SlideShare una empresa de Scribd logo
1 de 11
The South Asian Cyber Security Landscape PostSnowden
Introduction – Yours truly…
• Independent Cyber Security Analyst
• Specialization: the cyber security landscapes of the wider Middle
East, Central Asia, and Indian Subcontinent
• Former staff member at iDefense, Inc., now independent
• Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik,
Hindi, Urdu, and German
• Interest in hacking and computers since childhood…
• Research: chronicle evolution of cyber security landscape in
Middle East, Subcontinent, and Central Asia, as objectively
and neutrally as possible
• Better understanding through comparative analysis –
especially geopolitical and socio-economic contexts driving
these cyber security landscapes!
The South Asian Cyber Security Landscape PostSnowden
The Edward Snowden revelations of massive scale espionage
activities conducted by the US’ NSA and other intelligence agencies
continues to have profound effects on the collective cyber security
landscape of the entire world.
This includes of course the South Asian cyber security
landscape…
The South Asian Cyber Security Landscape PostSnowden
The Snowden revelations seem to be working
like a giant catalyst stimulating wider global
cyber security arms race…

“National internets” in which countries can better
enforce their respective laws, controls, and
sovereignty in general…
Discussion of fully domestic internet infrastructure
that ensure transmitted data does not leave
respective national borders!
Examples:
“Internetz”
The Iranian “halal internet”…
Etc. etc. …
The South Asian Cyber Security Landscape PostSnowden
A number of countries working on their own internet surveillance
programs, much like PRISM…
• India working on National Cyber Coordination Centre
• Said to target metadata more than actual content, with only
metadata of concern or interest flagged for later content
analysis
• Controversial in India itself; calls for oversight, better privacy
laws, etc. likely to intensify
Pakistan itself taking similar action -- talk of beefing up PKCERT, put
in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues…
Talk of possible treaties between India and Pakistan preventing
targeting of nuclear installations, etc. - likely wishful thinking…
The South Asian Cyber Security Landscape PostSnowden
More “state actor” hacker groups likely to proliferate in South Asia,
along the lines of what we already see in the Middle East…

Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter,
Tango, Washington Post, Al-Jazeera, any news outlets it perceives as
against Bashar Al-Asad…
The South Asian Cyber Security Landscape PostSnowden

Syria’s closest regional political ally is Iran, with wide-ranging military
security cooperation ongoing between both countries…

Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad
military; in 2012, Deutsche Welle publishes claim of Iran Information
Ministry cyber security assistance to Syria.
The Cyber Security Landscapes of the Middle East and
the Indian Subcontinent: A Brief Comparative Analysis
Base ingredients for this to happen are already present…
The South Asian Cyber Security Landscape PostSnowden
Brazil, Russia, India, China, and South Africa (BRICS countries)
recently had a meeting in which they expressed their desire to
decrease reliance across the board on US sourced internet
technology…
• Drive for greater technological independence in India long-time part
of Indian political discourse!
• Huawei!
• Snowden revelations likely to accelerate these efforts, though
results of these efforts likely not forthcoming overnight…
Snowden revelations have indicated that US is targeting China's
Tsinghua university, one of China's leading research and
development universities…
• Snowden revelations confirm not altogether unknown fact:
essentially, everybody spying against everybody!
The South Asian Cyber Security Landscape PostSnowden
Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among
Middle Easter hacker Groups! Snowden revelations will definitely accelerate this
trend…

… but translations of the Hebrew
captions revealed nonsense words,
strongly suggesting a forgery.

The SEA itself soon denied having
done the attack in a Twitter release…

Headlines ensued in June 2013 that the Syrian
Electronic Army had succeeded in breaching a
SCADA system at a water and electricity utility
station in Haifa, Israel…
The South Asian Cyber Security Landscape PostSnowden
Conclusions…
• Snowden revelations to accelerate global cyber arms race
dramatically!
• New national cyber espionage programs of various kinds will
proliferate all over the world, surprises likely forthcoming…
• Commercial companies specializing in cyber espionage likely to
proliferate
• Some headquartered in countries with lax or nonexistent cyber
laws, to safeguard offensive cyber espionage from legal
pursuit…
• “National” or “indigenous” internets will get fairly significant impetus,
especially for ensuring route of data not to cross systems in US or
other outside country
• Of ancillary importance here: TLDs able to be made using nonEnglish characters
• To some limited degree, Balkanization of internet? Debatable,
uncertain…
• Essentially, cyber IN-security is the new normal.
The South Asian Cyber Security Landscape PostSnowden

…

Más contenido relacionado

La actualidad más candente

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 

La actualidad más candente (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

Destacado

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC Russia
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentationPollypo
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and usesUj17
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Jeffrey Funk
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureLawrence kok
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingLawrence kok
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronicsChinmay Chepurwar
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsMoeez Shem
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applicationsArpit Agarwal
 

Destacado (13)

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao Pãulo
 
Graphene
GrapheneGraphene
Graphene
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentation
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and uses
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
 
What Is Graphene?
What Is Graphene?What Is Graphene?
What Is Graphene?
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronics
 
Synthesis of graphene
Synthesis of grapheneSynthesis of graphene
Synthesis of graphene
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applications
 
Graphene
GrapheneGraphene
Graphene
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applications
 

Similar a ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxAkashTomar739930
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Mohamed N. El-Guindy
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATIONKelli Waxman
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposedNumaan Huq
 

Similar a ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
114-116
114-116114-116
114-116
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptx
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATION
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 

Más de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Más de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

  • 1. The South Asian Cyber Security Landscape PostSnowden Introduction – Yours truly… • Independent Cyber Security Analyst • Specialization: the cyber security landscapes of the wider Middle East, Central Asia, and Indian Subcontinent • Former staff member at iDefense, Inc., now independent • Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik, Hindi, Urdu, and German • Interest in hacking and computers since childhood… • Research: chronicle evolution of cyber security landscape in Middle East, Subcontinent, and Central Asia, as objectively and neutrally as possible • Better understanding through comparative analysis – especially geopolitical and socio-economic contexts driving these cyber security landscapes!
  • 2. The South Asian Cyber Security Landscape PostSnowden The Edward Snowden revelations of massive scale espionage activities conducted by the US’ NSA and other intelligence agencies continues to have profound effects on the collective cyber security landscape of the entire world. This includes of course the South Asian cyber security landscape…
  • 3. The South Asian Cyber Security Landscape PostSnowden The Snowden revelations seem to be working like a giant catalyst stimulating wider global cyber security arms race… “National internets” in which countries can better enforce their respective laws, controls, and sovereignty in general… Discussion of fully domestic internet infrastructure that ensure transmitted data does not leave respective national borders! Examples: “Internetz” The Iranian “halal internet”… Etc. etc. …
  • 4. The South Asian Cyber Security Landscape PostSnowden A number of countries working on their own internet surveillance programs, much like PRISM… • India working on National Cyber Coordination Centre • Said to target metadata more than actual content, with only metadata of concern or interest flagged for later content analysis • Controversial in India itself; calls for oversight, better privacy laws, etc. likely to intensify Pakistan itself taking similar action -- talk of beefing up PKCERT, put in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues… Talk of possible treaties between India and Pakistan preventing targeting of nuclear installations, etc. - likely wishful thinking…
  • 5. The South Asian Cyber Security Landscape PostSnowden More “state actor” hacker groups likely to proliferate in South Asia, along the lines of what we already see in the Middle East… Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter, Tango, Washington Post, Al-Jazeera, any news outlets it perceives as against Bashar Al-Asad…
  • 6. The South Asian Cyber Security Landscape PostSnowden Syria’s closest regional political ally is Iran, with wide-ranging military security cooperation ongoing between both countries… Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad military; in 2012, Deutsche Welle publishes claim of Iran Information Ministry cyber security assistance to Syria.
  • 7. The Cyber Security Landscapes of the Middle East and the Indian Subcontinent: A Brief Comparative Analysis Base ingredients for this to happen are already present…
  • 8. The South Asian Cyber Security Landscape PostSnowden Brazil, Russia, India, China, and South Africa (BRICS countries) recently had a meeting in which they expressed their desire to decrease reliance across the board on US sourced internet technology… • Drive for greater technological independence in India long-time part of Indian political discourse! • Huawei! • Snowden revelations likely to accelerate these efforts, though results of these efforts likely not forthcoming overnight… Snowden revelations have indicated that US is targeting China's Tsinghua university, one of China's leading research and development universities… • Snowden revelations confirm not altogether unknown fact: essentially, everybody spying against everybody!
  • 9. The South Asian Cyber Security Landscape PostSnowden Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among Middle Easter hacker Groups! Snowden revelations will definitely accelerate this trend… … but translations of the Hebrew captions revealed nonsense words, strongly suggesting a forgery. The SEA itself soon denied having done the attack in a Twitter release… Headlines ensued in June 2013 that the Syrian Electronic Army had succeeded in breaching a SCADA system at a water and electricity utility station in Haifa, Israel…
  • 10. The South Asian Cyber Security Landscape PostSnowden Conclusions… • Snowden revelations to accelerate global cyber arms race dramatically! • New national cyber espionage programs of various kinds will proliferate all over the world, surprises likely forthcoming… • Commercial companies specializing in cyber espionage likely to proliferate • Some headquartered in countries with lax or nonexistent cyber laws, to safeguard offensive cyber espionage from legal pursuit… • “National” or “indigenous” internets will get fairly significant impetus, especially for ensuring route of data not to cross systems in US or other outside country • Of ancillary importance here: TLDs able to be made using nonEnglish characters • To some limited degree, Balkanization of internet? Debatable, uncertain… • Essentially, cyber IN-security is the new normal.
  • 11. The South Asian Cyber Security Landscape PostSnowden …

Notas del editor

  1. http://www.dev-point.com/vb/t286148.html