This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Frost & Sullivan. No part of it may be circulated, quoted, copied or otherwise reproduced without the written approval of Frost & Sullivan.
2
Functional Expertise
Experience in market and technology research and consulting
- Primary research, secondary research, analysis, technical write-ups and presentations
- Tracking innovations in the Information and Communication technology domain
- Expertise in technology evaluation, technology roadmaps, analysis
Rich IT consultancy experience, which includes successful implementation of customized ERP solutions. Particular
expertise in:
- Requirement Analysis
- Client Handling
- Business Development
Industry Expertise
Information and Communication Technology:
Cloud Computing Technology, Indoor Positioning Technology, Digital Payments Technology
IT consultancy experience base covering broad range of sectors, leveraging long-standing working relationships
with leading industry participants, Senior Executives in
- Education
- Tourism
- Manufacturing
What I bring to the Team
• Extensive knowledge of IT consultancy
• Strong requirement analysis, analytical and problem solving skills
• Experience in business development and client interaction.
Career Highlights
Prior to joining Frost & Sullivan, was extensively involved in providing IT consultancy services.
Education
� MBA in Information and Systems Management from Jadavpur University, Kolkata, India
� BTech in Computer Science and Engineering from West Bengal University of Technology, Kolkata, India
Debarun Guha Thakurta
Debarun Guha ThakurtaResearch Analyst
Technical Insights
Frost & SullivanGlobalKolkata
Place photo hereShadow Background
for effect
3
Focus Points
Agenda
� Why Cyber Security is Essential?
� Recent Attack Trends
� Key Sectors under Frequent Attack
� Impact of Cyber Attacks on Key Sectors
� Types of Innovations that can Protect against Cyber Attacks
� Cyber Security Roadmap
4
WHY CYBER SECURITY IS ESSENTIAL?
Access
Security
Network
Security
Data
Security
Application
Security
Security of
Autonomous
Systems
National
Security
SectorsTargeted
Lack of User Awareness of
Security
Growth of Internet
Constantly Emerging Attacks
Lack of Threat Information
Sharing
Lack of Skilled Security
Personnel
5
RECENTLY EMERGING ATTACK TYPES
Spear Phishing
BeEF Toolkit
Social Phishing
CryptoLocker
TimThumb Attacks
SEO Poisoning
6
Health Information Insurance Information Medical Devices
With the digitization ofhealth records intoelectronic health records(EHRs), the need to securethem is ever increasing.
Unauthorized access toEHRs could lead toleakage of confidentialfinancial details fromhealth insurancedatabases.
Connected medicaldevices are being used fortransmission of malicioustraffic. Unauthorizedaccess and control couldlead to breach of data andcan also cause harm topatients.
IMPACT OF CYBER ATTACKS ON KEY SECTORS
HEALTHCARE
LOW HIGH LOW HIGH LOW HIGH
7
Communication Networks
Computing Systems Storage Applications and Servers
Disruption ofcommunicationchannels is done byusing advancedattacking methods suchas DDoS, router levelattacks, high energyradio frequency attacksand so on.
Infiltration in the computingsystems by using methodssuch as spoofing, phishing,vishing could result inaccess to securedcomputing systems andnetworks.
Compromised computingsystems and networksprovide a gateway to datastorage systems, whichcould lead to breach ofconfidential data.
Sophisticated attackson servers andapplications by usingDNS and applicationlevel attacks couldlead to disruption ofcritical services.
IMPACT OF CYBER ATTACKS ON KEY SECTORS
INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)
LOW HIGH LOW HIGH LOW HIGH LOW HIGH
8
Communication Channel
Automated Units Supply Chain R&D Data
Attackers often try todisrupt the aerospaceand defensecommunicationchannels aiming toobstruct interaction withbase. In addition, focusis also on gettingaccess to theconversations.
Cyber attackers target togain unauthorized accesson the automated unitsand computers systemssuch as radars in order todisrupt and abuse thesame.
Cyber attacks inaerospace and defensecomputing systems arealso focused at obtainingaccess to the supply chaininformation.
Several nation andorganization sponsoredhacktivists aim to gainaccess to theaerospace and defensedata in order to obtainthe R&D information.Such data areimmensely valuable toknow for rival nationsand enterprises.
IMPACT OF CYBER ATTACKS ON KEY SECTORS
AEROSPACE AND DEFENSE (A&D)
LOW HIGH LOW HIGH LOW HIGH LOW HIGH
9
Data Communication Channels
User Identity User Accounts
Cyber attackers oftentarget at disrupting dataintegrity in the bankingand finance sector. Thismakes it easier for themto make fraudulenttransactions withoutgetting identified.
Disruption ofcommunication channelscan lead to networkoutage, resulting inincomplete or blockedtransactions and datatransfers.
Identity theft is a commonobjective of cyberattackers in this sector.Stolen identities arefrequently used to accessuser accounts and makefraudulent transactions.
Account takeover isincreasing everyday.Malware-, phishing-,and spyware-basedattacks are leveragedby cyber attackers togain access to useraccounts.
IMPACT OF CYBER ATTACKS ON KEY SECTORS
BANKING AND FINANCE
LOW HIGH LOW HIGH LOW HIGH LOW HIGH
10
Power Grids Internet of Things Automated Control Systems
R&D Data
Targeted attacks oncontrol systems ofpower grids can resultin prolonged poweroutages in large areasleading to disruption ofessential services suchas healthcare, food,water, communication,and so on.
While Internet of Things(IoT) promises to connectvarious physical devices, itwidens the attack surface,which can be utilized bycyber attackers to infiltratenetworks.
With the concept ofIndustry 4.0 setting in todevelop smart factorieswith automated intelligentprocesses, the chances ofcyber attacks to disruptthe operations will evolve.Effects could be fatal inenergy and manufacturingsectors.
Cyber espionage is amalicious practice toobtain rich R&D data forthe energy andmanufacturing sectors.
IMPACT OF CYBER ATTACKS ON KEY SECTORS
MANUFACTURING AND ENERGY
LOW HIGH LOW HIGH LOW HIGH LOW HIGH
11
Low High
How it helps?• Identify and block compromised devices
• Control data access using policies
• Block specific malicious applications
• Clear data if device is lost
• Track device location using GPS
Present adoption ratesacross industries
Innovation Themes
BYOD security is high on demand with innovations in the areas of:� Comprehensive BYOD Management� Mobile Application Management� Mobile Data Management� Mobile Device Management
Innovations and InnovatorsInnovations and Innovators
Technology Capability
� Device Behavior Monitoring
� Network Access Monitoring
� Application Behavior Monitoring
� Data Access Protection
� Remote Device Monitoring andControl
� AirWatch (VMware)
� McAfee EMM
� MobileIron EMM
� Citrix XenMobile
� IBM MaaS360 MDM
� Symantec Mobile Management
� BlackBerry BES10
� CA technologies MDM
� AirWatch (VMware)
� McAfee EMM
� MobileIron EMM
� Citrix XenMobile
� IBM MaaS360 MDM
� Symantec Mobile Management
� BlackBerry BES10
� CA technologies MDM
INNOVATIONS ENABLING CYBER SECURITY
DEVICE SECURITY
12
Low High
How it helps?
• Protection against Denial of Service (DoS), Distributed Denial of Service(DDoS)
• Network Vulnerability Assessment
• Protection against DNS attacks
• Intrusion detection and prevention
Present adoption rateacross industries
Innovation Themes
In addition to traditional anti-virus and anti-malware solutions, target specific networksecurity solutions are high on demand:� Flexible DNS Security Appliance� LTE Small Cell Security� Secure Gateways� Intrusion Detection Systems� Next Generation Firewalls
Innovations and InnovatorsInnovations and Innovators
Technology Capability
� Access Protection
� Network Traffic Behavior Analysis
� Predictive Threat Analysis
� Machine Learning
� Skybox Vulnerability Control (Skybox Security)
� LTE Small Cell Security (Clavister AB)
� Barracuda Firewall (Barracuda Networks)
� Perception (Chemring Group PLC)
� Infoblox 4030 DNS Caching Appliance (Infoblox)
� Core Insight 3.0 (Core SDI Inc.)
� Arbor Cloud (Arbor Networks Inc.)
� Skybox Vulnerability Control (Skybox Security)
� LTE Small Cell Security (Clavister AB)
� Barracuda Firewall (Barracuda Networks)
� Perception (Chemring Group PLC)
� Infoblox 4030 DNS Caching Appliance (Infoblox)
� Core Insight 3.0 (Core SDI Inc.)
� Arbor Cloud (Arbor Networks Inc.)
INNOVATIONS ENABLING CYBER SECURITY
NETWORK SECURITY
13
Low High
How it helps?
• Cost effective less complex cloud based security
• Secured application execution environment
• Advanced data security
• Data integrity
Present adoption rateacross industries
Innovation Themes
� Cloud Security� Big Data Security� Security-as-a-Service� Advanced Encryption and Key Management� Internet of Things� E-mail, Application, Data, Access security
Innovations and InnovatorsInnovations and Innovators