Challanges for Cybersecurity
https://www.linkedin.com/pulse/idea-4-part-one-challenges-cybersecurity-reuben-dreiblatt/?trackingId=8%2BR40z9qRNKek6btFxA5SA%3D%3D
December 26, 2019
The features and techniques of Cybersecurity are continuously improving and becoming more complex as white-hat hackers try to keep up with black-hat hackers and vice versa. The power of the internet is changing the Cybersecurity landscape and we will start to see the effects of that rapid acceleration this decade. Here are some guiding questions and predictions to consider.
See publication
Tags: Cybersecurity, Privacy, Risk Management
Will Blockchain Replace Banks?
CPO Magazine
November 06, 2019
Is that the end of world for Banks or banks will be constrained to use Tokenized Cheques and Decentralized Ledger? And if yes, whether this transition will be easier for Banks or Banks will feel disoriented.
See publication
Tags: Blockchain, Business Strategy, Cybersecurity
Will the Self-Securing Cloud Replace Security Professionals?
CPO Innovation
October 17, 2019
With these innovations whether self-securing clouds could replace security professionals? I do not think so but this will certainly transform the security professional in a very big way and they will have to change.
See publication
Tags: Blockchain, Cloud, Cybersecurity
How cyberthieves found blockchain’s weak link
https://www.bai.org/
July 03, 2019
How cyberthieves found blockchain’s weak link
See publication
Tags: Blockchain, Customer Experience, Cybersecurity
Are Human necessary to Cyber Threat Intelligence?
https://www.csoforum.in
January 10, 2019
Given the increasing financial and reputational costs of breaches, an organization can no longer overlook human aspect of Cyber Intelligence
See publication
Tags: AI, Blockchain, Cybersecurity
Why Cyber-attacks can cause next Financial Crisis?
linkedin
September 15, 2018
Reported cyber-attacks against financial services rose by 80-90% in the last year and growing further at an exponential rate. A major cyber-attack can cause substantial damage to financial ecosystem. Assume If ATM networks across the nations are infected, online banking systems are inaccessible, Payment systems are frozen and if this results into ‘no cash and no payments’, then the banking system and economy will be broken and there will be panic and chaos across.
See publication
Tags: Analytics, Cybersecurity, Digital Transformation, FinTech
Will Blockchain replace Banks?
linkedin
September 05, 2018
Blockchain is today most discussed technology and will remain so for more time. Crypto Society most often criticize banks for being over centralized and many times being overpriced and monopolistic. In contrast Blockchain can be a viable option as it is decentralized and a cost effective solution.
See publication
Tags: Blockchain, Cryptocurrency, Cybersecurity, FinTech
Can Blockchain Fight Hackers?
linkedin
July 03, 2018
The very high level of dependence on the technology and rising influence of internet on technology today has resulted in innovative business models for enterprises, but with this ascends new fissures and thus opportunities for hackers to exploit even more.
See publication
Tags: Blockchain, Cybersecurity
Are Employees still at the root of most cyber breaches?
Linkedin
December 17, 2017
The biggest strength for company is their Human Capital and it is usually seen that most of their employee at least once did something that could have left their company at cyber risk. It is commonly seen that when it comes to transferring and storing of data, dealing with user credentials, backup of files employees prioritize personal convenience over security protocols.
See publication
Tags: Blockchain, Cybersecurity, Digital Transformation
Is wannacry attack over?
https://www.linkedin.com/pulse/wannacry-attack-over-ratan-jyoti/
May 15, 2017
“Is the game over?” in the battle between cyber terrorists and security professionals. Answer is not ‘YES’. Microsoft has just said that the wannacry attack is a wake-up call for the IT industry, governments & organizations and warned not to stockpile knowledge of software vulnerabilities which can be exploited in even worst forms.
See publication
Tags: Cybersecurity, Privacy, Risk Management
Is true Privacy online viable?
https://www.linkedin.com/pulse/true-privacy-online-viable-ratan-jyoti/
February 25, 2017
Digital Life is all about staying connected, but have you ever imagined how much your private information is at risk? Do you think, your privacy is preserved when you go online or stay connected? If ‘yes’, probably you are perhaps wrong. Your browsing pattern and preferences may be collected by Government agencies, advertisers and sometimes even by people with malicious intent.
See publication
Tags: Customer Experience, Cybersecurity, Privacy
https://www.linkedin.com/pulse/riot-right-your-iot-devices-ratan-jyoti/
https://www.linkedin.com/pulse/riot-right-your-iot-devices-ratan-jyoti/
February 12, 2017
The Internet of Things (IoT) is a pool of diverse and varied types of devices. These devices ranges from small Micro controller units to a more capable high end processors and hence traditional Operating Systems (OS) does not suite them and they require special Operating systems to support their varied needs. Such Operating Systems should also require minimal resources and be light weighted. RIOT OS is one such Operating System which has real-time capabilities, and needs only a minimum of 1.5 kB of RAM and 5 KB of ROM.
See publication
Tags: Cybersecurity, Emerging Technology, Privacy
Big Data - Big Security
https://www.linkedin.com/pulse/big-data-analytics-security-ratan-jyoti/
February 05, 2017
Big Data Analytics is and can be most effective fortifications against cyber intrusions. Accurate, speedy and effective information can help us in lessening of critical time from detection to remediation and thus proactively defend and protect your information and infrastructure.
See publication
Tags: Big Data, Cybersecurity, Privacy
10 Ransomware trends to watch for in 2017
https://www.linkedin.com/pulse/10-ransomware-trends-watch-2017-ratan-jyoti/
January 29, 2017
10 Ransomware trends to watch for in 2017
See publication
Tags: AI, Cybersecurity, Privacy
Cyber Security – is machine the answer?
https://www.linkedin.com/pulse/cyber-security-machine-answer-ratan-jyoti/
January 14, 2017
Artificial Intelligence has already been part of many security solutions today. Is Artificial Intelligence ready to replace humans and all other security solutions? Answer to this question will tell if machine learning will detect advance breaches with utmost accuracy. IT environment today has become very complex and huge and complex data sets are being generated. Is the hidden malicious pattern can be uncovered without too many false positive?
See publication
Tags: AI, Cybersecurity, Privacy
Banking on Thin
https://www.linkedin.com/pulse/banking-thin-ratan-jyoti/
January 08, 2017
Banking means ‘Confidentiality and Integrity’ which has to be preserved all the time. Banking requires access to banking applications which is mainly carried out using thick clients which are mostly desktops and sometimes laptops. The fat computer or the thick client are always attractive from the user standpoint but has its own risk. Alternative is thin client which helps in centralized processing and increased efficiency. Thin Client works as part of a network, with the client acting as an interface and the network server undertaking centralized processing of data and controlling the clients which helps in efficient management and can also protect from the use of unauthorized software or malicious agents.
See publication
Tags: AI, Cybersecurity, Privacy
10 things to evaluate while selecting Web Application Firewalls (WAFs)
https://www.linkedin.com/pulse/10-things-evaluate-while-selecting-web-application-firewalls-jyoti/
June 15, 2016
10 things to evaluate while selecting Web Application Firewalls (WAFs)
See publication
Tags: AI, Cybersecurity, Privacy
Integrating BCP with InfoSec Program – Simple two ways
https://www.linkedin.com/pulse/integrating-bcp-infosec-program-simple-two-steps-ratan-jyoti/
June 02, 2016
Integrating BCP with InfoSec Program – Simple two ways
See publication
Tags: Cybersecurity, Leadership, Privacy
Automated Incident Response System (AIRS)
https://www.linkedin.com/pulse/automated-incident-response-system-airs-ratan-jyoti/
April 09, 2015
In Cyber security Management System, an event like cyber-attack needs to be investigated to find out the remedial measures. The investigation process requires:
Time depending upon complexity of the attack
Skilled Man Power to carry out the investigation and remediation
See publication
Tags: Analytics, Cybersecurity, Predictive Analytics
Insider Threat & Profiling Analytics
https://www.linkedin.com/pulse/insider-threat-profiling-analytics-ratan-jyoti/
April 06, 2015
External cyber thefts and attacks are not always the biggest threats, many a times enemy within can be a bigger risk. This enemy within is none other than some of our most valuable assets – our employee.
Placing the sophisticated Firewalls, IDS/IPS to get protection from outside attack is very important but what is equally important is a mechanism to profile the digital activities of employee to make the security resilient. Profiling Analytics can predict the possible data theft early.
See publication
Tags: Analytics, Cybersecurity, Leadership
Privacy Impact Analysis – a Risk Management Tool
https://www.linkedin.com/pulse/privacy-impact-analysis-risk-management-tool-ratan-jyoti/
April 01, 2015
Privacy Impact Analysis is the Risk Management tool which helps Privacy implementer to identify, assess and respond to the risk related to the Privacy in any information system or organization. PIA can be carried out for IT as well as Non IT system.
Privacy Preservation necessarily means the process of identification, detection and mitigation by suitably handling the Personal Identifiable Information (PII). Safeguarding the PII evaluated through a chain of process is the basic aim of Privacy Impact Analysis (PIA).
See publication
Tags: Cybersecurity, Privacy, Risk Management
Insider Threats & Options available
https://www.linkedin.com/pulse/insider-threats-options-available-ratan-jyoti/
January 19, 2015
Employees are pivotal in enterprise information security management. The way they use the IT System is key to the enterprise information security. Theoretically any threat originated from within the organization is an insider threat.
Who can be the source of insider threat?
See publication
Tags: Cybersecurity, Predictive Analytics, Privacy
Do Cyber crimes continue to be costly?
https://www.linkedin.com/pulse/do-cyber-crimes-continue-costly-ratan-jyoti/
January 12, 2015
Many institutions tend to invest less in cyber security as they take a chance for being attacked against spending to prevent the cyber-attacks. Many things that cannot be calculated in this cost benefits analysis are:
opportunity costs
trust reduction for company’s online services
reputational damage
See publication
Tags: Analytics, Cybersecurity, Privacy
Computing Everywhere and Security
https://www.linkedin.com/pulse/computing-everywhere-security-ratan-jyoti/
January 06, 2015
The new era is said to be the era of Computing Everywhere wherein the mobile and smartphone technology will further advance where traditional and new generation devices and screens will seamlessly be interconnected. The contents on all interconnected traditional devices and smart devices will be managed without much efforts of the users. Technology like Google Glass indicates what would be the shape of the next generation smart devices. Intelligent screens in multiple forms and shapes will replace the current day screens. The capability of interconnection of intelligent screens and smart devices can just be imagined which will provide a supreme user experience. These devices and screens will work without fatigue and with much faster speed as compared to all modern day devices. The capabilities and intelligence of such system can only be imagined at present. Integration of varied vendor products and platforms should also be possible.
See publication
Tags: Analytics, Cybersecurity, Leadership
Are smart devices threatening your privacy?
https://www.linkedin.com/pulse/smart-devices-threatening-your-privacy-ratan-jyoti/
January 22, 2007
s your smart device spying on you? Does your smartphone track your whereabouts? Can your mobile service provider access all your confidential information that you have stored on your mobile device? Whether Siri knows many things about you? Is Google Maps tracking your location? Are your apps eavesdropping your conversations?
See publication
Tags: Cybersecurity, IoT, Privacy
Infosec Maestro Award 2019
Infosec Maestro Award 2019
November 22, 2019
Infosec Maestro Award 2019
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Champion CISO Award 2018
Champion CISO Award 2018
February 20, 2019
Champion CISO Award 2018
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Top Influencer 2018
Top Influencer 2018
February 20, 2019
Top Influencer 2018
See publication
Tags: Blockchain, Cybersecurity, Risk Management
CSO 100 Award 2018
CSO 100 Award 100
January 09, 2019
CSO 100 Award 2018
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Infosec Maestro Award 2018
Infosec Maestro Award 2018
January 01, 2019
Infosec Maestro Award 2018
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Infosec Maestro Award 2017
Infosec Maestro Award 2017
January 01, 2018
Infosec Maestro Award 2017
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Top 7 CISO Award
Top 7 CISO Award
February 20, 2017
Top 7 CISO Award
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Top Influencer 2017
Top Influencer 2017
February 20, 2017
Top Influencer 2017
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Infosec Maestro Award 2016
Infosec Maestro Award 2016
January 01, 2017
Infosec Maestro Award 2016
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Infosec Maestro Award 2015
Infosec Maestro Award 2015
January 01, 2016
Infosec Maestro Award 2015
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Rise of the DPO in wake of India’s Data Protection Bill
https://www.csoonline.com/article/3513459/rise-of-the-dpo-in-wake-of-india-s-data-protection-bill.html
January 10, 2020
In today’s cyber world data is the focal point and appointing a dedicated Data Protection Officer will help not just in protecting the data but it will facilitate efficient use of data and the better customer service leading to organizational growth.
See publication
Tags: Cybersecurity, Privacy, Risk Management
Keep Your Data Secure On and Off the Cloud: Defense In-Depth
https://blogs.oracle.com/cloudsecurity/keep-your-data-secure-on-and-off-the-cloud-defense-in-depth
October 28, 2019
In our recent Cloud Threat Report, we asked respondents how concerned they were with 13 different types of threats over the next 12 months. All 13 different types of attacks had at least half of all respondents highly concerned. That shows that external threats are highly varied, damaging, and keeping security experts awake at night.”
See publication
Tags: Cloud, Cybersecurity, Risk Management
https://www.bankinfosecurity.in/vendor-risk-management-urgent-issue-for-small-finance-banks-a-12922
https://www.bankinfosecurity.in
August 16, 2019
https://www.bankinfosecurity.in/vendor-risk-management-urgent-issue-for-small-finance-banks-a-12922
See publication
Tags: Blockchain, Cybersecurity, Privacy
CISO Can Help Innovate and Not Just Fight Cyber Threats: Ratan Jyoti, Ujjivan Small Finance Bank
https://www.dynamicciso.com/
March 27, 2019
“It is said that learning is the superpower of superpowers and continuous learning motivates and inspires me more than anything else and helps me carrying out my own research,” quips Jyoti as he recalls the starting point of his learning process – his first job, which a data warehouse project that involved work related to databases and programming. He was too particular about exception handling and validation in his programming and gradually realized that absence of validation could provide him access to websites and databases within. Slowly he started analyzing websites for their robustness and the process became a puzzle solving exercise for him and he started learning by himself. At that time there were not many tools available and each website taught him a unique way to penetrate. While he failed many a times, he became successful some of the times and could access what he calls the treasure, i.e. the data.
See publication
Tags: Blockchain, Cybersecurity, Digital Transformation
Fileless Malware: What Mitigation Strategies Are Effective?
https://www.bankinfosecurity.com
January 28, 2019
Fileless Malware: What Mitigation Strategies Are Effective?
See publication
Tags: Blockchain, Cybersecurity, Leadership
In cybersecurity, no solution is a long term solution
https://www.expresscomputer.in
July 25, 2018
We have not faced any security risks recently. The banking system, in general, is facing many security challenges. New technologies like the Internet of Things (IoT) or IIoT are giving cybercriminals ample opportunities and platforms to launch more sophisticated attacks on banks. Banks and Financial sector firms intertwine services from multiple vendors and other third parties and these pose significant cyber risks. International cyber-attacks are another area of concern. The emergence of mobile banking is bringing new threats. With BYOD and mobile devices, the opportunity for infected devices to connect to a network has dramatically increased.
See publication
Tags: Blockchain, Cybersecurity, Digital Transformation
Applying Blockchain Technology for Securing the Enterprise
https://www.bankinfosecurity.in
July 04, 2018
Applying Blockchain Technology for Securing the Enterprise
See publication
Tags: Blockchain, Cybersecurity, Risk Management
Reserve Bank of India Issues ATM Edict: Upgrade, or Else
https://www.bankinfosecurity.in/
June 28, 2018
Reserve Bank of India Issues ATM Edict: Upgrade, or Else
See publication
Tags: Blockchain, Cybersecurity, Privacy
Future Of Artificial Intelligence – Expert Opinions
https://www.beencrypted.com
May 07, 2018
Future Of Artificial Intelligence – Expert Opinions
See publication
Tags: AI, Blockchain, Cybersecurity
Using Blockchain for Securing IoT Devices
https://www.bankinfosecurity.in
April 10, 2018
Using Blockchain for Securing IoT Devices
See publication
Tags: Blockchain, Cybersecurity, Privacy
WhatsApp's New Payment Service Leverages NPCI's UPI
ISMG
February 16, 2018
WhatsApp's New Payment Service Leverages NPCI's UPI
See publication
Tags: Blockchain, Cybersecurity, FinTech
Indian Budget 2018: A Push for Blockchain and Cyber Tech
https://www.bankinfosecurity.in/indian-budget-2018-push-for-blockchain-cyber-tech-a-10624
February 01, 2018
Indian Budget 2018: A Push for Blockchain and Cyber Tech
See publication
Tags: Blockchain, Cybersecurity, Privacy
As ATM 'Jackpotting' Spreads, India Sizes Up Security
https://www.bankinfosecurity.in/as-atm-jackpotting-spreads-india-sizes-up-security-a-10617
January 31, 2018
As ATM 'Jackpotting' Spreads, India Sizes Up Security
See publication
Tags: Blockchain, Cybersecurity, Privacy
Banks Take Precautionary Measures Against App Malware
https://www.bankinfosecurity.in/banks-take-precautionary-measures-against-app-malware-a-10579
January 12, 2018
Banks Take Precautionary Measures Against App Malware
See publication
Tags: Blockchain, Cybersecurity, Privacy
Aadhaar Virtual ID System is Operational
https://www.bankinfosecurity.in
July 13, 2017
Aadhaar Virtual ID System is Operational
See publication
Tags: Blockchain, Cybersecurity, Privacy
Amidst the evolving new technology where is the CIO’s role heading ?
https://cio.economictimes.indiatimes.com
January 28, 2016
Amidst the evolving new technology where is the CIO’s role heading ?
See publication
Tags: Blockchain, Cybersecurity, FinTech
Securing The Cloud To Drive Business
https://cio.siliconindia.com/enterpriseinsights/ratan-jyoti-catid-10-iid-141.html
January 13, 2016
The burden of possessing, managing and maintaining the IT infrastructure has been the key challenge for financial sector. Banking with the cloud has definitely been a game changer. Many banks have already placed their less critical application to cloud computing as a low-risk exercise. The major benefits to the bank are:
• No upfront capital costs and reduced technology costs
• Faster implementation • High flexibility and scalability
• Multi-channel reach
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
Data Security and Privacy Concerns for Indian Banking Industry
https://revenue-management.apacciooutlook.com/cxoinsights/data-security-and-privacy-concerns-for-the-indian-banking-industry-nwid-44.html
January 01, 2016
Data Security and Privacy Concerns for Indian Banking Industry
See publication
Tags: Cybersecurity, Privacy, Risk Management