About Bangalore Chamber of Industry

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

Report

On
“Conference on Improving the
Technology Trustmark “
A BCIC EVENT
SUBMITTED TO
Ms. Richa Sarna

Indian Business Academy


Bangalore

SUBMITTED BY

Anshul Shrivastava FPB0911/013


Table of Contents
1. About Bangalore Chamber of Industry & Commerce (BCIC)......................................................2
2. BCIC EVENT..........................................................................................................................................4
“Conference on Improving the Technology Trustmark “..............................................................................4
3. Session 1:- Security for You.................................................................................................................9
4. Session 2:- Security for your ENTERPRISE..................................................................................12
5. Session 3:- Security for your CITY......................................................................................................13
6. Experience of the Conference:-.........................................................................................................14
1. About Bangalore Chamber of Industry & Commerce (BCIC)

Bangalore Chamber of Industry and Commerce (BCIC) (Formerly known as The Greater
Mysore Chamber of Industry) is the apex Association of the large and medium industries in the
State of Karnataka (INDIA) covering 95 percent of the capital investment and 90 percent of the
Labour Employed in the State.

BCIC members account for over 95 percent of the capital investment and nearly 90 percent of
the labor employed in Karnataka's corporate sector. The membership profile of the BCIC
reflects a wide spectrum of industries. These include manufacturing activities covering Steel,
Cement, Paper, Automotive Components, Chemicals and fertilizers, Engineering, Textiles,
Electronics, Software and Computers, Pharmaceuticals, Processed Foods, besides Plantations,
Printing and Publishing, Hotel Industry and Tourism, Turnkey Consultancy, Banking and
Finance and other services. The Chamber has been invited to serve on many Advisory
Committees constituted by the Central and State Governments, through which it addresses
issues proposed by its members, as well as those which are of general interest. The areas
cover all aspects of policy and procedures.

Information repository, One of the major strengths of BCIC is in its collection of large amount of
information and data base relevant to the industry. It also has a speedy mechanism for
dissemination of all Central and State Government Notifications, Enactments, Reports, Circulars
and Statistical Information. From time to time, BCIC arranges very useful meetings, seminars,
interactions and discussions with Foreign Ambassadors, Consular Representatives and
Business Missions from abroad.

BCIC has close linkages with a number of Bi-National Chambers in the country and many
Chambers of Commerce outside India. It has signed Memorandum of Co-operation (MOCs) with
the Council of EU Chamber of Commerce; Indo-French Chamber of commerce and Industry;
Shenzhen Branch of China Chamber of Commerce and Industry; Sussex Chamber of
Commerce, UK, Calgary Chamber of Commerce, Alberta, Canada, Australia India Chamber of
Commerce INC, Melbourne, Australia and the Trade development Alliance of Greater Seattle,
Washington, USA.

Chamber Activities

BCIC assits large and medium enterprises by interacting within the country and abroad.

 It encourages Technology Transfer, Technology Upgradation and R&D.


 It provides a strong interface with federal and state Government by formulating and
modulating sectoral and industrial policies.
 It assists and promotes exports through policy interventions.
Focal Point

BCIC acts as a focal point for companies to meet with potential partners across various sectors
and national borders.It organises seminars, workshops and interactions with foreign
business,trade and investment missions visiting the state to facilitate this process.

History

Bangalore Chamber of Industry and Commerce (BCIC) was founded in 1976 with its
headquarters at Bangalore, by a group of corporate captains who wanted an effective
organization to project the views of the large and medium industries in Karnataka. The BCIC's
goal has been to create a congenial climate in the State for the development of industry,
business, service, infrastructure, internal and external trade. The Bangalore Chamber of
Industry and Commerce (BCIC) is affiliated to the Associated Chambers of Commerce and
Industry (ASSOCHAM) and Federation of Indian Chambers of Commerce and Industry (FICCI),
New Delhi.

BCIC Membership Profile

BCIC has over 550 members spread throughout the State of Karnataka. Besides large and
medium industries in the Manufacturing Sector, the Membership includes Organisation and
Companies in information Technology, Banking Services, R&D Sectors, consultants which
includes professionals, lawyers etc. The BCIC's goal has been to create a congenial climate in
the State for the development of industry, business, service, infrastructure, internal and external
trade.
2. BCIC EVENT

“Conference on Improving the Technology Trustmark “

Information Technology is playing a critical role in our day-to-day lives. It is not only enabling
global commerce, but also helping us in transforming education, healthcare thereby significantly
impacting the overall quality of our life. However, as much as technology inspires confidence, it
also invokes fear. Not necessarily in a Hollywoodian sense of technology taking over our lives,
but in a more real life scenario of we wanting to but not willing to fully adopt it into our lives -
Afraid of the cost of breach of data, identity and at the core of it all “Trust”.

“Improving the Technology Trustmark” distinguished the factors that have kept the positives of
technology pervasiveness at bay and probe into the realities of how safe today’s technology is
and what the present and future beholds.

SPEAKERS

• Dr. Gulshan Rai, Director General, STQC Directorate,Department of Information Technology,


Ministry of Communications & IT, GoI

• Mr. M N Vidyashankar, IAS, Principal Secretary, e-governance, GoK

• Dr. DV Guru Prasad, Director General of Police, CID

• Dr. Kamlesh Bajaj, CEO, Data Security Council of India

• Mr. Gopinath KN, Director, Airtightnetworks

• Mr. Gopi Krishnan, Regional Counsel, India and South Asia, IBM • Mr. Satish Das, Chief
Security Officer and Director, (Enterprise Risk Management) Cognizant Technology Solutions

• Mr. Sanjoy Sen, Senior Director, Deloitte Touche Tohmatsu India Pvt Ltd

• Mr. Manohar Ganshani - Head – Governance, Risk & Compliance – Wipro Ltd

• Mr. Chalam V Peddada, Sr. Director, Information Security & Risk, Fidelity India

• Mr. Ramesh Ramanathan, Co-founder, Janaagraha • Mr. Sanjay Bahl, Chief Security
Officer, Microsoft India • Mr. Ray Cooke, Director, Physical Safety and Security, Cisco

• Mr. Maheswaran S, Sr. Consultant, SAARC, Websense

TARGET AUDIENCE

• CIOs, Decision makers and Senior Managers of enterprises. • Technology product and service
vendors. • Individuals/Students
Welcome Addressed By: - Mr. K. R Girish, Immediate Past President, BCIC

Mr. K. R Girish gave inputs about the current situation and mindset of people regarding security
and gave examples how the threat of security breach became the most concerned part of the
corporate today. He introduced all the speakers present and concluded his remarkable
introductory speech by saying “Security in the system”.

Keynote Addressed by: - Mr. Gopi Gopinath, Chairman & CEO, AT & T Global Network
Services Ltd.

Mr. Gopi Gopinath, started by quoting “It’s a Dangerous World out there!”. He explained
about The Sea of Red – Code-Red (CRv2). He explained that code red was the security breach
that happened in July 19, 2001, infecting about 3,59,000 servers (43%US, 11%KR, 5%CN), with
total time taken of just 14 hours. It was the deliberately done to prove that any personal can play
with the servers around the world.

He showed what were hackers and what are their new definition?

 from Fame to Dollars


 from Loud(showing presence) to Silent(secretly working)
 from Random to Directed(particular target that is money)
 from Self-Written Program(developed by hacker) to Automated Scripts(Self-Driven
Programs developed to protect the identity of the criminals)

All here shows the evolution of hackers to criminals. Hackers earlier was only for fun now it’s for
theft and utilizing the general potential to get two most important part of a person, Personal
details and Money. So driving security concerns made governments to include this type works
as criminal’s works in Law.
90
80 % of Respondents
80
70.1
70
60 50.7 52
46.7 46.7
50
40
30
20
10 5.25 4.9 4.2 3.31 2.89 2.85

0
Data Loss Denial of Un- Compliance VirusAttacks SPAM
Services authorized
access

The major concern among the corporate is the Data loss. Below Graph shows the percentage
and concerns about the major thefts happening in this area.
Mr. Gopi gave inputs on BOTNET, BOT Networks Architecture, Robot Networks, the Distributed
Denial of service Attacks. He gave the exact figure of Total Malware & Security Risk Detections;
there was a big change in numbers as compared to previous years and year 2009.

In year 2000 number detections in a day was 5, in 2007 the number of detections were 1942, in
2009 the number of total detections in a day came to 8403. It was much higher as compared to
earlier due to the evolution of hackers to criminals. He mentioned that even a trusted websites
like that of Citibank, ICICI Bank etc can give Malware to user computers on a simple visit.

The graph in next page shows Total Malware & Security Risk Detections:-
Mr. Gopi Showed ways to protect companies Network Infrastructures.

 Employ the network as the first line of defense

 Utilize a service provider’s predictive security capabilities

 Implement a defense-in-depth strategy

 Use a risk-based approach

 Apply reactive to proactive to predictive to adaptive

Quick Facts about Managed Security

 End to End Security Capabilities- from end point to the cloud


 Security integrated with services as appropriate
 “In the Cloud” security
 World-class security experts and support professionals
 Access to reports and tools through a portal.

Mr. Gopi concluded by Introducing Global Security Operations:-

 Global Sensor Grid


 Threat Detection & Analysis

 Security Nodes
 Monitoring & Mitigation
 Security Operations
 Configuration, Alerting,
Response

Mr. Gopi ended the presentation stating the security-Challenges Never Really Go Away:-

 Virus, Spyware and Spam


 Online Fraud, Identity Theft, Access Control
 Regulatory Compliance
 Information Protection (integrity and privacy)
 Risk Management
 Employees underestimate importance of following security policy
 Budget too small to cover necessary security purchases
 Executives underestimate importance of following security policy

After the wonderful Keynote presentation by Mr. Gopi, the 1st Sessions started, the sessions
were divided into three parts:-

 Security for YOU

 Security for your ENTERPRISE

 Security for your CITY

3. Session 1:- Security for You

The relevance and importance of Security to people as individuals has taken a new meaning in
recent times with the proliferation of internet-based commerce and social networking sites. This
session focused on related issues highlighting matters that individuals should keep in mind;
Issue such as individual security, privacy, and legal position.

• Moderator : Dr. Gulshan Rai, Director General, STQC Directorate, Department of


Information Technology, Ministry of Communications & IT, GoI

• Dr. DV Guru Prasad, Director General of Police, CID Online identity – how do you protect
yourself from identity theft and Online fraud?
• Dr. Kamlesh Bajaj, CEO, Data Security Council of India The growing importance of Data
privacy in our daily lives – what you can do.

• Mr. Gopinath KN, Director, Airtightnetworks Smartphones: Are we smart enough to use
them?

• Mr. Gopi Krishnan, Regional Counsel, India and South Asia, IBM Security Compromised –
does the law protect you?

Learning: -

This session explained about how personal security can be breached and can be protected by
precautions taken.

Dr. DV Guru Prasad, Director General of Police, CID talked about online fraud happens on
internet via e-mail Spams. He told a case about Nigerian citizen staying in India, and mailing to
different email IDs about fake lottery win and asking about personal details (like bank account)
to get it. The victim was an Indian Doctor and he paid much amount to get the lottery amount.
Dr. DV Guru Prasad displayed evidence of that particular case, a portable electronic locker,
which was recovered at the time of investigation. He informed many such cases where many
people get affected by these fraud lottery systems. He explained what measures CID is taking
to resolve such reported cases.

Dr. Kamlesh Bajaj, CEO, Data Security Council of India talked about the growing importance of
Data privacy in our daily lives. He talked about Privacy Definition and Data Protection Laws,
explained about the different Versions of privacy.

 First version- access to centralized databases - file system or an electronic record


 Second Version- info available online and collected thru databases - used for profiling
 Current Version- open to all with internet making info available in real time

He talked about the following topics:-

 Emergence of Privacy Standards and Codes


 Emerging Technology
 Technology for Security and Surveillance
 Privacy in the economy transformation and more…..
He concluded by DSCI Recommendations to Privacy issues and their initiatives.

After this valuable talk we have Mr. Gopinath KN, Director, Airtightnetworks Smartphones : he
talked about the smart phones and how smart we are to use them.

He mentioned about wi-fi disadvantages using wi-fi through Smartphones. Attackers can use
the users wi-fi to attack to different servers without even coming in the picture.

He talked about few Wi-Fi attacks which can be done by: -

1. Wi-Fi Attack 1: Access via a Honeypot


2. Wi-Fi Attack 2: Access Exploiting Mobile Hotspot Feature

He mentioned about Adhoc and Open, WEP are major responsible for this type of attacks.

He mentioned that Attacks on Smartphone Wi-Fi are possible at:-

 Home Wi-Fi
 Public places (Airport, Cafes)
 Work places (enterprises, government offices etc.)!

In the end he concluded by giving knowledge of the best practices for protecting the
smartphones from such attack.

After that Mr. Gopi Krishnan, Regional Counsel, India and South Asia, IBM Security talked
about the law protection from this type of threats.

He mentioned the following points which should be in notice:-

 The Amendments to the IT Act, 2000


 Privacy – Drivers and Impacts
 Privacy Framework Components

Ten Best Practices for Successful Implementation of Privacy Policies

1. Uniform, Fair, and Appropriate Privacy Practices – think Global!


2. Online Interactions with care – Educate!
3. Implement Information Architecture – Classification & Controls; Conduct Privacy
Assessments!
4. Internal Controls & Safeguards – Leverage Privacy Tools!
5. Target behaviour - Empower Individuals (Ethics, Trust, Privacy). Communicate!
6. Contracts & Third Party Engagements – Promise what you can deliver!
7. Understand Laws, Regulations, and Compliance requirements – integrate into daily
operations!
8. Incidents and Investigation Response – Swift with consequence management!
9. Plan for the future – Privacy by design. Invest in People!
10. Privacy Implementation and Governance– A cross-functional team is a must!
This way the conclusion for this session was that with increasing global networks and small
networks getting into play, so security is more important now a days for each and every Device,
big or small, Nothing is secure.

4. Session 2:- Security for your ENTERPRISE

How much Security? In an environment with fast-growing and emerging technologies such as
mobile technologies, wireless, cloud computing, constantly evolving regulatory expectations,
changing customer needs and increasing demands on business to stay lean and competitive,
organizations have to constantly address this question. How does one strike the balance
between doing business and staying secure? This session addressed these dimensions from an
enterprise’s point of view.

• Moderator : Mr. Satish Das, Chief Security Officer and Director (Enterprise Risk
Management) Cognizant Technology Solutions

• Mr. Sanjoy Sen, Senior Director, Deloitte Touche Tohmatsu India Pvt Ltd Is Security an
enabler or a blocker in the enterprise?

• Mr. Manohar Ganshani - Head – Governance, Risk & Compliance – Wipro Ltd How does an
organization balance IT compliance with Business flexibility?

• Mr. Chalam V Peddada, Sr. Director, Information Security & Risk, Fidelity India How do we
protect the modern enterprise with the right technologies, culture and processes?

• Mr. Maheswaran S, Sr. Consultant, SAARC, Websense Securing the Borderless Enterprise
Learnings: -

This session was totally panel discussion; there was no individual presentation in this. The
above panel discussed about how enterprise select different technologies which can give proper
inputs for enabling or blocking as per the security. Balancing with IT compliance and developing
the perfect combination of security and services to get the best practice to stop the data theft.

Thus giving proper inputs on Right Technologies, culture and processes can give better results.

Websense gave inputs on how security can be developed to overcome the common threat
which corporate world is facing right now.

5. Session 3:- Security for your CITY


Cities are trying to cope with the challenges of growth and increasingly resorting to measures
with a strong dependency on technology – be it the transportation engines, making services
“e-friendly” or even Smart homes. Bundled with the benefits are concerns on security and
safety.

This session focused on security from this dimension.

• Moderator : Mr. C S Murali, Chairman IT and ITES Expert Committee, BCIC

• Mr. Ramesh Ramanathan, Co-founder, Janaagraha

• Mr. Sanjay Bahl, Chief Security Officer, Microsoft India

• Mr. M N Vidyashankar, IAS, Principal Secretary, e-governance, GoK

• Mr. Ray Cooke, Director, Physical Safety and Security, Cisco

Learnings: -

The talks in this session were the most important talk in context with the general people
awareness about securing the city. The Mr. Sanajay Bahl, Introduced about Microsoft’s
initiatives in making city tech savvy, He showed us the video how cities in USA are under high
security, through system from Microsoft.
Mr. Ray Cooke explained about the CISCO initiatives for the rapid development of cities. He
shared the various forms where the implementation of IT and can make security the best in the
town. Security which implemented in Europe and developed, can give other countries a good
opportunity for holding the criminal minds to work on. The major talk was about urban
restructuring, the development of security system in urban areas can give the protectors (Army)
the basic need for checking around for various Terrorist activities. The future focus is on urban
rather that rural restructuring.

Mr. Ramesh asked the companies to stop looking at the profit side for some time and to think
about development and security first from various threats.

6. Experience of the Conference:-

The BCIC “Conference on Improving the Technology Trustmark “ was very interesting and
knowledge oriented. Rather talking just one technology, the conference covered all with
interesting topic of every entity on this earth today i.e. “SECURITY”. I was completely thrilled by
the value they chosen and by the presence various companies heads. During breaks in
conference I got chance to meet various heads of different companies of different verticals. It
was the good time to extract the knowledge and give the “elevators pitch”. I promoted IBA in
talks with various speakers, and tried to get the opportunity to get some IT projects for myself.
Even sleeping only for 1 hour in night before the conference, I never felt asleep, such was the
level of conference and speakers. Now I am continuously visiting the BCIC website and trying to
get more information about such conferences.

I am very thankful to our Sir, Mr. Manish Jain for sponsoring us for such a Great Conference. I
am also very thankful for Ms. Richa Sarna for guiding us throughout the conference visit and for
leading the team with trust in us. It was a Great overall experience for me to be there in
conference. I request college management to keep providing us such information about other
conferences. It really changed the thoughts and vision of working.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy