Cyber Immunity Unleashed: Explore the Future with iTech Magazine! - PowerPoint PPT Presentation

About This Presentation

Cyber Immunity Unleashed: Explore the Future with iTech Magazine!


Dive into the dynamic world of innovation with inaugural edition of iTech Magazine, where cutting-edge technology meets insightful storytelling. Explore the latest trends, uncover groundbreaking advancements, and connect with the forefront of the tech landscape. Elevate your tech journey with in-depth features, expert perspectives, and a spotlight on the innovations shaping our digital future. Welcome to iTech Magazine – Where Tomorrow's Tech Unfolds Today! Visit to know more: – PowerPoint PPT presentation

Number of Views:4
Date added: 18 January 2024
Slides: 53
Provided by: digitalconfex


Transcript and Presenter's Notes

Title: Cyber Immunity Unleashed: Explore the Future with iTech Magazine!

Genie Sugene Gan
Head of Government Affairs Public Policy, APJ
META regions CEO Office, Kaspersky
(No Transcript)
(No Transcript)
Welcome to the inaugural issue of DIGITALCONFEXs
iTech Magazine - your go-to source for
cutting-edge insights, expert analysis, and a
front-row seat to the ever-evolving landscape of
technology. Technology knows no boundaries, and
neither do we. Our Magazine strives to connect
tech enthusiasts, professionals, and curious
minds from across the globe. Were also excited
to spotlight trailblazing companies and
individuals who are redefining the landscape of
technology. Their stories are not just inspiring
but also offer a blueprint forsuccess in a
constantly evolving industry. Join us on this
exciting journey through the ever-evolving world
of technology. Explore, learn, and engage with
iTech Magazine as we unravel the mysteries and
celebrate the triumphs of innovation. Warmest
36 39
40 42
44 48
Gmultiple regions in Kaspersky
enie heads up the Public
Policy Government Affairs
(including Asia-Pacific, Japan, Middle
East, Turkey Africa). Genie comes with an
excellent academic track record she holds a
Juris Doctor in law, an honors degree in
Accountancy, and a Specialist Diploma in
Counselling Psychology. Called to the
Singapore Bar and a qualified lawyer, she is
also a Mediation Coach and an International
Mediator amongst other things. Having a rich and
diverse career history, Genie started her
journeys in accountancy and law in Big Four
firms. Early on, she was an award- winning
entrepreneur, before spending a significant
length of time as a senior official in the
Singapore Government, having assumed several
key portfolios such as Special Aide to the
Minister for Law, Singapore negotiator and
delegate to the United Nations General Assembly,
and Director for policy and law reform. Outside
her professional portfolio, her passion for
teaching, non-profit and charity work has led
her to be an adjunct lecturer at universities
and serve on various Boards and Committees of
Non- Profit Organizations and volunteer for pro
bono legal causes.
Genie Sugene Gan Head of Government Affairs
Public Policy, APJ META regions CEO Office,
-JANUARY 2024 7
The key to a safe and secure digital
transformation By Genie Sugene Gan, Head of
Government Affairs Public Policy APAC META at
Digital transformation has brought about
tremendous opportunities for economic and
industrial growth. The Internet of Things (IoT),
in particular, has allowed businesses to build
end-to-end digital services, and improved their
ability to analyze data and monitor device
operation and condition. Ops-Tech (OT)
platforms, which started as part of process
controls for manufacturing equipment, are now
ubiquitous. However, these developments have also
created a complex environment consisting of a
large number of disparate digital elements, which
introduces more points of vulnerability that
cybercriminals can potentially attack. A new
paradigm is needed to ensure that cybersecurity
solutions for this complex environment remains
efficient and secure Cyber Immunity is one such
vision upon which such solutions can be built.
systems, programmable logic controllers (PLCs),
and computer numerical control (CNC) also
offers opportunities for professional targeted
attacks. Just between 2017 and 2021, the number
of observed Advance Persistent Threats (APTs) and
activity clusters grew from 100 to 900. Based
on Kasperskys research, more than 40 of all ICS
computers globally were attacked in 2022.
Considering the vast amounts of data created and
processed by OT platforms, there is an urgent
need to find efficient yet customized
cybersecurity solutions that can be scaled up
The Vision of Cyber Immunity and Kasperskys
Operating System
Even with evolving technologies, the
cybersecurity industry often finds itself merely
playing catch-up with the attackers. This is
especially so when traditional cybersecurity
solutions adopt an approach of detecting and
reacting. Kaspersky thus embarked on an ambitious
effort to change things, by finding a way to
develop IT systems with innate protection
Cyber Immunity.
Growing Pervasiveness and Complexity of Threats
in IoT and OT Platforms
As the number of devices connected to the IoT
grows exponentially, the installation of
protective tools that need regular updates on
each of these devices is a time- consuming and
resource-intensive process. The problem is
compounded by many of these devices not having
the processing capacity for cybersecurity add- on
tools such as antivirus software. One example is
the growing popularity of the cloud kettle, which
is part of the IoT and can be controlled through
an app on a smartphone not all cloud kettles
have the CPU or memory for solutions against
cyberattacks, but this does not mean that they
will not be targeted in attacks. This is a
problem that did not exist during the eras of
mere whistling or electric kettles.
The vision of Cyber Immunity posits that by
separating the IT system into isolated parts and
controlling the interactions between them, the
system continues to perform critical functions
even in an aggressive environment and stops
potential attackers in their tracks. The goal is
to ensure that the cost of an attack on an
organization far exceeds the cost of possible
damage, thus rendering an attack ineffective.
A recent finding by Kasperskys researchers
illustrates just how pervasive IoT threats have
become, as well as the fact that they could be
targeted at seemingly innocuous devices.
Researchers found that a popular model of smart
pet-feeder, which dispenses pet food at regular
intervals and has cameras to check on the pet,
could be easily hacked to allow an attacker to
gain unauthorized access to the device and
effectively use the pet feeder as a spy camera.
There are also risks of a chain reaction type of
attack, as once an attacker gains control of a
pet feeder in the home network, it can be used as
a hub to launch more attacks against other
devices in the network.
Figure 1 Cyber Immunity as the Design Principle
for KasperskyOS
To operationalize the vision of Cyber Immunity,
Kaspersky developed its own operating system
KasperskyOS which comprises a microkernel and
the Kaspersky Security System (KSS) module, which
come together to provide protection by
Where OT platforms are concerned, the disparate
network of robots, industrial control systems
(ICS), supervisory control and data acquisition
The term microkernel implies that only the most
critical system operation mechanisms are located
in the kernel, while less important functions are
ordinary applications located outside the
kernel. This makes it much easier to ensure that
the kernel code is free of errors and
vulnerabilities, and that the attack surface is
minimal. This works hand in hand with the KSS
module, which checks each interaction for
compliance with security policies, and blocks any
interaction that is non-compliant this ensures
that even if a component is compromised, KSS can
eliminate or minimize any possible damage. Figure
3 Size of KasperskyOS microkernel code compared
to the monolithic kernel of a general-purpose
system Actual Applications of Cyber Immune
Solutions Cyber Immunity is not just a vision or
theory Kaspersky has successfully developed
real world applications for use in Industrial
IoT Infrastructure Security, Smart City
Protection, and Safe Smart Cars, among others,
through a combination of KasperskyOS and hardware
developed in collaboration with partners such as
Siemens as well as Kasperskys subsidiary,
Adaptive Production Technology (Aprotech).
Industrial IoT Infrastructure Security Industrial
IoT infrastructure consists of many
components at various levels. One component to
which all devices in any IoT system connect is
the gateway through which information is
transferred to data centers for further
processing and storage. Kaspersky IoT Secure
Gateway (KISG), powered by KasperskyOS, is
installed on the boundary between IoT
infrastructure and external data networks to
protect this crucial interface. The gateway
blocks attacks on smart ICS, equipment and
information-sharing channels by identifying
unauthorized network connections, and providing
secure updates and configuration of software, and
transfers control instructions to actuators.
Convenient centralized configuration and
management of the events of Kaspersky IoT Secure
Gateway are provided by Kaspersky Security
Center, which enables an administrator to monitor
the status of gateways from a single point and
respond quickly to incidents.
Figure 2 KasperskyOS Components Interaction
Compared to the traditional monolithic kernel of
a general-purpose system, which requires 35
million lines of code in Linux, the KasperskyOS
microkernel only requires approximately 100,000
lines of code to develop. This drastically
lowers the barrier for developers to create
Cyber Immune solutions using KasperskyOS, and
reduces the cost of developing and supporting
secure IT solutions, even if untrusted third-
party code is used. Notably, the
microkernel architecture of KasperskyOS also
enables Provable Security (based on mathe
matical proofs), and minimizes the Trusted Code
Base required. While it is possible to use
Provable Security on other operating systems,
this will take considerably more effort.
Figure 4 Gateway functions in an industrial
-JANUARY 2024 9
Smart City Protection Large cities face the
challenge of managing public utilities for
thousands of residential and non-residential
premises efficiently. This often requires
automated data, but collection of such data has
to be secured. Kaspersky, with support from the
Orenburg regional government, successfully built
a cloud control room for managing smart digital
systems in the municipal sphere, using several
solutions for protection at different levels. The
cloud level is protected by Kaspersky Hybrid
Cloud Security, which controls applications and
devices, segments networks, and prevents the use
of unpatched vulnerabilities. The data transfer
channel from the controller (PLC) to the cloud is
protected by KISG 1000, which detects and
classifies all devices on the network, and has
firewall functions and blocks attacks on CCTV
cameras, motion and door sensors, and other local
devices and data links. This is in turn managed
by the Kaspersky Security Center platform. The
cloud control room has thus made it possible to
monitor the actual consumption of resources in
real time, get notifications of accidents, gain
better control over the deterioration of
telecommunications units (TCU/V2X, gateways),
driver assistance systems, self-driving cars
(HAD/ ADAS) and other components of the smart
vehicle digital cockpit. KasperskyOS ensures
component isolation and control over interprocess
communication, which prevents separated systems
from affecting one another, thus enabling the
highest level of solution reliability and
security in smart cars.
Figure 6 Solutions used for safe smart cars
and increase transparency in public utilities
management while ensuring the safekeeping
of automated data.
There are many more applications of Cyber
Immunity, such as in Virtual Desktop
Infrastructure and in railway protection. Cyber
Immunity has also received much recognition, with
KasperskyOS-based products having won awards at
the World Internet Conference in China in both
2020 and 2022. In the future, we hope to see even
more uses of Cyber Immunity for the vision to
take root and become established.
Hopes for the Future of Cyber Immunity and
Potential Partnerships
Figure 5 Solutions used for smart city
protection in Orenberg
The vision of Cyber Immunity was designed to be
collaborative. Kaspersky alone does not have all
the solutions to bring it to fruition, and
KasperskyOS was designed for scalability and
participation from like- minded partners.
Kaspersky seeks partners to join us in building a
Cyber Immune world. These could be education and
research institutions, which could receive
content on the basics of Cyber Immunity, and
which could potentially co-develop Cyber Immune
products with us. We are also keen to work with
partner resellers and system integrators, who can
integrate Cyber Immunity into both new and
existing products. Finally, our KasperskyOS-based
products Kaspersky Thin Client and KISG are ready
to be applied in more use cases. We hope to
further the vision of Cyber Immunity and see
scalable solutions for KasperskyOS that will
underpin the infinite possibilities for digital
Safe Smart Cars A modern motor vehicle can have
more than 100 electronic control units (ECUs).
They optimize fuel consumption, inform the driver
of road conditions, entertain passengers, control
braking, and perform other important functions.
The software for these control units is becoming
more and more sophisticated, and can exceed 100
million lines of code (more than in a modern
operating system) and creates possibilities for
vulnerabilities. Kaspersky Automotive Secure
Gateway (KASG) is specialized software designed
to provide secure and reliable communication
between electronic units of the
electrical/electronic architecture, the connected
vehicle cloud, and diagnostic devices. This
software can be used to implement remote
diagnostics, secure over-the-air ECU updates, and
other telematic services. KASG includes the
Kaspersky Automotive Adaptive Platform (KAAP),
powered by KasperskyOS, which is a software
development kit that supports secure solutions
for ECUs, including
Unleashing the Power of Cloud, Security, and
Cutting-Edge Development with an ESG
Advantage. At DiggFull, we navigate the
complexities of technology with a commitment
to ESG principles. Our cloud services not
ensure scalability, security and efficiency but
email at also
prioritize sustainability, ethical
practices, and responsible governance. Dive into
a world where cloud solutions are boundless,
development is driven by passion, and security is
unwavering. With DiggFull,
Visit Our Website
you're not just embracing technology you're
championing a sustainable and ethical digital
MILITARY TRANSITION Chief Information Security
EDGE. Experienced Technology Executive Skilled In
Cyber Security, It Project Management, Vendor
Public Relations. Proficient In Procurement
Analytics And Strategic Growth. Worked As Chief
Technology Program Manager For Data Analytics,
Ai, Innovation. Passionate About Leveraging
Cutting-Edge Tech For Positive Impact.
Tfor innovation, growth, and prosperity.
he digital economy has revolutionised the way
we live, work, and interact with each other. It
Indias digital economy has grown 2.4 times
faster than the Indian economy, with strong
forward linkages to non-digital sectors. Indias
digital consumer base is the second largest in
the world and growing at the second- fastest rate
amongst major economies. Indias inclusive
digital model is narrowing the digital divide
within the country and bringing benefits of
Anurag Chandra Cyber Enthusiast Digital Economy
Security technology to all segments of people.In
times of crisis, DPIs elevate from an efficient
good-tohave to a necessary must-have like
bringing in the real time observability to
vaccine inventory visibility.
has brought about unprecedented opportunities
However, with these opportunities come new
challenges and risks. The digital economy is
under constant threat
from cybercriminals, hackers, and other malicious
actors who seek to exploit vulnerabilities in our
digital infrastructure. The need for digital
security has never been more urgent. In this
article, its an endeavour to bring out the
importance of digital security in todays economy
and why it is essential to safeguard our digital
assets. Lets try to investigate also, latest
trends, technologies, and best practices in
digital security and provide actionable insights
that can help us secure our digital future. Let
try discovering as to how we can protect the
digital economy and ensure a safe and secure
digital transformation for all.
DPIs help strengthen a countrys public finances
through strengthening tax revenue or
increased financial transparency through
linking of Public Financial Management System
(PFMS) with Aadhaar. But then what are the
challenges even if I can be enabling
targeted-welfare spends through Aadhaar- like
identity program or reduced risk and increase in
the supply of credit to MSMEs and the public.
Countries with many DPIS are best suited to
adopt, spread as well as regulate the use of
Artificial Intelligence (AI) technologies in
service of their people.
India has seen a significant boom in the digital
economy in recent years. The Digital India
initiative has played a key role in this growth.
The initiative aims to provide digital
infrastructure to every citizen of India and has
been successful in increasing the number of
internet users in the country. The digital
platform infrastructure has enabled businesses to
reach a wider audience and has created new
opportunities for entrepreneurs.
As the digital realm continues to evolve, and
with the sharing DPIs, this can be unleashed as
powerful DIGITAL capital. In such scenarios,
Indias cyber insurance market has emerged as a
domain of strategic importance and robust growth.
The significant rise in cyber awareness,
compelling companies, businesses, and individuals
to rely heavily on digital solutions for daily
operations. However, this has also led to
increased incidences of cybercrimes, targeting
vulnerable group.
Digital Public Infrastructure (DPI). According to
Nandan Nilekani, an Indian entrepreneur,
cofounder Infosys. India is moving from an
offline, informal, low productivity, multiple set
of micro-economies to a single online, formal,
high-productivity mega economy with the help of
Digital Public Infrastructure (DPI). The DPI
approach includes frameworks such as the
Open Network for Digital Commerce (ONDC), Open
Credit Enablement Network (OCEN), and the
National Digital Education Architecture (NDEAR),
which are unlocking new opportunities for
businesses and individuals alike.
Therefore, certainly! Securing the digital
economy is a crucial aspect of the modern world.
various surveys, it reveals that securing the
digital economy is a complex and evolving
challenge. According to the World Economic Forum,
two key challenges for the digital economy are
cybersecurity and privacy.
Nilekani believes that this transformation will
continue over the next 20 years and will create
tremendous economic value and empowerment of
citizens as new digital applications permeate
sector after sector.
As per the Indian 2011 census, there is only 36
chance that two Indians selected at random could
even talk to each other. As we as Indians have a
huge variations in culture, markets,
industrialisation and regulations. But today in
the year 2024 we have most closely micro
economies, electronic registering and digital IDs
through Aadhaar, a unique lifetime identity. In
these eight years of period India became the
worlds highest volume of digital payments.
The Asia-Pacific Economic Cooperation (APEC) has
identified the following challenges
cybersecurity, data privacy, digital inclusion,
and digital skills development. In Southeast
Asia, the digital economy has brought about
opportunities for innovation and growth, but also
poses challenges such as cybersecurity, data
privacy, and human and physical capital
-JANUARY 2024 13
SOURCES. emerald Insight, government.economictimes
prevent unauthorized access.
Importance of Digital Security in Todays
Economy Safeguard Digital Assets. Digital
security is a critical aspect of todays economy,
and it is essential to safeguard our digital
assets. The rise of the digital economy has
brought about unprecedented opportunities for
innovation, growth, and prosperity. However, with
these opportunities come new challenges and
risks. The
With the rise of digital payments in India, there
has been a significant increase in the number of
frauds perpetrated by exploiting digital payment
systems and human vulnerabilities. The Reserve
Bank of India (RBI) reported that the volume of
frauds reported by financial institutions (FIs)
using cards and internet banking was 34 higher
in 2021-22 than in 2019-20. During 2022- 23,
public sector banks reported 3,405 frauds
involving Rs 21,125 crore, while private banks
reported 8,932 cases involving Rs 8,727 crore.
The rest were from foreign banks, financial
Anurag Chandra Cyber Enthusiast Digital Economy
Security institutions, small finance banks, and
payment banks. Frauds occurred predominantly in
the category of digital payments (card/
internet), in terms of number, said Reserve
Banks Annual Report 2022-23.
digital economy is under constant threat from
cybercriminals, hackers, and other malicious
actors who seek to exploit vulnerabilities in our
digital infrastructure. The need for digital
security has never been more urgent. Companies
and governments alike must take proactive
measures to Anurag Chandra Cyber Enthusiast
Digital Economy Security secure their digital
assets. By embracing digital security, we can
ensure a safe and secure digital transformation
for all, fostering trust in the digital economy
and enabling sustainable economic growth.
The dark web is a part of the internet that is
not indexed by search engines and is often used
for illegal activities. The changing nature of
fraud and increase in fraudulent activities can
be attributed to the major factors like -
Diversified entry points. Businesses in India
have been digitizing across their value chains at
breakneck speeds. This increases the scope of
opportunities for fraudsters and offers them a
wider attack surface for exploitation. The common
entry points include social media, ecommerce, or
services like retail transactions, rideshares and
As a CISO, it is important to stay up-to-date
with the latest cybersecurity trends and
technologies. This includes keeping up with the
latest threats and vulnerabilities, as well as
understanding the best practices for securing
digital assets. It is also important to have a
strong disaster recovery plan in place in case of
a cyber attack.
To secure the digital economy, it is important to
have a robust cybersecurity framework in place.
This may need measures such as encryption,
firewalls, intrusion detection system, and access
controls to be mandatorily be included. It is
also important to have a disaster recovery plan
in place in case of a cyber attack. By taking few
of the industry proven steps, businesses can
ensure that they are well-protected in the
digital age.
- Vulnerabilities in the new payment
technologies. Personal data of customers is made
available on the dark web, enabling fraudsters to
carry out this type of fraud.
To combat these frauds, payment service providers
have been providing an enhanced seamless user
experience at competitive prices, promoting wider
adoption of digital payments. Users have
multiple options for digital payments such as
cards, wallets, Unified Payments Interface (UPI),
mobile banking, QR code and various other methods
. UPI has contributed significantly to the growth
of digital transactions in India.
In this year, AI would help cybercriminals
manipulate social media and shape public opinion
like never before. Bad actors would deploy AI
tools to fabricate photos, videos, and audios and
lodge on social media.
As a CISO, it is important to be aware of the
current cybersecurity landscape in India.
According to a survey conducted by Indias
print media, Indias digital footprint has
made it an alluring target for cybercriminals
seeking to exploit vulnerabilities.
In the vast and intricate landscape of the
internet, the Dark Web stands as a shadowy realm
that has captured the imagination of both cyber
enthusiasts and those concerned about online
security. This hidden corner of the web is
notorious for being a hub of illicit activities,
from drug trafficking and hacking services to
stolen data markets and more.
providers have warned that data breaches would
skyrocket in 2024, and there would be continued
acceleration in ransomware activities in addition
to a surge in identity-based attacks resulting
from increasing cloud adoption. Deepfakes would
also pose a looming threat to the countrys
cybersecurity this year.
The Dark Web is a portion of the internet
intentionally hidden from search engines and
casual users. It is only accessible through
specific software, such as Tor (The Onion
Router), which anonymizes users and their
activities. Unlike the Surface Web, which
includes websites indexed by search engines, and
the Deep Web, which comprises unindexed web pages
(e.g., databases,
As organizations migrate their data,
applications, and workloads to the cloud, the
attack surface widens, providing a broader
canvas for threat actors to exploit.
Organisations may also have less visibility and
control over cloud resources than in on-premises
environments, which could make it difficult to
detect intrusions and
password-protected content), the Dark Web is
designed to be deliberately concealed. The Dark
Web is, in essence, a subset of the Deep Web, but
what sets it apart is the intent to hide content
and activities. This intentionality has made it a
haven for those seeking anonymity, whether
for legitimate purposes like whistleblowing or
nefarious activities like illegal
trade. Cybercriminals use the dark web as their
base of operations to carry out illegal
activities, sell stolen data, and launch
cyber-attacks on businesses. It is a growing
concern for enterprises, as they face
increasingly sophisticated cyber threats every
day. The Dark Web poses significant threats
to both individuals and organizations in terms
of Identity Theft, Financial Fraud, Corporate
Espionage, Reputational Damage and also creating
Law Enforcement Challenges.
should establish a comprehensive disaster
recovery plan to ensure they can recover their
systems and data quickly in case of a successful
cyber-attack. To summarise and to address these
challenges, CISOs should consider implementing
the following measures Ø Conducting regular
security assessments. Regular security
assessments can help identify vulnerabilities and
provide insights into the effectiveness of
existing security measures. Ø Implementing
multi-factor authentication. Multi- factor
authentication can help prevent unauthorized
access to sensitive data and systems. Ø
Establishing a security awareness program. A
security awareness program can help educate
employees on the importance of cybersecurity and
how to identify and report potential security
threats. Ø Implementing a data backup and
recovery plan. A data backup and recovery plan
can help ensure that critical data is not lost in
the event of a security breach. Ø Partnering with
a trusted cybersecurity provider. Partnering with
a trusted cybersecurity provider can help
organizations stay up-to-date with the latest
security threats and implement effective security
The Digital Personal Data Protection Bill, 2023
(DPDP Bill). In the era of digitisation, data
protection must be balanced with the right
equation of fraud detection associated with data.
Businesses must be well-equipped to combat the
threats of data breaches and ensure their
customers data is not at risk. The Digital
Personal Data Protection Bill, 2023 (DPDP Bill)
marks the onset of a new data protection regime
in India, the bill is ready to set a benchmark
amongst similar legal frameworks,
globally. protect the enterprise from the dark
web, cybersecurity professionals must sharpen
their skills, invest in advanced security
technologies, and implement effective security
By implementing these measures, CISOs can help
protect their organizations from the growing
threat of cyberattacks and ensure the safety of
their data and systems.
CONCLUSION As AI continues to lower the barrier
to cybercrime and ushers in a new era of
AI-powered cyberthreats, scams will become more
sophisticated and more difficult to distinguish
from legitimate messages and sites. Even experts
will have trouble telling fact from fiction to
deepfakes that could impact everything including
the future of our children, and beyond,. Digital
security is no longer an option, but a necessity
in todays economy. As the world becomes
increasingly interconnected, the risks and
threats to our digital
To ensure digital payment security, it is
important to follow the best practices
recommended by the payment service providers.
There will be few basic steps which we all might
have to adhere to, like
  • Use strong passwords and change them frequently.
  • Avoid using public Wi-Fi networks for making
    digital payments.
  • Keep your devices operating system and
  • up-to-date.
  • Do not share your personal information, such as
  • passwords, PINs, or OTPs, with anyone.
  • Check your bank statements regularly to detect
  • unauthorized transactions.
  • Integrated platforms can consolidate numerous
    point products into a single purpose-built
    solution. The consolidation of endpoint, server,
    and cloud security and workload protection
    allows you to protect your ecosystem, providing
    more visibility and simplifying operations
  • Educate Your Employees as they are often the
    first point of contact with cybercriminals, who
    use social engineering tactics to gain access to
    your network. Provide awareness training that
    teaches them to recognise suspicious and
    fraudulent messages, be careful about the
    information they share online, and verify any
    requests for sensitive data.

infrastructure, services, and data have grown
exponentially. The rise of artificial
intelligence and the Internet of Things has
fundamentally altered the way we
use software and data, making softwares attack
surfaces more complicated and software itself
more vulnerable. The importance of digital
security cannot be overstated, and it is
imperative that companies and governments alike
take proactive measures to secure their digital
assets. By embracing digital security, we can
ensure a safe and secure digital transformation
for all, fostering trust in the digital economy
and enabling sustainable economic growth. To
safeguard our digital assets, we must adopt a
comprehensive approach to digital security.
This approach should include measures such as
implementing robust cybersecurity protocols,
conducting regular security audits, and
investing in employee training and awareness
programs. We must also leverage the latest
technologies and best practices in digital
security to stay ahead of emerging threats. By
taking these steps, we can protect our digital
assets and ensure a safe and secure digital
future for all.
Implement Effective Security Policies and
-JANUARY 2024 15
In the dynamic realm of Web3, where blockchain
and tokenization take center stage, startups face
unique challenges on their path to success.
Accelerators, specialized programs for rapid
growth, emerge as guiding beacons for these
ventures. This article delves deeper into the
profound impact of accelerators, with a focus on
the tailored approach required for diverse Web3
early-stage startups.
he Web3 space is a frontier of innovation,
presenting startups with intricate challenges
that demand expertise in blockchain and
tokenized ecosystems. Accelerators step into
this landscape, offering more than just
  • education, networking, and funding. They become
    architects of success, especially crucial in a
    domain where equity or tokens often constitute
  • Tailoring Accelerator Programs for Web3 Diversity
  • Recognizing the diverse needs of Web3 startups at
    various stages, accelerators play a pivotal role
    in tailoring programs. The demands of an
    early-stage Web3 venture vastly differ from those
    of a series-A health startup. This nuanced
    understanding allows accelerators to provide
    targeted mentorship, ensuring each cohort
    receives specialized guidance for success.
  • Mentorship Accelerators offer invaluable
    mentorship from seasoned industry professionals,
    guiding startups through the complexities of
    Web3 with first-hand insights.
  • Educational Resources Curating specialized
    content, accelerators empower entrepreneurs to
    stay abreast of Web3 advancements, ensuring they
    are well- informed and equipped for success.
  • Networking Opportunities Accelerators facilitate
    meaningful connections with investors, mentors,
    and peers, creating a collaborative environment
    where ideas flourish and startups grow.
  • Seed Funding Crucial seed funding provided by
    accelerators serves as the financial backbone
    for early-stage startups, nourishing growth
    and transforming innovative concepts into
    impactful solutions.

The customization of accelerator programs is
explored further in subsequent chapters,
highlighting their adaptability to diverse
startup needs in the vibrant Web3 ecosystem.
Artak is BD and IR manager at yardhub web3
venture studio accelerator.
Different Accelerator Types in Web3 In the realm
of startup accelerators, tailoring programs to
meet the distinct needs of various industry
verticals and startup stages is paramount.
The diverse requirements of Web3 early-stage
startups differ significantly from those of
series-A health startups.
Recognizing these differences allows accelerators
to design programs that provide targeted
mentorship, resources, and support, ensuring that
each cohort receives the specialized guidance
required for success in their specific domain and
stage of development. This customized approach
enhances the effectiveness of accelerator
programs in fostering innovation and
facilitating the growth of startups across a
spectrum of industries and developmental phases.
especially those involving tokens or NFTs,
depends on the effectiveness of the initial
launch. Multiple factors influence this,
requiring experience and insight for informed
decision-making. - Fundraising Hurdles
Successfully raising funds goes beyond a
compelling pitch deck. Warm introductions from
other founders or personal relationships with VCs
or angel investors are crucial. Feedback from VCs
early on can save significant time.
yardhub Accelerator Nurturing Web3
Innovation response to the unique challenges
faced by Web3 startups, the yardhub accelerator
emerges as a beacon of support. The accelerator
leverages the teams rich experiences over the
past two years in launching and nurturing
successful Web3 projects. The program is
meticulously crafted, focusing on product
development, business models, GTM strategy,
marketing, business development, and fundraising.
Explore the diverse structures of Web3
accelerators, essential pathways for startups.
Understanding this variety is crucial for
startups navigating their way to success in the
dynamic Web3 landscape.
  • Regional Accelerators Regional accelerators
  • strategically target startups within specific
    locations, harnessing local entrepreneurial
    ecosystems to provide contextual advantages.
  • Corporate Accelerators Large corporations drive
    Web3 innovation through strategically
    aligned accelerators. These programs offer
    startups exclusive access to corporate resources
    and extensive networks, propelling rapid growth.
  • Government Startup Programs Governments actively
  • contribute to Web3 innovation through initiatives

yardhub accelerator program offers
  • Mentorship from successful experts
  • Educational workshops focused on the needs of
  • Strategic networking opportunities with key
  • players and investors
  • Market positioning assistance for user adoption
    and brand development
  • Grant support from blockchains and other
  • Hub71 and DIFC Fintech Accelerator in the UAE.
    These programs demonstrate a dedication to
    nurturing innovation by providing startups with
    essential support to thrive in the evolving Web3
  • Non-Corporate Accelerators Initiated by
    small companies with domain expertise,
    non-corporate accelerators bring a unique flavor
    to the Web3 startup scene. Often focused on
    specific fields, these accelerators offer
    specialized support tailored to the intricate
    needs of startups within those niches.

Unveiling the Second Cohort The first cohort of
yardhub accelerator witnessed tremendous
success, with over 100 applicants in November. As
the program gears up for its second cohort in
2024, it continues to offer a 12-week journey
that goes beyond traditional acceleration.
Participants benefit from
Addressing Web3 Startup Challenges Web3 startups
encounter specific challenges that
accelerators are adept at solving. Accelerators
bring experience and insights critical for
tackling these hurdles.
mentorship, educational workshops, strategic
networking, and the opportunity to pitch to VCs
and investors at the demo day.
Contributing to Web3 Industry Trends Beyond the
confines of individual accelerators, the Web3
industry is marked by dynamic trends. These
trends encompass decentralized finance (DeFi),
non-fungible tokens (NFTs), and blockchain
applications. Accelerators adapt to these
emerging technologies, playing a pivotal role in
shaping the landscape of Web3 innovation.
The specific challenges of web3 start-ups, that
accelerators can solve.
  • Creating Sustainable Business Models Many Web3
    startups focus on token launches or NFTs, posing
    significant long-term risks. Few projects have
    achieved a revenue stream that ensures long-term
  • User Acquisition Challenge dApps require users
    to be familiar with blockchain technologies,
    including blockchain wallets and custodial
    wallets. This complexity deters regular users,
    narrowing the target audience.
  • Lack of Network Startups face difficulties
    in networking during their initial stages.
    Achieving goals often requires substantial
    social capital, emphasizing the importance of
    knowing the right people.
  • - Effective Go-to-Market Strategy Web3
    project strategies differ significantly from
    traditional ones,

Conclusion Accelerators like yardhub are
indispensable in the Web3 ecosystem, bridging the
gap between challenges and opportunities for
startups. The commitment to fostering innovation
and success in this dynamic sector is evident in
the announcement of the second cohort of
yardhub acceleration program. As Web3 continues
to evolve, accelerators play a crucial role in
shaping the narrative of success for emerging
startups. Their comprehensive support empowers
startups to thrive in the complex and
ever-evolving landscape of Web3. Apply for the
2nd cohort of yardhub acceleration program
presenting challenges unfamiliar to Web2
- Tokens and NFT Launch The success of a project,
-JANUARY 2024 17
Chief Engineer - Strategic Projects at Tata
Technologies Limited Global Practices -
Automotive Industrial Heavy Machinery
Engineering Research Design, PLM Digital
Enterprise System Creating Industry engineering
Business Solutions for Digital Physical
Transformation from Product to Manufacturing Mr
Rabindra Sah is having 31 Years of working
Experience with Tata Motors and Tata
Technologies. He is industry leader to
engineering services in various industries and
domain using digital technologies Industry 4.0
solutions for more than 80 customers worldwide -
Asia Pacific, Europe North America. In his
current role, he is creating Industry Business
Solutions for Digital Physical Transformation
in Product Manufacturing (Digital to Physical)
and have worked for the industries - Automotive,
Aerospace, Industrial Heavy Machinery, Process
Industry Steel, Port, Air Cargo, FMCG, Media
Entertainment. He comes with strong Domain for
End to End - Product Design Development, CAE
Product Validation, New Product Introduction,
Smart/Digital Manufacturing, Digital Twin,
Industry4.0, Process Facility Planning,
Augmented Virtual Reality, Additive
Manufacturing, Data Science, Block chain, Vehicle
and Autonomous vehicle. He is instrumental in
digital transformation using solution of Dassault
Systemes, Siemens, Altair, MSCNastran,
DEFORM-2D/3D, PTC, Euclid, Autodesk, UNITY,
Unreal Engine, Xcelgo in the industry. Rabindra
is an expert in the Digital Manufacturing world
and has experience in Virtual Production,
Visualization, Digital Twin in the framework of
Industry4.0, and Autonomous vehicle. Rabindra is
Unreal Engine Authorised instructor (UAI) from
Epic Games. One of his passions is as and trainer
on Games, Augmented Virtual Reality and Virtual
Production experiences Unreal Engine. He loves to
interact, guide and motivate student, Faculty
industry professionals with his talk, training,
mentoring coaching. He is passionate to share
knowledge acquired from his vast three decades of
experience leadership working across
Industries, domains and digital technologies and
supports the mission skill of the nation for the
noble cause. Rabindra Sah holds B. Tech
(Mechanical Engineering) from the National
Institute of Technology Patna M. Tech in Data
Science and Engineering from Birla Institute of
Technology Science, Pilani. He currently
pursuing his PhD in Autonomous Vehicle at Amrita
Vishwa Vidyapeetham -Bangalore Linkedin
Turning Vehicles into Immersive Living Spaces By
Rabindra Sah, Chief Engineer Tata Technologies
Tadvanced technologies. As vehicles become
2. Innovation with Design Thinking OEMs and Tier
suppliers are heavily focusing on the framework
of Design Thinking to drive innovation and
improve their products and processes. This
approach aids in delving into problem statements
and coming up with unique solutions. The Design
Thinking framework has provided the Startup
community with a systematic methodology, enabling
them to become leading global automotive OEMs.
he automotive industry is witnessing a
remarkable transformation in customer
behavior driven by the rapid adoption of
more connected and integrated with cutting-edge
digital features, the driving experience has
evolved into something akin to a second living
Customers now seek immersive experiences with
high- tech Human-Machine Interfaces (HMI) and
digital cockpits, creating an environment where
they can stay connected, entertained, and
productive while on the move.
In this era of smart vehicles, consumers are no
longer just passengers they are active
participants in their journey. The automotive
industrys commitment to sustainability and the
circular economy has led to vehicles designed
with recycled and reusable materials, aligning
with the growing demand for eco-friendly options.
3. Growth with Collaboration Partnership Collabo
ration and partnership have become the norms of
business for achieving growth. OEMs face
significant challenges when attempting to be
involved in the design and development of every
part of a vehicle. As a result, there is a global
trend toward collaboration and partnerships
between OEMs. These collaborations often involve
startups and other entities, with OEMs reserving
funds for their partners to develop solutions.
This approach accelerates the journey to success
and product development. FOR EXAMPLE
  • Tesla partners with BYD supplies electric vehicle
  • Toyota Produces EV powered by BYD Batteries
  • The Volvo Group and Daimler Truck AG to lead the
    development of sustainable transportation by
    forming joint venture for large-scale production
    of fuel cells

IMMERSIVE EXPERIENCE 1. Gamification for
immersive Experience The technology of the game
engine platform is being employed by OEMs for
various engineering applications in the
automotive sector. Key areas of application
include Augmented Reality (AR) and Virtual
Reality (VR), Collaborative Design Review and
Visualization, Autonomous Vehicles, Advanced
Driver-Assistance Systems (ADAS), Metaverse,
Virtual Production, Sales and Marketing,
Human-Machine Interface (HMI), and more. AR and
VR are particularly making significant
inroads in design, manufacturing, training,
maintenance, and sales marketing.
4. Adoption of Agile Framework In the realm of
product development, automotive OEMs strongly
embrace the Scrum Framework. Unlike -JANUARY
2024 19
the traditional waterfall approach, which is a
defined process, the Scrum Framework is empirical
and handles changing situations efficiently. Work
is divided into iterations, making it flexible
and adaptable to changes in priorities due to
evolving circumstances. The usage of Agile
frameworks is prevalent in the context of OTA
(Over-The-Air) updates for software- defined
vehicles, particularly in the domains of electric
vehicles, connected vehicles, and autonomous
7. Adoption of Functional Safety and
Cybersecurity Standards by Auto OEMs There are
three primary standards for automotive embedded
systems, safety, and security. These
standards are integral to the design,
development, and updates of vehicles by OEMs,
especially for their autonomous and ADAS
endeavors. Automotive OEMs are actively working
to implement these frameworks. ISO 26262 Road
vehicles Functional Safety ISO/PAS 21448 Safety
of the Intended Functionality (SOTIF) ISO/SAE
21434 Automotive Cybersecurity
5. New Perspective - The Car as a Second Living
Room o Nowadays car is being considered as
second living room. Prime considerations for
designers are how immersive experience can be
created considering more Space, Spatial Audio,
ergonomics of Seats, Infotainment systems,
Comfort, Safety and new Features.
8. Evolution of Automotive withRise of
the Software-Defined Vehicle (SDV) In
automotive, a software-defined vehicle is that
relies extensively on software for its various
functions, control, and features, rather than
being solely hardware-based. The core concept
of a software- defined vehicle revolves around
the idea of flexibility, adaptability, and
upgradability through software, which can
enhance and even transform the vehicles
capabilities over time 6. Enhancing Safety with
  • There are large number of accidents happening
    worldwide due to Human driving a vehicle due to
    Human error considering perception, performance,
    vehicle and environment situations.
  • Auto OEMs, Startup, Software OEMs, Hardware OEMs
    and Engineering service providers are
    working to develop autonomous vehicle and
    Advanced Driving Assistance Systems (ADAS) .
    Globally technology is being developed and
    tested to make vehicle driving safe, accident
    free and enjoyable experience. Vehicle developed
    happens on SAE defined level.
  • Advanced Driving Assistance Systems (ADAS) like

It means that Software-Defined Everything in
automotive. Virtually every aspect of the
vehicle, from its engine and drivetrain to its
safety systems and infotainment, can be
configured and controlled through software. This
means that changes and improvements can be made
via software updates, rather than requiring
physical modifications
Over-the-Air Updates (OTA)that updates and allow
manufacturers tosend patches, bug fixes, and new
features directly to the vehicles software
systems, much like you would update your
smartphones operating system.
Lane Departure Warning, Blind
Spot Warning,Parking Assistance,Automatic Lane
E/E (Electrical/Electronic) architecture in
the automotive industry refers to the structured
design and layout of electrical and electronic
components and systems within a vehicle. This
architecture encompasses
Change and more are being developed and
provided in the vehicle.
10. Widespread Adoption of UI/UX Principles o
User Experience (UX) and User Interface (UI)
skill set is being highly used to create a better
product and better experience for users. It leads
to high demand of User Experience experts. US
UI provides an engaging user with product eco-
system for new level of experience.
all the electrical and electronic systems,
modules, sensors, controllers, and networks that
enable various functions, features, and
operations within the vehicle. E/E architecture
is essential for the efficient and reliable
functioning of modern vehicles.
9. Embracing Sustainable Design and the Circular
11. Immersive Experiences through HMI and Digital
Cockpit Technologies
  • OEMs and suppliers are actively transitioning
    from a linear economy to a circular economy.
    They are shifting from a Cradle to Grave to a
    Cradle to Cradle business model. In this new
    model, the focus is on designing products with
    recycled and reusable materials to minimize
    waste and achieve net carbon neutrality. Each
    CEO of OEMs and suppliers has sustainability
    targets defined for its integration into their
    systems, which leads to a substantial amount of
  • The Fourth Industrial Revolution is being
    leveraged to support the goal of achieving
    net-zero carbon emissions and establishing a
    sustainable circular economy. This endeavor
    primarily concentrates on three major areas
    Product, Manufacturing Operations, and Supply
  • Every OEMs are working with their partner to
    create unique Human Machine Interface,
    infotainment systems and interior to provide
    their customers enhanced and better immersive
    experience. It leads to creativity, innovation
    and value proposition. HMI Digital Cockpit
    experience is the one of the prime factors for
    users to decide purchasing of vehicle.
  • Combination of software from engineering, game
    engine and hardware are being used to develop
    HMI Digital Cockpit functionality.

-JANUARY 2024 21
13. Incorporating Passenger Vehicle (PV) Features
into Commercial Vehicles (CV) A prevailing global
trend involves the pursuit of fresh business
opportunities within the commercial sector.
Worldwide, OEMs are setting their sights on
leveraging the diverse features commonly found in
passenger vehicles and integrating them into
commercial vehicles. This expansion covers a
spectrum of elements, encompassing safety
enhancements, Human Machine Interface (HMI)
innovations, advanced infotainment systems,
upgraded digital cockpits, and overall
improvements in the user experience. The
objective is to enhance the capabilities and
user-centric features of commercial vehicles,
aligning them more closely with the advancements
and offerings in the passenger vehicle segment
12. Auto OEM Building a Customer Community
  • OEMs place a strong focus on nurturing their user
    community as a means to bolster their brand. To
    achieve this, OEMs undertake various initiatives
    aimed at engaging their users and involving them
    in the journey to success. One notable approach
    is the establishment of a Users Advisory Board,
    a platform through which OEMs actively seek
    input, suggestions, and ideas from their users
    to enhance their products. This endeavour not
    only encourages a sense of belonging among users
    but also reinforces their connection with the
  • In addition to this, OEMs invest in the creation
    of exclusive clubs and corporate social
    responsibility (CSR) initiatives for their
    users, organizing regular events that allow
    users to actively participate

14. Emerging Trends of Subscription-Based
Business Models
  • A novel business model is emerging within the
    automotive industry, often referred to as
    Flexibility is the New Premium. This model
    introduces the concept of vehicle subscription,
    allowing users to choose whether to buy or rent
    a vehicle according to their specific needs. It
    offers a range of flexible options in terms of
    pricing and duration, enabling users to tailor
    their choice to fit their budget. In this
    innovative approach, users have the freedom to
    select a vehicle that precisely suits
    their requirements, and they even have the
    flexibility to switch cars as frequently as
    necessary. This model empowers users with
    unprecedented choice and adaptability, ushering
    in a new era of convenience and personalization
    in the automotive landscape.
  • In summary, the new business model allows for car
  • subscription, offering the following options
  • Purchase when needed
  • Rent when needed
  • Choose the vehicle you need
  • Flexibility to meet your budget
  • References/Credit
  • Images are taken from websites/internet,OEMs
    software and service provider
  • Reference of images from Rivian, Ford, BMW,
  • Volvo, Unreal Engine, News, Technode and others

Abdul Azeem Baqar Mohammed
IT Manager, Emirates Float Glass Abdul Azeem is a
distinguished IT Infrastructure and
Cybersecurity professional who has
consistently demonstrated exceptional expertise,
dedication, and innovation in the field of IT
Infrastructure and Cybersecurity. He has made
significant contributions to safeguarding digital
landscapes, protecting critical information
systems, and mitigating cyber threats.
Any special project/work you would like to
highlight Building an Effective IT
Infrastructure and Information Security Strategy
for the Organization
Adedolapo Peter Akindehin Cybersecurity
Governance and Compliance Manager/ BISO, Unity
Bank Plc Adedolapo Akindehin is a seasoned
professional with over 12 years of experience
spanning across GRC, Project Management, IT
Audit, and IT Security. the Head Security
Governance, Program Management and Compliance
in one of the top banks in Nigeria, he is
responsible for leading and coordinating the
operations of the security strategies in line
with the business objectives. He acts in the
capacity of the Business Information Security
Officer (BISO) and deputizes for the CISO. has
implemented several security projects, some of
which are email security, endpoint security, data
loss prevention and system hardening. Prior to
now, he was a senior cybersecurity consultant
with Digital Encode Limited, and a certified
member of ISC2, ISACA, PMI, ACFE and
ISO. Adedolapo is a Fellow of the Institute
of Chartered Accountants of Nigeria (ICAN) and
an alumnus of University of Lagos and University
of Liverpool, from where he bagged two Masters
degrees in Business Management and Cybersecurity
respectively. His hobbies are fishing, reading,
teaching, travelling and meeting people
Abhilash Radhadevi
Head of Cybersecurity, OQT Abhilash Radhadevi,
Head of Cybersecurity at OQT is a Senior
Cybersecurity executive with more than twenty
years of combined experience in the Banking,
Financial, and Energy domains. Renowned for his
leadership, he has successfully guided global
organizations through complex security
landscapes. Abhilashs extensive experience
encompasses pioneering
cybersecurity strategies, earning him prestigious
awards and
recognition. A respected thought leader, he has
authored multiple articles on emerging threats
and innovative solutions, contributing to
industry knowledge. His global influence and
commitment to mentoring reflect his dedication to
shaping the future of cybersecurity. Any special
project/work you would like to highlight
Artificial Intelligence in the absence of a 24/7
Security Operations Center
Alexandre Horvath
Chief Information Security Officer (CISO) Data
Protection Officer (DPO), Cryptix AG 20 years
of experience in multinational organizations
on a global level. Proven business partner of
C-level executives. Successful management of
international cross-functional teams and major IT
security and risk programs. Strong background in
cybersecurity, data protection and risk
management as Alexandre has over a decade of
leadership experience in
those areas, from a strategic, operational as
well as project management point of view. Any
special project/work you would like to
highlight Preparing several companies for the
ISO27001 certification
Ankit Agarwal
IT Infrastructure Global System Architect,
Encora As the Head of IT Infrastructure and
Governance at Encora Inc., Ankit Agawral bring
over 20 years of experience in managing IT
operations, driving tech transformation, and
ensuring cybersecurity. With exerience in
verticals like Governmet, Education, Finance,
Manufacturing, Ankit has successfully led tech
transformation and automation safeguarding
critical assets against evolving cyber threats
while ensuring the resilience and efficiency of
IT infrastructure. Any special project/work you
would like to hi
Write a Comment
User Comments (0)