Society For Electronic Transactions and Security (SETS)
IEEE Computer Society, Madras
Computer Society of India, Chennai
ACM Professional Chapter, Chennai
and
National Centre of Excellence - Data Security Council of India (NCoE-DSCI)
Cordially invite to the hybrid mode talks at the
Computer Security Day Celebrations
Date & Time
Friday 29th Nov 2024 :: 2 pm to 5 pm IST
Venue
In-person: SETS, Taramani. Location Map: https://lnkd.in/gNnniDPy
Online: Through MS Teams (link will be shared closer to the event)
Program Schedule
1.45 pm -- Registration & Networking
2.00 pm -- Inaugural Session
🔸Welcome Address & About SETS by Dr. N Subramanian, Executive Director, SETS
🔸About NCoE-DSCI by Dr. Sarat Chandra Babu, Advisor, NCoE-DSCI
🔸About Computer Security Day by Mr. HR Mohan, Chair - Events, IEEE CS Madras
2.15 pm -- Launch of the Book "Vulnerability to Victory" authored by Mr. Arul Selvar Thomas, Founder & Director, BriskInfoSec
2.30 pm -- Talk 1 on "Vulnerability to Victory: Mastering Cybersecurity in the Modern Age" by Mr Arul Selvar Thomas, Founder & Director, BriskInfoSec
3.00 pm -- Talk 2 on "Gaurding your Digital Footprint with Cyber Hygiene" by Dr. DM Ajay, Senior Research Engineer - GenAI, HCLTech
3.30 pm -- Talk 3 on "Phishing Scams: Strategies for Prevention and Real-World Insights" by Mr. K Thirupathi, Scientist, Society for Electronic Transactions and Security (SETS)
4.00 pm -- Talk 4 on "Uninstallable by Design: The Role of Pre-installed Apps in Android’s Security Landscape" by Mr. Thomas Sutter, Researcher, University of Bern and Zurich & Research Associate, University of Applied Science, Switzerland
4.30 pm -- Closing Remarks by Dr. P Sakthivel, Chair, IEEE CS Madras & ACM Chennai
4.40 pm -- Vote of Thanks by Dr. K Komathy, Chair, CSI Chennai
4.45 pm -- High Tea
5.00 pm -- End of the Program
The program is free to participate. However, the registration is mandatory for logistics reasons.
While the seats are limited for in-person mode, there are no restrictions for attending the event online.
If the no of in-person mode registrations exceeds the hall capacity, the mode of participation of the late registrants will be made online and they will be informed accordingly.
However, the registration will be closed by 5 pm on 27th Nov 2024.
The online link to join the hybrid mode event will be shared by email to the registered participants on 28th Nov 2024
About the Sessions, Talks & Speakers
Launch of the Book: Vulnerability to Victory
In the book, "Vulnerability to Victory," the author Arul Selvar Thomas delivers a concise yet impactful guide for business leaders navigating the complex world of cybersecurity. He demystifies the evolving Top 21 cyber threat landscape, offering practical advice on identifying vulnerabilities and implementing effective security measures. Thomas emphasizes a proactive approach, encouraging a culture of cybersecurity awareness within organizations. He provides clear explanations of key concepts, making the book accessible to both technical and non-technical audiences. "Vulnerability to Victory" is a valuable resource for any leader seeking to protect their organization and transform cybersecurity challenges into strategic advantages.
Talk 1: Vulnerability to Victory: Mastering Cybersecurity in the Modern Age
Speaker: Mr. Arulselvar Thomas, Founder and Director, Briskinfosec Technology and consulting Pvt Ltd
About the Speaker
Mr. Arulselvar Thomas is the Founder and Director of Briskinfosec, a leading cybersecurity solutions provider based in Chennai, India. With over a decade of experience in the field, Thomas is a recognized cybersecurity expert, dedicated to helping businesses and individuals stay safe online. He founded Briskinfosec with a vision to be a pioneer in protecting digital assets, offering a range of services including security audits, penetration testing, and compliance solutions. Thomas is a strong advocate for cybersecurity awareness and actively participates in industry events to share his expertise. His leadership and commitment have been instrumental in Briskinfosec's growth and success.
About the Presentation
Vulnerability to Victory: Mastering Cybersecurity in the Modern Age
In today's interconnected world, where digital transformation reigns supreme, cybersecurity is no longer a mere technical concern; it's a critical business imperative. The digital realm, while brimming with opportunities, is also fraught with threats that can disrupt operations, compromise sensitive data, and erode hard-earned reputations. This presentation, "Vulnerability to Victory," will dive into the top 20 cyber threats lurking in the digital shadows, poised to strike businesses of all sizes. We will explore how seemingly small misconceptions and a lack of awareness can pave the way for devastating cyberattacks. More importantly, we will equip you with the knowledge and strategic guidance to transform your vulnerabilities into strengths, fortifying your businesses against the ever-evolving cyber landscape. Further, in the presentation, we will Deep dive into the most prevalent and potent threats, from ransomware and phishing to social engineering and supply chain attacks; Examine how seemingly innocuous oversights and a lack of cybersecurity awareness can create exploitable weaknesses within your organization; and Build a Resilient Cybersecurity Strategy with a practical guide by crafting a robust cybersecurity strategy tailored to your business needs, encompassing risk assessment, proactive measures, and incident response planning. We shall dive together to turning potential vulnerabilities into strategic advantages.
Talk 2: Guarding Your Digital Footprint with Cyber Hygiene
Speaker: Dr. DM Ajay, Senior Research Engineer - GenAI, HCLTech
About the Speaker
Dr. Ajay DM is a Senior Research Engineer at HCLTech, specializing in cybersecurity across generative AI, healthcare, automotive, and industrial sectors. With a PhD focused on mobile and cloud-based data security, Dr. Ajay brings deep expertise in data encryption, cybersecurity strategies, and AI ethics. At HCLTech, he spearheads AI-driven research, actively developing solutions tailored to client needs and focusing on responsible AI principles. Dr. Ajay’s work includes vulnerability detection, threat prevention, and security integration within AI models, ensuring resilient and ethical AI applications. In addition to his technical work, Dr. Ajay has held positions, such as the treasurer of the Internet Society’s Cybersecurity SIG and an ambassador for the German Informatics Society, contributing significantly to global discussions on cybersecurity. Beyond the corporate sphere, he is actively engaged in initiatives to raise cybersecurity awareness, especially for vulnerable communities.
About the Presentation
This presentation on cyber hygiene practices covers essential strategies for safeguarding digital identities and maintaining security in both personal and professional settings. It begins by introducing the importance of cybersecurity, highlighting how individuals and companies are vulnerable to identity theft, financial loss, and reputational damage from cyberattacks. The presentation explores cyber hygiene concepts such as regularly updating software, using antivirus programs, and implementing strong password management to prevent unauthorized access. It discusses techniques like multi-factor authentication and the use of unique, complex passwords, avoiding public Wi-Fi for sensitive logins, and securing personal devices. Furthermore, the presentation delves into secure financial management practices, advising on separate accounts for savings and digital transactions, maintaining low balances in digital accounts, and monitoring transaction limits to avoid risks. It also emphasizes phishing prevention, teaching how to identify suspicious emails or links and encouraging users to report potential scams immediately. Additionally, it touches on the importance of financial transaction security by checking website certifications and avoiding oversharing sensitive information online. This comprehensive approach ensures that individuals are well-equipped to protect their digital presence and respond effectively to potential cybersecurity threats.
Talk 3: Phishing Scams: Strategies for Prevention and Real-World Insights
Speaker: Mr K Thirupathi, Scientist, Society for Electronic Transactions and Security (SETS)
About the Speaker
Mr K Thirupathi is working as a Scientist and Head of Network Security Research Group at SETS, Chennai. With over 12 years of experience, he specializes in developing network security products and providing comprehensive cybersecurity solutions to end-users. His research interests revolve around Cybersecurity, Network Traffic Analysis, Intrusion Detection & Prevention Systems, Design of Network Firewall Systems, Virtual Private Networks, and Security Information and Event Management (SIEM). His notable accomplishments include: developing indigenous security solutions for national critical infrastructure, conducting vulnerability assessment and penetration testing for critical network infrastructure. He is a certified Ethical Hacker, followed by a certified ISMS Lead Auditor and a Cisco Certified Network Associate certificate holder. His extensive background underscores a commitment to advancing the realms of cybersecurity through both practical applications and research exploration.
About the Presentation
Phishing scams are a prevalent and deceptive form of cybercrime where attackers impersonate trusted entities to steal sensitive information, such as passwords, credit card details, or personal data. These scams often take the form of fraudulent emails, messages, or websites designed to trick individuals into disclosing private information. Awareness of common phishing tactics, such as suspicious sender addresses, urgent messages, and misleading links, is crucial in preventing attacks. Preventative measures include verifying communication sources, avoiding unsolicited links, and using security features like two-factor authentication (2FA). The talk will cover the real-world examples that highlight the widespread impact of phishing, from financial losses to identity theft, underscoring the importance of vigilance and proactive security practices with demonstration of phishing attacks.
Talk 4: Uninstallable by Design: The Role of Pre-installed Apps in Android’s Security Landscape
Speaker: Mr. Thomas Sutter, Researcher, University of Bern and Zurich & Research Associate, University of Applied Science, Switzerland
About the Speaker
Mr. Thomas Sutter is a researcher in Computer Science at the University of Bern (Switzerland), conducting research on automated software testing and security analysis of mobile applications under the guidance of Prof. Dr. Timo Kehrer. Thomas research interests encompass software security, software testing, software engineering, Applied Cryptography, Security Awareness and Human Factors, Data Analysis and Machine Learning. Additionally, he holds a position as a research associate in the Information Security Group (ISE) at the Zurich University of Applied Sciences.
About the Presentation
The competitive smartphone market is keen to prevent its intellectual property from being analysed by competitors and the public. As a result, most smartphones are locked when distributed, and anti-reversing techniques are widely used. Consequently, millions of users use smartphones daily without a clear understanding of the software’s functionality and purpose. In this presentation, the speaker will explain the novel framework, FirmwareDroid, developed by their team to analyse the security of mobile device firmware and discuss the challenges to automate the process of analyzing Android firmware and showcase how to use FirmwareDroid for various analysis tasks.