NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015

Size: px
Start display at page:

Download "NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015"

Transcription

1 NASSCOM Cyber Security Task Force Working Group Discussion Slides June 10, 2015

2 CSTF Working Plan NASSCOM Cyber Security Task Force Scope / Charter Recommendations Four Working Groups Industry Development Technology Development Skills Development Policy Development A NASSCOM Initiative

3 Opportunities for Indian Industry NASSCOM envisages the Indian IT-BPM industry to achieve a size of USD billion by 2025; the country can aspire to build a cybersecurity product and services industry of USD billion by 2025 Currently, Indian industry revenue from security is estimated to be around 1% (USD 1.5 billion) of overall IT-BPM industry revenue (USD 146 billion); by 2025, India can aspire to scale it to 10% Generate a million skilled jobs in the security space by 2025 to cater to the rising global demand of security professionals current global shortfall is estimated to be around 0.7 million, expected to rise to 1.5 million in 2020 as per (ISC)2 Frost and Sullivan Booz Allen Hamilton Report

4 Global Initiatives/ Best Practices in WG Domains Industry Development In Israel o 200 cyber security firms; 78 companies have raised USD 400 million since 2010 o cyber related exports are more than 5 percent of global market US Department of Homeland Security has nurtured cyber security start-ups like Kryptowire & Nowsecure Skill Development In UK o Government offers apprenticeships to boost the number of civil service cyber specialists, cyber security training in further and higher education o Cyber specials program to bring volunteer police officers with specialist skills Israel Education ministry has set up after-school programs for cyber security in middle & high school. In US, National Initiative for Cybersecurity Education (NICE) for cyber-savvy citizens and building cyber-capable workforce. Technology Development Israel: Cyber security incubator established; Ben Gurion University has become the hub of Cyber Security Research and innovation. US: The federal cybersecurity R&D strategic plan intends to strengthen and leverage the link between industry and academia. UK: National Technical Assistance Center: Research in encryption & cryptanalysis Policy Development Many countries have established processes for policy implementation, proactive review with clear activity timelines and accountability mechanisms Policy push R&D investment, IP ownership & product commercialization Policy enables PPP initiatives - Coordinating Councils in US, National Cyber Security Hub in UK In US, protection for organization sharing security information with govt. through Cyber Intelligence Sharing and Protection Act (CISPA) bill debated A NASSCOM Initiative

5 Industry Development Group A NASSCOM Initiative

6 A NASSCOM Initiative

7 A NASSCOM Initiative

8 A NASSCOM Initiative

9 A NASSCOM Initiative

10 Technology Development Group A NASSCOM Initiative

11 Recommendations - Technology Development WG 1. Visibility & Motivation - PM as brand ambassador for Secure India Movement: The research and innovation in the area of Cyber Security requires a major impetus if India is to emerge on the global map. The Honorable Prime Minister be requested to help create a national movement secure India, and be the brand ambassador to galvanize the faculty and students at nation s academic institutions, and young Indian innovator firms in a movement similar to Swachh Bharat for cyber security research and development of products. National, State and college level hackathons to be also held. 2. Creation of Sectoral CERTs+: Each core industrial sector to have a sectoral CERT on similar lines as the (RBI s) Banking CERT. These to act as means for i) cyber security intelligence exchanges for respective sectors, ii) be affiliated with the sectoral Government Regulator and create sectoral compliance regulations, leading to direct creation of demand for sector specific cyber security solutions and create impetus for product innovation by the industry in response to the demand, iii) Enable sector specific PPP partnerships for R&D by academic institutions (COEs, labs, etc.) and innovation of security products by the Industry, by giving visibility to sector specific needs and revenue potential, iv) have a role in validating new technology solutions and setting standards for their sectors, 3. Role of Industry - NASSCOM, DSCI & Other Bodies: i) take the initiative in creation of Sectoral CERTs+. ii) Help in creation of a PPP innovation & incubator fund (see para 6 below), ii) Mapping of existing Industry capabilities and products, iii) Facilitate academia -industry collaboration for commercial incubation of R&D outcomes. iv) Work with Sectoral CERTs+ for identification of sector specific requirements and Technological Gap identification 4. Reduce Procurement Barriers for new Products of Small Firms in Govt Procurement: Govt will be the single largest customer of cyber security products. i) New innovation driven technologies and products by innovator firms must have a means to meet the procurement qualification requirements. For this there is a requirements to create testing certifications and quality standards. If a young Indian company can successfully meet, these then it would be eligible for R&D grant/subsidy of the testing certification cost, as also its products eligible for govt procurement (often as OEM through SIs). Ii) Procurement plans and roadmaps for the govt requirements must be released for next five years annually, this would make the potential demand and revenue potential visible to the Industry of the largest customer and help Industry in taking commercial decisions to invest in product development and R&D 5. Govt to Outsource Paid R&D to Small Innovator Firms and Academic Institutions: The R&D base of the country needs expansion through outsourced paid research for greater access to talent and grass-root innovation capabilities that exist in the private industry 6. Creation of National Cyber Security Innovation Fund: A PPP based fund with participation by the Govt, Sectoral CERTs+, and the financial institutions with the main aim to identify new technologies and products and innovator firms to invest in, mostly at commercial terms. This fund would also act as the incubator for new technologies, in partnership with Sectoral CERTs+ and R&D institutions

12 Skills Development Group A NASSCOM Initiative

13 One million certified skilled cybersecurity professionals by Develop cybersecurity as a national mainstream cadre. Mandate through SSC, global best practices and certifications: 200 universities/colleges to run both dedicated stream and commercial research 200 vocational training providers 5 regional security hubs integrated with industry 2. Select 100 Cybersecurity Drone acharyas and establish 10 COEs to create a pool of expert Cybersecurity trainers 3. Govt. declares cybersecurity as a strategic sector on par with the space, atomic energy and defence and make investments for capability and capacity building 4. Attract the best talent for Cybersecurity via widespread advocacy, early introduction in schools and talent search through hackathon and reality shows 5. Mandate Cybersecurity health index of essential public services, critical infrastructure and public companies 6. Embed Cybersecurity in the academic curriculum across all levels for creating cyber aware citizens Excellence@Scale

14 Policy Development Group A NASSCOM Initiative

15 Policy Development Policy advocacy (initiatives/ amendments) required for CS Industry (Product + Services) Development Ecosystem 1. Capability Development through PPP Addressing trust issues (PPP) Contracted projects to private sector to develop solutions/ technology, security clearance of individuals; secure sites Establishing Cyber Military Industrial Complex Engaging industry (including startups) on contracts in existing CS initiatives such as NCCC, Botnet Clearing 2. Promoting innovation and startups Govt. promoting startup ecosystem (funds, incubation, infrastructure, IP-Patent issues etc.) to be developed; single window or distributed? System Integrators (SIs) to include and promote startups in solutioning eg. internal incubation programs Procurement (including tendering) & audit processes of govt. to encourage startups eg. EMD requirements, market share restrictions, etc. 3. Showcasing Indian industry abroad international delegations, conferences, road shows etc. 4. Testing and Assurance mechanisms Test Labs, Certifications harmonized with global standards, domestic + global market + becoming global delivery hub 5. Enabling Framework Cyber Commission; Privacy Law, Info exchange framework, encryption policy, Cyber Security Act (mandatory disclosures on structure, investments, etc.), LEA capability building, international cooperation etc.; whistleblowing provisions and policies in government & private sector; e-security index 6. Inputs from Industry, Skills and Technology WG A NASSCOM Initiative

16 Thank You

Overview of Cloud Computing in India

Overview of Cloud Computing in India Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market

More information

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Development of a BPO Industry in Kenya: Critical Success Factors. CSFs and Policy Recommendations

Development of a BPO Industry in Kenya: Critical Success Factors. CSFs and Policy Recommendations 1. Introduction Development of a BPO Industry in Kenya: Critical Success Factors CSFs and Policy Recommendations Prof. Timothy M. Waema Intercontinental Hotel, Nairobi 10 th September, 2009 1. Introduction

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

Canada 2017! A Digital Nation Focus on ICT

Canada 2017! A Digital Nation Focus on ICT Canada 2017! A Digital Nation Focus on ICT Growing Canada s Prosperity Used for Ministerial Briefing www.itac.ca Page 1 Introduction ICT & Canada s prosperity Importance of ICT to Canada s prosperity:

More information

Job Title: Executive Director for Strategy, Transformation & Commissioning Support

Job Title: Executive Director for Strategy, Transformation & Commissioning Support Job Title: Executive Director for Strategy, Transformation & Commissioning Support Job Reference Number: T2STC1 Job Band: Band 13 Functional Area: Strategy, Transformation & Commissioning Support Accountable

More information

Guidance on Providing Learning and Development (L & D) Services and Cabinet Office (CO) Controls

Guidance on Providing Learning and Development (L & D) Services and Cabinet Office (CO) Controls Annex 11.1 Guidance on Providing Learning and Development (L & D) Services and Cabinet Office (CO) Controls 1. Readership All L & D leads (Departments, Agencies, and NDPBs) All Finance leads All L & D

More information

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14 Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance

More information

SESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY?

SESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY? SESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY? Dato Dan E Khoo, Vice President Corporate Strategy, MDeC Presented by: THE 3 RD INDUSTRIAL REVOLUTION IS MADE POSSIBLE WITH DIGITAL TECHNOLOGY 1 st

More information

DSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events

DSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events Vol. 3 No. 2 DSCI NEWS DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Harness data protection as a lever for economic development of India through global integration of practices and standards

More information

How To Bridge The Skill Gap In Tourism And Hospitality

How To Bridge The Skill Gap In Tourism And Hospitality Skill Development initiatives of Ministry of Tourism for the Tourism & Hospitality Sector Government of India Ministry of Tourism New Delhi NIRVANA FILM.mpg Future Manpower Requirement Market Pulse report

More information

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION

DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with

More information

Offshore Models for Engineering Product Development

Offshore Models for Engineering Product Development Offshore Models for Engineering Product Development Captive Center Vs Vendor Partner Vijay Machigad, KNS Acharya In today s global economy, the word outsourcing has become synonymous with offshoring. Having

More information

How To Get A Good Job In Karnataka

How To Get A Good Job In Karnataka Department of Information Technology & Bio Technology Government of Karnataka Karnataka the Advantage Largest hub of STPI s in India Largest Software exporter in India 3 rd largest number of engineering

More information

Industry Engagement: Canada s Military Procurement System Canadian Association of Defence and Security Industries (CADSI)

Industry Engagement: Canada s Military Procurement System Canadian Association of Defence and Security Industries (CADSI) Industry Engagement: Canada s Military Procurement System Canadian Association of Defence and Security Industries (CADSI) On behalf of: Industry Canada, National Defence, and Public Works and Government

More information

Executive summary. Key trends. Market overview

Executive summary. Key trends. Market overview Executive summary The animation and gaming industry have undergone a metamorphosis in the past two years. The ride has been eventful from the highs of 2006-07 where expectations were immense to the lows

More information

AGIMO and whole-of-government ICT Policy

AGIMO and whole-of-government ICT Policy AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy

More information

Global Sourcing of Business Services

Global Sourcing of Business Services Prof. Stephan Manning UMB College of Management What does sourcing mean? What does sourcing mean?! Organizing supply of inputs/resources needed for primary and support activities Inputs Focal Firm Outputs

More information

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents

2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents 2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org

Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide

More information

Karnataka Electronic System Design and Manufacturing (ESDM) Policy 2013

Karnataka Electronic System Design and Manufacturing (ESDM) Policy 2013 Karnataka Electronic System Design and Manufacturing (ESDM) Policy 2013 1 Preamble 1. Electronic System Design and Manufacturing (ESDM) is the fastest growing segment of the Information and Communications

More information

PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT

PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT Ms LIM May-Ann, Managing Director, TRPC Pte Ltd, & Executive Director, Asia Cloud Computing Association (ACCA) mayann@trpc.biz @eilonwy @accacloud

More information

The International ICT Sourcing Ecosystem Key value enablers

The International ICT Sourcing Ecosystem Key value enablers The International ICT Sourcing Ecosystem Key value enablers Dr. Randhir Mishra Regional Director Central and Eastern Europe Satyam Computer Services Ltd randhir_mishra@satyam.com Agenda The ICT value enablers

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

AGENCY: International Trade Administration, Department of Commerce.

AGENCY: International Trade Administration, Department of Commerce. This document is scheduled to be published in the Federal Register on 09/30/2014 and available online at http://federalregister.gov/a/2014-23210, and on FDsys.gov DEPARTMENT OF COMMERCE International Trade

More information

Jyväskylä Cyber Security Ecosystem

Jyväskylä Cyber Security Ecosystem Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Critical building blocks for collaboration and growth in the global aerospace supply chain

Critical building blocks for collaboration and growth in the global aerospace supply chain Critical building blocks for collaboration and growth in the global aerospace supply chain Jim Walters, Commercial Director Who are we? DNA Group provides Global Supply Chain Development Supply Chain Development

More information

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards

Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

Australian Government Cyber Security Review

Australian Government Cyber Security Review Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and

More information

Priority III: A National Cyberspace Security Awareness and Training Program

Priority III: A National Cyberspace Security Awareness and Training Program Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.

More information

Holcim Leadership Journey 2012-2014. May 14, 2012

Holcim Leadership Journey 2012-2014. May 14, 2012 Holcim Leadership Journey 2012-2014 Summary of the Holcim Leadership Journey 2012-2014 Focus on health and safety strengthen the social dialog Development and generation of leaders and talents By 2014

More information

Creating and supporting high-growth entrepreneurs

Creating and supporting high-growth entrepreneurs Creating and supporting high-growth entrepreneurs Overview The National Entrepreneurship Network (NEN) is Wadhwani Foundation s flagship initiative in India. It was co-founded in 2003 with IIT Bombay,

More information

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

Cyber Security Initiatives in India

Cyber Security Initiatives in India Cyber Security Initiatives in India Nandkumar Saravade Director, Cyber Security and Compliance NASSCOM Some Numbers: Internal and External Growth of Internet User Population Electronic Banking in India

More information

Measuring Business Process Outsourcing

Measuring Business Process Outsourcing Measuring Business Process Outsourcing Survey on Computer Software and Information Technology Enabled Services Export from India Regional Seminar on International Trade Statistics Nov 3 6, 2014 New Delhi

More information

PUBLIC HEALTH WALES NHS TRUST CHIEF EXECUTIVE JOB DESCRIPTION

PUBLIC HEALTH WALES NHS TRUST CHIEF EXECUTIVE JOB DESCRIPTION PUBLIC HEALTH WALES NHS TRUST CHIEF EXECUTIVE JOB DESCRIPTION Post Title: Accountable to: Chief Executive and Accountable Officer for Public Health Wales NHS Trust Trust Chairman and Board for the management

More information

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE

HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg

More information

OUTSOURCED PROCUREMENT TRAINING FOR DEFENCE IN AUSTRALIA Richard Doyle* INTRODUCTION

OUTSOURCED PROCUREMENT TRAINING FOR DEFENCE IN AUSTRALIA Richard Doyle* INTRODUCTION INTERNATIONAL PUBLIC PROCUREMENT CONFERENCE PROCEEDINGS 21-23 September 2006 OUTSOURCED PROCUREMENT TRAINING FOR DEFENCE IN AUSTRALIA Richard Doyle* ABSTRACT. The Defence Materiel Organisation, a prescribed

More information

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS

CYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS CALL FOR EXHIBITORS 10% DISCOUNT FOR FIRST TIME EXHIBITORS* INTRODUCING THE CYBER ZONE Get ready to really showcase your products and services to a specific and vetted audience in a distinctive, dedicated

More information

Northrop Grumman Cybersecurity Research Consortium

Northrop Grumman Cybersecurity Research Consortium Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information

More information

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY

EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the

More information

Context. UK-lndia Education and Research Initiative (UKlERl)

Context. UK-lndia Education and Research Initiative (UKlERl) Joint Statement between the Ministry of Human Resources Development of the Government of lndia and the Department of Business, Innovation and Skills on behalf of the Government and the Devolved Administrations

More information

Draft Policy on Internet of Things

Draft Policy on Internet of Things Draft Policy on Internet of Things Department of Electronics & Information Technology(DeitY) Ministry of Communication and Information Technology Government of India Table of Contents 1.0 PREAMBLE... 3

More information

Dr. B.K. Murthy Director & Head NKN, E-infra & Internet Governance Div. Department of IT Ministry of Communications and IT Government of India

Dr. B.K. Murthy Director & Head NKN, E-infra & Internet Governance Div. Department of IT Ministry of Communications and IT Government of India Indian ICT Landscape and Road Map Dr. B.K. Murthy Director & Head NKN, E-infra & Internet Governance Div. Department of IT Ministry of Communications and IT Government of India Key Factors of Knowledge

More information

Strategic Progress Update July 2014 March 2015

Strategic Progress Update July 2014 March 2015 Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida

More information

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014 OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2 Linda Sanches, MPH Senior Advisor, Health Information Privacy HCCA Compliance Institute March 31, 2014 Agenda Background Audit Phase

More information

Commonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative

Commonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative Commonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative Deputy Secretary Anthony Fung Presentation to the Health IT Standards Advisory Committee December 17, 2015

More information

Genpact Services LLC (India Branch), a Genpact Entity. Corporate Social Responsibility (CSR) Policy

Genpact Services LLC (India Branch), a Genpact Entity. Corporate Social Responsibility (CSR) Policy Genpact Services LLC (India Branch), a Genpact Entity Corporate Social Responsibility (CSR) Policy 1 Table of contents INTRODUCTION AND BACKGROUND 3 Our CSR Philosophy. 3 OBJECTIVES OF THE POLICY. 3 CSR

More information

Cybersecurity Competence Building Trends

Cybersecurity Competence Building Trends Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,

More information

General Manager, Economic Development and Culture

General Manager, Economic Development and Culture STAFF REPORT ACTION REQUIRED Women's Entrepreneurship Roundtable Date: March 31, 2014 To: From: Wards: Economic Development Committee General Manager, Economic Development and Culture All Reference Number:

More information

Open Certification Framework. Vision Statement

Open Certification Framework. Vision Statement Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption

More information

Creative Cluster Challenge Fund for Screen Industries Guidelines for applicants

Creative Cluster Challenge Fund for Screen Industries Guidelines for applicants Creative Cluster Challenge Fund for Screen Industries Guidelines for applicants Closing date for applications: 18 September 2015 The BFI reserves the right to amend these guidelines from time to time or

More information

Data Security Council of India (DSCI) Response to

Data Security Council of India (DSCI) Response to Data Security Council of India (DSCI) Response to A Comprehensive Approach on Personal Data Protection in the European Union Communication from the Commission to the European Parliament, The Council, The

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation

Virginia Joint Commission on Technology and Science. Cybersecurity Legislation Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT

More information

Developing HR Strategies in Public Administration Institutions Recruitment and Retention Strategies and Workforce Plans

Developing HR Strategies in Public Administration Institutions Recruitment and Retention Strategies and Workforce Plans Developing HR Strategies in Public Administration Institutions Recruitment and Retention Strategies and Workforce Plans 27th to 29th May 2014 and October 2014 Danilovgrad, Montenegro PROVISIONAL PROGRAMME

More information

India IT-BPM sector and Economic growth in Bengaluru. 4 August 2015 Ashok Pamidi

India IT-BPM sector and Economic growth in Bengaluru. 4 August 2015 Ashok Pamidi India IT-BPM sector and Economic growth in Bengaluru 4 August 2015 Ashok Pamidi About NASSCOM Driving thought leadership and collaboration for 25+ years Premier trade body and chamber of commerce of the

More information

NASSCOM. Copyright 2014

NASSCOM. Copyright 2014 1 Copyright 2014 NASSCOM International Youth Center, Teen Murti Marg, Chanakyapuri, New Delhi 110 021, India Phone: 91-11-23010199, Fax: 91-11-23015452 E-mail: research@nasscom.in First Print: July 2014

More information

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come

More information

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015

The National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015 The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a

More information

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives

Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security

More information

EXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium

EXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium EXECUTIVE SUMMARY EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium The Multi Stakeholder Forum on Corporate Social Responsibility (CSR) was held in Brussels

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

ICT and Globalization

ICT and Globalization ICT and Globalization Developments and Perspectives from the Indian IT-ITES Experience Presented to the OECD Working Party on the Information Economy Paris, June 2006 This material was used by NASSCOM

More information

INVITATION OF PROPOSAL

INVITATION OF PROPOSAL INVITATION OF PROPOSAL for Study on Status and Opportunities for Indian Consulting Industry CONSULTANCY DEVELOPMENT CENTRE (Autonomous Institution of DSIR, Ministry of Science & Technology) 2 nd Floor,

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)

State University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15) University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):

More information

Network for global. Indians. Initiative

Network for global. Indians. Initiative Network for global Indians Business Connect Startup Connect Initiative Social Impact Investment About OIFC Who we are? Overseas Indian Facilitation Centre (OIFC) is a not-for-pro t Trust set-up by the

More information

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations

CRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations

More information

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of

More information

Data Security Council of India

Data Security Council of India A Comparison of the APEC CBPR and DSCI Privacy Assessment Systems Josh Harris Future of Privacy Forum - On Behalf of - Data Security Council of India A NASSCOM Initiative About DSCI Established by The

More information

Opening a Science Industry Partnership (SIP) account

Opening a Science Industry Partnership (SIP) account Opening a Science Industry Partnership (SIP) account Access to SIP grant funding The programmes we are developing through the SIP will have a direct impact on our productivity, allowing people coming into

More information

2012 Public Policy Priorities A pro-growth, pro-jobs agenda for New York

2012 Public Policy Priorities A pro-growth, pro-jobs agenda for New York 2012 Public Policy Priorities A pro-growth, pro-jobs agenda for New York 2 Partnership for New York City About the Partnership The Partnership is dedicated to ensuring that New York remains a thriving

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

CURRICULUM FOR BACHELOR PROGRAMME MANAGEMENT AND BUSINESS ADMINISTRATION

CURRICULUM FOR BACHELOR PROGRAMME MANAGEMENT AND BUSINESS ADMINISTRATION VILNIUS UNIVERSITY CURRICULUM FOR BACHELOR PROGRAMME MANAGEMENT AND BUSINESS ADMINISTRATION IDENTIFICATION Name of programme Qualification awarded Level Study field Scope of programme (ECTS) Language of

More information

JHANSI CANTONMENT BOARD

JHANSI CANTONMENT BOARD JHANSI CANTONMENT BOARD Govt of India, Ministry of Defence Expression of Interest (EOI) for Procurement, Installation, Commissioning of the CCTV Cameras and Video Surveillance Systems (using Video Management

More information

High Performance Computing

High Performance Computing High Parallel Computing Hybrid Program Coding Heterogeneous Program Coding Heterogeneous Parallel Coding Hybrid Parallel Coding High Performance Computing Highly Proficient Coding Highly Parallelized Code

More information

NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses

NITRD: National Big Data Strategic Plan. Summary of Request for Information Responses NITRD: National Big Data Strategic Plan Summary of Request for Information Responses Introduction: Demographics Summary of Responses Next generation Capabilities Data to Knowledge to Action Access to Big

More information

Cyber Security Strategy(Information Security Policy Council, June 10, 2013)

Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace

More information

PROPOSED MODEL FOR THE US COMMUNITY COLLEGES TO BUILD STRATEGIC PARTNERSHIP IN THE FIELD OF SKILL DEVELOPMENT IN INDIA

PROPOSED MODEL FOR THE US COMMUNITY COLLEGES TO BUILD STRATEGIC PARTNERSHIP IN THE FIELD OF SKILL DEVELOPMENT IN INDIA PROPOSED MODEL FOR THE US COMMUNITY COLLEGES TO BUILD STRATEGIC PARTNERSHIP IN THE FIELD OF SKILL DEVELOPMENT IN INDIA Preamble It is estimated that in 2022, when India turns 75 years, 50% of the Indian

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

The development of Shinawatra University s international graduate program in joint public and business administration (PBA)

The development of Shinawatra University s international graduate program in joint public and business administration (PBA) The development of Shinawatra University s international graduate program in joint public and business administration (PBA) Introduction: Given the fact that management challenges in terms of political-economic-societaltechnological

More information

Need for a bridge to bridge. Network Security. skills gap. The. Network Security. Academy academy.cyberoam.com

Need for a bridge to bridge. Network Security. skills gap. The. Network Security. Academy academy.cyberoam.com White paper Need for a bridge to bridge Network Security skills gap A collaborative vision on network security education and cyber-security workforce development Academy Learning The Network Security Academy

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information