Virtual Conference on Cyber Security
27th June 2020
Aegis School of Cyber Security organized a live virtual conference on "Cyber Security" on 27th June 2020. Dr. Ashima Mehta, Assistant Professor, Dronacharya College of Engineering, Gurugram attended the conference.
The event bought together around 350 people including students, teachers, people from industry, research scholars and other academicians to review the scope of cyber forensics and cyber security.
The conference began with opening remarks, "People are the new Parameter" and further Mr. Anil Chiplunkar (Info Counselor) explained the concept of Cyber Forensics. The agenda for the same was to why do we need to study Cyber Forensics and its approach. The challenges faced were also discussed in the same session followed by Q/A round.
Mr. Anil also discussed, the evolution of internet has had a profound impact on the way business and individuals and government work and communicate. As cybercrime continues to grow at a substantial pace enterprises have realized, there is need for security mechanism which can provide and preserve safety of e-info.
Further he explained, the development of cyber forensics has become necessary in the light of following factors:
- The insufficient conventional methods - The inadequacy in the procedural law has created a procedural loophole in maintaining substantive liability. The procedural aspects are framed to create and establish liability and guilt but certain breakdowns in the procedural aspect has lead to the deadlock in investigation. The traditional procedural methods dealing with finger prints, DNA, Testing and other blood tests are neither applicable nor suitable for and in the existing situation.
- Shifting dimensions of crime - The usage of internet offences involves crimes like hacking, pornography, privacy violations, spamming, identity theft, cyber terrorisms etc which has imposed diverse range of crime and criminals. In order to curb the race the crime and criminal it is of outmost importance that certain measures are essentially required for curbing the menace cyber crime in an effective manner.
- Assessment - A comparison of the traditional crimes and criminals with those of current methods has led to the observation that in IT being a significant in the IT environment, the parameters of the comparison being nature of the crime, support system has changed the methods of crime but certainly the parameters remain the same in assessing the face of the crime, players in the crime etc. Thus, the statutory as well as the non statutory investigation machinery in the form of cyber forensic body is very much required.
Other topics discussed were two factor authentications, Cyber hygiene, Breaches in security, Scrapping from social site. Also other top industry leaders discussed top 10 biggest data breaches of all time.
The next presentation was related to "Cyber Criminal Investigation and Advanced Attack Vectors". Various case studies were also discussed like:
- Whatsapp Morphed Images
- Image received on email
- Share trading- Mobile App
- Kidnapping through mobile app
- Income Tax Refund
- Viral Vedio
- Paytm KYC
- COVID-19 Related threats in 2020
In 2nd Session Panel Moderator Mr. Burgess Cooper (Partner Information & Cyber Security at Ernst and Young) had discussion.The Panelists were Mr. Bhupesh, CEO Aegis School of Data Science and R. Sridhar Govardhan, Senior Director and Head of Information security at Flipkart. The session emphasized on "Careers in Cyber Security".
While it's possible to find certain entry-level cyber security positions with an associate’s degree, most jobs require a four-year bachelor’s degree in cyber security or a related field such as information technology or computer science. Coursework in programming and statistics combined with classes in ethics and computer forensics prepare students with the technical and analytical skills required for successful careers in cyber security.
In an environment where data breaches are becoming the norm, more cyber security degree programs are being added every year. Before choosing a cyber security degree, prospective students should make sure that it is not only accredited, but also aligns with their career goals.
Presentations, panel discussions and interactive dialogue held at the conference from the top industry leaders and best brains were fruitful for all the participants.