Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai

Similar documents
Cyber Security Emerging Cyber Threats & Challenges. Inaugural Session hrs

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

EC-Council GOVERNMENT OF KARNATAKA DEPARTMENT OF INDUSTRIES AND COMMERCE

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

IP CHANGES IN THE THAI COMPUTER CRIME ACT. Cyber crime in Thailand Introduction & Overview

CYBER SOLUTIONS & THREAT INTELLIGENCE

New Zealand National Cyber Security Centre Incident Summary

Defending Our Digital Density.

hrs Tea / Coffee Break. Agenda hrs Registration of Delegates hrs: Inaugural Session

2 nd ARF Seminar on Cyber Terrorism PAKISTAN S PERSPECTIVE AND EXPERIENCE WITH REFERENCE TO CERT IN COMBATING CYBER TERRORISM

CYBER INTELLIGENCE ASIA Combating Cybercrimes across the region Conference & Exhibition 20 th 22 nd March 2018 Singapore

9 TH SOUTHERN INDIA INFORMATION TECHNOLOGY FAIR (SIITF) THEME : EMERGING TECHNOLOGIES TO CREATE NEWER MARKETS

Caribbean Cyber Security: Not Only Government s Responsibility

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

DHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017

Cyber Security to Information Assurance: An Overview P. K. Paul 1, A. Bhuimali 2 P. S. Aithal 3 R. Rajesh 4

Security is one of the biggest concerns today. Ever since the advent of the 21 st century, the world has been facing several challenges regarding the

Gujarat Forensic Sciences University

Leading the Digital Transformation from the Centre of Government

Governance Ideas Exchange

Programme. Legal Instruments for the Internet Economy. Building Capacity and Implementing Regulation. Malta, 14 th to 19 th September, 2015

CYBER SECURITY & CYBER LAWS

Cybersecurity and Privacy Innovation Forum Brussels, 28 April Keynote address. Giovanni Buttarelli European Data Protection Supervisor

PROVIDING INVESTIGATIVE SOLUTIONS

Understanding the Changing Cybersecurity Problem

Cybersecurity, safety and resilience - Airline perspective

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

NERC Staff Organization Chart Budget 2018

SEACEN Cyber Security Summit 2014 Demystifying Cyber Risks: Evolving Regulatory Expectations

NERC Staff Organization Chart Budget 2019

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Securing Information Systems

Promoting Global Cybersecurity

NERC Staff Organization Chart Budget 2019

National Cybersecurity preparation to deal with Cyber Attacks

Cybersecurity and Hospitals: A Board Perspective

Background. Threats. Present Status. Challenges and Strategies 9/30/2009 TRAI 2

Project III Public/private cooperation

DEPARTMENT OF LAW NORTH EASTERN HILL UNIVERSITY

Bengaluru Space Expo 2010

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Whitepaper on AuthShield Two Factor Authentication with SAP

Data Breach Preparedness & Response

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

INTERNAL SECURITY. Chapter 1: Internal Security Challenges. Global Indices and Measurement of Vulnerability of a State Towards such Non-State Actors

COUNTER- TERRORISM SOLUTIONS Ltd. The Training & Consulting Arm of the International Institute for Counter Terrorism (ICT)

The Cyber Savvy CEO Getting to grips with today s growing cyber-threats

Presentation by Craig Richardson, Chief Executive Officer Australian Emerging Companies Conference UBS Sydney Australia Monday 20 April

The UK s National Cyber Security Strategy

Syllabus for P.G. Diploma in Cyber Law and Information Technology

COUNTER-TERRORISM. Future-oriented policing projects

Cyber Security: Threat and Prevention

CYBER SECURITY LAW, ITS REGULATION AND RELEVANCE FOR OUTER SPACE

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

INFORMATION SECURITY NO MORE THE CINDERELLA?

Rohana Palliyaguru Director -Operations Sri Lanka CERT CC APCERT AGM and Conference, 24 th October 2018 Shanghai, China MINISTRY OF TELECOMMUNICATION

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

NASSCOM Cyber Security Task Force 1 st Meeting. May 25, 2015

DSCI Framework and Practices are based on sound principles that are

Caribbean Stakeholders Meeting: Cyber Security and Cybercrime (CSM II) Provisional Agenda. Day 1: 16 March 2016

COUNTERING IMPROVISED EXPLOSIVE DEVICES

Assistant Secretary-General Michèle Coninsx Executive Director, CTED

A Forensic Accountant in Cyber Security

ZOOM Technologies forays into Gujarat (Surat) with Cybersecurity and Forensics!

INDONESIA S PERSPECTIVE ON CYBER TERRORISM

Legal Foundation and Enforcement: Promoting Cybersecurity

Are we breached? Deloitte's Cyber Threat Hunting

Keynotes. Mobile Version Subscribe Contact Us About Us Advertising Editorial SC UK SC Aus/NZ

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

NERC Staff Organization Chart Budget 2017

Opening Doors to Cyber and Homeland Security Careers

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia

DAY 1 - Monday 30th September 2013

Cyber Security Maturity Model

The commission communication "towards a general policy on the fight against cyber crime"

Information Security Incident Response Plan

CYBERSECURITY. The Intersection of Policy and Technology YOU RE HERE TO MAKE A DIFFERENCE ṢM

AGENDA: Cyber Essentials: The UK Government Scheme to improve cyber security (Dexter House, Royal Mint Court, London, 17 July 2014)

NERC Staff Organization Chart Budget 2017

Information Security Incident Response Plan

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Workshop on Cyber Security & Cyber Crime Policies. Policies for African Diplomats

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Introduction Privacy, Security and Risk Management. What Healthcare Organizations Need to Know

UN General Assembly Resolution 68/243 GEORGIA. General appreciation of the issues of information security

We did it our way. Tony Neate, Chief Executive - Get Safe Online Tony Larks, Vice President Marketing, Trend Micro & Director, Get Safe Online

Best Practices in Public Information Management in Sri Lanka. Presented by Nimal Athukorala D.C. Dissanayake

HOLY ANGEL UNIVERSITY COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY CYBER SECURITY COURSE SYLLABUS

Physical security advisory services Securing your organisation s future

Security Takes Center Stage

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Presented by: - Anselm Charles ICT Manager CARICOM IMPACS

Cyber Threat Landscape April 2013

PERSON SPECIFICATION. Cyber PROTECT Officer. Job Title: Status: Established

ISACA West Florida Chapter - Cybersecurity Event

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Transcription:

(Southern Region) Conference on Cyber Security Emerging Cyber Threats & Challenges 24 th April 2010 : Hotel Accord Metropolitan, T Nagar, Chennai PROGRAMME 24 th April 2010 1000 1100 hrs : Inaugural Session Opening Remarks & Theme Address Special Address Special Address Keynote Address Address by the Chief Guest Mr R Sri Kumar, IPS (Retd) Chairman, CII Task Force on Internal Security (Southern Region) & Former Director General & IG of Police, Karnataka Mr T Rajendran, IPS Additional Director General of Police & Commissioner of Police Chennai Police Mr N Lakshmi Narayanan Vice Chairman Cognizant Technology Solutions Mr P W C Davidar, IAS Secretary - Information & Technology Govt. of Tamil Nadu Dr (Tmt) Poongothai Aladi Aruna Minister for Information Technology Govt. of Tamil Nadu Gp Capt L V Mohandas Head Internal Security & IT (SR) Confederation of Indian Industry 1100 hrs Tea & Coffee Break 1

1115-1215 hrs : Plenary Session I - Cyber Security : Banking, Finance, IT & Security Surveillance Theme : Exploitation of technological flaws in the current corporate world be it banking, finance or Information technology could result in compromise of customer/corporate information which in turn leads to internet frauds like credit card Misuse, identity thefts etc. It is hence imperative for banks and allied financial companies providing client products and services to ensure that their customer data is secure. The following sessions will provide a broader understanding of the current risks and the security measures taken to counteract these threats. Opening Remarks by Session Chairman Emerging Trends in Cyberspace - Implications for Online Transactions Online fraud and Data Leakage Prevention Online Transaction Security Challenges faced by Banks Mr K R Ananda Regional Director Reserve Bank of India Mr J Chandrasekaran Chief General Manager State Bank of India Mr Rajiv Rathinam Associate Vice President, Financial Crime Risk Scope International Pvt Ltd Mr C V G Prasad Chief Information Officer - IT ING Vysya Bank Ltd. Mr K R Ananda 2

1215 1315 hrs : Plenary Session II - Cyber Crimes : Cyber Crimes, Digital Evidence & Cyber Forensics Theme : With the advent of the Internet and advances in computer technology that helps businesses to function more efficiently and effectively, it has also opened up avenues for the bad guys to take advantage of the inherent risks and vulnerabilities in the use of such technology. Cyber crimes include a multitude of potentially illegal activities ranging from Malware, Denial-of-service attacks and Computer viruses that target computer and network devices and also activities like Cyber stalking, Fraud/identity theft, Phishing and Information warfare that merely use a computer or network device to carry out such activities. The differentiating factor in a cyber crime is that it is entirely virtual and has no physical consequences. Detecting cyber crimes, gathering and preserving digital evidence and the related forensic studies are more challenging given the virtual nature of the environment. The following sessions will give an overview of various cyber crimes, the handling of digital evidence and advances in cyber forensic investigations Opening Remarks by Session Chairman Cyber Forensics & e - Discovery Microsoft Endeavor in Empowering Law Enforcement Anatomy of a Data Breach Mr R Sri Kumar, IPS (Retd) Chairman, CII Task Force on Internal Security (Southern Region) & Former Director General & IG of Police, Karnataka Mr Murali Talasila Director KPMG Mr Deepak Maheshwari Director Corporate Affairs Microsoft Corporation (India) Private Limited Mr Mathan Kasilingam Regional Manager (System Engineering) Symantec Software Solutions Pvt. Ltd. 1315 hrs Lunch 3

1415 1515 hrs : Plenary Session III - Cyber Act : Policies & Laws Theme: This session highlights the need for Cyber Laws and the importance of having policies & laws restricting cyber crimes. It provides basic information on laws pertaining to cyber security especially on the Indian Cyber Law touching upon the legal aspects of all Online activities and frauds. It also covers the types of internet policies that are required for an organization as a basic security measure to safeguard the organization and its data from Cyber crimes. Opening Remarks by Session Chairman Mr K Muralikrishna Co Chairman, CII (SR) Task Force on Internal Security & Vice President and Head Computer & Communication Division Infosys Technologies Ltd. IT Act 2008 Implementation and Practical Problems Implications on Clause 49 of Corporate Governance under ITA 2008 Cyber Security Regulatory and Enforcement Perspectives Mr Sanjay Vir Singh, IPS Inspector General of Police Anti Terrorist Squad Karnataka Police Mr Na Vijayashankar Director Cyber Law College Ms Savitha Kesav Jagadeesan Partner Khaitan & Partners Advocates & Notaries 4

1515 1615 hrs : Plenary Session IV - Cyber Threats : Military, Industrial, Commercial & Societal Theme: Cyber threats are extremely dangerous to every individual those who use IT and ITES systems to carry out important missions and functions. In today s world, wars are fought more in cyber space than in the Conventional battle field and will more likely disrupt the vital infrastructure of the nation by spies capturing sensitive information of government s & nation s secrets. From the Industries front, it is extremely important for them to protect the trade secrets, copyrights & intellectual properties. The third major sector is being the commercial organization like Aviation and manufacturing and health care that are most vulnerable for cyber frauds. This session provides insights into the various cyber threats in Military, Industrial, Commercial organizations and society. Opening Remarks by Session Chairman & Talk on Threat perception from China Mr Jayadeva Ranade Former Additional Cabinet Secretary Govt. of India Cyber Terrorism Cyber war and National Security When Ends Becomes the Means Mr Amaresh Pujari, IPS Inspector General of Police Tamil Nadu Police Academy Mr Amit Sharma Deputy Director Defence Research and Development Organisation Cyber Security Trends Past, Present & Future Mr Pazhamalai Jayaraman Chief Information Security Officer Wipro 1615 hrs Tea & Coffee Break 5

1630 1730 hrs : Plenary Session V - Cyber War : The Emerging Security Challenges in the 21st Century Theme: The issue of cyber security has weighed heavily on the minds of policymakers as the severity and complexity of malicious cyber attacks have intensified over the past decade. These attacks, directed against both the public and private sectors, are the product of a heterogeneous network of state and non-state actors whose actions are motivated by a host of factors. Over the past quarter century, the cyberspace domain has rapidly expanded to dominate almost every aspect of human interaction. The entire world now depend on cyberspace more then ever to manage their banking transactions, investments, work and personal communication, shopping, travel, utilities, news, and even social networking. Indeed, the global online networks that carry people, goods, information, and services have brought out an epidemic of cyber crimes and pose a continuous challenge to Security. With this growing dependency inevitably comes an increased challenge for securing the world from these threats. The following session would provide an insight on the various threats involved & steps to be taken to strengthen the cyber security. Opening Remarks by Session Chairman & Talk on Cyber War in the 21 st Century : The emerging threats and Challenges Offensive Cyber Warfare Emerging Cyber Threats & Challenges - A perspective on Information Security Maj Gen Yashwant Deva, AVSM (Retd) Former President, IETE & Chief Signal Officer, Southern Army Command Mr J Prasanna Chief Executive Officer AVSLABS Mr Neeraj Gupta General Manager- Information Security) Global Technology Services IBM India Private Limited Conference Conclusion 1730 hrs Conference Sum up Mr Janagraj Akkaiah Associate Vice President & Senior Security Manager, GIS Security Solution Scope International Pvt. Ltd. Gp Capt L V Mohandas Head Internal Security & IT (SR) Confederation of Indian Industry 1800 hrs End of Conference ***** 6