SlideShare ist ein Scribd-Unternehmen logo
1 von 36
  Securing the Unsecured World: 21 st  Century Challenge   Creating Digital Trust & Cyber Security   Cyber Assurance Need of  the Enterprises of “morrow  Prof. K. Subramanian SM(IEEE), SMACM, FIETE, SMCSI,MAIMA,MAIS,MCFE Professor & Director, Advanced Center for Informatics & Innovative Learning (ACIIL), IGNOU HON.IT Adviser to CAG of India  & Ex-DDG(NIC), Min of C & IT President, Cyber Society of India  Emeritus President, eInformation Systems Security Audit Association (eISSA), India
Important Notable  Quotes ,[object Object],[object Object],[object Object],[object Object],[object Object]
IS LOSING TO COMPETITION LOSS OF  CUSTOMERS LOSS OF CREDIBILITY EMBARRASSMENT FINANCIAL LOSS FRAUD & THEFT SCAVENGING VIRUS ATTACK ACCIDENTAL DAMAGE NATURAL  DISASTER UNAUTHORISED  ACCESS INTERCEPTION TROJAN HORSES INCOMPLETE  PROGRAM CHANGES HARDWARE / SOFTWARE FAILURE SOCIAL  ENGINEERING ATTACK DATA  DIDDLING PASSWORDS ENCRYPTION ANTI-VIRUS BACKUPS HARDWARE MAINTENANCE SECURITY GUARDS INPUT VALIDATIONS AUDIT TRAILS PROGRAM CHANGE DOCUMENTATION AUTHORISATION BUSINESS CONTINUITY PLAN INTEGRITY CONFIDENTIALITY AVAILABILITY
Cyber  Security – A Holistic View Proactive Control Source: Symantec Inc Authentication Access Control & Authorization Identity Mgmt Antivirus Firewall Intrusion Detection VPN Content  Updates &  Security Response 24x7 Global Customer Support Attack  Recovery  Tools/Svcs Honey Pot & Decoy Technology Threat Management & Early Warning Vulnerability Assessment Policy Compliance Event &  Incident Mgmt Config. Mgmt Common Console Encryption
 
Typical Global Scenario ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Cyber Threats 2011-12
IT Security predictions 2011-2012 ,[object Object],[object Object],[object Object]
IT Security predictions 2011-2012 ,[object Object],[object Object],[object Object],[object Object]
In the Era of Digital Age ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Assurance ~Business Assurance Feeling of Comfort by Enterprises ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenging Issues Security is technology issue ? Trust is a management issue ? and  Privacy is a social issue?
Present Risk Certification Issues Trust ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Layered E-trust Framework PKI Technology Trusted Digital Identity Infrastructure Shared E-trust Applications Computing E-trust  Services Single e-trust   Applications Infrastructure Layer 2 Service Provider example: Identrus Layer 2 Service Provider example IDENTRUS B2B, B2C, SET, C2C
Measurement of IT  Projects Value and Effectiveness ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ASSURANCE ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oct 29,2010 ciso  forum Oct , 29 2010 Delhi India 15th April 2009 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Oct 29,2010 ciso  forum Oct , 29 2010 Delhi India
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Oct 29,2010 ciso  forum Oct , 29 2010 Delhi India 23rd June 2005 Cognizant Address
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Oct 29,2010 ciso  forum Oct , 29 2010 Delhi India
Transition: Insurance    Assurance  &  Assurance Layered Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internal Threat Models and Mitigation Tools
Managing Interdependencies Critical  Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber Governance Components ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Corporate Governance Business Assurance Framework ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Business Vs cyber Alliances
15th April 2009 Prof. KS@2009: BMS CII Conference New delhi April14-15, 2009 Standards, Standards, Standards  Technical Vs Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],15th April 2009 Prof. KS@2009: BMS CII Conference New delhi April14-15, 2009
Importance of Group Standards -no one standard meets all requirements ISO 27001/BS7799 Vs COBIT Vs CMM Vs ITIL Mission Business Objectives Business Risks Applicable Risks Internal Controls Review
CERTIFICATION SEMANTIC ISSUES What is certification; what does it denote and mean? What are the principal  concepts and elements of certification What additional concepts and  notions are expressed and implied by certification? What is the Intent of the  certification; what is it you are trying  to do in certifying something? TECHNOLOGICAL  ISSUES How is certification achieved? How are the prerequisites and  context for certification established? What is it you are certifying? (Object of certification) Certification with respect to what? (Business for certification) What relation must exist for certification? (Object/basis relation) What activities/decisions are prerequisite for certification? How and when is certification to be conducted? ADMINISTRATIVE ISSUES Who does the certification? Who is the recipient of the certification? What is the significance of the certification for the certifier? What is the significance of the certification for the recipient ? Why certify?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internal Threat Models in Use
eSecurity Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
April 20, 2011 secure IT 2011  New Delhi Security Governance Maturity Model
Perfect Security—A Dream ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
“ IT Regulations and Policies-Compliance & Management” Pre-requisites  Physical Infrastructure and Mind-set ,[object Object],[object Object],[object Object],[object Object],[object Object],We have to embrace  Integrated Security & Cyber Assurance Framework
Security Governance  - Final Message ,[object Object],[object Object],[object Object]
Thank you ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Let all of us work together to make our country  a  secured Developed Nation

Weitere ähnliche Inhalte

Was ist angesagt?

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Erik Ginalick
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?Cognizant
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires SuperhumansDinesh O Bareja
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profilepatelhiranya
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET Journal
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public versionIBM Sverige
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iotramesh209
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 

Was ist angesagt? (19)

2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991Managed Security For A Not So Secure World Wp090991
Managed Security For A Not So Secure World Wp090991
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
The Security Challenge: What's Next?
The Security Challenge: What's Next?The Security Challenge: What's Next?
The Security Challenge: What's Next?
 
Incident Response Requires Superhumans
Incident Response Requires SuperhumansIncident Response Requires Superhumans
Incident Response Requires Superhumans
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
July 2010 Cover Story
July 2010 Cover StoryJuly 2010 Cover Story
July 2010 Cover Story
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 

Andere mochten auch

Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...NHSScotlandEvent
 
Parallel Session 4.4.2 My Pathway, My Choice
Parallel Session 4.4.2 My Pathway, My Choice Parallel Session 4.4.2 My Pathway, My Choice
Parallel Session 4.4.2 My Pathway, My Choice NHSScotlandEvent
 
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...NHSScotlandEvent
 
Biblioteka szkolna
Biblioteka szkolnaBiblioteka szkolna
Biblioteka szkolnasp3torun
 
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...NHSScotlandEvent
 
Getting Knowledge into Action for Best Quality Healthcare
Getting Knowledge into Action for Best Quality HealthcareGetting Knowledge into Action for Best Quality Healthcare
Getting Knowledge into Action for Best Quality HealthcareNHSScotlandEvent
 
Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...NHSScotlandEvent
 
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...NHSScotlandEvent
 
Delivering Quality Through eHealth and Information Technology
Delivering Quality Through eHealth and Information TechnologyDelivering Quality Through eHealth and Information Technology
Delivering Quality Through eHealth and Information TechnologyNHSScotlandEvent
 
Selected Reading - The Broken Spears
Selected Reading - The Broken SpearsSelected Reading - The Broken Spears
Selected Reading - The Broken Spearsjenniferyung
 
Chapter 21 family child care workers organize
Chapter 21   family child care workers organizeChapter 21   family child care workers organize
Chapter 21 family child care workers organizeSEIU
 
โครงงาน
โครงงานโครงงาน
โครงงานTangkwa Tom
 
634062fall11copyrtcarmona2
634062fall11copyrtcarmona2634062fall11copyrtcarmona2
634062fall11copyrtcarmona2cherubess
 

Andere mochten auch (20)

Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
Transforming Quality Through the Third Sector: Challenging and Influencing Pr...
 
Parallel Session 4.4.2 My Pathway, My Choice
Parallel Session 4.4.2 My Pathway, My Choice Parallel Session 4.4.2 My Pathway, My Choice
Parallel Session 4.4.2 My Pathway, My Choice
 
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...
Parallel Session 1.6.3 Managed Clinical Networks and Quality Improvement: A D...
 
Vaishali Rana
Vaishali RanaVaishali Rana
Vaishali Rana
 
Biblioteka szkolna
Biblioteka szkolnaBiblioteka szkolna
Biblioteka szkolna
 
Dr. Mohd. Ilyas Rizvi
Dr. Mohd. Ilyas RizviDr. Mohd. Ilyas Rizvi
Dr. Mohd. Ilyas Rizvi
 
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...
Parallel Session 3.7 Applying Best Practice to Develop Innovative and Effecti...
 
Rajan Raj Pant
Rajan Raj PantRajan Raj Pant
Rajan Raj Pant
 
Getting Knowledge into Action for Best Quality Healthcare
Getting Knowledge into Action for Best Quality HealthcareGetting Knowledge into Action for Best Quality Healthcare
Getting Knowledge into Action for Best Quality Healthcare
 
Manu Srivastava
Manu SrivastavaManu Srivastava
Manu Srivastava
 
Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...Making the Books Balance – Understanding the Financial Context and Efficiency...
Making the Books Balance – Understanding the Financial Context and Efficiency...
 
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...
Delivering Results Through Person-Centred Care: Kaiser Permanente Patient Car...
 
Mr. Manish Upadhyay
Mr. Manish Upadhyay Mr. Manish Upadhyay
Mr. Manish Upadhyay
 
Delivering Quality Through eHealth and Information Technology
Delivering Quality Through eHealth and Information TechnologyDelivering Quality Through eHealth and Information Technology
Delivering Quality Through eHealth and Information Technology
 
Selected Reading - The Broken Spears
Selected Reading - The Broken SpearsSelected Reading - The Broken Spears
Selected Reading - The Broken Spears
 
Chapter 21 family child care workers organize
Chapter 21   family child care workers organizeChapter 21   family child care workers organize
Chapter 21 family child care workers organize
 
โครงงาน
โครงงานโครงงาน
โครงงาน
 
Review notes
Review notesReview notes
Review notes
 
Mikaela scott
Mikaela scottMikaela scott
Mikaela scott
 
634062fall11copyrtcarmona2
634062fall11copyrtcarmona2634062fall11copyrtcarmona2
634062fall11copyrtcarmona2
 

Ähnlich wie Dr K Subramanian

Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internetaccenture
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 

Ähnlich wie Dr K Subramanian (20)

Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the InternetSecuring the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 

Mehr von eletseditorial

Mehr von eletseditorial (20)

Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011Tele-homeopathy Mind Technologies- eINDIA2011
Tele-homeopathy Mind Technologies- eINDIA2011
 
3 d technology in education :: Podar International School
3 d technology in education :: Podar International School3 d technology in education :: Podar International School
3 d technology in education :: Podar International School
 
Nalini Chandran, Director
Nalini Chandran, Director Nalini Chandran, Director
Nalini Chandran, Director
 
Rachna Swarup
Rachna Swarup Rachna Swarup
Rachna Swarup
 
Murli K S
Murli K S Murli K S
Murli K S
 
Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal, Dr Kuldeep Agarwal,
Dr Kuldeep Agarwal,
 
Mark Parkinson
Mark Parkinson Mark Parkinson
Mark Parkinson
 
Nagraj G Honnekeri
Nagraj G Honnekeri Nagraj G Honnekeri
Nagraj G Honnekeri
 
Shraman Jha
Shraman Jha Shraman Jha
Shraman Jha
 
Dr Melor Md yunus
Dr Melor Md yunus Dr Melor Md yunus
Dr Melor Md yunus
 
Dinesh Kumar
Dinesh Kumar Dinesh Kumar
Dinesh Kumar
 
Veena Raizada
Veena Raizada Veena Raizada
Veena Raizada
 
Amit Gupta
Amit Gupta Amit Gupta
Amit Gupta
 
Dr Anita Priyadarshini
Dr Anita Priyadarshini Dr Anita Priyadarshini
Dr Anita Priyadarshini
 
Dr Anjalee Prakash
Dr Anjalee Prakash Dr Anjalee Prakash
Dr Anjalee Prakash
 
Son Kuswadi
Son Kuswadi Son Kuswadi
Son Kuswadi
 
Mr. Raj Grover
Mr. Raj Grover Mr. Raj Grover
Mr. Raj Grover
 
Dr Thomas Christie
Dr Thomas Christie Dr Thomas Christie
Dr Thomas Christie
 
Prof K R Srivathsan
Prof K R Srivathsan Prof K R Srivathsan
Prof K R Srivathsan
 
World education summit 2011 [inaugural session]
World education summit   2011 [inaugural session]World education summit   2011 [inaugural session]
World education summit 2011 [inaugural session]
 

Kürzlich hochgeladen

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Dr K Subramanian

  • 1. Securing the Unsecured World: 21 st Century Challenge Creating Digital Trust & Cyber Security  Cyber Assurance Need of the Enterprises of “morrow Prof. K. Subramanian SM(IEEE), SMACM, FIETE, SMCSI,MAIMA,MAIS,MCFE Professor & Director, Advanced Center for Informatics & Innovative Learning (ACIIL), IGNOU HON.IT Adviser to CAG of India & Ex-DDG(NIC), Min of C & IT President, Cyber Society of India Emeritus President, eInformation Systems Security Audit Association (eISSA), India
  • 2.
  • 3. IS LOSING TO COMPETITION LOSS OF CUSTOMERS LOSS OF CREDIBILITY EMBARRASSMENT FINANCIAL LOSS FRAUD & THEFT SCAVENGING VIRUS ATTACK ACCIDENTAL DAMAGE NATURAL DISASTER UNAUTHORISED ACCESS INTERCEPTION TROJAN HORSES INCOMPLETE PROGRAM CHANGES HARDWARE / SOFTWARE FAILURE SOCIAL ENGINEERING ATTACK DATA DIDDLING PASSWORDS ENCRYPTION ANTI-VIRUS BACKUPS HARDWARE MAINTENANCE SECURITY GUARDS INPUT VALIDATIONS AUDIT TRAILS PROGRAM CHANGE DOCUMENTATION AUTHORISATION BUSINESS CONTINUITY PLAN INTEGRITY CONFIDENTIALITY AVAILABILITY
  • 4. Cyber Security – A Holistic View Proactive Control Source: Symantec Inc Authentication Access Control & Authorization Identity Mgmt Antivirus Firewall Intrusion Detection VPN Content Updates & Security Response 24x7 Global Customer Support Attack Recovery Tools/Svcs Honey Pot & Decoy Technology Threat Management & Early Warning Vulnerability Assessment Policy Compliance Event & Incident Mgmt Config. Mgmt Common Console Encryption
  • 5.  
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Challenging Issues Security is technology issue ? Trust is a management issue ? and Privacy is a social issue?
  • 13.
  • 14. Layered E-trust Framework PKI Technology Trusted Digital Identity Infrastructure Shared E-trust Applications Computing E-trust Services Single e-trust Applications Infrastructure Layer 2 Service Provider example: Identrus Layer 2 Service Provider example IDENTRUS B2B, B2C, SET, C2C
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28. Importance of Group Standards -no one standard meets all requirements ISO 27001/BS7799 Vs COBIT Vs CMM Vs ITIL Mission Business Objectives Business Risks Applicable Risks Internal Controls Review
  • 29. CERTIFICATION SEMANTIC ISSUES What is certification; what does it denote and mean? What are the principal concepts and elements of certification What additional concepts and notions are expressed and implied by certification? What is the Intent of the certification; what is it you are trying to do in certifying something? TECHNOLOGICAL ISSUES How is certification achieved? How are the prerequisites and context for certification established? What is it you are certifying? (Object of certification) Certification with respect to what? (Business for certification) What relation must exist for certification? (Object/basis relation) What activities/decisions are prerequisite for certification? How and when is certification to be conducted? ADMINISTRATIVE ISSUES Who does the certification? Who is the recipient of the certification? What is the significance of the certification for the certifier? What is the significance of the certification for the recipient ? Why certify?
  • 30.
  • 31.
  • 32. April 20, 2011 secure IT 2011 New Delhi Security Governance Maturity Model
  • 33.
  • 34.
  • 35.
  • 36.

Hinweis der Redaktion

  1. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  2. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  3. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  4. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Model of how customers view their security needs Introduce Symantec’s process to secure your enterprise – APRM
  5. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  6. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  7. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  8. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 cyber security-->insurance to Assurance Prof. K. Subramanian 20th april 2011 Secure IT 2011 Delhi
  9. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  10. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  11. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Cybr assurance-Tne need for Technologists & Business of 'morrow 27/11/2007 Prof. KS SUNY BUF Lecture 27th November 2007
  12. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 CXsOs & Business Assurance Focus Prof. K. Subramanian 29th oct 2010 ciso forum oct 2010 esecurity Governance~Corporate Governance 29th November 2007 Prof. KS@2009, IOD Lecture, March 22, 2009
  13. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 CXsOs & Business Assurance Focus Prof. K. Subramanian 29th oct 2010 ciso forum oct 2010
  14. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 CXsOs & Business Assurance Focus Prof. K. Subramanian 29th oct 2010 ciso forum oct 2010
  15. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 CXsOs & Business Assurance Focus Prof. K. Subramanian 29th oct 2010 ciso forum oct 2010
  16. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Corporate Goverance & Assurance 29th November 2007 Prof. K. Subramanian @October 2007
  17. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Corporate Goverance & Assurance 29th November 2007 Prof. K. Subramanian @October 2007
  18. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 cbs convergence 2007 oct 25,2007 21/02/09 Prof. K. Subramanian 04/11/09 Prof. KS@2009, IOD Lecture, March 22, 2009 esecurity Governance~Corporate Governance
  19. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 cyber security-->insurance to Assurance Prof. K. Subramanian 20th april 2011 Secure IT 2011 Delhi
  20. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Cyber Assurance for Trusted Financial Services 7th January 2008 2nd Bank Tech Congress Prof. K. Subramanian, Dec 2007, Mumbai India
  21. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 cbs convergence 2007 oct 25,2007 21/02/09 Prof. K. Subramanian 04/11/09 Prof. KS@2009, IOD Lecture, March 22, 2009 esecurity Governance~Corporate Governance
  22. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 cyber security-->insurance to Assurance Prof. K. Subramanian 20th april 2011 Secure IT 2011 Delhi Corporate Goverance & Assurance 29th November 2007 Prof. K. Subramanian @October 2007 The development was guided by the Software Engineering Institute’s efforts in the late 80’s in building maturity models for software development. By using such a scale, an organization can determine where it is, define where it wants to go and, if it identifies a gap, it can do an analysis to translate the findings into projects. Reference points can be added to the scale. Comparisons can be performed with what others are doing, if that data is available, and the organization can determine where emerging international standards and industry best practices are pointing for the effective management of security and control.
  23. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  24. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011
  25. security of insecurity cyber ssurace Framework 3rd August 2011 Prof. KS@2011 Egov world forum 2011 Digital ADMINISTRATION CONFERENCE CHENNAI mARCH 2008 18th March 2008 PROF. ks@2008 March 2008 PROF. ks@2008 March 2008 Digital ADMINISTRATION CONFERENCE CHENNAI mARCH 2008 18th March 2008