SlideShare une entreprise Scribd logo
1  sur  14
K J Somaiya Institute of Management, India
CEPAR 9th Annual International
Conference
Cyber Security –Need of the hour
Nanda Mohan Shenoy
Feb 4th 2023
1
K J Somaiya Institute of Management, India
Cyber-The Top Technological Risk
2
K J Somaiya Institute of Management, India 3
578 ransomware
attacks each
minute.
55260 username
and password
attacks
One Minute Impact
K J Somaiya Institute of Management, India
Davos-2023
4
K J Somaiya Institute of Management, India
Russia China North
Korea
Cyber Warfare
5
K J Somaiya Institute of Management, India
India Story
6
K J Somaiya Institute of Management, India 7
India Story
7
K J Somaiya Institute of Management, India 8
2021
52,974 incidents of cyber crimes in 2021
Cyber Crime Statistics
8
K J Somaiya Institute of Management, India
The Secretary, Ministry of Electronics and Information Technology
(MeitY), Shri Alkesh Kumar Sharma inaugurated the G20 Cyber Security
Exercise and Drill for more than 400 domestic and international
participants under India’s G20 presidency, here yesterday.
The Indian Computer Emergency Response Team (CERT-In) conducted this
Cyber Security Exercise and drill in hybrid mode (Physical and Virtual)
where international participants from more than 12 countries joined
through online mode while domestic participants from diverse sectors such
as Finance, Education, Telecom, Ports & Shipping, Energy, IT/ITeS and
others attended in-person as well as in virtual mode.
International Co-operation
9
K J Somaiya Institute of Management, India
Protection
10
K J Somaiya Institute of Management, India
क्लिक कर
11
Fundamental Principle
11
K J Somaiya Institute of Management, India
https://cybercrime.gov.in/
“Since the inception of Citizen
Financial Cyber Fraud Reporting and
Management System, more than 6
lakh complaints have been registered
till December 12, 2022, and in more
than 1.11 lakh complaints so far, the
financial amount of more than Rs188
crore have been saved,” Teni said in
a written reply to BJP MPs Tejasvi
Surya and Pratap Simha.
CFCRM
12
K J Somaiya Institute of Management, India
▪ What is wonder?
▪ Day after day countless people
die. Yet the living wish to live
forever. O Lord, what can be a
greater wonder
▪ Day after day countless cyber
attacks happen . Yet the Top
Management thinks that their
organisation will not be
attacked. O Lord, what can be a
greater wonder than this
Conclusion
13
13
K J Somaiya Institute of Management, India
Thank You
simsr.somaiya.edu
14

Contenu connexe

Similaire à CEPAR Conference _20230204.pdf

Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital Indiajournal ijrtem
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingIAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityIAEME Publication
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative sadique_ghitm
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking Systempaperpublications3
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in indiaGyan Research And Analytics
 
Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016Rajiv Bajaj
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportRaghav Bisht
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data securityAshish Jhalani
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 

Similaire à CEPAR Conference _20230204.pdf (20)

Security Analysis in Digital India
Security Analysis in Digital IndiaSecurity Analysis in Digital India
Security Analysis in Digital India
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Fee management system
Fee management systemFee management system
Fee management system
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arisingProtective measures in e commerce to deal with security threats arising
Protective measures in e commerce to deal with security threats arising
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Protective measures in e commerce to deal with security
Protective measures in e commerce to deal with securityProtective measures in e commerce to deal with security
Protective measures in e commerce to deal with security
 
Digital India Initiative
Digital India Initiative Digital India Initiative
Digital India Initiative
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
FICCI-talk
FICCI-talkFICCI-talk
FICCI-talk
 
Latest technology news
Latest technology newsLatest technology news
Latest technology news
 
Varindia var india
Varindia var indiaVarindia var india
Varindia var india
 
Safety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking SystemSafety Mechanism of Cyber Crime in Indian Banking System
Safety Mechanism of Cyber Crime in Indian Banking System
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Synopsis & toc sectoral capsule on cyber security market in india
Synopsis & toc  sectoral capsule on cyber security market in indiaSynopsis & toc  sectoral capsule on cyber security market in india
Synopsis & toc sectoral capsule on cyber security market in india
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016Newsletter dated 08th October, 2016
Newsletter dated 08th October, 2016
 
Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 

Plus de Nanda Mohan Shenoy (20)

Srimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdfSrimadbhagavata_parayanam_v3.pdf
Srimadbhagavata_parayanam_v3.pdf
 
D07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdfD07_SVCMahatmyam_v1.pdf
D07_SVCMahatmyam_v1.pdf
 
D06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdfD06_SVCMahatmyam_v1.pdf
D06_SVCMahatmyam_v1.pdf
 
D05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdfD05_SVCMahatmyam_v1.pdf
D05_SVCMahatmyam_v1.pdf
 
D04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdfD04_SVCMahatmyam_v1.pdf
D04_SVCMahatmyam_v1.pdf
 
D03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdfD03_SVCMahatmyam_v1.pdf
D03_SVCMahatmyam_v1.pdf
 
D02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdfD02_SVCMahatmyam_v1.pdf
D02_SVCMahatmyam_v1.pdf
 
D01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdfD01_SVCMahatmyam_v1.pdf
D01_SVCMahatmyam_v1.pdf
 
09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf09_Sundara Kandam_v3.pdf
09_Sundara Kandam_v3.pdf
 
08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf08_Sundara Kandam_v3.pdf
08_Sundara Kandam_v3.pdf
 
07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf07_Sundara Kandam_v3.pdf
07_Sundara Kandam_v3.pdf
 
06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf06_Sundara Kandam_v3.pdf
06_Sundara Kandam_v3.pdf
 
05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf05_Sundara Kandam_v3.pdf
05_Sundara Kandam_v3.pdf
 
04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx04_Sundara Kandam_v3.pptx
04_Sundara Kandam_v3.pptx
 
03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf03_Sundara Kandam-v3.pdf
03_Sundara Kandam-v3.pdf
 
02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf02_Sundara Kandam_v3.pdf
02_Sundara Kandam_v3.pdf
 
01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf01_Sundara Kandam_v3.pdf
01_Sundara Kandam_v3.pdf
 
Digitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedbackDigitial Personal Data Bill 2022 feedback
Digitial Personal Data Bill 2022 feedback
 
IS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptxIS17428_ISACA_Chennai_20220910.pptx
IS17428_ISACA_Chennai_20220910.pptx
 
F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6F 32-Mukundamala- Part-6
F 32-Mukundamala- Part-6
 

Dernier

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxDavid Michel
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 

Dernier (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

CEPAR Conference _20230204.pdf

  • 1. K J Somaiya Institute of Management, India CEPAR 9th Annual International Conference Cyber Security –Need of the hour Nanda Mohan Shenoy Feb 4th 2023 1
  • 2. K J Somaiya Institute of Management, India Cyber-The Top Technological Risk 2
  • 3. K J Somaiya Institute of Management, India 3 578 ransomware attacks each minute. 55260 username and password attacks One Minute Impact
  • 4. K J Somaiya Institute of Management, India Davos-2023 4
  • 5. K J Somaiya Institute of Management, India Russia China North Korea Cyber Warfare 5
  • 6. K J Somaiya Institute of Management, India India Story 6
  • 7. K J Somaiya Institute of Management, India 7 India Story 7
  • 8. K J Somaiya Institute of Management, India 8 2021 52,974 incidents of cyber crimes in 2021 Cyber Crime Statistics 8
  • 9. K J Somaiya Institute of Management, India The Secretary, Ministry of Electronics and Information Technology (MeitY), Shri Alkesh Kumar Sharma inaugurated the G20 Cyber Security Exercise and Drill for more than 400 domestic and international participants under India’s G20 presidency, here yesterday. The Indian Computer Emergency Response Team (CERT-In) conducted this Cyber Security Exercise and drill in hybrid mode (Physical and Virtual) where international participants from more than 12 countries joined through online mode while domestic participants from diverse sectors such as Finance, Education, Telecom, Ports & Shipping, Energy, IT/ITeS and others attended in-person as well as in virtual mode. International Co-operation 9
  • 10. K J Somaiya Institute of Management, India Protection 10
  • 11. K J Somaiya Institute of Management, India क्लिक कर 11 Fundamental Principle 11
  • 12. K J Somaiya Institute of Management, India https://cybercrime.gov.in/ “Since the inception of Citizen Financial Cyber Fraud Reporting and Management System, more than 6 lakh complaints have been registered till December 12, 2022, and in more than 1.11 lakh complaints so far, the financial amount of more than Rs188 crore have been saved,” Teni said in a written reply to BJP MPs Tejasvi Surya and Pratap Simha. CFCRM 12
  • 13. K J Somaiya Institute of Management, India ▪ What is wonder? ▪ Day after day countless people die. Yet the living wish to live forever. O Lord, what can be a greater wonder ▪ Day after day countless cyber attacks happen . Yet the Top Management thinks that their organisation will not be attacked. O Lord, what can be a greater wonder than this Conclusion 13 13
  • 14. K J Somaiya Institute of Management, India Thank You simsr.somaiya.edu 14