SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
In association with Presented by Supported by 
LATEST THREATS IN 
DIGITAL SECURITY 
Santosh Satam, CEO, SecurBay Services 
SEPT 19, 2014 Hotel Digital Security Seminar
Presented by 
In association with 
Supported by 
Santosh Satam 
Santosh has multi-disciplinary skills in 
software product engineering, 
technology management and 
enterprise risk assessment. 
His areas of expertise are web 
application security, mobile & cloud 
security and threat intelligence. 
His client list includes MNCs, BFSI, 
hospitality and government agencies. 
He is an advisor to the Institute for 
Development and Research in Banking 
Technology (IDRBT) on matters 
related to mobile security for banks. 
By X Events Hospitality (www.x-events.in) 
2 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Agenda 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
3 
¨ Current Landscape 
¨ Hospitality Industry - Attack Vectors 
¨ How to Secure Yourself 
¨ Way Forward 
¨ Q&A
Presented by 
In association with 
Supported by 
Current Landscape 
By X Events Hospitality (www.x-events.in) 
4 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Digital universe is growing 
2014 
By X Events Hospitality (www.x-events.in) 
5 
Digital Universe is huge and growing exponentially 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
2006 
180 EB 
2008 
2011 
200 EB 1800 EB 44 ZB 
1 Exa Byte=1 Billion GB 
1 ZB = 1 Trillion GB 
Source IDC 2014
Presented by 
In association with 
Supported by 
Growth drivers 
By X Events Hospitality (www.x-events.in) 
6 
Source: 
http://thenextweb.com/apple/2012/01/25/there-are-now-more-iphones- 
sold-than-babies-born-in-the-world-every-day/ 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
371 K 
Babies born per day 
378 K 
iPhones sold per day
Presented by 
In association with 
Supported by 
Next big thing - IoT 
By X Events Hospitality (www.x-events.in) 
7 
Hotel Digital Source IDC 2014 Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Is our information safe? 
50% 
of the 
Information is not protected 
By X Events Hospitality (www.x-events.in) 
8 
Hotel Digital Source IDC 2014 Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
The numbers don’t lie 
76% of the US Companies had 
a cyber security incident 
reported in the last year 
By X Events Hospitality (www.x-events.in) 
9 
Source: http://online.wsj.com/news/articles/SB10001424052702303933404577504790964060610 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Attack Vectors 
Attack Vectors for Hospitality Industry 
By X Events Hospitality (www.x-events.in) 
10 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Data breach hits 14 hotels 
By X Events Hospitality (www.x-events.in) 
11 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
Source: http://www.cnbc.com/id/101396464#. 
In 13 of the 14 cases, the malware 
was in the credit and debit card 
readers at the hotels' restaurants 
and gift shops.
Presented by 
In association with 
Supported by 
Keylogger malware 
The U.S. Secret Service is 
adv i s ing the hospi t a l i t y 
industry to inspect computers 
made available to guests in 
hotel business centers, warning 
t h a t c rook s h ave b e e n 
compromising hotel business 
center PCs with keystroke-logging 
malware in a bid to 
steal personal and financial 
data from guest. 
By X Events Hospitality (www.x-events.in) 
12 
http://krebsonsecurity.com/2014/07/beware-keyloggers-at-hotel-business-centers/ 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Repeated computer hacks 
Wyndham Hotels' lax security 
policies allowed Russian 
hackers to access more than 
500,000 customer accounts on 
three separate occasions 
between 2008 and 2010. 
Hackers used the data to rack 
up more than $10.6 million in 
f r a u d u l e n t c re d i t c a rd 
transactions, according to the 
suit filed in the U.S. District 
Court of Arizona. 
By X Events Hospitality (www.x-events.in) 
13 
http://edition.cnn.com/2012/06/26/travel/wyndham-hacking/index.html 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Attacks on website 
S Can you spot 
Security Risk on 
this compromised 
Website ? 
By X Events Hospitality (www.x-events.in) 
14 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Social engineering attacks 
Operator to Guest: 
Excuse me sir, I am 
calling from Front 
Desk, Can I have your 
credit card number 
please ? 
What you will do ? 
By X Events Hospitality (www.x-events.in) 
15 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
No business is 
immune from threats. 
In association with 
Supported by 
How safe am I? 
Threats can come in 
any shape and size 
Need Threat 
Intelligence 
By X Events Hospitality (www.x-events.in) 
16 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Most common attacks 
By X Events Hospitality (www.x-events.in) 
17 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
DBIR 2014 Data Breach Report 
"The universe of threats 
may seem limitless, but 
92% of the 100,000 
incidents we've analyzed 
from the last 10 years 
can be described by just 
nine basic patterns."
Presented by 
In association with 
Supported by 
Is it applicable to me? 
By X Events Hospitality (www.x-events.in) 
18 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
DBIR 2014 Data Breach Report
Presented by 
In association with 
Supported by 
Cyber risks in India 
Source: https://gigaom.com/2013/06/25/new-google-report-shows-malware-by-country-highest-rates-in-india-central- 
By X Events Hospitality (www.x-events.in) 
19 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
europe/ 
The hi ghes t r a te of 
malware, however, doesn’t 
belong to obvious suspects 
like Russia or Ukraine (8% 
each), but instead India 
(15%) and many Latin 
American countries like 
Mexico (12%) and Chile 
(11%).
Presented by 
In association with 
Supported by 
Cyber risks in India 
9,174 Indian websites were hacked 
by various hacker groups from 
different parts of the world till May 
2014. 
62,189 security incidents were 
reported during the same period 
to the Indian CERT-In 
By X Events Hospitality (www.x-events.in) 
20 
http://zeenews.india.com/news/nation/9174-indian-websites-hacked-till-may-it-minister_947431.html 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
How to Secure Yourself? 
By X Events Hospitality (www.x-events.in) 
21 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Need Systemic Approach 
By X Events Hospitality (www.x-events.in) 
22 
Ad-hoc Approach Ad-hoc Approach 
http://zeenews.india.com/news/nation/9174-indian-websites-hacked-till-may-it-minister_947431.html 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
What can I do about it? 
ASSESS EXECUTE MONITOR 
By X Events Hospitality (www.x-events.in) 
23 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
Find out your current 
Security Posture by 
doing Gap 
Assessment 
Vulnerability 
Assessment 
and Penetration 
Testing 
Implement the 
Roadmap 
Monitor and Improve 
DEFINE 
Define Short, Medium 
and Long tem Action 
Plan
Presented by 
In association with 
Supported by 
People, Process & Technology 
- UTM. Firewalls 
- IDS/IPS 
- Data Center 
- Physical Security 
- DLP 
- IRM 
- SIM/SIEM 
- Managed Services 
- Encryption 
By X Events Hospitality (www.x-events.in) 
24 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
- Training 
- Awareness 
- HR Policies 
- Background 
Checks 
- Roles / 
responsibilities 
- Social Engineering 
- Social Networking 
- Acceptable Use 
- Risk Management 
- Asset Management 
- Data Classification 
- Info Rights Mgt 
- Data Leak Prevention 
- Access Management 
- Change Management 
- Patch Management 
- Configuration Mgmt 
- Incident Response 
- Incident Management 
Technology 
People Process
Presented by 
In association with 
Supported by 
About us 
HATT is India's young and premium 
community for CXOs from the 
Hospitality, Healthcare, Aviation, Travel 
and Tourism industries. 
o With over 1,000 members across 
India, we are now poised to expand 
globally with a presence in South East 
Asia and the Middle East by 2016. 
www.hattforum.com 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
25 
X Events manages & supports events 
exclusively for the hospitality & travel 
industries. 
o Our USP is that we are hoteliers 
by training. We focus on the two 
most important aspects of an 
event; content quality and impact. 
o We do it because we believe in it. 
www.x-events.in 
By X Events Hospitality (www.x-events.in) 
FB/hattforum
Presented by 
In association with 
Supported by 
Our host – Brian Pereira 
Brian is a veteran technology 
journalist with two decades of 
experience. He has served as 
editor for two magazines: CHIP 
and InformationWeek India. 
He is a respected speaker & host 
at conferences worldwide. 
In his current role at Hannover 
Milano Fairs India, Brian serves 
as project head for CeBIT 
Global Conferences, 
the world's largest ICT fair that 
will debut in India this November, 
in Bangalore. 
By X Events Hospitality (www.x-events.in) 
26 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014
Presented by 
In association with 
Supported by 
Hotel Digital Security Seminar & Webinar, Sept 19, 2014 
27 
Five expert speakers 
1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, 
CEO, SecurBay Services. 
2. The immediate action needed to tighten up (Priority list, cost, internal policies) 
- Ambarish Deshpande, MD - India & SAARC, Blue Coat 
3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, 
Seclore 
4. How to build a business case & get the management's attention - Dhananjay 
Rokde, CISO, Cox & Kings Group. 
5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk 
Services, Deloitte India. 
By X Events Hospitality (www.x-events.in) 
The seminar schedule
Presented by 
In association with 
Supported by 
Our sponsors & supporters 
By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 
28 
Thank You
In association with Presented by Supported by 
HOTEL DIGITAL SECURITY SEMINAR 
SEPT 19, 2014 www.x-events.in

Weitere ähnliche Inhalte

Andere mochten auch

Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level OneCTIN
 
Criminal investigation
Criminal investigation Criminal investigation
Criminal investigation Vicky Pulido
 
Quality Management at Hotel Industry
Quality Management at Hotel IndustryQuality Management at Hotel Industry
Quality Management at Hotel IndustryKunal Goyal
 
Geust safety and security in Hotel
Geust safety and security in HotelGeust safety and security in Hotel
Geust safety and security in HotelSuman Subedi
 
Chapter 2 front office practice
Chapter 2 front office practiceChapter 2 front office practice
Chapter 2 front office practiceUUM
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Hotel safety & security
Hotel safety & securityHotel safety & security
Hotel safety & securityzaffar abbasi
 

Andere mochten auch (9)

Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
Criminal investigation
Criminal investigation Criminal investigation
Criminal investigation
 
Tqm final
Tqm finalTqm final
Tqm final
 
Quality Management at Hotel Industry
Quality Management at Hotel IndustryQuality Management at Hotel Industry
Quality Management at Hotel Industry
 
Geust safety and security in Hotel
Geust safety and security in HotelGeust safety and security in Hotel
Geust safety and security in Hotel
 
Chapter 2 front office practice
Chapter 2 front office practiceChapter 2 front office practice
Chapter 2 front office practice
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Hotel safety & security
Hotel safety & securityHotel safety & security
Hotel safety & security
 
Hotel security
Hotel securityHotel security
Hotel security
 

Ähnlich wie Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar_Sept19'14)

Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)XEventsHospitality
 
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)XEventsHospitality
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...XEventsHospitality
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...XEventsHospitality
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 publishedDSCI_Connect
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodSalil Kumar Subramony
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery, Inc.
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability reportSayali Sawant
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Harriet Davis
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxCompanySeceon
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Mark Skilton
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
Alexandre Knight: Digital Strategy at AXA
Alexandre Knight: Digital Strategy at AXA  Alexandre Knight: Digital Strategy at AXA
Alexandre Knight: Digital Strategy at AXA Vicky Gerassimou
 

Ähnlich wie Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar_Sept19'14) (20)

Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
Tighten Up Data Security - Blue Coat (Hotel_Data_Security_Seminar_Sept19'14)
 
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)
Information Loss Prevention - Seclore (Hotel_Digital_Security_Semianr_Sept19'14)
 
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
Build A Business Case For IT Security - Dhananjay Rokde (Hotel_Digital_Securi...
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
 
The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)The Digital Insurer Award - Hanover Re (cyber)
The Digital Insurer Award - Hanover Re (cyber)
 
Event report 2014 published
Event report 2014 publishedEvent report 2014 published
Event report 2014 published
 
Veracode CISO Round Table
Veracode CISO Round TableVeracode CISO Round Table
Veracode CISO Round Table
 
Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
 
Veracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green MethodVeracode CISO Executive Workshop - presented by Saudi Green Method
Veracode CISO Executive Workshop - presented by Saudi Green Method
 
Ghostery Enterprise EU Security Study
Ghostery Enterprise EU Security StudyGhostery Enterprise EU Security Study
Ghostery Enterprise EU Security Study
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!Unleash Your Inner Creativity: Virtual Event Planner Edition!
Unleash Your Inner Creativity: Virtual Event Planner Edition!
 
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptxLearnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
Learnings from the IDC South Africa CIO Summit 2023 #IDSACIO (1).pptx
 
Infosecurity magazine webinar v2
Infosecurity magazine webinar v2Infosecurity magazine webinar v2
Infosecurity magazine webinar v2
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Alexandre Knight: Digital Strategy at AXA
Alexandre Knight: Digital Strategy at AXA  Alexandre Knight: Digital Strategy at AXA
Alexandre Knight: Digital Strategy at AXA
 

Kürzlich hochgeladen

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Latest Threats in Digital Security - SecurBay (Hotel_Digital_Security_Seminar_Sept19'14)

  • 1. In association with Presented by Supported by LATEST THREATS IN DIGITAL SECURITY Santosh Satam, CEO, SecurBay Services SEPT 19, 2014 Hotel Digital Security Seminar
  • 2. Presented by In association with Supported by Santosh Satam Santosh has multi-disciplinary skills in software product engineering, technology management and enterprise risk assessment. His areas of expertise are web application security, mobile & cloud security and threat intelligence. His client list includes MNCs, BFSI, hospitality and government agencies. He is an advisor to the Institute for Development and Research in Banking Technology (IDRBT) on matters related to mobile security for banks. By X Events Hospitality (www.x-events.in) 2 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 3. Presented by In association with Supported by Agenda By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 3 ¨ Current Landscape ¨ Hospitality Industry - Attack Vectors ¨ How to Secure Yourself ¨ Way Forward ¨ Q&A
  • 4. Presented by In association with Supported by Current Landscape By X Events Hospitality (www.x-events.in) 4 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 5. Presented by In association with Supported by Digital universe is growing 2014 By X Events Hospitality (www.x-events.in) 5 Digital Universe is huge and growing exponentially Hotel Digital Security Seminar & Webinar, Sept 19, 2014 2006 180 EB 2008 2011 200 EB 1800 EB 44 ZB 1 Exa Byte=1 Billion GB 1 ZB = 1 Trillion GB Source IDC 2014
  • 6. Presented by In association with Supported by Growth drivers By X Events Hospitality (www.x-events.in) 6 Source: http://thenextweb.com/apple/2012/01/25/there-are-now-more-iphones- sold-than-babies-born-in-the-world-every-day/ Hotel Digital Security Seminar & Webinar, Sept 19, 2014 371 K Babies born per day 378 K iPhones sold per day
  • 7. Presented by In association with Supported by Next big thing - IoT By X Events Hospitality (www.x-events.in) 7 Hotel Digital Source IDC 2014 Security Seminar & Webinar, Sept 19, 2014
  • 8. Presented by In association with Supported by Is our information safe? 50% of the Information is not protected By X Events Hospitality (www.x-events.in) 8 Hotel Digital Source IDC 2014 Security Seminar & Webinar, Sept 19, 2014
  • 9. Presented by In association with Supported by The numbers don’t lie 76% of the US Companies had a cyber security incident reported in the last year By X Events Hospitality (www.x-events.in) 9 Source: http://online.wsj.com/news/articles/SB10001424052702303933404577504790964060610 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 10. Presented by In association with Supported by Attack Vectors Attack Vectors for Hospitality Industry By X Events Hospitality (www.x-events.in) 10 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 11. Presented by In association with Supported by Data breach hits 14 hotels By X Events Hospitality (www.x-events.in) 11 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 Source: http://www.cnbc.com/id/101396464#. In 13 of the 14 cases, the malware was in the credit and debit card readers at the hotels' restaurants and gift shops.
  • 12. Presented by In association with Supported by Keylogger malware The U.S. Secret Service is adv i s ing the hospi t a l i t y industry to inspect computers made available to guests in hotel business centers, warning t h a t c rook s h ave b e e n compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guest. By X Events Hospitality (www.x-events.in) 12 http://krebsonsecurity.com/2014/07/beware-keyloggers-at-hotel-business-centers/ Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 13. Presented by In association with Supported by Repeated computer hacks Wyndham Hotels' lax security policies allowed Russian hackers to access more than 500,000 customer accounts on three separate occasions between 2008 and 2010. Hackers used the data to rack up more than $10.6 million in f r a u d u l e n t c re d i t c a rd transactions, according to the suit filed in the U.S. District Court of Arizona. By X Events Hospitality (www.x-events.in) 13 http://edition.cnn.com/2012/06/26/travel/wyndham-hacking/index.html Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 14. Presented by In association with Supported by Attacks on website S Can you spot Security Risk on this compromised Website ? By X Events Hospitality (www.x-events.in) 14 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 15. Presented by In association with Supported by Social engineering attacks Operator to Guest: Excuse me sir, I am calling from Front Desk, Can I have your credit card number please ? What you will do ? By X Events Hospitality (www.x-events.in) 15 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 16. Presented by No business is immune from threats. In association with Supported by How safe am I? Threats can come in any shape and size Need Threat Intelligence By X Events Hospitality (www.x-events.in) 16 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 17. Presented by In association with Supported by Most common attacks By X Events Hospitality (www.x-events.in) 17 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 DBIR 2014 Data Breach Report "The universe of threats may seem limitless, but 92% of the 100,000 incidents we've analyzed from the last 10 years can be described by just nine basic patterns."
  • 18. Presented by In association with Supported by Is it applicable to me? By X Events Hospitality (www.x-events.in) 18 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 DBIR 2014 Data Breach Report
  • 19. Presented by In association with Supported by Cyber risks in India Source: https://gigaom.com/2013/06/25/new-google-report-shows-malware-by-country-highest-rates-in-india-central- By X Events Hospitality (www.x-events.in) 19 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 europe/ The hi ghes t r a te of malware, however, doesn’t belong to obvious suspects like Russia or Ukraine (8% each), but instead India (15%) and many Latin American countries like Mexico (12%) and Chile (11%).
  • 20. Presented by In association with Supported by Cyber risks in India 9,174 Indian websites were hacked by various hacker groups from different parts of the world till May 2014. 62,189 security incidents were reported during the same period to the Indian CERT-In By X Events Hospitality (www.x-events.in) 20 http://zeenews.india.com/news/nation/9174-indian-websites-hacked-till-may-it-minister_947431.html Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 21. Presented by In association with Supported by How to Secure Yourself? By X Events Hospitality (www.x-events.in) 21 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 22. Presented by In association with Supported by Need Systemic Approach By X Events Hospitality (www.x-events.in) 22 Ad-hoc Approach Ad-hoc Approach http://zeenews.india.com/news/nation/9174-indian-websites-hacked-till-may-it-minister_947431.html Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 23. Presented by In association with Supported by What can I do about it? ASSESS EXECUTE MONITOR By X Events Hospitality (www.x-events.in) 23 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 Find out your current Security Posture by doing Gap Assessment Vulnerability Assessment and Penetration Testing Implement the Roadmap Monitor and Improve DEFINE Define Short, Medium and Long tem Action Plan
  • 24. Presented by In association with Supported by People, Process & Technology - UTM. Firewalls - IDS/IPS - Data Center - Physical Security - DLP - IRM - SIM/SIEM - Managed Services - Encryption By X Events Hospitality (www.x-events.in) 24 Hotel Digital Security Seminar & Webinar, Sept 19, 2014 - Training - Awareness - HR Policies - Background Checks - Roles / responsibilities - Social Engineering - Social Networking - Acceptable Use - Risk Management - Asset Management - Data Classification - Info Rights Mgt - Data Leak Prevention - Access Management - Change Management - Patch Management - Configuration Mgmt - Incident Response - Incident Management Technology People Process
  • 25. Presented by In association with Supported by About us HATT is India's young and premium community for CXOs from the Hospitality, Healthcare, Aviation, Travel and Tourism industries. o With over 1,000 members across India, we are now poised to expand globally with a presence in South East Asia and the Middle East by 2016. www.hattforum.com Hotel Digital Security Seminar & Webinar, Sept 19, 2014 25 X Events manages & supports events exclusively for the hospitality & travel industries. o Our USP is that we are hoteliers by training. We focus on the two most important aspects of an event; content quality and impact. o We do it because we believe in it. www.x-events.in By X Events Hospitality (www.x-events.in) FB/hattforum
  • 26. Presented by In association with Supported by Our host – Brian Pereira Brian is a veteran technology journalist with two decades of experience. He has served as editor for two magazines: CHIP and InformationWeek India. He is a respected speaker & host at conferences worldwide. In his current role at Hannover Milano Fairs India, Brian serves as project head for CeBIT Global Conferences, the world's largest ICT fair that will debut in India this November, in Bangalore. By X Events Hospitality (www.x-events.in) 26 Hotel Digital Security Seminar & Webinar, Sept 19, 2014
  • 27. Presented by In association with Supported by Hotel Digital Security Seminar & Webinar, Sept 19, 2014 27 Five expert speakers 1. Latest threats in digital security (Worms, attacks, viruses, flaws) - Santosh Satam, CEO, SecurBay Services. 2. The immediate action needed to tighten up (Priority list, cost, internal policies) - Ambarish Deshpande, MD - India & SAARC, Blue Coat 3. Information loss prevention (Principles & practices) - Geet Lulla, VP - India & ME, Seclore 4. How to build a business case & get the management's attention - Dhananjay Rokde, CISO, Cox & Kings Group. 5. Global cyber security outlook - A. K. Viswanathan, Senior Director - Enterprise Risk Services, Deloitte India. By X Events Hospitality (www.x-events.in) The seminar schedule
  • 28. Presented by In association with Supported by Our sponsors & supporters By X Events Hospitality Hotel Digital Security Seminar & Webinar, Sept 19, 2014 (www.x-events.in) 28 Thank You
  • 29. In association with Presented by Supported by HOTEL DIGITAL SECURITY SEMINAR SEPT 19, 2014 www.x-events.in