SlideShare a Scribd company logo
4
Most read
7
Most read
9
Most read
IoT Security, Threats and
Challenges
By V.P.Prabhakaran
Introduction of IoT
The Internet of Things (IoT) is the network of physical objects
or “things” embedded with electronics, software, sensors,
and network connectivity, which enables these objects to
collect and exchange data. It is a complete integration of
physical objects with computer logical operations.
01
Things in IoT
• Things, in the IoT, include vast collections
of devices such as heart monitoring
implants, biochip transponders on farm
animals, automobiles with built-in sensors,
or field operation devices that assist fire-
fighters in search and rescue,” reads the
definition provided by Wikipedia.
02
Associated Challenges
• IoT Security is all about protecting or safeguarding. Nowadays, in almost every objects, we
have a small chip, which usually we used to ignore. Attackers try to compromise those chips
by gaining logical access to devices remotely. All security and technical experts face the
challenge of protecting that chip from attackers because all the devices, like cars, industrial
machines, and home appliances, have the same chip that works with a specific program
which is easy to target.
02
Companies who Operate IoT
• Traditional Big Companies –
Google, Microsoft, and Amazon are
the big companies who are well
versed with latest security and
threats associated with IoT and they
have experts who can protect it from
attacks. The Image below, that I
would like to share, show how
Amazon is using IOT.
02
Companies who Operate IoT (contd…)
• Big Companies – They are not as exposed in terms of threats associated with IoT, like Honeywell
and Ford
• Kickstartup – New joinees who did research and developed a prototype, later on big companies,
like IFTTT (If This Then That) by Linden Tibbets and MuleSoft by Greg Schott, purchase these
packages and used them. Currently, the industry is facing a shortage of IoT security experts and
they still struggle with countermeasures of IoT, according to the report ” ISACA Survey: UK Security
Experts Sceptical of IoT Device Security; 3/4 Say Manufacturers are Not Implementing Sufficient
Security Measures “
02
Common Threats Associated with IoT
• Vulnerable IoT Perimeters: When IoT networks are designed, there is lack of planning of good
security implementation which can allow an intruder to easily gain access to the network. Let’s take
an example of Smart Meter. If a cyber criminal compromised this device, he is able to access a
domestic network and also can monitor the connections between objects in IoT.
• Increase in Data Breaches: Data breaches are one of the biggest threats in IoT devices. Cyber
attackers can try to spy on the communications between devices in IoT network. Devices accessed
through Internet of Things may be used for cyber espionage purposes by an intelligence agency or
by some companies for commercial purposes. The FBI’s chief information security officer warned
the impact of IoT data breaches could be much worse for end users than previous enterprise data
breaches.
02
Common Threats Associated with IoT
• Malware and Botnet Attacks: Malicious users designed the code for attempting to attack against
IOT networks. Cyber criminals can exploit vulnerabilities in firmware running on the devices and run
their arbitrary code, turning IoT components to unplanned use. Some of the Malware used in IOT is
Linux worm, Linux.Darlloz. Graphics processing units-based malware and ransomware attacks are
growing rapidly, due to the increase in data, bigger networks, and the Internet of Things (IoT),
according to Intel Security’s five-year retrospective threat report. The analysis found that
ransomware continued to grow rapidly, with the number of new ransomware samples rising 58
percent in Q2. According to Intel Security, the total number of ransomware samples also grew by
127 percent year-on-year, with the company attributing the increase to fast-growing new families,
such as CTB-Locker and CryptoWall. The release of the report marks the five-year anniversary
since Intel Security purchased McAfee for $7.7 billion.
02
OWASP Introduces Vulnerabilities in IoT
• The Open Web Application Security Project (OWASP) comes with best practices to improve the
security of IoT. It is natural that the project also analyzed the top 10 security issues related to the
popular paradigm:
02
• Insecure Web Interface Insecure Web Interface is a common vulnerability found in IoT. OWASP
Zap and shodan tools are available and with them we can access these devices. The most famous
example of this to date is the case of the web application on TrendNet cameras that exposed a full
video feed to anyone who accessed it.
OWASP Introduces Vulnerabilities in IoT (contd…)
• Insufficient Authentication/Authorization Most IoT devices are protected with a weak password
and it is easily exploited through a brute force attack. The attack could come from external or
internal users. Some devices in IoT are configured with a base64 password encoding mechanism
and sent between devices in plain text so attacker can use an online website through which they try
to convert base64 code to simple text. Many IoT devices are secured with “Spaceballs quality”
passwords like “1234”, put their password checks in client-side Java code, send credentials without
using HTTPS or other encrypted transports, or require no passwords at all.
02
OWASP Introduces Vulnerabilities in IoT (contd…)
• Insecure Network Services Insecure network services may be vulnerable to buffer overflow
attacks. Some other attacks can also be done, like DOS and DDOS attacks, which leave systems
inaccessible to clients or users. In order to find insecure network services, we use several tools, like
Nmap and other fuzzers. Examples of these types of services abound in IoT documentation and are
regularly lit up by security researchers. In August 2014, a sweep of more than 32,000 devices found
“at least 2000 devices with hard-coded Telnet logins.”
02
OWASP Introduces Vulnerabilities in IoT (contd…)
• Lack of Transport Encryption IoT devices have a lack of transport encryption which are exploited
by an attacker who is trying to intercept the information exchanged between IoT devices. This
attack can be done from internal and external users.
• Privacy Concerns An attacker uses a different path, like lack of authentication, lack of strong
transport encryption or other ports and network services through which they gain access to
personal data. One of the biggest vulnerabilities, as per OWASP Standard, is that home users may
not understand computer security, but they do understand physical security (“is my door locked?”)
and privacy (“is that camera watching me?”). Furthermore, their fears are widespread.
02
OWASP Introduces Vulnerabilities in IoT (contd…)
• Insecure Cloud Interface We can identify an insecure cloud interface vulnerability through
reviewing the connections to the cloud interface and analyzing if SSL is secure. We also attempt a
password reset on the portal to find a live user, which can lead to user enumeration. Since most
security professionals already know how to evaluate systems for these types of vulnerabilities, we
won’t spend much time on it in this article, except to remind you that you should get the permission
of any remote cloud service before you attempt to perform any type of penetration test against it.
02
OWASP Introduces Vulnerabilities in IoT (contd…)
• Insecure Mobile Interface
• Insufficient Security Configurability
• Insecure Software/Firmware
• Poor Physical Security
02
OWASP Introduces Vulnerabilities in IoT (contd…)
• Insecure Mobile Interface
• Insufficient Security Configurability
• Insecure Software/Firmware
• Poor Physical Security
02
About Author
• V.P.Prabhakaran is a highly-experienced security
professional , having more then 9 years experience
as Senior Information Security Consultant at Koenig
Solutions.
02
Information Security Consultant
CISSP | CISA | CISM |COBIT 5|TOGAF
Koenig training services are sought by some of the biggest multinationals and Fortune 500 companies.
Some of the brand names associated with Koenig for its world renowned IT training include:
Our Valuable Customers
24
27
• Nearly half the cost as compared to similar training in UK or USA.
• Experienced pool of 350+ certified trainers
• Happiness Guaranteed else Money Back or Class Redo
• Authorized partner for 30+large IT vendors
• Multiple modes of delivery
• Customizable learning packages
• World class training centres with best infrastructure
• Post training support
• Excursion to local tourist attractions
• Best accommodation and support services
• Visa Guidance
Advantages @ Koenig
Let’s Talk
Koenig Delhi
Koenig Campus B-39, Plot No. 70,
KLJ Complex-1, Shivaji Marg, Moti
Nagar, New Delhi-110015 (India)
Koenig Bangalore
PARAGON PRIMA, 2nd & 3rd Floor,
No. 39, 8th Main Koramangala 4th
Block Bengaluru-560034, (India)
Koenig Goa
3rd Floor, B/T1, Campal Trade Centre,
Opp. Kala Academy, Panjim,
Goa-403001 (India)
33
Koenig Shimla
7, Prospect Lodge, Behind YMCA,
Lower Jakhu, Shimla-171001,
Himachal Pradesh (India)
Koenig Dehradun
Plot #22, IT Park, Sahastradhara
Road, Dehradun-248001,
Uttarakhand (India)
Koenig Dubai
Block 3, Office G10,
Dubai Knowledge Village Dubai, UAE
Phone : +9714 3686241
Email : info@Koenig-dubai.com
Koenig USA
640 W California Avenue, Suite 210,
Sunnyvale, CA 94086, USA
Koenig Singapore
30 Cecil Street, #19-08 Prudential
Tower, Singapore 049712
Koenig Solutions (India)
Website: www.koenig-solutions.com
Phone : +91 75330 08521 (24x7)
Email : info@Koenig-solutions.com
THANK YOU
Follow us:
http://www.Koenig-solutions.com

More Related Content

PDF
Fundamentals of IoT Security
PPT
IoT security (Internet of Things)
PPTX
Presentation on IOT SECURITY
PDF
IOT Security
PDF
Overview of IoT and Security issues
PPTX
IoT Security proposal.pptx
PPTX
IoT security
PPTX
security and privacy-Internet of things
Fundamentals of IoT Security
IoT security (Internet of Things)
Presentation on IOT SECURITY
IOT Security
Overview of IoT and Security issues
IoT Security proposal.pptx
IoT security
security and privacy-Internet of things

What's hot (20)

PPTX
Introduction to IoT Security
 
PPTX
IoT Security
PPTX
IP Spoofing
PPTX
Internet of things ppt
PPTX
Security in IoT
PDF
Security challenges in IoT
PPTX
Security services and mechanisms
PPTX
Ip spoofing ppt
PDF
Fog computing in IoT
PDF
Network Security Presentation
PPTX
Wireless network security
PPTX
Iot Security
PDF
IoT Networking
PPTX
Iot(security)
PPTX
Iot Security, Internet of Things
PPTX
Technology Behind IoT (JNTUK - Unit - 1)
PPTX
Iot architecture
DOCX
Security and Privacy considerations in Internet of Things
PDF
IoT Security Challenges and Solutions
Introduction to IoT Security
 
IoT Security
IP Spoofing
Internet of things ppt
Security in IoT
Security challenges in IoT
Security services and mechanisms
Ip spoofing ppt
Fog computing in IoT
Network Security Presentation
Wireless network security
Iot Security
IoT Networking
Iot(security)
Iot Security, Internet of Things
Technology Behind IoT (JNTUK - Unit - 1)
Iot architecture
Security and Privacy considerations in Internet of Things
IoT Security Challenges and Solutions
Ad

Viewers also liked (20)

PDF
A New Security Paradigm for IoT (Internet of Threats)
PPT
It for fiu The Internet as a tool for financial intelligence units
PPTX
Security Threats
PPTX
Cyber Security Landscape: Changes, Threats and Challenges
PPTX
IoT Security: Cases and Methods [CON5446]
PDF
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
PDF
Security challenges as threats to national unity in nigeria
PPTX
Successful Industrial IoT patterns
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPTX
Язык Html
PPTX
родительское собрание 1
PPTX
Things to know about Oracle GoldenGate
PPTX
Классный час по профориентации
PPTX
Kim, stacy cnmc case study presentation
DOCX
Chart
PPTX
набор в 9 классы
PPTX
плюша в болгарии
PPTX
гиа 9-2017
PPTX
функционал1
PPTX
World Ocean and its parts
A New Security Paradigm for IoT (Internet of Threats)
It for fiu The Internet as a tool for financial intelligence units
Security Threats
Cyber Security Landscape: Changes, Threats and Challenges
IoT Security: Cases and Methods [CON5446]
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
Security challenges as threats to national unity in nigeria
Successful Industrial IoT patterns
Tutorial 09 - Security on the Internet and the Web
 
Язык Html
родительское собрание 1
Things to know about Oracle GoldenGate
Классный час по профориентации
Kim, stacy cnmc case study presentation
Chart
набор в 9 классы
плюша в болгарии
гиа 9-2017
функционал1
World Ocean and its parts
Ad

Similar to IoT Security, Threats and Challenges By V.P.Prabhakaran (20)

PDF
IoT – Breaking Bad
PDF
Safeguarding the Internet of Things
PPTX
Assign 1_8812814ctm.pptx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
Internet of Things - Privacy and Security issues
DOCX
Addressing security and privacy in io t ecosystem v0.4
PDF
Cybersecurity in the Age of IoT - Skillmine
PDF
How Secure are you Around “IoT”_.pdf
PPTX
Security of iot device
DOCX
Can you please explain some of the Security Challenges for Internet of.docx
PPTX
A Wake-Up Call for IoT
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PDF
IoT, Security & the Path to a Solution
PPTX
IoT, Data Analytics and Big Data Security.pptx
PPTX
PPTX
Introduction to IOT security
IoT – Breaking Bad
Safeguarding the Internet of Things
Assign 1_8812814ctm.pptx
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Internet of Things - Privacy and Security issues
Addressing security and privacy in io t ecosystem v0.4
Cybersecurity in the Age of IoT - Skillmine
How Secure are you Around “IoT”_.pdf
Security of iot device
Can you please explain some of the Security Challenges for Internet of.docx
A Wake-Up Call for IoT
Technology & Policy Interaction Panel at Inform[ED] IoT Security
IoT, Security & the Path to a Solution
IoT, Data Analytics and Big Data Security.pptx
Introduction to IOT security

More from Koenig Solutions Ltd. (11)

PPTX
Best cyber security certifications 2017
PPTX
Top 7 Tips and Shortcuts for MS Outlook 2013
PPTX
10 tips for successful project management
PPTX
Top 7 productivity apps
PPTX
Capabilities of a good database
PPTX
Top Benefits of ITIL Certification
PPTX
How to Create Plan-of-Action to Secure Critical Information
PPTX
5 Things You Should Know About Ethical Hacking
PPTX
Azure training
PPTX
Top 5 Microsoft Certifications
PPSX
Koenig Corporate Presentation
Best cyber security certifications 2017
Top 7 Tips and Shortcuts for MS Outlook 2013
10 tips for successful project management
Top 7 productivity apps
Capabilities of a good database
Top Benefits of ITIL Certification
How to Create Plan-of-Action to Secure Critical Information
5 Things You Should Know About Ethical Hacking
Azure training
Top 5 Microsoft Certifications
Koenig Corporate Presentation

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Business Ethics Teaching Materials for college
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cardiovascular Pharmacology for pharmacy students.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Microbial disease of the cardiovascular and lymphatic systems
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
01-Introduction-to-Information-Management.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Business Ethics Teaching Materials for college
Open folder Downloads.pdf yes yes ges yes
Abdominal Access Techniques with Prof. Dr. R K Mishra
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
O7-L3 Supply Chain Operations - ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
GDM (1) (1).pptx small presentation for students
102 student loan defaulters named and shamed – Is someone you know on the list?

IoT Security, Threats and Challenges By V.P.Prabhakaran

  • 1. IoT Security, Threats and Challenges By V.P.Prabhakaran
  • 2. Introduction of IoT The Internet of Things (IoT) is the network of physical objects or “things” embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data. It is a complete integration of physical objects with computer logical operations. 01
  • 3. Things in IoT • Things, in the IoT, include vast collections of devices such as heart monitoring implants, biochip transponders on farm animals, automobiles with built-in sensors, or field operation devices that assist fire- fighters in search and rescue,” reads the definition provided by Wikipedia. 02
  • 4. Associated Challenges • IoT Security is all about protecting or safeguarding. Nowadays, in almost every objects, we have a small chip, which usually we used to ignore. Attackers try to compromise those chips by gaining logical access to devices remotely. All security and technical experts face the challenge of protecting that chip from attackers because all the devices, like cars, industrial machines, and home appliances, have the same chip that works with a specific program which is easy to target. 02
  • 5. Companies who Operate IoT • Traditional Big Companies – Google, Microsoft, and Amazon are the big companies who are well versed with latest security and threats associated with IoT and they have experts who can protect it from attacks. The Image below, that I would like to share, show how Amazon is using IOT. 02
  • 6. Companies who Operate IoT (contd…) • Big Companies – They are not as exposed in terms of threats associated with IoT, like Honeywell and Ford • Kickstartup – New joinees who did research and developed a prototype, later on big companies, like IFTTT (If This Then That) by Linden Tibbets and MuleSoft by Greg Schott, purchase these packages and used them. Currently, the industry is facing a shortage of IoT security experts and they still struggle with countermeasures of IoT, according to the report ” ISACA Survey: UK Security Experts Sceptical of IoT Device Security; 3/4 Say Manufacturers are Not Implementing Sufficient Security Measures “ 02
  • 7. Common Threats Associated with IoT • Vulnerable IoT Perimeters: When IoT networks are designed, there is lack of planning of good security implementation which can allow an intruder to easily gain access to the network. Let’s take an example of Smart Meter. If a cyber criminal compromised this device, he is able to access a domestic network and also can monitor the connections between objects in IoT. • Increase in Data Breaches: Data breaches are one of the biggest threats in IoT devices. Cyber attackers can try to spy on the communications between devices in IoT network. Devices accessed through Internet of Things may be used for cyber espionage purposes by an intelligence agency or by some companies for commercial purposes. The FBI’s chief information security officer warned the impact of IoT data breaches could be much worse for end users than previous enterprise data breaches. 02
  • 8. Common Threats Associated with IoT • Malware and Botnet Attacks: Malicious users designed the code for attempting to attack against IOT networks. Cyber criminals can exploit vulnerabilities in firmware running on the devices and run their arbitrary code, turning IoT components to unplanned use. Some of the Malware used in IOT is Linux worm, Linux.Darlloz. Graphics processing units-based malware and ransomware attacks are growing rapidly, due to the increase in data, bigger networks, and the Internet of Things (IoT), according to Intel Security’s five-year retrospective threat report. The analysis found that ransomware continued to grow rapidly, with the number of new ransomware samples rising 58 percent in Q2. According to Intel Security, the total number of ransomware samples also grew by 127 percent year-on-year, with the company attributing the increase to fast-growing new families, such as CTB-Locker and CryptoWall. The release of the report marks the five-year anniversary since Intel Security purchased McAfee for $7.7 billion. 02
  • 9. OWASP Introduces Vulnerabilities in IoT • The Open Web Application Security Project (OWASP) comes with best practices to improve the security of IoT. It is natural that the project also analyzed the top 10 security issues related to the popular paradigm: 02 • Insecure Web Interface Insecure Web Interface is a common vulnerability found in IoT. OWASP Zap and shodan tools are available and with them we can access these devices. The most famous example of this to date is the case of the web application on TrendNet cameras that exposed a full video feed to anyone who accessed it.
  • 10. OWASP Introduces Vulnerabilities in IoT (contd…) • Insufficient Authentication/Authorization Most IoT devices are protected with a weak password and it is easily exploited through a brute force attack. The attack could come from external or internal users. Some devices in IoT are configured with a base64 password encoding mechanism and sent between devices in plain text so attacker can use an online website through which they try to convert base64 code to simple text. Many IoT devices are secured with “Spaceballs quality” passwords like “1234”, put their password checks in client-side Java code, send credentials without using HTTPS or other encrypted transports, or require no passwords at all. 02
  • 11. OWASP Introduces Vulnerabilities in IoT (contd…) • Insecure Network Services Insecure network services may be vulnerable to buffer overflow attacks. Some other attacks can also be done, like DOS and DDOS attacks, which leave systems inaccessible to clients or users. In order to find insecure network services, we use several tools, like Nmap and other fuzzers. Examples of these types of services abound in IoT documentation and are regularly lit up by security researchers. In August 2014, a sweep of more than 32,000 devices found “at least 2000 devices with hard-coded Telnet logins.” 02
  • 12. OWASP Introduces Vulnerabilities in IoT (contd…) • Lack of Transport Encryption IoT devices have a lack of transport encryption which are exploited by an attacker who is trying to intercept the information exchanged between IoT devices. This attack can be done from internal and external users. • Privacy Concerns An attacker uses a different path, like lack of authentication, lack of strong transport encryption or other ports and network services through which they gain access to personal data. One of the biggest vulnerabilities, as per OWASP Standard, is that home users may not understand computer security, but they do understand physical security (“is my door locked?”) and privacy (“is that camera watching me?”). Furthermore, their fears are widespread. 02
  • 13. OWASP Introduces Vulnerabilities in IoT (contd…) • Insecure Cloud Interface We can identify an insecure cloud interface vulnerability through reviewing the connections to the cloud interface and analyzing if SSL is secure. We also attempt a password reset on the portal to find a live user, which can lead to user enumeration. Since most security professionals already know how to evaluate systems for these types of vulnerabilities, we won’t spend much time on it in this article, except to remind you that you should get the permission of any remote cloud service before you attempt to perform any type of penetration test against it. 02
  • 14. OWASP Introduces Vulnerabilities in IoT (contd…) • Insecure Mobile Interface • Insufficient Security Configurability • Insecure Software/Firmware • Poor Physical Security 02
  • 15. OWASP Introduces Vulnerabilities in IoT (contd…) • Insecure Mobile Interface • Insufficient Security Configurability • Insecure Software/Firmware • Poor Physical Security 02
  • 16. About Author • V.P.Prabhakaran is a highly-experienced security professional , having more then 9 years experience as Senior Information Security Consultant at Koenig Solutions. 02 Information Security Consultant CISSP | CISA | CISM |COBIT 5|TOGAF
  • 17. Koenig training services are sought by some of the biggest multinationals and Fortune 500 companies. Some of the brand names associated with Koenig for its world renowned IT training include: Our Valuable Customers 24
  • 18. 27 • Nearly half the cost as compared to similar training in UK or USA. • Experienced pool of 350+ certified trainers • Happiness Guaranteed else Money Back or Class Redo • Authorized partner for 30+large IT vendors • Multiple modes of delivery • Customizable learning packages • World class training centres with best infrastructure • Post training support • Excursion to local tourist attractions • Best accommodation and support services • Visa Guidance Advantages @ Koenig
  • 19. Let’s Talk Koenig Delhi Koenig Campus B-39, Plot No. 70, KLJ Complex-1, Shivaji Marg, Moti Nagar, New Delhi-110015 (India) Koenig Bangalore PARAGON PRIMA, 2nd & 3rd Floor, No. 39, 8th Main Koramangala 4th Block Bengaluru-560034, (India) Koenig Goa 3rd Floor, B/T1, Campal Trade Centre, Opp. Kala Academy, Panjim, Goa-403001 (India) 33 Koenig Shimla 7, Prospect Lodge, Behind YMCA, Lower Jakhu, Shimla-171001, Himachal Pradesh (India) Koenig Dehradun Plot #22, IT Park, Sahastradhara Road, Dehradun-248001, Uttarakhand (India) Koenig Dubai Block 3, Office G10, Dubai Knowledge Village Dubai, UAE Phone : +9714 3686241 Email : info@Koenig-dubai.com Koenig USA 640 W California Avenue, Suite 210, Sunnyvale, CA 94086, USA Koenig Singapore 30 Cecil Street, #19-08 Prudential Tower, Singapore 049712 Koenig Solutions (India) Website: www.koenig-solutions.com Phone : +91 75330 08521 (24x7) Email : info@Koenig-solutions.com