Cybersecurity Roadmap 2026 | Skills, Salary, Threat Intelligence Gap And Career Growth | Simplilearn
Chapters13
Participants are welcomed, the host outlines the session goals and how to participate, including Q A and certificates.
A practical, UI-driven look at Cyber Threat Intelligence 2026, with AI's impact on defense and attack, plus a clear path to career growth through Simplilearn and TripleIT Bangalore.
Summary
Simplilearn’s Cybersecurity Roadmap 2026, hosted by Adarya, features Dr. Harish Ramani and a deep dive into why threat intelligence (CTI) matters now more than ever. The talk maps the current threat landscape in India, showing breaches like Aadhaar and Air India to illustrate that data existed; what was missing was timely intelligence and action. Ramani argues that CTI is a readiness problem—identifying gaps, aligning tools to method, and understanding context—rather than merely collecting more alerts. The session then unpacks CTI in three levels (tactical, operational, strategic) and debunks common myths such as “AI will replace analysts” or “one tool solves everything.” A major thread is how AI changes both offense and defense, from automated data collection to threat hunting and user behavior analytics, while human review remains essential. The discussion pivots to career implications: threat intelligence analyst, threat hunter, incident response lead, and even CISO paths, with a market showing thousands of open roles and substantial salary upticks. Finally, Simplilearn’s program, in partnership with TripleIT Bangalore, is presented as a concrete, hands-on pathway—covering infrastructure, network/app security, security operations, AI foundations, and real-world case studies—to bridge the gap between industry need and talent. The session closes with practical advice, success stories, and guidance on joining a program designed for working professionals and newcomers alike, including a robust career-support system. Ramani emphasizes practical learning—concepts first, then methods, then tools—and the importance of common sense in a rapidly evolving cyber landscape.
Key Takeaways
- Threat intelligence is about readiness: identify gaps, align data, context, and tools to act before breaches escalate.
- AI boosts defense and offense, but human review remains essential for validating detections and reducing false positives.
- Relying on a single tool or a single threat feed is a major risk; a diversified, multi-tool approach is necessary.
- Cybersecurity is a long-term road map (12–24 months or more); maturity comes from collecting and analyzing data, then acting with agreed playbooks.
- There are thousands of CTI roles today (analyst, threat hunter, incident responder, advisor) with high demand and strong salary growth.
- The program combines cyber security with AI, offers hands-on labs, 30+ global case studies, 100+ guided assignments, and 30+ tools, plus AI-powered job assistance.
- Learning should follow: concept → methods → tools, so you build a solid foundation before adopting new technologies.
Who Is This For?
IT and cybersecurity professionals aiming to enter or advance in threat intelligence, incident response, or cyber operations, as well as managers evaluating upskilling options. This talk helps beginners understand CTI, AI’s role, and how a structured program can accelerate career growth.
Notable Quotes
"“Threat intelligence is one of those terms that gets used a lot, but you know could mean different things.”"
—Dr. Harish Ramani clarifies what CTI means and its practical relevance.
"“AI is going to help you identify but it is not going to complete the process for you.”"
—Ramani emphasizes human judgment alongside AI in security operations.
"“Start with the concept, go to methods and arrive at tools.”"
—Advice on building CTI skills methodically, not just chasing tools.
"“Never rely on one particular tool for your entire organization.”"
— warns against single-vendor risk and overreliance on a single feed.
"“Common sense is missing in pretty much everyone.”"
—Final career-advice from Ramani, urging practical thinking in cyber defense.
Questions This Video Answers
- How does cyber threat intelligence change in 2026 with AI integration?
- What are realistic CTI career paths and salary expectations in India?
- What frameworks should CTI professionals know (NIST, MITRE ATT&CK, 18 CIS Controls)?
- What does a modern CTI program curriculum look like for working professionals?
- Is it worth pursuing an AI+Cybersecurity credential with a program like Simplilearn?
Cybersecurity Roadmap 2026Cyber Threat Intelligence (CTI)AI in CybersecurityThreat HuntingIncident ResponseSecurity Operations (SOAR/SIEM)TripleIT BangaloreSimplilearn partnershipCareer paths in cybersecurityCTI frameworks (NIST, MITRE ATT&CK)
Full Transcript
Hey, I see a lot of participants joining us. Uh please do uh drop your introductions in the chat box. We'd like to know your name and where you're joining us from. If possible, you can also let us know what you do. Okay. Okay. and seeing some messages. Uh, hi Sad. Hi Sar, you're great. Okay, so we're also live on LinkedIn and YouTube and we have more participants joining us there. Once again, a warm welcome to everyone. Um let me quickly uh quickly introduce myself. My name is Adarya and I would be hosting the session on behalf of uh Seprian.
Um okay someone saying that you're not able to hear. I hope my audio is clear to everyone else. Um you can like you know react with a thumb. It's clear if yes. Okay. Um okay great. Okay. Uh hi Narish, thank you for joining us. Um great great to have uh such a lively bunch of audience here. Um we have an amazing session planned with an amazing guest. Uh so without further ado, uh let's um look at the road map for the next hour. uh we'll start with um you know understanding the current state of cyber threats in India.
Move into what cyber threat intelligence means and look at where organizations are going wrong and then get into the really interesting part um how AI is changing both sides of the equation attack and defense. We'll also look at career paths in the space and how the triple IDB AI powered cyber security program uh we are featuring today can uh help you get there. Um there will be time for Q&A at the end as well. So please stay tuned. Um so before we begin a couple of ground rules for the session. All your questions go in the Q&A box and not in the chat box.
Uh the chat is pretty much for conversations, reactions and sharing your thoughts. If you want our expert to answer something directly, please use the Q&A box. And if you'd like an attendance certificate today, stay until the end of the session. we will be launching a poll and you will need to submit your full name there to uh get an admin certificate. Uh unfortunately we will not be able to take any manual entry. So please ensure that you fill in the poll and you will be getting the um depth that we are presenting as well as a webinar recording um over email to all those who stay uh who stays through the session.
So please stay tuned. Right. A quick word on simply learn before we begin. We have helped millions of professionals advance their careers across 150 countries and we do it in partnership with some of the world's best institutions and companies. What it means for you today is everything that we discuss the curriculum, the career pathways, the tools, um everything is grounded in what the industry actually needs and not just you know what looks good on a course outline. And um yeah, speaking of partners, we are incredibly proud of the ecosystem that we have built from globally renowned institutions to tech giants like Google, Microsoft, IBM and AWS.
These partnerships mean that our learners get curriculum that's not just current but you know also co-created with the people who are actually building the future of tech and uh AI. Um but the number worth noting is that um our learners have reported a 50% average salary hike across um you know uh categories and you know for us this is not just a marketing figure this is um an outcome from people who have gone through structured credentialed upskilling upskilling in high demand fields um exactly like what we will be covering today and yes now let's meet the expert who's going to make the next hour very very valuable to us all Um we have uh Dr.
Harish Ramani as uh the expert. Um he is not just you know a cyber security expert. He has a profound technical expertise and commitment to education as well. He holds a master's degree in computer science and uh technology from India and a PhD from Australia. His experience is very vast. Um it covers areas like security, networking, data communication and data center management. um notably has also played like an important role in resolving corporate financial and cyber crime cases across various industries. Uh currently Dr. Rammani leads as CEO and CTO at global cyber cops in India Chennai India.
Um his passion for education extends to his role as um you know an adjunct faculty at triple IT Bangalore and the University of Wales as well where he's training the next wave of cyber security professionals. Uh, Professor Harish, it's great to have you here. Uh, would you like to add on to that introduction and say your hi to all the participants? Yeah, thank you Ana. Hi all. Uh, good evening. Uh, a warm welcome to all of you. Uh, I mean I've got about 15 years of experience uh trying to learn uh how cyber security is being thriving for a very long time.
So where I started and uh where things are moving right now are completely different uh probably you could say difference between earth and mass kind of things and u I think we're making a lot of differences today with respect to AI coming into picture. Uh we should understand the importance and we should also not forget the traditional uh conceptualization of uh cyber security because uh cyber security is still thriving more uh from the traditional practices. So I'm a person who still have not used uh not even one AI tool so far. So I don't know how many of you can agree to that.
Uh it's it's a real fact. It's been 3 years I think the GPTs have come in but I've not gone into any of those tools but I'm still teaching AI that's different. understanding AI uh or slash using AI are two different things which is what I completely believe in myself and anybody who asks this question I have no problem in sharing my computer whether you could see any uh AI tools installed or if you have forensic experience you can do the forensics and also understand that so I still believe the traditional methods are much more comprehensive uh with the help of AI I'm sure that it is going to make a lot of difference yeah that's what I would like to start with perfect yes thank Thank you professor.
Um before we uh get into the session I see a couple of questions about how long um this will be. This session we aim to um you know keep it uh within 1 hour. Um if there are like you know a lot of questions then we might extend by a few minutes but yes it will last about an hour and uh yes you will be getting the deck and the recording on email um within the next 48 hours. Right. So um we're going to start with understanding why this conversation, this topic matters a lot right now.
Um this next slide is one of those moments where like you know the numbers stop being just numbers. These are real breaches, real India organizations and real consequences. So let's quickly look at what's actually been happening. Okay. So Aadhaar, Zumato, Air India, Ames, Star Health, these are organizations that all of us you know um interact with directly. um 81.5 crore Indians personal data on the dark web 4.5 million Air India passengers data breached um AI as server was down for six days while cancer patients waited star health customer data sold through a telegram chatbot and here's what connects all of them in almost every case the data to detect these attacks existed before the breach happened the problem was not like a lack of information it was a lack of intelligence and the ability to act on that information in time and that forms the corrupt of cyber threat intelligence and that's exactly what we're going to talk about um in detail today right so we've just you know shown you five major Indian breaches so here's a simple question just to you know um start with the poll um when you last heard about a major data breach in the news what was what was your first reaction um a that's scary I hope my data was not involved my data is not compromised or b that company should have just had better security or C I wonder how long the attackers were already inside before anyone noticed or D these things are unavoidable, inevitable, not much anyone can do.
Just take a moment and let us know your uh answer in the chat box. Um we will um you know take forward the session according to answers to the answers. Okay, I see some question answers coming in. A lot of you are saying C which is great. Okay. We have a lot more participants here and I see just a few handful who have responded. Okay. So, right. Okay. So, if some of you are saying thinking about a um that's it's a natural human reaction. Um but here's the thing your data was probably involved. Uh the question is whether anyone knew in time to limit the damage.
If you're thinking of uh B then you're not wrong but better security is where most organizations actually stop. They deploy more tools they buy more feeds and breaches still keep happening right so we are going to discuss about that in detail. If you answered C like most of you have already answered you're you know probably already thinking like a threat intelligence analyst. Um this instinct uh how long were they already in is exactly the question CTI exists to answer. And if you answered D, by the end of the session, we hope to change your mind.
Uh because inevitability is what attackers want you to believe. Um okay. So I think I've taken enough time without further ado. Um uh we can um you know start with professor's uh remarks as well. So um professor, we're going to talk about this topic a lot in detail, but I want to start with like the fundamentals. Um cyber threat intelligence is one of those terms that gets used a lot, but you know could mean different things. So how would you explain it to someone who is hearing it for the first time today? I mean uh this is all about how you wanted to keep yourself ready.
Okay, first thing I would wanted to put the word would be readiness. Okay. So whether you wanted to go ahead with evidence uh you want to go with data or you want to go with tools. So any of these things your first understanding should be identifying the ideal gaps in the scenario and to make sure that are you ready for it because I would probably give a similar example in line with uh co okay uh but co was one of uh we've not come across something like that probably in the last 100 years time right probably previous generation has gone through uh quite a number of uh issues like that uh Ebola kind of things happened in I think the African region but those were all small things where not many people got affected and the spread was not also not like how covid spread today cyber security is unfortunately has become a covid kind of spread I'm I'm talking about the negative angle where the threat spread is all about so you wanted to work out based on tools I think you need to be literally uh be aware of what tool are you deploying and whether the tool is ideal for you to really deploy the same thing okay and then you wanted to keep your data up and running I think the data matters a part.
So where you wanted to keep the data I think today a lot of people are also uh talking about PII the personally identifiable information. So when you talk about threat intelligence and your data being lost with all the statistical data that was provided few slides ago is all in connection with how much of these data being taken and how did it you know gone go out and all of these things matters with basic security coming into existence. So you need to know who are who are all your threats. That's where your threat intelligence comes into existence and how these threats can be utilized by somebody at various times.
Right? So readiness is definitely one thing where you need to have adequate knowledge about your environment and it's obviously not just about data alone. you need to know about the context too where the threat is, how the threat is, whether I I've seen people talking about uh uh data on the cloud and they said no no no I don't need to worry about anything every data is on the cloud what if that entire cloud is being taken over by somebody else right so these are some of the easiest questions that we could probably ask at various times and how much of uh uh your data is important to somebody is also Intel we need to be aware of such scenarios too see when I work with organizations it's different scenario when I work with government it's very different when I work with institutions and research you know angle I think that's completely different I could see that the difference between core mantle and crust kind of difference where you're in the top most topmost layer you just worry about what it is inside and then you don't really need to know what is there that's where institutions typically work with and then you go bit more that's where governments are uh government are concerned but nobody is willing to take up responsibility outrightly and then we come into the organization spectrum.
That's exactly where multiple differential organizations come into existence vertical based. So we wanted to be sure of how organizations want to probably secure themselves as one side for which without threat intel you're not going to uh plan your readiness very well. So whatever knowledge that you have that has to be put into a single probably uh one one single table and then do your uh brainstorming and come to a conclusion. I think if you're going to do that I think your answers are going to be much more critical and you will have outcomes also to be accepted at various times.
So that is what probably I would u let you know in terms of conclusion as it is and uh that's what is also happening outrightly. Yeah. Thank you for that uh definition clear definition. So um I believe that there are like more levels to uh threat intelligence. So if you could talk us through that that would be absolutely absolutely see what what when whenever we are trying to uh talk about threat as I said readiness comes into picture at first right so you need to plan like how we plan our investments how you plan how you wanted to get educated how you wanted to grow your family your organization so with all these things there are obviously three steps to it.
So one is immediate and one is like okay I I'm going to plan for 2 3 months time and then I'm going to plan longterm. So immediate uh which is where the tactical uh workaround typically comes into existence where uh identification of those threats come in and then basic analysis starts. That's where tactical analysis come in. We in fact uh talk tactical/transactional because once you're uh initiating something then obviously transactional outcomes comes into existence. That's first one. Number two where we have operational analysis where it is going to be uh bringing into uh time types of frameworks into workar around.
So there are quite a number of frameworks that we use. We all know I'm I'm not sure how many of you really understand the importance of these frameworks today where we have something as NIST as a framework. National Institute of Science and Technology Standards and Technology Science they've given their uh frameworks in line with it and we have got something which is what today we are all calling it as the holy book as MITER framework where we talk about TTP which is tactics techniques procedures so where we have techniques and then we have sub techniques also incorporated into it so how much of your knowledge is in alignment with your operations then that is exactly what you're going to secure your organ organization or your environment as it is.
And then obviously you take all these problems to your strategic u uh discussions which is in your boardroom or could be your detailed discussion with your uh managements or top level stakeholders where they'll have to start pumping in money. It could be resource based, it could be cost based, it could be uh where you will have to you you're not ready today where you don't know where you are standing. You may have to start working out something from the scratch and then take it forward step after step. So where we call them maybe 12 months 24 months kind of analysis because cyber security is one thing where many people don't understand it's not you can complete it in overnight it is a road map right and you wanted to do something you wanted to probably start sometime and I want I have seen a lot of people saying that no we wanted to secure ourself we want to secure ourself these terms are repetitively being spoken out but did they ever start no I think that's where again you wanted to get into your operational work around you need to collect adequate data.
You need to analyze those data and you also need to make sure that you process those data based on the context that you have. As long as you are in alignment with these three things, I think you are you are good with your uh levels and you all also know all the stakeholders starting from an analyst to a board member will be aware of what is happening realistically. I think that way uh it's clearly also being given right now. So we can also take it up with that uh as one is mindset uh two is how you want to put that into place.
So that's where my conclusion is on this. Perfect. Okay. So here in this slide um there are um misconceptions that seem almost universal. So uh professor from your experience which one of these is uh like the most dangerous one like the one that gets organizations into trouble? uh honestly all five of them are damn dangerous okay to be precise but I'll give you analysis very simple in that so first thing is a lot I'll probably out of these five I will tell you uh which one is on the priority list of one to five probably I could align it in that way okay instead of just telling them what is realistically tough okay so first thing is uh thinking that somebody somewhere someone is going to handle which is where AI will handle threat detection we need fewer analysts.
I think that's a wrong thing. AI is going to help you identify but it is not going to complete the process for you. I think that's where today everybody is talking about. Uh I was I was handling a couple of uh classes for uh IM on on AI in cyber security where people were asking we talking about AI in the very naive state in the world of cyber security. How are you starting to rely on that? I said yes it is but wherever it is making an impact we have started to utilize it that's what that's where it it is coming into existence where you have identification you have detection I think AI is being super good with respect to what we are talking about but you still uh need someone to identify whether it is a false positive or not so that's why we cannot just like that discount whatever that is being provided straight away so as long as we are uh aware Okay, we use AI for a maximum capacity and then we also have a human intervention.
I think then we take it up with much more uh adequacy in line with it. So that's number one. So priority on the list is obviously AI. Number two is we have 12 security tools deployed and we are well protected. That's another very wrong misconception because whenever people say that uh we wanted to deploy on tools which means the people process technology equation technology only contributes to about 4 percentage of the problems and process contributes to about uh say 8%age of the problems. So you know which one contributes to the rest of it's all about people but 88%age of problems are being contributed by the people as such.
So if you're going to just deploy those tools and who's going to manage those tools you can't say that no no the tools are going to be managed by AI. That's point number two where it'll it'll create a lot of nonsense. Okay. Third one is uh which is we subscribe to a thread feed and we have uh threat intel uh cyber threat intel and the thread feed is going to provide all the data and we are just going to follow whatever that is being given there as a holy book like process. So you're not sure one thread book is going to typically give you whatever you want.
One thread feed is going to provide you everything in the world. In fact uh one common example as a security professional we all speak about is never rely on one particular tool for your entire organization. What if that one tool goes down all other tools are also going to be down right or all other tools are not going to be effective then you are not going to be making a difference. So you cannot rely on one particular tool at any point of time. You need to have a differential stake. So these three are I would call them the notorious things on the top three.
And then typically you have cyber threat cyber threats are it problem is uh a lot of people keep that mindset again people process technology equation comes in 88% are people's problem so vulnerabilities happen in the world with respect to cyber environment 88%age are contributed by the 10fingered 20 fingered animals typically we don't realize that we are humans we are just animals when we are clicking a link so that's exactly how we can differentiate it because we don't put our brains into it just putting something else and clicking it or giving the OTP or anything for that matter.
So I've been working with the police department for a very long time and I understand how people uh I mean you can't even imagine how this person could have given the data just like that and could have lost 50 60 lakh rupees. All right. So this way you can also identify it. And the last one obviously is we haven't been breached so far and our security is working. That is a mindset. As long as you're not breached, I'll say okay fantastic. I think somebody is around you. All your good self that you have done it's also coming back.
We could call also call it as don't stop doing good things because your karma is going to hit you back. So that's exactly what we could say it as an example as such. But yes, that's how I could uh probably put it into an into a priority based uh workaround for organizations, institutions and everybody to follow it up. I think explanation also says something but explanation is something people can always read about with the data statistical analysis. Right. I think you made more sense of uh uh this slide than the question that I posed. Thank you for that.
Um we have touched upon this a little bit but um if you can if you can like you know also help us understand what exactly um is going wrong like where are organizations going wrong and like what gap is it like you know creating that' be great because we keep hearing about new cyber breaches and threats almost every other week. True. Uh see technically uh a lot of organizations think that what they are doing uh is right okay and they are continuing to follow that. I think that is uh an issue which uh I personally have come across quite a number of places.
Uh I I'll because this slide is uh in fact manufactured exactly for the problem statement as it is because problem versus reality the vend diagram itself says in fact you could even push the reality to the right hand side honestly because reality and problem are completely different things. So it's like I've gone to a doctor with a stomach pain. Okay. And then doctor said, "Oh, don't worry. Nothing is happening. You are completely good. Your hands are working pretty fine." It's that kind of a solution. Right? So I have a problem on my stomach and my doctor I've told him I think I' I've got stomach pain.
Then he started seeing my hands and then say that don't worry your elbow is pretty strong. You can still continue to hit couple of more sixes if you're a cricketer or if you're a tennis player. You can still good play good smashes. So the answer towards uh problem statement is problem versus reality online. Okay. So you you've listed out a number of things right. So we have sock teams receive 10,000 alerts. I think that's exactly where AI is playing a difference in qualitative analysis. Then we have thread feeds uh delivered uh through indicators of compromises where we have thousands of them and that's exactly where we are trying to bring in where you need to know AI.
As I said in the start, you must know AI but you cannot just live with AI. The previous slide and the connect current slide are directly connected in terms of deployment of tools, deployment of AI at the same time security budgets which is another very big pain area for the strategic partners, strategic players to not contribute, not be in a position to contribute as the core gap is not just increasing the gap in inside the gap itself is increasing. where means the connecting uh things between problem versus reality is not happening. your vend diagram is I would say is more generous in the process in terms of explaining what what we are trying to do it but in reality it is much more uh different than it and then obviously maturity comes out uh very handy right fewer than 5% are actually investigated actually yes because we don't have the courage to investigate and identify what could have gone wrong and trying to provide a scenario for the same for which again your threat intel is the first thing you'll have to start with most are uh ingested and not analyzed because you have too much of problems and you don't know which problem to start analyzing and then you still getting problems after problems after problems.
It's like in a police station where they keep receiving thousands of cases. Whichever case there is a high-profile connection involved then you take that case and then start processing that. That's exactly how today's security operations are operating. So I've been operating a security operations for more than 8 years now. I know what kind of problems we face and how we have matured today over a period of time by learning. So the only call that we could take up is going on undetected breach for 200 days whether you wanted it to be a zero day or you wanted to just to be lethargic or you wanted to work out being trained.
I think that's exactly where I would definitely suggest programs like this are more important for people to be updated professionals to be updated in the process. So then you can put in actionable intelligence. You can then concentrate to the next level which is threat and threat hunting. Eventually one after the other will come in. So it's all about how you want to take it. How the problems are to be looked at versus how the reality is. That would be my my conclusion on that. Perfect. Thank you. So now that we've understood the gap and the easier it becomes um you know to understand why threat intelligence matters as well.
So um but professor just to sort of like you know conclude the segment it would be great if you could summarize why CTI is like so important to all organizations and for a cyber security professional how important is this as a skill or like you know an area of knowledge to uh develop see ideally uh with respect to our threat intelligence uh coming in uh where learning matters a lot I've been repeatedly saying that it's more of practical analysis where learning comes in Okay, eventually you'll have to arrive at tools. There's no option about it because if you want to do things faster, but you can't just identify a tool and rely on the tool completely.
So I've defined my own statement which is start with the concept, go to methods and arrive at tools. So if you are clear with your conceptualization all right then you can avoid uh the the later uh surprises negative surprises that's where it starts then you get into the method so which method is suitable for you and for the organization or for the teams it's it's not individual you in the sense I'm talking about an organization as such. So as long as the the people are clear about uh the methodology that they're going to start putting into place then identifying the right tool and putting that into place makes a big time difference.
Then training somebody on the tool is going to be easier. In fact uh a lot of people are only being trained on tools. So we keep we keep talking to a lot of people in a regular basis. So everybody is interested only to concentrate on the tools. What if that tool is going to become obsolete over a period of time? So threat intelligence is one area where people will have to start working out on understanding what realistic threat intelligence is and then identify the tool based on parameters. See for people understanding it goes different right.
So when whenever we are having uh breaches they don't inform right I have known uh probably 150 plus cases I've handled myself. It starts saying that an a hacker an attacker sitting inside the network doing raiki doing recon for a period of six up to 6 months and initiating an attack. So once you uh know that there is a hacker sitting in or you don't know when the hacker is sitting in there are two different aspects. First allowing the hacker to enter in itself is really not good and then you allow the hacker to sit in for a longer period of time and take over is something which is definitely not being appreciated.
So threat intelligence to start with is definitely important. As I said threats in fact I would define a um you know a formula again where you have a threat actor a threat actor design a threat from probably you could also say threat actor/threat source who designs a threat from the threat where you have uh if you have a vulnerability then that is going to pose you a risk. So if you are clear with your identification of threats then your intel is good where you conceptually methodologically and tools wise then you can put all of these things one after the other right your security team is going to be aware of what they're going to do and at the end your the tool that you're going to use whether it is going to be obviously we're talking about threat intelligence which is more relevant to security operations so you'll be using SIM security information and event management today it's not SIM anymore.
It's SIM with SOER, security, orchestration, automation and response. And we also have quite a few more uh tools that are now being inducted into it which are probably we call them network detection and response uh user behavior analysis. So all of these things comes one after the other. So CTI trained professionals can clearly tell right whether there is background noise or not or whether there is something that is smoking. If there is smoke, there is obviously some at some point of time there is some there's a fire that is going to come up, right? So you don't want a smoke to be inside your organization for the fire to blow later point of time.
So we wanted to just align these things in sequence and make sure that people are to be aware of. So if they are just going to learn what is threat intel alone, right, they're not going to get what they want. As you can clearly see you have open source intelligence already available which is contributing to threat intel but what they'll get to see are only junk of tools. There are thousand tools exist there and I'll tell you telling you 45 to 50% of the tools don't even work or they are region specific. So you can't just rely on tools alone.
That's why I said you need to know the concept the method and of course the tool then you will arrive at what you really want. So your adversaries becomes more easier to identify straight away. Perfect. That's a very comprehensive uh summary. Thanks for that. So uh let's shift uh gears a little bit. So we've established why CTI matters and where organizations are falling short. Uh now let's explore what's uh what this means for people's careers like because the gap between the organization's need and what the talent pool looks like you know is pretty wide. Uh so professor let's uh talk about where opportunities are.
So what are some career pathways uh you are seeing in the cyber field specific to threat intelligence or at a wider scale as well? Uh quite a number of things are uh going around. Okay. Uh we've got a lot of positions that are uh currently uh open as you can see there are about as as we've mentioned only about six of them in line which are directly connecting connected to people. But in in in in real world there are not just six there are more than 12 13 positions that are directly available and which are contributing also for our uh you know goodness.
Okay. In fact we have AI in the program right we've known what AI is actually contributing towards it. So with a threat intelligence analyst is one side you have uh we need to incorporate AI into it because if you start to receive a lot of threats in line then you won't be able to get going. So threat uh analyst is a starting position where you could actually get started and then you can keep moving step after step. In fact there is also a position called as used to be a position called as sock analyst. I I'm not sure how many of them here aware of that position is almost gone out.
It's because of the AI's inclusion into the picture and we used to have somebody as L1 analyst. Today we are not talking about L1 analyst at all. We're only talking about who can be specialized like threat in intelligence analyst, threat hunting analyst who can perform operations uh to make sure that we arrive at solutions right and then it goes to obviously you can start to lead develop and get to become an incident ready person. So once your moment you are incident ready you know exactly what to do. We can probably talk about incident response lead and incident incident management lead.
In fact, we also have positions like incident handler. Uh it is not very popularly available even today, but it is one of the highest paid jobs in the market where you could easily be get going with not just money as such. It also gives you a lot of respect uh going forward in the same line. So that way uh people can say okay I'm starting right now and where I wanted to end where I want to probably lead myself into it obviously to a consultant or a CISO as it is. But one there are two there are two things and two aspects to it.
A CISO is a person who understand uh from a documentation perspective more often today because they end up answering to the regulatory regulatory or to the uh stakeholders kind of things. But when it comes to the consultant where they'll have to be hands-on they can still continue to be enjoying the core security parameters of security operations. They'll have to play around and threat intel would be the path that they'll have to start taking it today. And obviously I I skipped the security architect position because an architect is one person who takes anything and everything into consideration whenever there is a design supposed to be initiated.
So as long as a person is working on a job then the eventuality is solution like solutioning like I you'll have to provide a solution and that solution automatically comes from somebody who has got responsibility accountability and ownership quite a number of things comes in uh in this life cycle a person who is taking up a threat intelligence role are responsible are accountable and also must carry ownership. Hence, it is one of the highest paid job in the market and there is also a good amount of demand that is also there uh in many companies.
I've seen over 7,000 plus jobs just today because I wanted to be updated with the data. So, I've just looked at uh how many how many threat analyst, how many threat intelligence, threat hunting people. I think it was 7,000 plus jobs are available right now in this particular domain alone. And it starts from startups to tier one companies. So the salaries are also being very acceptable and the job is also being challenging. It's not like you keep doing looking at the monitor scheme again and again. So that way it's more challenging and more operable. Yeah.
Perfect. And um an interesting point that you mentioned was um you know the need for specialization um in in the field. Uh so if we can you know talk a little bit more about um what are the skills or like you know areas that a professional need to um you know learn or upskill in um so that like you know they they differentiate themselves in the job market like whether they are looking to enter the field or like looking to grow further in um uh the cyber field like what what areas should they um craft craft themselves on?
Sure. uh I think I've already told about concept method and tools but how do you put that into industry acceptable manner is what you can differentiate yourself among the crowd all right so we start with one side as the standards I think a lot of people miss that plot very often they end up missing the plot where there are quite a number of standards that exist as I said nd has got standards we've got miter framework we've got the critical security controls 18 so there are quite a number of list of standards that exist where if you could align stating that I know certain parameters I know certain concepts I know some tools at the same time I also know how to align these things with the standards in the market like you've me we've clearly mentioned that one is technical foundation being very strong I think that that that is something we can learn by joining just sitting in in programs like this and you can take it up but how you can trade how you can use that to probably tell them tell people that like hey I'm completely different and I've also gone to the same school but I'm doing something very different is because you can align yourself with the requirement in the market somebody is saying hey I know I've done this programs I know I've got experience this is the common uh rums that we generally look into it but what is required how many attacks did I stop okay how many how many attacks did I stop and what was the tat and how what did I do in terms of stopping that particular attack I followed the frameworks I've made sure that I was in alignment with the intelligence whatever I've gained and I've used quite a few tools so you don't need to tell them that I know 20 tools I know 30 tools kind of things even if you know two or three tools which can solve most of the problems I think organizations are definitely interested in terms of identifying that person as the person whoever is required to be fitting into that position Obviously AI so I'll have to definitely conclude today because if it is going to be on network design or uh any other uh positioning AI is not making a difference but in the security operations in threat intelligence in threat hunting uh I think identification of an adversary in fact working on the uh indicators of compromise or indicators of attack I think AI is definitely playing a very big role you don't need to be an AI I model writer you don't need to even know how to train a data that's fine but if you know how to use the existing tools in AI into the threat intel processing into threat hunting processing and sometimes we also using it in user behavior analytics so that way it is making a huge difference so you want to be unique I think you just have to carry all of these things in your hat as simple as that so it's just going to add feather each feather in your in your crown is going to make you different at various times because we've been interviewing a lot of people.
I'm telling you uh what we want uh is really not happening because it's they're just going by unfortunately the GPDs of the world rather than the AI that we use on uh the real world rights are being written by GPDs today. So that's something which everybody hates all right people really forget how to write two lines uh on technical documentation just go prompt engineering and then start working it out. I think that is making a difference. That's why people are not finding it easier to get in. Uh and I think they're just making it tougher themselves.
Hey, I think your point on AI sets the perfect context for our next segment. Um you know, a lot of people might be more interested in this segment as well because AI has like been changing everything um and specifically in the cyber space uh on both sides as well. So it's making like you know defenders faster but also making attackers more capable. So we can get a bit more into this professor. Um how exactly as AI fit into or like you know rather transform the threat intelligence workflow? I know you mentioned this uh in bits and pieces uh through but if you could let us know specifically about threat intelligence workflow and AI.
Sure. I'll make it much I'll make it really short because it's going to be just a repetitative of what I've said. I just connect the dots as you said right so we have automated thread collection which is making a huge difference where your data is being collected from that's one area where you have the data and you should know where the data is and you collect the data that's from a technical front once this is good then you'll obviously have uh have to know probably sometimes we also put the word instinct into place but not everybody carries instinct they rely on methods and experience and we also call them signature based, pattern based and huristics based.
So these three things comes into existence, right? Where we can start taking that into consideration. It could be from deep verb, it could be from dark web, it doesn't matter. Wherever you're getting your data from, you need to align that with the context whether it is a threat to your organization or not. If that is not there, I think then you're you're good. And finally, you connect that with your response platform. Whatever tools that you wanted to work out from, right? You need to write your playbooks. If you are connecting these three things, I think your AI is going to make a huge difference because it can process anything and everything which is falling into that particular bucket and said okay don't worry about it.
This is completely been taken care of. But there is also a process called as review by the human by human is definitely required. So with that we'll be easily configuring and sitting and relaxing to concentrate on something that is more serious or maybe regulate and automate more or such issues in the future. So this way I think it's it's easier to work around. So it's more of connecting uh the dots as such. Great. Thank you for that. And uh now we have uh what we have here is a detailed timelines that sort of illustrates how a cyber breach happens.
Uh so from recon that happens on day one to initial access on day 14. Uh lateral movement between days 21 to 90, excfiltration between days 91 to 195 and then discovery around day 196. Um this timeline is there just to like you know sort of sort of illustrate how AI um also works on both sides at every stage. Um professor my question here is a little um you know different from the content as such. So if you were advising an organization uh which AI powered capability would you suggest that they you know most focus on like say anything from the slide um you know that would give them the most protection?
I'm not really sure whether I can answer that question because uh um the more uh see we are working on many models unfortunately today. Okay. Uh every organization or every tool uh uses their uh tool their models as such. So I I mean I can directly say that the answer is not going to be a straight one as it is. But uh how you're going to take it is all going to be based on whether you wanted to defend right and defend like defend is kind of protect scenario and then you also need to start on the offensive parameters.
So how you wanted to use this towards your offensive parameter is concerned. So working out on the answer I think I've not answered that question which I'm well aware but it's it's a pretty vague uh in terms of operational as a question too. So probably we can ask this question to pro probably people whoever is working on u in in their regular uh uh operations as such because optimization is one thing that we will concentrate more okay regularization of u uh or probably we'll call them sequencing uh and then doing the regularization of the work and bring lot of tools and then connect those tools into place.
So that's that's how I could probably give you again it's it's more of vague because uh maybe I would say in that way I'm not an AI guy. right or I'm not doing research on AI as it is. So we use whatever that is coming into the market and testing whether it is doing good job or not. So in from from that angle probably I'm my answers are not in this angle is not going to be as adequate as it is. But this is going to definitely give understanding uh for the people to work more on this platform.
somebody is now getting into uh cyber security or somebody has got uh some few years of knowledge in the world of cyber security and they've already interested in AI and then model or understanding developing kind of things right so this is a great area for research in in fact uh I know quite a number of people whom I've been advising on AI based research with respect to cyber security and every day they're coming out with problems which are mind mindboggling because I wouldn't have even given a thought about it even in my wildest dreams and then they're coming up with some algorithm and says that this algorithm is working or do you want to probably test it?
So it's an open question and for everybody also it is an open question not to me alone but for a lot of lot of them yeah I'll probably put a you can say in the past kind of things. No this is just my um you know the context was just to uh try to understand like uh the different roles that AI plays um in uh you know when when a breach happens. Um right so I think that uh um brings us to the last segment. We've spent um about 45 minutes uh building a picture of what's at stake where the gaps are and what the right skills look like.
Um now we'll take just a few minutes to show you how simply learn program in partnership with triple IT Bangalore and recess these uh gaps systematically. I'll start with uh a brief overview and then uh professor will be able to give um you know much detailed understanding. Um so four things that stand out about this program. Uh first it's not just you know cyber security it's cyber security plus um AI. Uh so um you know we we've seen that um it's it's come to an extent where you probably cannot separate uh the two anymore. Uh so second aspect here is that the curriculum includes CV13 AI certification with easy council which is one of the most recognized credentials in the field globally.
Uh third and this is one of uh um you know the aspects that matters most for people who are worried about um landing a job um is that you'd get an AI powered uh job assistance from Simply Learn. I will talk a bit more uh in detail uh on that later. And fourth um it's um you know this is a program that has 30 plus global case studies, 100 plus guided assignments uh 30 plus tools that uh you know you get exposure to. So, so this is um you know it involves a lot of learning by doing um not just learning by watching slides or listening.
Um and uh speaking of which I think um you know we don't um we can uh get into understanding the curriculum much more in detail from professor uh so um professor Harish over to you. Yeah thank you. See uh I think we have to understand quite a number of uh concepts before we get into becoming a threat uh intelligent uh professional. Okay. Okay. So you need to understand about infrastructure uh where you have networks coming into take place. Then you have network security that is where the depth is pretty much being arrived as it is right.
So you also need to understand a bit of scripting where you can start to develop something of your own because today we are talking about again AI. So development is also important. So you don't need to do coding but basic scripting with oneliner kind of commands is going to add a lot of parameters and that's what the program has in it. one and then we talk about securing it. So what are we securing it? We need enterprise level understanding. So enterprise infrastructure security is one area where it'll give you the 360deree angle of what the what an enter enterprise has as device as operations as process.
So that would ideally be covered on that. Then we have application and application security which is where we call them. We need to understand about the waves and how secure coding kind of things are there right. We're not going to go in depth into coding parameters. I think a lot of you may have that as a doubt but it has its own understanding of basic commands and basic line items of scripting. So where you're scripting and this one would be in alignment with that. Then you have AI as I think I've spoken enough of that uh today.
So we need to understand about the foundations of AI and how this is making an impact in the world of cyber security. So the foundation of AI is as it is AI as it is and then we're going to use what right are we going to use a model are we going to use a technique are we going to use something that is like machine learning or it is natural language processing so it talks about AI as it is and then takes you to the uh connection where cyber security is right and then we have AI part then we have blue team exercises where it's more of incident readiness right uh because with CTI incident readiness is where I started with and that's like more important in alignment with that and when you have AI is going to add power to that right so even it is 20% powerful you still have only 80% of job to be conducted imagine yourself like 0% versus 20% you have somebody covering it up you still can concentrate on the rest of the things pretty easily and then you have ransomware malware analysis how adversaries are playing a role and how attacks are making a difference with offensive security then traditional hacking where with the consent of the owner How you do vulnerability analysis then penetration testing or we call the vulnerability assessment and penetration testing and parameters of that is also important as the steps and how reconnaissance can be done with tools and how you can uh use the information that has already been captured.
Then we have red team as I said blue team then obviously you have red teaming which is more of exploitation it could be on a network or onto an individual. Then coming finally into your cyber security LLMs and adversaries where AI as it is also to be learned and connect those remember the answer that I gave I'm not practicing AI but somebody is creating something and then I've been asked to test my team is asked to test right so that is a difference here where you yourself can create your AI and bring that AI and test it yourself so you know the entire ambit of AI adversaries and how it is making a difference in terms of detection mechanism with or putting into the cyber security as the subject as it is and then finally you do your own project which is going to be uh the real world scenario where you'll get to understand how this is going to make a difference when you get to apply that in the real world because what you need to do uh and what you're supposed to do are to be the same right but uh in academia what we study and in organizations when we come and work there those are two different things but here what you study versus what you work are exactly the same that difference is something you will not find out at the end of the program.
So that's the base the program is being designed so far in that light right so with this we will be able to also have lot of master classes then you'll have uh people talking about uh things then you have professors coming in you will hear it from the best of the people see I'm not best in everything okay I know that and I also accept the fact that whatever I'm not best in I'll probably continue to learn on that everything will have to learn but you can't be a best in everything you can't be a like jack of all master of none kind of combinations will not work here try to learn something which is directly connected to you and then the subject will also take you forward with adequate knowledge and of course interest plays a very important role.
So whenever I teach uh whenever I'm talking both ways one is teaching in a class or giving a lecture into an organization or de delivering a practice based analysis I said only one thing if you're interested take it up and concentrate on that probably you will start you may not be able to understand it at the first instance but you'll be able to take it forward straight away probably in later point of time cyber security subject as I said it's a it's a road map you won't get it on the day one it's okay but you will still be able to get it on day 15 day 20 kind of Common sense plays a very important role there.
I think that's what the the entire highlights of the core modules are and you will also get to understand more from of course the website too as it is. Okay, perfect. Thank you. And um in the next three slides we have uh the skills that the program will be uh focusing on the tools, case studies and projects. Um so your your uh inputs on those. Yeah, I mean u you have to start uh anywhere with your own computer which is your operating system as it is is host server. Okay. And then you go beyond. So I'll put it in four different uh probably uh verticals as it is you know that's how I learn cyber security.
So we had network security which is infrastructure and network security. That's where is the first set and then it goes into application security because you need to know how the network is helping the application to work. Okay, even for the network to work, you need to have a firmware which is also an application. So, network security. Second pillar is application security. And then you have the third pillar which is what we call them as security operations and its monitoring and analysis where sometimes we also incorporate where forensics comes into existence where you will you'll touch base on that as part of the program.
And the last uh vertical is generally the risk and compliance which is more of theoretical process oriented angle. But the first three vertical is what uh is required to be a core cyber security professional. When you call core security which is u we call them data security we have core security. So core is more of technical and data is more of documentation process awareness protocols procedures kind of things coming in. So each of these things whatever you're going to learn learn it the way as it is right. uh you may also probably want to do a lot of unlearning as the program gets going.
So you please learn. The biggest thing for any human being to do is unlearning. And if you know how to do how to unlearn yourself, I think you will come up with the absolute colors for sure in time. I think the tools gives you uh a lot of connection there straight away. Okay. industry tools you need to learn uh open-source and also commercial proprietary tools at the same time right it's a combination of open source and commercial even when we do penetration testing when we do testings we use both uh proprietary tools and open source at various times and then you you'll eventually have to connect those with all those case studies that you'll have to uh probably uh go through with I think we started with quite a few case studies about ADA data went off right and then we had as attack ransomware attack.
I'm not sure how many of you are aware. Uh after got attacked, okay, uh hospital industry was considered to be critical information infrastructure. We call them CI, right? As a matter of fact, many hospitals are completely uh don't even know something like that exist. So this is the world that we are living in. So if you go to a diagnostic center and wanted to get your blood tested, you ask somebody who's sitting there not the probably not the technician lab technician you ask somebody who's sitting there in front of a computer do you know what is CIA you are falling under critical information infrastructure they'll say that I don't know anything you ask my manager right that is the awareness that people are carrying today so if you encounter something like that I think yes and I want to give you one advant I mean one piece of additional information I'll take one more minute Anya for that uh if you go to a uh pharmacy and uh you buy medicines and that particular medicine uh you you're buying it regularly maybe not for you maybe for your relative for your grandparents for your mother for your father whomever it is and you get to buy that regularly and you get the discount by providing your phone number and please understand none of these pharmacy chains have got security parameters aligned with because they're not having any regulatory compliance coming into their picture.
If it is a financial organization or NBFC, yes, it is. But for other than that, it is all completely bank blank. So if you're going to do that and that data is going to go out and they get to see that a particular medicine is going to be purchased is being purchased by somebody very regularly, then you go and apply for a medical insurance, your premium will be high tomorrow. Don't get surprised. Your friend may get a premium that is lower because your friend didn't have I mean did not give the phone number or didn't buy medicine from that pharmacy but if you encounter to do that you be please be prepared for that.
I think that is a very big difference because pharmacies data are they don't know the word called security exist with them. I've seen it with at least 20 plusies all around places wherever I've gone. They don't have antivirus in their systems. They just use a very simple preparatory software created by some third party. Whether it has been tested or not, only God knows. So for 5% of 10% of your discounts that you wanted to achieve, probably give a phone number that you don't want you or you're not using it for anything else. That's fine. Be a little intelligent with that.
But harsh reality is people don't know what's happening. We're talking about enterprise level but it is also important for to be an individually how you can secure yourself. It's a some probably you can say it as a selfish behavior. I don't want people to just like that lose data as it is. Yeah, I think you just gave a preview into you know what it is, how it is to learn through case studies. Um and yeah, we've established that um you know the program uh takes a very practical approach to learning these concepts which is great and um ultimately you know um it comes down to uh outcomes and uh we have like a couple of uh success stories from our alumni year.
uh Shahed landed her cyber security engineer role at UL solutions with a 250% salary hike um uh after the program and Sepundrani moved into an executive director and cyber security consultant role after graduating. Um both of uh their testimonials point to same similar things which is you know which are practical modules, hands-on lab work and career support also that actually worked for them. And yes, speaking of career support, here is the support structure um around the program, you get a dedicated cohort manager um you know who will be with you throughout and this is like you know a person not a chatbot that you might find uh elsewhere.
Uh you get mentoring sessions with u subject matter experts like uh uh professor Harish mentioned. Um there are flexile learn options um interview prep um and mock assessments as well um and technical capability enhancement also from instructors who have worked in the field. Um so this is you know um the program is built for working professionals um as well as um um you know beginners uh people who have jobs who have commitments um you know this is applicable for everyone um right so the program is priced at 2 lak 32,000 uh rupees for Indian learners and if that number seems large there are also installment options which brings um it to 10,388 rupees per month um you can scan this QR code for uh full det details of the program including the exact curriculum uh the faculty um the breakdown of uh the timelines upcoming batch dates um and any current offers also um that are applicable I am also sharing uh the link in the chat um to access more details about the program um right so with that I'm going to launch a poll to take your interest in enrolling in the program um all you have to do is click on um yes or no if you have any queries So you're unsure, you want to know more details, you can still vote yes because our expert advisor will be getting in touch with you to guide you further.
And in case if you're voting no, feel free to uh drop a note in the chat um as to what uh is holding you back. We would genuinely, you know, like to understand what your reasons are and uh see what we can do about it. Um meanwhile, professor um while that uh um poll is ongoing, we can look take a look at couple of questions that have come our way. Um so I'm going to read uh um these questions out. Um okay, so the 12 time range to detect a cyber attack is 100 to 200 uh days.
So what happens when an attack goes undetected for more than 200 days? Does it become beyond repair or is it just like more hard to fix? See the end result is what uh matters a lot. Okay. Uh quite a number of times it is being uh milking money. That's what the end result has always been. So it's how you initiate an attack on ransomware. That's as simple as that. So undetected have gone past. Yes, I've known scenarios where it's been undetected for a longer period of time. But uh when when it'll be detected is only if they end up losing money.
That's the only connection. Some known use cases like an adversary came in at about uh 4th of January into the network uh which it's a pretty big company uh operating out of South India manufacturing company and the attack happened on the 21st of April and 4 days everything was shut for them. Literally everything was shut for them and then they resurrected. They had backups and other things but it took them almost three and a half months for them to bring back their original work structure and and this is hard reality to accept it. Okay. And they are now what happened with these kind of companies the biggest problem is who is advising them a lot a person who has got breach investigation experience or not.
So it's all about how you wanted to look into it uh as a matter and it doesn't generally don't go undetected for a longer period of time because they won't be able to milk what they want. It's only data I mean said I don't care about my data being out okay and if my data is not available for me and it has got some confidentiality and somebody owns the data then I'm really scared because that's hard reality right we've got lot of compliance received today with police departments but all of these things are almost equivalent to similar scenario as uh how you take it so if it goes undetected uh it doesn't happen generally as simple as that very rarest of the cases if it is goes unredicted then it goes unredicted forever but that I'm not sure whether somebody's making been able to do something with that data as it is so that's uh of course that's my experience also at the same time coming in we've never seen uh anything over like 6 months uh in normal times okay thank you so um that's done and the next question um is that so There are different data types, different kinds of breaches.
Uh so do we require um cyber security measurement or management according to the different types of uh breaches that we're working with? Not really. I mean that is something which is uh tailor made for organizations as it is. Uh and how much uh it's again knowledge plays a very important role. So what kind of knowledge you carry uh is what is going to reflect on the work that you're going to be doing it right. So you need to understand the entire network infrastructure. You need to know about how the applications work. As long as you're not aware of how the organization is working, then it becomes difficult for somebody to handle those scenarios.
So it is either management nor technical persons I I mean that's something you will probably be able to uh get going with your knowledge and experience. Yeah. as it is. Okay, perfect. Great. We've gotten quite a lot of interest to enroll in the program as well. So, I'm going to uh end the poll right now and uh yes, I will be launching another poll to um get uh the entries for the certificate. Just give me a moment. Okay. So, please enter your full name exactly as you would like to appear on the certificate. You do not need to add your email ID or any other uh detail.
Um we will be generating the certification sharing with you on email in the next 48 working hours. Um in case if you're not able to access the poll, please uh drop us an email at webinars simply.net and we will be able to get back to you. Uh professor while this poll is on we can take like you know a couple of uh um final questions um and yeah wrap up the session. Uh okay, Shahhat has a question on how does cyber security help to keep um nationwide related data uh safe like is there any firm in India handling the security for like that type of large data I mean lot of people are doing that as a matter of fact it's not like one company managing it uh is not is not happening so far so you've got lot of uh people handling data uh depending upon u where it is for example Aadhaar is largest database right now I think exist in the world if I'm right with respect to PII is concerned right and we've got what 97 percentage of people are already in Aadhaar if I'm right or maybe a little more than that so uh one organization looking at it is uh is not as we think because there are quite quite a number of APIs that are uh in existence so you want to connect Aadhaar you want to check it out yes it's possible in fact so far other breaches have not leaked from Aadhaar as it is it is only by means of the APIs that are connected towards it.
So right now uh there are plenty of organizations who still create APIs and we connect and then get verified with things. These banks do that, NBFCs do that. I've seen telecom companies are doing that. Uh in fact, if you wanted to get in, yes, you can still connect that and then start working it out. There are the APIs there. But ADAR is one example. There are quite a number of things where it is also happening uh in line, but there's no single organization who performs big-time tasks. It's always being number of organizations. In fact, if you're going to go with just one company, it's going to be called a single point of failure if something goes wrong.
So that's why I said in one of the examples, never go with one tool across organization. I think I've seen a lot of people mentioning that I've got this tool and it is taking care of every aspect. So when you talk about cyber security framework, you have the identify, protect, detect, respond, recover and and you have the govern all the six steps are being managed by one single vendor. Yes, it is possible. I'm not saying one vendor cannot provide everything. But what if that one vendor is breached or out of business for some reason what you will do then you will eventually reach out to single point of failure.
You will not know exactly what to do because all your people are trained on only one tool one uh I mean one family. So it's definitely not suggested to go with one uh probably vendor at any point of time. So even we run our own company you know I run company it doesn't matter you still have multiple people because it's for the welfare and not for just business as it is because it's our data right we got to be literally clear about it and digital personal data protection act is coming in I think a lot of people are going to cry and I'm waiting to see that okay perfect and the final question um how important are DLP and CL CLC while undergoing or understanding an attack uh see data loss and protection is DLP is more of uh uh individual user level um access is what it's all about.
Okay. I think the differentiation is uh what if you have a server and your data is there and that is taken from the from the server itself. So DLPs are for individuals to be monitored or your data doesn't go out from an individual computer but we are having a lot of places where your data is being or your organization's data is being with so uh it is good to have a DLP uh because you don't need to worry about your employee taking your data out okay or any of your consultants taking your data out. So it has got its limitations to work out to work out with and it could be one solution that you could rely on is not right.
So you have one among the solutions. So you've got threat intelligence in SIM s then you've got threat hunting SIM and SAR then you have user behavior analytics SIM and SAR in. So similarly you have DLP you have privilege access management you have identity access management. All of these things are individual solutions catering to specific needs but you need many things like that to work together and your output is generally being looked at it. So DLP is for individual devices your data is not being stolen or transferred or copied uh unauthentic with unauthentic access levels.
So it's limitation it has got its own limitation to operate as simple as that. It's like no if you're going to if you if you're going to ask me to talk something else say there is a physics class and you want me to talk about I'll be the biggest idiot in the class because I have no connection on current physics I may talk about common sense of physics but not has physics physics right because I'm working on the field of cyber security so it's like that kind of a difference I have my own limitation everybody has it so tools also has its own limitation as it is I can also read one so I'm a bug bounty hunter working online bugout hacker one other platforms found bugs in Microsoft NASA and other companies related to rce broken access control and uh broken authentication uh type like business logical flaws as well as I like manual testing right now so I'm 21 my qualification is in inter so what do you give suggestion to me uh am I enrolled in graduation or do so okay see bug bounty uh or any of these things are more relevant to application security okay so if you wanted to become an application security professional yes you get going there because the channel is like this.
You have threat modeling, you have secure coding, you have source code review, you have uh this is how the uh steps go, right? So you you already have experience in doing that. Then I think you should become an application security professional. Uh don't just become a vulnerability analyst because uh that job is also going out because of AI again, right? So you can become an application security professional. Try to understand the entire uh ambit of application security. you will have a bright future uh going forward and I think the program has got very good application security component incorporated into it and if you can also learn uh both sides of application where where is it being hosted how is it being monitored like network security networks infra and how is it being monitored from the SIM sock operations you will you may have you may understand the holistic view of uh the the program one and also how we could put that into practice Uh, professor, there's also a question on whether um, you know, uh, the learners would be learning according to EU regulation or Indian regulation.
See, there is I wouldn't suggest Indian regulation/ EU regulation. EU is again just because GDPR came in first. People talk about EU. Uh, because India is coming late, it doesn't mean that uh, as it is. So I wouldn't call regulation as any particular regulation. This is what we call them best practices in the program. In fact, the program is based on technology techniques. So, data security is uh from a risk and compliance perspective uh is not part of this particular thing as it is. It's more core uh of cyber security. That's what I would probably say.
So, you don't learn either way uh in this program. You will learn the core of it which means it is holistically you will get to cover uh you can align that with any standards any protocols however you wanted to uh practice with because protocols is more of rules and regulations and then you have standards which is uh coming out from where you wanted to follow the SOPs and stuff like that. Yeah. Okay. Perfect. Um I think with that I will end the certificate uh as well. Um uh I see a couple of uh uh concerns regarding not being able to access the poll.
In case you know you don't have the Zoom app or you've logged in from your phone um then the poll might not have been accessible. Please don't worry about it. Just drop us an email on webinars.net and we'll be uh getting getting you the certificate. Great. Um I think that's a wrap. Uh huge thank you to you professor Harish for an incredibly um you know informative substantive session. Is there any final piece of advice that you'd like to share with everyone here? I mean just apply common sense. That's one thing which is missing in pretty much everyone.
Uh I was very shocked to read a a research document uh 8 n months ago. I keep reading research documents on an average one a day. Uh this research came out from uh CMU and they said that uh we already use only 3% of our brain. That's what uh common man is all about and we are only using 3% of the 3% because of chat GPT today. So chat GPT or Gemini or anything else. So you can rely on it. I'm not saying that you don't use any of the GPTs of the world today but don't completely rely on it.
I think you are as an individual as a human we've got better intelligence to be used. uh relying on cyber threat intelligence is also something more relevant towards it. So uh I think use your common sense more uh if you really wanted to succeed in the world of cyber security. I think that's the only thing which I carry in myself. I believe so is I can't get updated every day and everything. But if you're going to ask me a question I'll tell you I'll answer you bullseye onto it and you go and refer to the book.
It'll be the word that I've said there. It's just because of common sense. So uh I think yeah that would be my piece of advice to anyone whoever is actually planning to uh live a world in the digital environment as far as uh zeros and ones are concerned. Thank you. Perfect. Perfect. Thank you uh so much professor. So um the intelligence gap that we discussed today it's real it's growing and it represents one of the most significant significant career opportunities in uh technology right now. Uh so the tools, the credentials and the support to bridge that gap are available uh through the program that we have discussed in detail today.
Um so uh for any follow-up questions um or any feedback, please do reach out to us at um webinars at simplearn.net. Um and our advisors will also be reaching out to anyone who has uh expressed interest in enrolling in the program. Uh so yes, with that we'll end the session. Take care. Um, thank you everyone for being here and stay safe online and we'll see you in the next webinar soon. Thank you. Thank you all. Have a good night.
More from Simplilearn
Get daily recaps from
Simplilearn
AI-powered summaries delivered to your inbox. Save hours every week while staying fully informed.
![AI With Python Full Course 2026 [FREE] | Learn Artificial Intelligence With Python | Simplilearn thumbnail](https://rewiz.app/images?url=https://i.ytimg.com/vi/SzD52e4Scgs/maxresdefault.jpg)
![AI With Python Full Course 2026 [FREE] | Learn Artificial Intelligence With Python | Simplilearn thumbnail](https://rewiz.app/images?url=https://i.ytimg.com/vi/T0Bzh5JEDzc/maxresdefault.jpg)
![Machine Learning With Python Full Course 2026 [FREE] | Python Machine Learning Course | Simplilearn thumbnail](https://rewiz.app/images?url=https://i.ytimg.com/vi/UW3-UUyh3Lo/maxresdefault.jpg)





