Centre (NTRO with Armed Forces) Governance in CyberCrime Investigation & Cyber Security Organizations National Information Security Authority NCIIPC National Critical Information Infrastructure Protection Committee CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 36. Organization Soup National Intelligence Board SSTCG Strategic Security Technology Coordination Group MAC Multi Agency Centre Joint Cipher Bureau CDRC Cyber Defence Research Centre, Jharkhand Scientific Advisory Group Cyber Suraksha Cell, Guajarat Indian Stastistical Institute Special Operations Group, Gujarat Cipher Committee Cyberdome, Kerala Police Scientific Advisor to Raksha Mantri DSCI Data Security Council of India IISc Indian Institute of Science, Bangalore ISAC Information Sharing and Analysis Centre CSI Computer Society of India Telecom Security Council of India NATGRID National Security Database IDRBT Institute for Development and Research in Banking Technology IBA Indian Banks Association RBI Crimes and Criminal Tracking Network and System NCTC was to weld together multiple intelligence databases: NJDG Indian Cyber Army CCTNS NCTC Deccan Hackers National Intelligence Grid National Judicial Data Grid TETC Telecom Testing and Security Certification Centre Reserve Bank of India TRAI DOT CBI's Bank Securities and Fraud Cell Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 37. Our Score = 60+ • The country should have been on the top of the Cyber capability index worldwide • We would not having this conference.. Rather … the topic would have been different • Nations and individuals would have to think twice to face up to us – no website defacements or data breach What We Have Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 38. • To respond to an attack by air the Air Force is called, on land it is the Army and the Navy at sea Who do we call upon for an attack through the internet • How do 60+ agencies coordinate with each other • How can a planned response be launched in the absence of a central coordinator…. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 39. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 40. • Worldwide – other countries are no better • No wonder attacks are on the rise and everyone is hurting bad Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 41. Taking a Look At Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 42. Disadvantages / Challenges • Increased risk of incompetent response when faced with a challenge • Uncontrolled purchases expenditure • Head in the sand bliss • Wasteful expenditure in the absence of competence or capability • The only certainty – defeat at the hands of anyone with a computer and malicious intent Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 43. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 44. One Bright Example - NDMA • Central Disaster Management agency • Body of Knowledge and expertise • Ensures regular drills and exercises • Follows national level standard processes • National mandate to coordinate and guide all states in their response and management setup • Recent Success – Orissa (Phailin) and AP (Lehar) • Challenge - communication, post-incident response Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 45. One Bright Example - NDMA • Before the NDMA • Many deaths • Unorganized response • Could we ever evacuate • Of course NDMA did not spring up overnight – it was formed in December 2005 and has come a long way Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 46. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 47. Taking a Look At Why don’t we • Relevance and strengths of planned security organizations • Why traditional security entities are not relevant against new-age challenges • The demand and growth of know-it-alls and the ignorant experts • Existing organization structure of Cyber Security Forces, Capability at national and state level • Disadvantages and challenges arising out of present organization structures • Way Ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 48. Way Ahead • Cyber Security must be entrusted (at national level) to one authority and organization • PMO / President should be designated as C-in-C as this is a frontier, a battleground • Cybercrime, Terrorism, War, Attacks, Espionage, Reputation, Information Exchange, Development of Offensive Capabilities et al cannot be decided upon by the NCSC Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 49. Commander in Chief PM / President Second Line of Command (Operational and Strategic) NSA NCSC Defence Chief of Staff CERT Head of Intelligence MHA LEA, Industry Rep & Bodies Cyber Security Organizations and Organizations with Cyber Command Centers State Cyber Security Centers Sectoral CERTs NTRO(cyber) NCIIPC IB, RAW, NIA, DIA Academia Participants Defense CERTs, DIA, DRDO etc CyberCrime Police Stations CCTNS, NATGRID Information & Data Library Online Battalions Continuing Education & Training General areas n.e.s. Control and Operational Areas (national and state level) Capacity Building Capability Building Education and Training Citizen Outreach Sectoral Departments Critical Infrastructure International Relations Policy & Regulations Offensive and Defensive Intelligence Gathering Knowledge Repository Domestic Relationships Risk Advisories Research and Development Public Private Partnership Public Relations Talent Identification Security Clearance Think Tank Testing Group Responsible Disclosure Reporting and Measurement Audit, Risk, Technology Field Organizations and Teams CERT Incident Response Awareness, Education, Training Governance in CyberCrime Investigation & Cyber Security Organizations Skill Development Developers Embedded Cyber Patrollers CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 50. Way Ahead • Organization will be responsible for every aspect of cyber security • • • • • • • Policy and regulations Advisories and Information sharing systems State level organizations – mandate and operations Cyber Defense Command Armed Forces cyber security organizations National and sectoral CERT National Critical Infrastructure Protection Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 51. Way Ahead • Build capacity and capability • Secure national and state infrastructure • Raise awareness of cybersecurity needs • Learn what is coming up – or what will come • So who will own this defence organization ? MHA or MOD ? Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 52. This is a peek into the Future what’s coming up ahead Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 53. BAD Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 54. Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 55. Dinesh O. Bareja, CISA, CISM, ITIL, BS7799, Cert IPR, Cert ERM • Professional Positions • • • • Pyramid Cyber Security & Forensics (Principal Advisor) Open Security Alliance (Principal and CEO) Jharkhand Police (Cyber Security Advisor) Indian Honeynet Project (Co Founder) • Professional skills and special interest areas • Security Consulting and Advisory services for IS Architecture, Analysis, Optimization.. • Technologies: SOC, DLP, IRM, SIEM… • Practices: Incident Response, SAM, Forensics, Regulatory guidance.. • Community: mentoring, training, citizen outreach, India research.. • Opinioned Blogger, occasional columnist, wannabe photographer Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai
  • 56. Contact Information E dinesh@opensecurityalliance.org @bizsprite +91.9769890505 dineshobareja L: http://in.linkedin.com/in/dineshbareja dineshobareja References http://socialmediastrategiessummit.com/blog/relevance-strategic-inflection/ Acknowledgements & Disclaimer Various resources on the internet have been referred to contribute to the information presented. Images have been acknowledged (above) where possible. Any company names, brand names, trade marks are mentioned only to facilitate understanding of the message being communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise mentioned. Apologies for any infraction, as this would be wholly unintentional, and objections may please be communicated to us for remediation of the erroneous action(s). Governance in CyberCrime Investigation & Cyber Security Organizations CYBER ATTACK Mumbai CYBER ATTACK 2014,2014, Mumbai