SlideShare une entreprise Scribd logo
1  sur  21
Cyber Fraud and Security
WHAT RISKS DOES FAMILY OFFICE'S FACE IN
TODAY'S WORLD?
Kannan Subbiah
Chief Technology Officer
MF Utilities India Pvt Ltd
1
About MF Utilities
2
 Transaction Aggregation System
 Ease and convenience of transacting
 SEBI Regulated
 Equally owned by the Asset Management Companies
 Free for all
 Check www.mfuindia.com for more details
Setting the Stage
“We thought that data was the new Oil …
… but it turns out it is the new Asbestos”
3
Mobile Devices
MOBILE, the new Cyber Crime Target
Percent of overall fraud originating
from a mobile device
Percent of transaction volume
originating from a mobile device
4
What’s Happening?
5
Cyber Threat Map
6
Source:
https://www.fireeye.com/cyber-
map/threat-map.html
Small is not Safe
7
Small is Not Safe
85%
50%
Vast majority of small
businesses lack a formal
Internet security policy for
employees, and only about half
have even rudimentary
cybersecurity measures in place
Despite significant
cybersecurity exposures, 85
percent of small business
owners believe their
company is safe from
hackers.
8
Some of the Small Business Stats
 28 million small business owners have no confidence in their
security
 1 in 5 small businesses reported a cyber attack
 63% of small businesses have been victims of cyber attacks in the
last 12 months
 Average cost of a breach for small to mid-sized businesses was
over $180,000
 40 percent of attacks are against organizations with fewer than
500 employees.
9
Where are We Heading to …
Data
Things Systems
People
11
Machine Intelligence
12
Privacy & Security
13
Privacy Security
Data
Safeguards
Awareness
& Training
Compliance
Notice & Choice
Collection Limitation
Use Limitation
Purpose
Specification
Accountability
Access to Data
Confidentiality
Integrity
Availability
Reliability
Authorization
Authentication
Access Control
Compliance under Indian IT Act
 Body Corporate includes Firms and Individuals
 Information Privacy
 Grievance Officer
 Reasonable Security Practices
 Maintenance of audit logs and trails
 Punishment – upto 3 years of Imprisonment or fine up to
5 Lakhs or both.
14
Risks For Small Office
 Reputation / Brand damage
 Loss of customer trust and in turn revenue loss
 Cyber extortion / Ransomware
 Network / System disruption
 Regulatory Compliance Liability
 Investigation, Fine and Remediation Costs
 Risk of business closure
15
The Myths
 Investment in sophisticated tools
 Third Party provides a managed security services
 Protect Internet Facing Applications alone
 Never been attacked
 It’s the Responsibility of IT
 Too Small to experience a breach
16
Stronger Authentication
18
Patch Regularly
19
Avoid Phishing Attacks
20
Have the Basics Right
 Install / Implement and Activate the Firewalls
 Use a reliable end point protection software
 Have a back up plan
 Collaborate with Friends & Peers on Cyber Risk /
Security
21
Other Precautions
 Be careful in sharing your personal data
 Control Physical and Logical access to IT Assets
 Maintain, Monitor & Review Logs
 Educate your employees
 Know about and be Compliant with Laws and Regulations
 Assess, Audit and Patch the security gaps periodically
 Use tools to stay vigilant and proactively monitor the cyber incidents
 Use Cyber Insurance
22
Thank You
? 23
Be Agile & Resilient

Contenu connexe

Tendances

Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataOptimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataAbsolutdata Analytics
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Lovejadams6
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation managementIBM Analytics
 
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .jadams6
 
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...DATUM LLC
 
Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Managementjadams6
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianDoreen Christian
 
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareThe, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareProfisee
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeGuy Pearce
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?CSpring
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance ProgramSteve Sugulas
 
Does data quality matter? View from the business
Does data quality matter? View from the businessDoes data quality matter? View from the business
Does data quality matter? View from the businessHanson Wade
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016bfreeman1987
 
Data governance
Data governanceData governance
Data governanceMD Redaan
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0KirSinc
 

Tendances (20)

Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, AbsolutdataOptimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
Optimization as a Golden Layer - Chris Diener, SVP Analytics, Absolutdata
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
 
4 common headaches with sales compensation management
4 common headaches with sales compensation management4 common headaches with sales compensation management
4 common headaches with sales compensation management
 
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
A Lawyer, a Salesperson and the Operations Guy Walk into a Bar . . .
 
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...DGIQ 2018 Presentation:  A Lawyer, a Salesperson and the Operations Guy Walk ...
DGIQ 2018 Presentation: A Lawyer, a Salesperson and the Operations Guy Walk ...
 
Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Management
 
Data Governance Overview - Doreen Christian
Data Governance Overview - Doreen ChristianData Governance Overview - Doreen Christian
Data Governance Overview - Doreen Christian
 
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation SlideshareThe, What, Why, & How of MDM in Digital Business Transformation Slideshare
The, What, Why, & How of MDM in Digital Business Transformation Slideshare
 
Big data governance as a corporate governance imperative
Big data governance as a corporate governance imperativeBig data governance as a corporate governance imperative
Big data governance as a corporate governance imperative
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance Program
 
Does data quality matter? View from the business
Does data quality matter? View from the businessDoes data quality matter? View from the business
Does data quality matter? View from the business
 
Legal Entity Risk and Counter-Party Exposure April 2016
Legal Entity Risk and Counter-Party Exposure  April 2016Legal Entity Risk and Counter-Party Exposure  April 2016
Legal Entity Risk and Counter-Party Exposure April 2016
 
Why data governance is the new buzz?
Why data governance is the new buzz?Why data governance is the new buzz?
Why data governance is the new buzz?
 
Data governance
Data governanceData governance
Data governance
 
GRC Fundamentals
GRC FundamentalsGRC Fundamentals
GRC Fundamentals
 
Data Quality+Security
Data Quality+SecurityData Quality+Security
Data Quality+Security
 
SDM Presentation V1.0
SDM Presentation V1.0SDM Presentation V1.0
SDM Presentation V1.0
 
Article in Techsmart
Article in TechsmartArticle in Techsmart
Article in Techsmart
 

Similaire à Cyber Fraud Risks Family Offices Face

Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...TheEntrepreneurRevie
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...IBM Security
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail SecurityIBM Software India
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Vaultastic
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM Security
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyIBM Security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...IBM Security
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareSarah Freemantle
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 

Similaire à Cyber Fraud Risks Family Offices Face (20)

Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...The Need for Internet Security for Small Businesses - 10 Best Practices | The...
The Need for Internet Security for Small Businesses - 10 Best Practices | The...
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
The challenges of Retail Security
The challenges of Retail SecurityThe challenges of Retail Security
The challenges of Retail Security
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
The 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach StudyThe 2016 Ponemon Cost of a Data Breach Study
The 2016 Ponemon Cost of a Data Breach Study
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 

Plus de Kannan Subbiah

Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer lookKannan Subbiah
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalizationKannan Subbiah
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An OverviewKannan Subbiah
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalKannan Subbiah
 

Plus de Kannan Subbiah (7)

Disruptive Technologies – a closer look
Disruptive Technologies – a closer lookDisruptive Technologies – a closer look
Disruptive Technologies – a closer look
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Globalization & internationalization
Globalization & internationalizationGlobalization & internationalization
Globalization & internationalization
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
EAI Best Practices
EAI Best PracticesEAI Best Practices
EAI Best Practices
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Social Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils FinalSocial Computing – The Promise And The Perils Final
Social Computing – The Promise And The Perils Final
 

Dernier

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Dernier (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

Cyber Fraud Risks Family Offices Face

  • 1. Cyber Fraud and Security WHAT RISKS DOES FAMILY OFFICE'S FACE IN TODAY'S WORLD? Kannan Subbiah Chief Technology Officer MF Utilities India Pvt Ltd 1
  • 2. About MF Utilities 2  Transaction Aggregation System  Ease and convenience of transacting  SEBI Regulated  Equally owned by the Asset Management Companies  Free for all  Check www.mfuindia.com for more details
  • 3. Setting the Stage “We thought that data was the new Oil … … but it turns out it is the new Asbestos” 3
  • 4. Mobile Devices MOBILE, the new Cyber Crime Target Percent of overall fraud originating from a mobile device Percent of transaction volume originating from a mobile device 4
  • 7. Small is not Safe 7
  • 8. Small is Not Safe 85% 50% Vast majority of small businesses lack a formal Internet security policy for employees, and only about half have even rudimentary cybersecurity measures in place Despite significant cybersecurity exposures, 85 percent of small business owners believe their company is safe from hackers. 8
  • 9. Some of the Small Business Stats  28 million small business owners have no confidence in their security  1 in 5 small businesses reported a cyber attack  63% of small businesses have been victims of cyber attacks in the last 12 months  Average cost of a breach for small to mid-sized businesses was over $180,000  40 percent of attacks are against organizations with fewer than 500 employees. 9
  • 10. Where are We Heading to … Data Things Systems People 11
  • 12. Privacy & Security 13 Privacy Security Data Safeguards Awareness & Training Compliance Notice & Choice Collection Limitation Use Limitation Purpose Specification Accountability Access to Data Confidentiality Integrity Availability Reliability Authorization Authentication Access Control
  • 13. Compliance under Indian IT Act  Body Corporate includes Firms and Individuals  Information Privacy  Grievance Officer  Reasonable Security Practices  Maintenance of audit logs and trails  Punishment – upto 3 years of Imprisonment or fine up to 5 Lakhs or both. 14
  • 14. Risks For Small Office  Reputation / Brand damage  Loss of customer trust and in turn revenue loss  Cyber extortion / Ransomware  Network / System disruption  Regulatory Compliance Liability  Investigation, Fine and Remediation Costs  Risk of business closure 15
  • 15. The Myths  Investment in sophisticated tools  Third Party provides a managed security services  Protect Internet Facing Applications alone  Never been attacked  It’s the Responsibility of IT  Too Small to experience a breach 16
  • 19. Have the Basics Right  Install / Implement and Activate the Firewalls  Use a reliable end point protection software  Have a back up plan  Collaborate with Friends & Peers on Cyber Risk / Security 21
  • 20. Other Precautions  Be careful in sharing your personal data  Control Physical and Logical access to IT Assets  Maintain, Monitor & Review Logs  Educate your employees  Know about and be Compliant with Laws and Regulations  Assess, Audit and Patch the security gaps periodically  Use tools to stay vigilant and proactively monitor the cyber incidents  Use Cyber Insurance 22
  • 21. Thank You ? 23 Be Agile & Resilient

Notes de l'éditeur

  1. Questions: Website / Portal Networked computers / laptops Security measures in place Traditional Crimes  Cyber Crimes Digital Business  dependency on Security Effective Cyber Security  success or failure of business
  2. Data – decision making Traditional vs. digital Technology - big data First Computer – early 1990s ₹ 10k for 4 MB RAM With Technology, Data as Asset  Data as Oil  Data as Asbestos Technology helps Hackers as well  Hackers are always ahead Data Breach – Jio Legislations – Legal actions
  3. Source: RSA Global Fraud Forecast – 2017 How many of you present here had seen the mobile phone of late 1990s? My first mobile Mobile Phone is not just a phone any more. Story - Location sharing
  4. Source: RSA Global Fraud Forecast - 2017 Motivation for Hackers – not just financial gain
  5. Being Small  Advantage for Hackers
  6. Tendency to defer cyber security investments. Path of least resistance
  7. NCRB Report 2016 In January and February 2017 alone, 39 government websites were hacked, which led the government to set up an expert group to combat cyber crime. 11,592 cases of cyber crime were registered in India, leading to 8,121 arrests. Operational systems apparently are most vulnerable to cyber attacks, as many are built around legacy technologies with weaker protocols that are inherently more vulnerable.
  8. By 2020, 50 billion smart devices Fridge, TV, Amazon Dash Do we want to go back?
  9. Robotics
  10. Privacy shall be the choice of your clients / users. To enable them to make the choice you should tell them as to why you need the data, what all you will be doing with that data, who will have access to this data, etc. This is where a well drafted Privacy Policy is essential for every organization and the same shall be accessible for them.
  11. Compliance as an organization using IT Punishment for other crimes
  12. Consequences - embarrassing to life-threatening Misuse of your IT assets by your employees – or even friends and neighbours Mobile – Your Identity A combination of these risks might lead to closure of business
  13. 25% small business have mistaken beliefs Threat is real – question is when Continuous thing Cyber Threat is Risk Issue than IT Issue
  14. 2FA, Passphrase Security Vs. User Experience NIST’s recent recommendation on Password No more periodic password changes.  No more imposed password complexity  Mandatory validation of newly created passwords 
  15. Vulnerabilities malware
  16. Example of Phishing Credit card – hacker database Social Engineering
  17. With the pace at which the technology is evolving and the pace at which the hackers and fraudsters change their tactics, there cannot be a single plan that will just work for ever. The defense should be agile and resilient, being able to discover and react to such newer threats.