The de-perimeterization phenomenon – Protection at the Source

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Traditionally the focus on protection postures has been on the perimeter of an IT organization – the protection of network gateways, extranets or even between assets and internal users. The concept of perimeterization requires an asset to be protected/isolated/controlled against users in such a way that only legitimate access/use is allowed. However the need today is to focus on eradicating the weakness in the asset itself and this can be exploited using legitimate access methods. Hence the need is “protection at the source,” which is to secure data and the applications. This presentation focuses on these two concepts of “de-perimeterization and protection at the source”

Download Now


Implementation of Risk Mgt w/4 Principles of Catustayam

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

This presentation ties comprehensive risk management practices with the ancient diplomatic principles of Catustayam – saama (pacify), daama (rewards), danada (punish) and bheda (divide). There are several methods to incorporate saama (pacify), daama (rewards), danada (punish) and bheda (divide) into an Organizations “Configuration Items”- covering Management, Business operations, Users and Security. This presentation focuses mainly on risk management along these principles.

Download Now


Data Security in CSM era

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Companies are now exposed to the power of Social networking phenomenon, its adaption and growth. The presentation highlights risks and threats related to data security during fast revolution happening at present in CSM media. Various security controls, practices, strategies and related concerns are shared in this presentation giving a holistic view of managing your data security at various stages.

Download Now


Converged Identity Management

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Identity & Access Management Solutions are among the top security priorities for CIO’s today. The presentation highlights different kinds of data, the threats it faces and why it becomes critical to protect this data. Further, the presentation also makes a case for converged data management – the features and benefits such an arrangement can provide.

Download Now


Relationship Management basic model

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Relationship management is an important aspect of the CISO’s role. This presentation takes a look at the various facets of relationship management in a simple high level model which helps in the process and builds a model for the same.

Download Now


Considerations for Application Security

by Yogesh Bhatia, Senior Consultant, Aujas

Companies are now exposing their internal network and data through internet facing applications. These applications help organizations collaborate with their business partners and third party vendors. These enable organizations to carry out business more efficiently, but it also comes with inherent risks which are generally ignored until somebody hacks into the systems. This presentation speaks about why we need to worry about application security, what are the various things you can do and also touches upon the aspects of incorporating security as part of your Software Development Life cycle.

Download Now


Psychometric Analysis – Software developers and security testers

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

The fact that application or software security issues leads to most attacks, that protection at source is critical, perimeter security is not the only way to manage risk etc. has been known to us for several years now. There are several ways organizations are solving this issue using technologies, processes, training etc. An important area to look at is the way of thinking of developers and security testers. This presentation attempts to do a Psychometric analysis of the two areas and try and give some pointers to work on.

Download Now


Secure Development Lifecycle for Mobile App Development

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Download this presentation by Sameer Shelke, co-founder, COO and CTO, Aujas, speaking at the RSA conference, San Francisco on “Security Development Lifecycle for Mobile Application Development.” The presentation covers how the challenges and risks vary in mobile application development when compared to traditional application development due to differences in technology, vulnerabilities, economic models, user expectations & GTM and how Microsoft Security Development Lifecycle (SDL) provides a robust platform for proactive and effective secure development.

Download Now


IT Risk Management and Compliance The Real Life

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Risk Management and Governance have become critical themes today given the uncertain market, high incidence of threat and information security breaches. This presentation discusses how to have a sound IT GRC strategy for the organization based on the author’s learning over the years as a Risk Management Consultant, IS Auditor and CISO.

Download Now


Our Psychology and Security – The way we think

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Our Major Risk / Security weaknesses being Lack of acceptance of weaknesses / vulnerabilities, Low focus on risk management / operations, Marginalization of Compliance, Low focus on Privacy, Selective security focus –not looking at the complete picture and Low focus on Insider Threats, this presentation will take you through the ways to come out with solutions.

Download Now


Information Risk Management in Difficult Times

by Sameer Shelke, Co-founder, Chief Operating Officer & Chief Technology Officer, Aujas

Given the overall economic slowdown, organizations today are expected to derive more out of their current IT investments. The risk factor is drastically increasing owing to lesser spend on security controls, operations budget reduction and fewer people managing security. This presentation talks about impact and challenges with IT Risk management and it outlines what could be done and the focus areas of IT Risk Management in difficult times.

Download Now