SlideShare una empresa de Scribd logo
1 de 21
Cyber Fraud and Security
WHAT RISKS DOES FAMILY OFFICE'S FACE IN
TODAY'S WORLD?
Kannan Subbiah
Chief Technology Officer
MF Utilities India Pvt Ltd
1
About MF Utilities
2
 Transaction Aggregation System
 Ease and convenience of transacting
 SEBI Regulated
 Equally owned by the Asset Management Companies
 Free for all
 Check www.mfuindia.com for more details
Setting the Stage
“We thought that data was the new Oil …
… but it turns out it is the new Asbestos”
3
Mobile Devices
MOBILE, the new Cyber Crime Target
Percent of overall fraud originating
from a mobile device
Percent of transaction volume
originating from a mobile device
4
What’s Happening?
5
Cyber Threat Map
6
Source:
https://www.fireeye.com/cyber-
map/threat-map.html
Small is not Safe
7
Small is Not Safe
85%
50%
Vast majority of small
businesses lack a formal
Internet security policy for
employees, and only about half
have even rudimentary
cybersecurity measures in place
Despite significant
cybersecurity exposures, 85
percent of small business
owners believe their
company is safe from
hackers.
8
Some of the Small Business Stats
 28 million small business owners have no confidence in their
security
 1 in 5 small businesses reported a cyber attack
 63% of small businesses have been victims of cyber attacks in the
last 12 months
 Average cost of a breach for small to mid-sized businesses was
over $180,000
 40 percent of attacks are against organizations with fewer than
500 employees.
9
Where are We Heading to …
Data
Things Systems
People
11
Machine Intelligence
12
Privacy & Security
13
Privacy Security
Data
Safeguards
Awareness
& Training
Compliance
Notice & Choice
Collection Limitation
Use Limitation
Purpose
Specification
Accountability
Access to Data
Confidentiality
Integrity
Availability
Reliability
Authorization
Authentication
Access Control
Compliance under Indian IT Act
 Body Corporate includes Firms and Individuals
 Information Privacy
 Grievance Officer
 Reasonable Security Practices
 Maintenance of audit logs and trails
 Punishment – upto 3 years of Imprisonment or fine up to
5 Lakhs or both.
14
Risks For Small Office
 Reputation / Brand damage
 Loss of customer trust and in turn revenue loss
 Cyber extortion / Ransomware
 Network / System disruption
 Regulatory Compliance Liability
 Investigation, Fine and Remediation Costs
 Risk of business closure
15
The Myths
 Investment in sophisticated tools
 Third Party provides a managed security services
 Protect Internet Facing Applications alone
 Never been attacked
 It’s the Responsibility of IT
 Too Small to experience a breach
16
Stronger Authentication
18
Patch Regularly
19
Avoid Phishing Attacks
20
Have the Basics Right
 Install / Implement and Activate the Firewalls
 Use a reliable end point protection software
 Have a back up plan
 Collaborate with Friends & Peers on Cyber Risk /
Security
21
Other Precautions
 Be careful in sharing your personal data
 Control Physical and Logical access to IT Assets
 Maintain, Monitor & Review Logs
 Educate your employees
 Know about and be Compliant with Laws and Regulations
 Assess, Audit and Patch the security gaps periodically
 Use tools to stay vigilant and proactively monitor the cyber incidents
 Use Cyber Insurance
22
Thank You
? 23
Be Agile & Resilient

Más contenido relacionado

La actualidad más candente

Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataOptimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataAbsolutdata Analytics
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Lovejadams6
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation managementIBM Analytics
 
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .jadams6
 
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...DATUM LLC
 
Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Managementjadams6
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianDoreen Christian
 
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareThe, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareProfisee
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeGuy Pearce
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?CSpring
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance ProgramSteve Sugulas
 
Does data quality matter? View from the business
Does data quality matter? View from the businessDoes data quality matter? View from the business
Does data quality matter? View from the businessHanson Wade
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016bfreeman1987
 
Data governance
Data governanceData governance
Data governanceMD Redaan
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0KirSinc
 

La actualidad más candente (20)

Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataOptimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation management
 
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
 
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
 
Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Management
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareThe, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance Program
 
Does data quality matter? View from the business
Does data quality matter? View from the businessDoes data quality matter? View from the business
Does data quality matter? View from the business
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
Why data governance is the new buzz?
Why data governance is the new buzz?Why data governance is the new buzz?
Why data governance is the new buzz?
 
Data governance
Data governanceData governance
Data governance
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Data Quality+Security
Data Quality+SecurityData Quality+Security
Data Quality+Security
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0
 
Article in Techsmart
Article in TechsmartArticle in Techsmart
Article in Techsmart
 

Similar a Cyber Fraud Risks Family Offices Face

Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 

Similar a Cyber Fraud Risks Family Offices Face (20)

Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 

Más de Kannan Subbiah

Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer lookKannan Subbiah
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalizationKannan Subbiah
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An OverviewKannan Subbiah
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 

Más de Kannan Subbiah (7)

Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer look
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalization
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
EAI Best Practices
EAI Best PracticesEAI Best Practices
EAI Best Practices
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cyber Fraud Risks Family Offices Face

  • 1. Cyber Fraud and Security WHAT RISKS DOES FAMILY OFFICE'S FACE IN TODAY'S WORLD? Kannan Subbiah Chief Technology Officer MF Utilities India Pvt Ltd 1
  • 2. About MF Utilities 2  Transaction Aggregation System  Ease and convenience of transacting  SEBI Regulated  Equally owned by the Asset Management Companies  Free for all  Check www.mfuindia.com for more details
  • 3. Setting the Stage “We thought that data was the new Oil … … but it turns out it is the new Asbestos” 3
  • 4. Mobile Devices MOBILE, the new Cyber Crime Target Percent of overall fraud originating from a mobile device Percent of transaction volume originating from a mobile device 4
  • 7. Small is not Safe 7
  • 8. Small is Not Safe 85% 50% Vast majority of small businesses lack a formal Internet security policy for employees, and only about half have even rudimentary cybersecurity measures in place Despite significant cybersecurity exposures, 85 percent of small business owners believe their company is safe from hackers. 8
  • 9. Some of the Small Business Stats  28 million small business owners have no confidence in their security  1 in 5 small businesses reported a cyber attack  63% of small businesses have been victims of cyber attacks in the last 12 months  Average cost of a breach for small to mid-sized businesses was over $180,000  40 percent of attacks are against organizations with fewer than 500 employees. 9
  • 10. Where are We Heading to … Data Things Systems People 11
  • 12. Privacy & Security 13 Privacy Security Data Safeguards Awareness & Training Compliance Notice & Choice Collection Limitation Use Limitation Purpose Specification Accountability Access to Data Confidentiality Integrity Availability Reliability Authorization Authentication Access Control
  • 13. Compliance under Indian IT Act  Body Corporate includes Firms and Individuals  Information Privacy  Grievance Officer  Reasonable Security Practices  Maintenance of audit logs and trails  Punishment – upto 3 years of Imprisonment or fine up to 5 Lakhs or both. 14
  • 14. Risks For Small Office  Reputation / Brand damage  Loss of customer trust and in turn revenue loss  Cyber extortion / Ransomware  Network / System disruption  Regulatory Compliance Liability  Investigation, Fine and Remediation Costs  Risk of business closure 15
  • 15. The Myths  Investment in sophisticated tools  Third Party provides a managed security services  Protect Internet Facing Applications alone  Never been attacked  It’s the Responsibility of IT  Too Small to experience a breach 16
  • 19. Have the Basics Right  Install / Implement and Activate the Firewalls  Use a reliable end point protection software  Have a back up plan  Collaborate with Friends & Peers on Cyber Risk / Security 21
  • 20. Other Precautions  Be careful in sharing your personal data  Control Physical and Logical access to IT Assets  Maintain, Monitor & Review Logs  Educate your employees  Know about and be Compliant with Laws and Regulations  Assess, Audit and Patch the security gaps periodically  Use tools to stay vigilant and proactively monitor the cyber incidents  Use Cyber Insurance 22
  • 21. Thank You ? 23 Be Agile & Resilient

Notas del editor

  1. Questions: Website / Portal Networked computers / laptops Security measures in place Traditional Crimes  Cyber Crimes Digital Business  dependency on Security Effective Cyber Security  success or failure of business
  2. Data – decision making Traditional vs. digital Technology - big data First Computer – early 1990s ₹ 10k for 4 MB RAM With Technology, Data as Asset  Data as Oil  Data as Asbestos Technology helps Hackers as well  Hackers are always ahead Data Breach – Jio Legislations – Legal actions
  3. Source: RSA Global Fraud Forecast – 2017 How many of you present here had seen the mobile phone of late 1990s? My first mobile Mobile Phone is not just a phone any more. Story - Location sharing
  4. Source: RSA Global Fraud Forecast - 2017 Motivation for Hackers – not just financial gain
  5. Being Small  Advantage for Hackers
  6. Tendency to defer cyber security investments. Path of least resistance
  7. NCRB Report 2016 In January and February 2017 alone, 39 government websites were hacked, which led the government to set up an expert group to combat cyber crime. 11,592 cases of cyber crime were registered in India, leading to 8,121 arrests. Operational systems apparently are most vulnerable to cyber attacks, as many are built around legacy technologies with weaker protocols that are inherently more vulnerable.
  8. By 2020, 50 billion smart devices Fridge, TV, Amazon Dash Do we want to go back?
  9. Robotics
  10. Privacy shall be the choice of your clients / users. To enable them to make the choice you should tell them as to why you need the data, what all you will be doing with that data, who will have access to this data, etc. This is where a well drafted Privacy Policy is essential for every organization and the same shall be accessible for them.
  11. Compliance as an organization using IT Punishment for other crimes
  12. Consequences - embarrassing to life-threatening Misuse of your IT assets by your employees – or even friends and neighbours Mobile – Your Identity A combination of these risks might lead to closure of business
  13. 25% small business have mistaken beliefs Threat is real – question is when Continuous thing Cyber Threat is Risk Issue than IT Issue
  14. 2FA, Passphrase Security Vs. User Experience NIST’s recent recommendation on Password No more periodic password changes.  No more imposed password complexity  Mandatory validation of newly created passwords 
  15. Vulnerabilities malware
  16. Example of Phishing Credit card – hacker database Social Engineering
  17. With the pace at which the technology is evolving and the pace at which the hackers and fraudsters change their tactics, there cannot be a single plan that will just work for ever. The defense should be agile and resilient, being able to discover and react to such newer threats.