SlideShare a Scribd company logo
+
Security for (Indian)
Startups
Manjula Sridhar
+ Agenda !
 Why and When does it matter ?
 Real Security Needs v/s FUD !
 Case Studies !
 Take Away !
+ Why Security ?
Most folk’s attitude towards security is
similar to that of exercise and diet.
Startups are no different
may be even worse !
+ When is Security Relevant ?
 Enabler to Business
 Payments and allied services (all online ordering ones)
 E-commerce
 Legal/Regulation mandated
 Healthcare, Legal
 Banking and Finance
 Prudent / Good to have (Privacy, Bad PR)
 Facebook, linkedin
 Portals
+ FUD is irrelevant to Startups
 Limited Budget or No budget.
 Focus is on getting up and running
somehow.
 Any publicity is a good publicity (Have
heard cases where founders
themselves planted fraud stories)
+ Case Study 1 : A well-known cab
company
 Technology Hack
 Well publicized event of an ethical hacker hacking the API
due to lack of Authentication and encryption.
 He was able to access the servers/DB as well as the credit
card info of the customers stored there.
 He also claimed he could recharge his mobile wallet.
 Huge negative publicity ensued and the cab company issued
a clarification saying it is only their test bed and not
production system that stores the actual customer data etc.
 Social Engineering
 Driver collecting the money multiple times for the incentives.
+ Case Study 2 : A Legal Process
Outsourcing company
 A LPO startup with Indo-US operations dealing with a patent
case in US.
 Disgruntled ex-employee got a document (supposedly stored)
in a secure vault (and only available for viewing) sent a mail
through fake email to the opposite party of the legal case
claiming to be in possession of the document.
 The opposing party did the right thing and showed it to the
judge and the judge froze the case and ordered the LPO to
address the issues.
 The client cancelled the contract and they had to struggle to
show that they indeed followed all the process.
+ What is the bare minimum security
?
 Authentication
 Encryption (https)
 Backup / Disaster recovery
 Logs
 Fraud Management
 Compliance and Certificate
 Software Development Security
 Privacy
+ Prudent View
 Security is continuous process.
 Best infrastructure and technology doesn’t guarantee no
hacking as weak processes and people issues may defeat
them.
 Security is a stance; it is best to have one and prepare for the
eventualities rather than get caught in the attacks and then
scramble.
 The stance after understanding the detailed risk profile could
be
 Cross it when it comes,
 Mitigate and continuously reduce
 Insure against.
Which one is yours ?
+
Thanks
contact@argbyte.com

More Related Content

PPTX
Info sec for startups
PDF
Clear and Present Danger
PPTX
Managing Identity without Boundaries
PDF
Application Security
PDF
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
A Smarter, More Secure Internet of Things
Info sec for startups
Clear and Present Danger
Managing Identity without Boundaries
Application Security
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
The 1st Step to Zero Trust: Asset Management for Cybersecurity
Application Security | Application Security Tutorial | Cyber Security Certifi...
A Smarter, More Secure Internet of Things

What's hot (20)

PPTX
Zero Trust Networks
PDF
Compliance is a pit stop – your destination lies ahead
PDF
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
PDF
Cyber Security For Organization Proposal Powerpoint Presentation Slides
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PDF
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PPTX
Understanding the Cyber Security Vendor Landscape
PPTX
Summer internship - Cybersecurity
PDF
Cyber Security for Digital-Era
PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
PPTX
Topic11
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPT
Identity-Defined Privacay & Security for Internet of Things
PPTX
Kent King - PKI: Do You Know Your Exposure?
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
PPT
Security&reliability
PPTX
Security Trend Report, 2017
PPT
Challenges in implementating cyber security
PDF
Insights into cyber security and risk
 
PPTX
Zero trust deck 2020
Zero Trust Networks
Compliance is a pit stop – your destination lies ahead
Inside The 10 Biggest and Boldest Insider Threats of 2019-2020
Cyber Security For Organization Proposal Powerpoint Presentation Slides
The Cyber Security Landscape: An OurCrowd Briefing for Investors
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
Understanding the Cyber Security Vendor Landscape
Summer internship - Cybersecurity
Cyber Security for Digital-Era
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Topic11
Are You Ready to Move Your IAM to the Cloud?
Identity-Defined Privacay & Security for Internet of Things
Kent King - PKI: Do You Know Your Exposure?
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Security&reliability
Security Trend Report, 2017
Challenges in implementating cyber security
Insights into cyber security and risk
 
Zero trust deck 2020
Ad

Viewers also liked (20)

PDF
Saas aroundio-iimb
PDF
PDF
2016 cloudnine iimb startup 7
PPTX
Decoding Term Sheet by N. Srikanth of Veda Corporate Advisors
PPTX
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
PPT
Effectual funding
PDF
Stock based compensations design for startups
PDF
Iimb 4startups appknox
PDF
Botmetric iim preso may 7v2
PPTX
Lean for startup IIMB NSRCEL
PPTX
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
PPTX
Cloud for-startup
PPTX
ESOPS for Startups by Ms. Neela Badami
PDF
Ask primer
PPTX
HR ForStartups_SuperSeva
PDF
Pitching4 startups
PPT
Growth for startups mastkalandar
PPTX
HR ForStartups_Kuliza
PDF
Media for start-ups By N Ravi Shankar of AimHigh consulting
PPTX
HR ForStartups_zipdial
Saas aroundio-iimb
2016 cloudnine iimb startup 7
Decoding Term Sheet by N. Srikanth of Veda Corporate Advisors
Valuation for startups by Parag Dhol of Inventus Capital @ NSRCEL of IIMB
Effectual funding
Stock based compensations design for startups
Iimb 4startups appknox
Botmetric iim preso may 7v2
Lean for startup IIMB NSRCEL
Term Sheets – Legal Issues By Ms. Neela Badami of Samvaad Ventures
Cloud for-startup
ESOPS for Startups by Ms. Neela Badami
Ask primer
HR ForStartups_SuperSeva
Pitching4 startups
Growth for startups mastkalandar
HR ForStartups_Kuliza
Media for start-ups By N Ravi Shankar of AimHigh consulting
HR ForStartups_zipdial
Ad

Similar to Manjula security for startups (20)

PPTX
The Difference Between Being Secure And Being Compliant
PPTX
Common sense security by Fortium Partners
PPTX
Data Security for Nonprofits
DOCX
87161911 selected-case-studies-on-cyber-crime
DOCX
Case 11. What exactly occurred Twitter is one of popular soci.docx
PPTX
Network Security - What Every Business Needs to Know
PDF
Cybersecurity and liability your david willson
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPSX
November 2017: Part 6
PPT
Information security management v2010
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
Hacker Defense: How to Make Your Law Firm a Harder Target
PPT
Powerpoint mack jackson
PPTX
Heartland
PDF
Potential Advantages Of An Insider Attack
DOCX
IT security : a five-legged sheep
DOCX
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
PDF
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf
The Difference Between Being Secure And Being Compliant
Common sense security by Fortium Partners
Data Security for Nonprofits
87161911 selected-case-studies-on-cyber-crime
Case 11. What exactly occurred Twitter is one of popular soci.docx
Network Security - What Every Business Needs to Know
Cybersecurity and liability your david willson
11 19-2015 - iasaca membership conference - the state of security
I’ve Been Hacked  The Essential Steps to Take Next
November 2017: Part 6
Information security management v2010
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Hacker Defense: How to Make Your Law Firm a Harder Target
Powerpoint mack jackson
Heartland
Potential Advantages Of An Insider Attack
IT security : a five-legged sheep
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdf

More from Kesava Reddy (13)

PDF
The Effectual Way of Starting A Startup.
PPTX
EMPLOYEE TO ENTREPRNEUR : Prepare to Plunge
PPTX
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
PDF
Marketing & Branding for Startups
PDF
Marketing For Startups
PDF
Pitching4 startups oct 2015 nbd 01
PDF
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
PPTX
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
PDF
Open Source For Start-ups, Prof. Rahul De
PDF
Sales For Startups- Prof. Ramesh Venkateswaran-March 08
PDF
Managing startup equity (Equity For Startups)
PPTX
Cloud computing for startups
PPTX
Media For Startups: Understanding media relations
The Effectual Way of Starting A Startup.
EMPLOYEE TO ENTREPRNEUR : Prepare to Plunge
Digital Marketing For Startups By VENUGOPAL GANGANNA, CEO at Langoor Digital
Marketing & Branding for Startups
Marketing For Startups
Pitching4 startups oct 2015 nbd 01
Leveraging media relations | Media For Startups | Prof. Bringi Dev | Jul 05 @...
PR for Startups - N RAVI SHANKAR - Aim High Consulting - 5th july 2014
Open Source For Start-ups, Prof. Rahul De
Sales For Startups- Prof. Ramesh Venkateswaran-March 08
Managing startup equity (Equity For Startups)
Cloud computing for startups
Media For Startups: Understanding media relations

Recently uploaded (20)

DOCX
Euro SEO Services 1st 3 General Updates.docx
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Business model innovation report 2022.pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PPTX
Business Ethics - An introduction and its overview.pptx
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PPTX
New Microsoft PowerPoint Presentation - Copy.pptx
Euro SEO Services 1st 3 General Updates.docx
ICG2025_ICG 6th steering committee 30-8-24.pptx
BsN 7th Sem Course GridNNNNNNNN CCN.pdf
Lecture (1)-Introduction.pptx business communication
Deliverable file - Regulatory guideline analysis.pdf
Nidhal Samdaie CV - International Business Consultant
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Business model innovation report 2022.pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
Business Ethics - An introduction and its overview.pptx
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Chapter 5_Foreign Exchange Market in .pdf
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
unit 1 COST ACCOUNTING AND COST SHEET
New Microsoft PowerPoint Presentation - Copy.pptx

Manjula security for startups

  • 2. + Agenda !  Why and When does it matter ?  Real Security Needs v/s FUD !  Case Studies !  Take Away !
  • 3. + Why Security ? Most folk’s attitude towards security is similar to that of exercise and diet. Startups are no different may be even worse !
  • 4. + When is Security Relevant ?  Enabler to Business  Payments and allied services (all online ordering ones)  E-commerce  Legal/Regulation mandated  Healthcare, Legal  Banking and Finance  Prudent / Good to have (Privacy, Bad PR)  Facebook, linkedin  Portals
  • 5. + FUD is irrelevant to Startups  Limited Budget or No budget.  Focus is on getting up and running somehow.  Any publicity is a good publicity (Have heard cases where founders themselves planted fraud stories)
  • 6. + Case Study 1 : A well-known cab company  Technology Hack  Well publicized event of an ethical hacker hacking the API due to lack of Authentication and encryption.  He was able to access the servers/DB as well as the credit card info of the customers stored there.  He also claimed he could recharge his mobile wallet.  Huge negative publicity ensued and the cab company issued a clarification saying it is only their test bed and not production system that stores the actual customer data etc.  Social Engineering  Driver collecting the money multiple times for the incentives.
  • 7. + Case Study 2 : A Legal Process Outsourcing company  A LPO startup with Indo-US operations dealing with a patent case in US.  Disgruntled ex-employee got a document (supposedly stored) in a secure vault (and only available for viewing) sent a mail through fake email to the opposite party of the legal case claiming to be in possession of the document.  The opposing party did the right thing and showed it to the judge and the judge froze the case and ordered the LPO to address the issues.  The client cancelled the contract and they had to struggle to show that they indeed followed all the process.
  • 8. + What is the bare minimum security ?  Authentication  Encryption (https)  Backup / Disaster recovery  Logs  Fraud Management  Compliance and Certificate  Software Development Security  Privacy
  • 9. + Prudent View  Security is continuous process.  Best infrastructure and technology doesn’t guarantee no hacking as weak processes and people issues may defeat them.  Security is a stance; it is best to have one and prepare for the eventualities rather than get caught in the attacks and then scramble.  The stance after understanding the detailed risk profile could be  Cross it when it comes,  Mitigate and continuously reduce  Insure against. Which one is yours ?