SlideShare une entreprise Scribd logo
1  sur  11
The South Asian Cyber Security Landscape PostSnowden
Introduction – Yours truly…
• Independent Cyber Security Analyst
• Specialization: the cyber security landscapes of the wider Middle
East, Central Asia, and Indian Subcontinent
• Former staff member at iDefense, Inc., now independent
• Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik,
Hindi, Urdu, and German
• Interest in hacking and computers since childhood…
• Research: chronicle evolution of cyber security landscape in
Middle East, Subcontinent, and Central Asia, as objectively
and neutrally as possible
• Better understanding through comparative analysis –
especially geopolitical and socio-economic contexts driving
these cyber security landscapes!
The South Asian Cyber Security Landscape PostSnowden
The Edward Snowden revelations of massive scale espionage
activities conducted by the US’ NSA and other intelligence agencies
continues to have profound effects on the collective cyber security
landscape of the entire world.
This includes of course the South Asian cyber security
landscape…
The South Asian Cyber Security Landscape PostSnowden
The Snowden revelations seem to be working
like a giant catalyst stimulating wider global
cyber security arms race…

“National internets” in which countries can better
enforce their respective laws, controls, and
sovereignty in general…
Discussion of fully domestic internet infrastructure
that ensure transmitted data does not leave
respective national borders!
Examples:
“Internetz”
The Iranian “halal internet”…
Etc. etc. …
The South Asian Cyber Security Landscape PostSnowden
A number of countries working on their own internet surveillance
programs, much like PRISM…
• India working on National Cyber Coordination Centre
• Said to target metadata more than actual content, with only
metadata of concern or interest flagged for later content
analysis
• Controversial in India itself; calls for oversight, better privacy
laws, etc. likely to intensify
Pakistan itself taking similar action -- talk of beefing up PKCERT, put
in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues…
Talk of possible treaties between India and Pakistan preventing
targeting of nuclear installations, etc. - likely wishful thinking…
The South Asian Cyber Security Landscape PostSnowden
More “state actor” hacker groups likely to proliferate in South Asia,
along the lines of what we already see in the Middle East…

Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter,
Tango, Washington Post, Al-Jazeera, any news outlets it perceives as
against Bashar Al-Asad…
The South Asian Cyber Security Landscape PostSnowden

Syria’s closest regional political ally is Iran, with wide-ranging military
security cooperation ongoing between both countries…

Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad
military; in 2012, Deutsche Welle publishes claim of Iran Information
Ministry cyber security assistance to Syria.
The Cyber Security Landscapes of the Middle East and
the Indian Subcontinent: A Brief Comparative Analysis
Base ingredients for this to happen are already present…
The South Asian Cyber Security Landscape PostSnowden
Brazil, Russia, India, China, and South Africa (BRICS countries)
recently had a meeting in which they expressed their desire to
decrease reliance across the board on US sourced internet
technology…
• Drive for greater technological independence in India long-time part
of Indian political discourse!
• Huawei!
• Snowden revelations likely to accelerate these efforts, though
results of these efforts likely not forthcoming overnight…
Snowden revelations have indicated that US is targeting China's
Tsinghua university, one of China's leading research and
development universities…
• Snowden revelations confirm not altogether unknown fact:
essentially, everybody spying against everybody!
The South Asian Cyber Security Landscape PostSnowden
Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among
Middle Easter hacker Groups! Snowden revelations will definitely accelerate this
trend…

… but translations of the Hebrew
captions revealed nonsense words,
strongly suggesting a forgery.

The SEA itself soon denied having
done the attack in a Twitter release…

Headlines ensued in June 2013 that the Syrian
Electronic Army had succeeded in breaching a
SCADA system at a water and electricity utility
station in Haifa, Israel…
The South Asian Cyber Security Landscape PostSnowden
Conclusions…
• Snowden revelations to accelerate global cyber arms race
dramatically!
• New national cyber espionage programs of various kinds will
proliferate all over the world, surprises likely forthcoming…
• Commercial companies specializing in cyber espionage likely to
proliferate
• Some headquartered in countries with lax or nonexistent cyber
laws, to safeguard offensive cyber espionage from legal
pursuit…
• “National” or “indigenous” internets will get fairly significant impetus,
especially for ensuring route of data not to cross systems in US or
other outside country
• Of ancillary importance here: TLDs able to be made using nonEnglish characters
• To some limited degree, Balkanization of internet? Debatable,
uncertain…
• Essentially, cyber IN-security is the new normal.
The South Asian Cyber Security Landscape PostSnowden

…

Contenu connexe

Tendances

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 

Tendances (20)

Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 

En vedette

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC Russia
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentationPollypo
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and usesUj17
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Jeffrey Funk
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureLawrence kok
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingLawrence kok
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronicsChinmay Chepurwar
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsMoeez Shem
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applicationsArpit Agarwal
 

En vedette (13)

PwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao PãuloPwC: From Moscow to Sao Pãulo
PwC: From Moscow to Sao Pãulo
 
Graphene
GrapheneGraphene
Graphene
 
Graphene presentation
Graphene presentationGraphene presentation
Graphene presentation
 
Graphene : Properties and uses
Graphene : Properties and usesGraphene : Properties and uses
Graphene : Properties and uses
 
Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility Graphene: its increasing economic feasibility
Graphene: its increasing economic feasibility
 
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structureIB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
IB Chemistry on Allotrope, Alloy, Graphene and crystalline structure
 
What Is Graphene?
What Is Graphene?What Is Graphene?
What Is Graphene?
 
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic BondingIB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
IB Chemistry on Allotrope of Carbon, Graphene, Alloy and Metallic Bonding
 
Application of Graphene in electronics
Application of Graphene in electronicsApplication of Graphene in electronics
Application of Graphene in electronics
 
Synthesis of graphene
Synthesis of grapheneSynthesis of graphene
Synthesis of graphene
 
Shaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applicationsShaowei zhang-graphene-based-composites-for-future-applications
Shaowei zhang-graphene-based-composites-for-future-applications
 
Graphene
GrapheneGraphene
Graphene
 
Graphene and its future applications
Graphene and its future applicationsGraphene and its future applications
Graphene and its future applications
 

Similaire à ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1Brett L. Scott
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaStefano Maccaglia
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxAkashTomar739930
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information SecuritySimoun Ung
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Mohamed N. El-Guindy
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATIONKelli Waxman
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfBenjamin Ang
 
Snarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdfSnarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdfSnarky Security
 

Similaire à ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan (20)

CWFI Presentation Version 1
CWFI   Presentation Version 1CWFI   Presentation Version 1
CWFI Presentation Version 1
 
114-116
114-116114-116
114-116
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
UN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - MaccagliaUN Presentation - 10-17-2018 - Maccaglia
UN Presentation - 10-17-2018 - Maccaglia
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptxCyber_warfare_presentation.pptx
Cyber_warfare_presentation.pptx
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
The Evolving Landscape on Information Security
The Evolving Landscape on Information SecurityThe Evolving Landscape on Information Security
The Evolving Landscape on Information Security
 
Media Pitch
Media PitchMedia Pitch
Media Pitch
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition Cyber Security for Energy & Utilities Special Editorial Edition
Cyber Security for Energy & Utilities Special Editorial Edition
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
FINANCIAL JIHAD PRESENTATION
FINANCIAL JIHAD  PRESENTATIONFINANCIAL JIHAD  PRESENTATION
FINANCIAL JIHAD PRESENTATION
 
Changing Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdfChanging Domains - The Cyber Info Realm 2023.pdf
Changing Domains - The Cyber Info Realm 2023.pdf
 
Snarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdfSnarky Security. Monthly Digest. 2024-04.pdf
Snarky Security. Monthly Digest. 2024-04.pdf
 

Plus de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Dernier

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Dernier (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

ciso-platform-annual-summit-2013-South asia cyber security landscape post snowden hluchan

  • 1. The South Asian Cyber Security Landscape PostSnowden Introduction – Yours truly… • Independent Cyber Security Analyst • Specialization: the cyber security landscapes of the wider Middle East, Central Asia, and Indian Subcontinent • Former staff member at iDefense, Inc., now independent • Longtime professional linguist of Arabic, Turkish, Farsi, Dari, Tajik, Hindi, Urdu, and German • Interest in hacking and computers since childhood… • Research: chronicle evolution of cyber security landscape in Middle East, Subcontinent, and Central Asia, as objectively and neutrally as possible • Better understanding through comparative analysis – especially geopolitical and socio-economic contexts driving these cyber security landscapes!
  • 2. The South Asian Cyber Security Landscape PostSnowden The Edward Snowden revelations of massive scale espionage activities conducted by the US’ NSA and other intelligence agencies continues to have profound effects on the collective cyber security landscape of the entire world. This includes of course the South Asian cyber security landscape…
  • 3. The South Asian Cyber Security Landscape PostSnowden The Snowden revelations seem to be working like a giant catalyst stimulating wider global cyber security arms race… “National internets” in which countries can better enforce their respective laws, controls, and sovereignty in general… Discussion of fully domestic internet infrastructure that ensure transmitted data does not leave respective national borders! Examples: “Internetz” The Iranian “halal internet”… Etc. etc. …
  • 4. The South Asian Cyber Security Landscape PostSnowden A number of countries working on their own internet surveillance programs, much like PRISM… • India working on National Cyber Coordination Centre • Said to target metadata more than actual content, with only metadata of concern or interest flagged for later content analysis • Controversial in India itself; calls for oversight, better privacy laws, etc. likely to intensify Pakistan itself taking similar action -- talk of beefing up PKCERT, put in place cyber security strategy for Pakistan, setting up an interservices cyber command, etc. etc. – the trend continues… Talk of possible treaties between India and Pakistan preventing targeting of nuclear installations, etc. - likely wishful thinking…
  • 5. The South Asian Cyber Security Landscape PostSnowden More “state actor” hacker groups likely to proliferate in South Asia, along the lines of what we already see in the Middle East… Syrian Electronic Army, led by Ali Farha (above) – targeting Viber, Twitter, Tango, Washington Post, Al-Jazeera, any news outlets it perceives as against Bashar Al-Asad…
  • 6. The South Asian Cyber Security Landscape PostSnowden Syria’s closest regional political ally is Iran, with wide-ranging military security cooperation ongoing between both countries… Gen. Ghassem Soleimani’s Quds Brigade (left) currently training Al-Asad military; in 2012, Deutsche Welle publishes claim of Iran Information Ministry cyber security assistance to Syria.
  • 7. The Cyber Security Landscapes of the Middle East and the Indian Subcontinent: A Brief Comparative Analysis Base ingredients for this to happen are already present…
  • 8. The South Asian Cyber Security Landscape PostSnowden Brazil, Russia, India, China, and South Africa (BRICS countries) recently had a meeting in which they expressed their desire to decrease reliance across the board on US sourced internet technology… • Drive for greater technological independence in India long-time part of Indian political discourse! • Huawei! • Snowden revelations likely to accelerate these efforts, though results of these efforts likely not forthcoming overnight… Snowden revelations have indicated that US is targeting China's Tsinghua university, one of China's leading research and development universities… • Snowden revelations confirm not altogether unknown fact: essentially, everybody spying against everybody!
  • 9. The South Asian Cyber Security Landscape PostSnowden Especially post-StuxNet, SCADA attacks have been high on the agenda as goals among Middle Easter hacker Groups! Snowden revelations will definitely accelerate this trend… … but translations of the Hebrew captions revealed nonsense words, strongly suggesting a forgery. The SEA itself soon denied having done the attack in a Twitter release… Headlines ensued in June 2013 that the Syrian Electronic Army had succeeded in breaching a SCADA system at a water and electricity utility station in Haifa, Israel…
  • 10. The South Asian Cyber Security Landscape PostSnowden Conclusions… • Snowden revelations to accelerate global cyber arms race dramatically! • New national cyber espionage programs of various kinds will proliferate all over the world, surprises likely forthcoming… • Commercial companies specializing in cyber espionage likely to proliferate • Some headquartered in countries with lax or nonexistent cyber laws, to safeguard offensive cyber espionage from legal pursuit… • “National” or “indigenous” internets will get fairly significant impetus, especially for ensuring route of data not to cross systems in US or other outside country • Of ancillary importance here: TLDs able to be made using nonEnglish characters • To some limited degree, Balkanization of internet? Debatable, uncertain… • Essentially, cyber IN-security is the new normal.
  • 11. The South Asian Cyber Security Landscape PostSnowden …

Notes de l'éditeur

  1. http://www.dev-point.com/vb/t286148.html