1 00:00:00,180 --> 00:00:00,960 Welcome, everyone. 2 00:00:00,990 --> 00:00:07,080 This is niche, and I'll tell you something, you haven't made it, you have made it clear, you have 3 00:00:07,080 --> 00:00:12,630 made your point that you will be constrained and learning ethical hacking. 4 00:00:13,290 --> 00:00:21,570 Now we are at learning what it feels like to be hacked, what it's really like to be being hacked, 5 00:00:21,660 --> 00:00:28,440 you know, so when you might have came across a whole lot of news and some of your friends call you 6 00:00:28,440 --> 00:00:34,230 up and say, hey, hey, hey, James, my my Facebook account got hacked and this is all happened. 7 00:00:34,470 --> 00:00:41,670 And you might have came across a website where, you know, the company A or Company B has got data 8 00:00:41,670 --> 00:00:42,300 breaches. 9 00:00:42,570 --> 00:00:47,170 They have they have came to a cyber attack or something. 10 00:00:47,430 --> 00:00:50,610 So what it what it what it is all about being hacked. 11 00:00:50,610 --> 00:00:50,820 Right. 12 00:00:51,240 --> 00:00:54,390 So this is all about the headline. 13 00:00:54,430 --> 00:00:59,490 You the ball, you get to see those hacked aquiline and everything. 14 00:00:59,500 --> 00:01:05,410 Right whenever those campaigns and those massive cyber attacks really run across. 15 00:01:05,940 --> 00:01:13,800 So in my point of view, whenever somebody says you have been hacked, there are two aspects that could 16 00:01:13,920 --> 00:01:14,670 really happen. 17 00:01:15,030 --> 00:01:15,450 Right? 18 00:01:16,290 --> 00:01:24,750 The two things that could really happen, hack could happen for a home user and it could even happen 19 00:01:24,750 --> 00:01:27,430 for a business that's a to take great. 20 00:01:27,690 --> 00:01:35,670 It could either happen to a single user or it could happen to the organization or maybe a corporate 21 00:01:35,670 --> 00:01:37,690 or government or any institution. 22 00:01:38,280 --> 00:01:42,560 So when it when a hack happened to a user, it's altogether different stuff. 23 00:01:42,840 --> 00:01:46,830 I'm not saying it's a small attack, but not at least not for him. 24 00:01:46,830 --> 00:01:47,090 Right. 25 00:01:47,190 --> 00:01:50,250 It could be a big asset for him. 26 00:01:50,250 --> 00:01:56,250 Maybe his Facebook account is got hacked or maybe his laptop has got ransomware or something where he 27 00:01:56,250 --> 00:02:00,430 has his family photos and some personal assets or something. 28 00:02:00,660 --> 00:02:02,930 So for him, it could be important. 29 00:02:03,240 --> 00:02:11,400 But in a in a nutshell, if you see the event when a business is get high or maybe the company website 30 00:02:11,400 --> 00:02:13,180 get taxed, it's big. 31 00:02:13,320 --> 00:02:20,540 Let me tell you in what sense, because businesses, such customers, it could be thousands. 32 00:02:20,550 --> 00:02:24,160 It could be millions, hundreds of millions as well. 33 00:02:24,540 --> 00:02:30,570 But when those data get hacked, the thousands and millions of information get leaked out of it. 34 00:02:30,570 --> 00:02:34,970 And their customer information get, you know, visible to everyone in the world. 35 00:02:35,280 --> 00:02:41,530 And that's basically destroys the loyalty from the customer. 36 00:02:42,030 --> 00:02:50,010 Customers start distrusting those those organizations and their business value get deteriorated. 37 00:02:50,220 --> 00:02:57,270 Their partners start to get, you know, kind of unstability kind of a business involvement with them 38 00:02:57,690 --> 00:03:01,110 or, you know, it could be a lot of other stuff as well. 39 00:03:01,140 --> 00:03:04,100 It could be a financial stress, all the stuff. 40 00:03:04,410 --> 00:03:11,540 And that's why the business cyberattack is something where businesses spend a lot of money as well. 41 00:03:12,150 --> 00:03:17,850 And that's what we are actually going to talk about then why businesses need an ethical hacker, because 42 00:03:17,850 --> 00:03:20,070 that's what we just have spoken, right? 43 00:03:20,370 --> 00:03:23,130 Because businesses are constantly under attack. 44 00:03:23,350 --> 00:03:25,460 There are there could be multiple reasons. 45 00:03:25,500 --> 00:03:31,350 The first is they are under constant attack because they are the most juicy. 46 00:03:31,680 --> 00:03:34,380 They are actually getting the most juicy stuff. 47 00:03:34,570 --> 00:03:41,730 As I told you earlier, they have the Web applications where the customer information is are stored. 48 00:03:42,160 --> 00:03:47,330 They are being those are being made public so that anybody can reach out to those applications. 49 00:03:47,340 --> 00:03:48,570 And, of course, so do they. 50 00:03:48,840 --> 00:03:50,550 So do the attackers as well. 51 00:03:50,560 --> 00:03:50,790 Right. 52 00:03:51,180 --> 00:03:52,980 So they are under constant attack. 53 00:03:52,980 --> 00:03:57,500 And of course, they are going to the cloud heavily and most of them are already on the cloud. 54 00:03:57,720 --> 00:04:05,040 You look at all the e-commerce site travel portals, you look at look at the government open open borders 55 00:04:05,040 --> 00:04:05,490 as well. 56 00:04:05,490 --> 00:04:11,670 You look at the supply chains, customer relationship management, chat rooms, all those tools are 57 00:04:11,670 --> 00:04:14,310 made publicly available on the cloud. 58 00:04:14,850 --> 00:04:21,230 And that's why it is also very easy target for ethical hackers as well. 59 00:04:21,240 --> 00:04:23,100 I'm not saying it's an easy target. 60 00:04:23,370 --> 00:04:31,290 It just that because it's on the cloud that the risk exposure is comparatively higher and now it's up 61 00:04:31,290 --> 00:04:38,160 to a hacker what tools or what techniques he used that makes his job easier. 62 00:04:38,320 --> 00:04:38,690 Right. 63 00:04:39,060 --> 00:04:48,540 And of course, the the the businesses definitely need ethical hacker because that reduces their risk 64 00:04:48,540 --> 00:04:56,300 exposure, that reduces their risk liability if they have the somebody to take care of their security, 65 00:04:56,880 --> 00:04:59,880 the security of their application, that reduces their. 66 00:05:00,420 --> 00:05:09,120 And the company's risk management team can sit, relax and be happy sometime, at least so that they 67 00:05:09,120 --> 00:05:12,920 can get the feel OK, there are applications are taken care of by somebody great. 68 00:05:13,770 --> 00:05:18,090 And, of course, the it also reduces the risk of data breaches. 69 00:05:18,120 --> 00:05:19,470 That's what we talked about earlier. 70 00:05:19,480 --> 00:05:23,360 Right, because data breaches are really to tread. 71 00:05:23,490 --> 00:05:31,170 But, you know, there are some compliances like GDP in Europe as well, where if you have data breaches, 72 00:05:31,170 --> 00:05:34,920 you get a penalty of, you know, in terms of money. 73 00:05:34,920 --> 00:05:38,800 And even brand reputation is also really a challenge. 74 00:05:39,210 --> 00:05:41,640 So that is also a big concern. 75 00:05:41,670 --> 00:05:50,130 That's why the business is really hires ethical hackers in the form of solution consultant in the form 76 00:05:50,130 --> 00:05:53,730 of solution, architect, security consultant. 77 00:05:53,730 --> 00:06:00,120 Many of this stuff they form their their position could be different, but the way they deal with it, 78 00:06:00,210 --> 00:06:01,360 it's exactly the same. 79 00:06:01,680 --> 00:06:02,130 All right. 80 00:06:02,150 --> 00:06:08,820 Are in a way, the the the way they perform the services, it could also be different in the form of 81 00:06:08,820 --> 00:06:16,790 consulting, in the form of testing their application or the form of quality analysis and everything. 82 00:06:16,830 --> 00:06:17,090 Right. 83 00:06:17,400 --> 00:06:22,400 So this is all the reason why businesses need anything like. 84 00:06:23,010 --> 00:06:26,610 I hope you have enjoyed the session so far. 85 00:06:26,790 --> 00:06:30,030 And this is all about it will catch you in the next one. 86 00:06:30,180 --> 00:06:30,630 Thank you.