NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015
|
|
- Tiffany Warner
- 8 years ago
- Views:
Transcription
1 NASSCOM Cyber Security Task Force Working Group Discussion Slides June 10, 2015
2 CSTF Working Plan NASSCOM Cyber Security Task Force Scope / Charter Recommendations Four Working Groups Industry Development Technology Development Skills Development Policy Development A NASSCOM Initiative
3 Opportunities for Indian Industry NASSCOM envisages the Indian IT-BPM industry to achieve a size of USD billion by 2025; the country can aspire to build a cybersecurity product and services industry of USD billion by 2025 Currently, Indian industry revenue from security is estimated to be around 1% (USD 1.5 billion) of overall IT-BPM industry revenue (USD 146 billion); by 2025, India can aspire to scale it to 10% Generate a million skilled jobs in the security space by 2025 to cater to the rising global demand of security professionals current global shortfall is estimated to be around 0.7 million, expected to rise to 1.5 million in 2020 as per (ISC)2 Frost and Sullivan Booz Allen Hamilton Report
4 Global Initiatives/ Best Practices in WG Domains Industry Development In Israel o 200 cyber security firms; 78 companies have raised USD 400 million since 2010 o cyber related exports are more than 5 percent of global market US Department of Homeland Security has nurtured cyber security start-ups like Kryptowire & Nowsecure Skill Development In UK o Government offers apprenticeships to boost the number of civil service cyber specialists, cyber security training in further and higher education o Cyber specials program to bring volunteer police officers with specialist skills Israel Education ministry has set up after-school programs for cyber security in middle & high school. In US, National Initiative for Cybersecurity Education (NICE) for cyber-savvy citizens and building cyber-capable workforce. Technology Development Israel: Cyber security incubator established; Ben Gurion University has become the hub of Cyber Security Research and innovation. US: The federal cybersecurity R&D strategic plan intends to strengthen and leverage the link between industry and academia. UK: National Technical Assistance Center: Research in encryption & cryptanalysis Policy Development Many countries have established processes for policy implementation, proactive review with clear activity timelines and accountability mechanisms Policy push R&D investment, IP ownership & product commercialization Policy enables PPP initiatives - Coordinating Councils in US, National Cyber Security Hub in UK In US, protection for organization sharing security information with govt. through Cyber Intelligence Sharing and Protection Act (CISPA) bill debated A NASSCOM Initiative
5 Industry Development Group A NASSCOM Initiative
6 A NASSCOM Initiative
7 A NASSCOM Initiative
8 A NASSCOM Initiative
9 A NASSCOM Initiative
10 Technology Development Group A NASSCOM Initiative
11 Recommendations - Technology Development WG 1. Visibility & Motivation - PM as brand ambassador for Secure India Movement: The research and innovation in the area of Cyber Security requires a major impetus if India is to emerge on the global map. The Honorable Prime Minister be requested to help create a national movement secure India, and be the brand ambassador to galvanize the faculty and students at nation s academic institutions, and young Indian innovator firms in a movement similar to Swachh Bharat for cyber security research and development of products. National, State and college level hackathons to be also held. 2. Creation of Sectoral CERTs+: Each core industrial sector to have a sectoral CERT on similar lines as the (RBI s) Banking CERT. These to act as means for i) cyber security intelligence exchanges for respective sectors, ii) be affiliated with the sectoral Government Regulator and create sectoral compliance regulations, leading to direct creation of demand for sector specific cyber security solutions and create impetus for product innovation by the industry in response to the demand, iii) Enable sector specific PPP partnerships for R&D by academic institutions (COEs, labs, etc.) and innovation of security products by the Industry, by giving visibility to sector specific needs and revenue potential, iv) have a role in validating new technology solutions and setting standards for their sectors, 3. Role of Industry - NASSCOM, DSCI & Other Bodies: i) take the initiative in creation of Sectoral CERTs+. ii) Help in creation of a PPP innovation & incubator fund (see para 6 below), ii) Mapping of existing Industry capabilities and products, iii) Facilitate academia -industry collaboration for commercial incubation of R&D outcomes. iv) Work with Sectoral CERTs+ for identification of sector specific requirements and Technological Gap identification 4. Reduce Procurement Barriers for new Products of Small Firms in Govt Procurement: Govt will be the single largest customer of cyber security products. i) New innovation driven technologies and products by innovator firms must have a means to meet the procurement qualification requirements. For this there is a requirements to create testing certifications and quality standards. If a young Indian company can successfully meet, these then it would be eligible for R&D grant/subsidy of the testing certification cost, as also its products eligible for govt procurement (often as OEM through SIs). Ii) Procurement plans and roadmaps for the govt requirements must be released for next five years annually, this would make the potential demand and revenue potential visible to the Industry of the largest customer and help Industry in taking commercial decisions to invest in product development and R&D 5. Govt to Outsource Paid R&D to Small Innovator Firms and Academic Institutions: The R&D base of the country needs expansion through outsourced paid research for greater access to talent and grass-root innovation capabilities that exist in the private industry 6. Creation of National Cyber Security Innovation Fund: A PPP based fund with participation by the Govt, Sectoral CERTs+, and the financial institutions with the main aim to identify new technologies and products and innovator firms to invest in, mostly at commercial terms. This fund would also act as the incubator for new technologies, in partnership with Sectoral CERTs+ and R&D institutions
12 Skills Development Group A NASSCOM Initiative
13 One million certified skilled cybersecurity professionals by Develop cybersecurity as a national mainstream cadre. Mandate through SSC, global best practices and certifications: 200 universities/colleges to run both dedicated stream and commercial research 200 vocational training providers 5 regional security hubs integrated with industry 2. Select 100 Cybersecurity Drone acharyas and establish 10 COEs to create a pool of expert Cybersecurity trainers 3. Govt. declares cybersecurity as a strategic sector on par with the space, atomic energy and defence and make investments for capability and capacity building 4. Attract the best talent for Cybersecurity via widespread advocacy, early introduction in schools and talent search through hackathon and reality shows 5. Mandate Cybersecurity health index of essential public services, critical infrastructure and public companies 6. Embed Cybersecurity in the academic curriculum across all levels for creating cyber aware citizens Excellence@Scale
14 Policy Development Group A NASSCOM Initiative
15 Policy Development Policy advocacy (initiatives/ amendments) required for CS Industry (Product + Services) Development Ecosystem 1. Capability Development through PPP Addressing trust issues (PPP) Contracted projects to private sector to develop solutions/ technology, security clearance of individuals; secure sites Establishing Cyber Military Industrial Complex Engaging industry (including startups) on contracts in existing CS initiatives such as NCCC, Botnet Clearing 2. Promoting innovation and startups Govt. promoting startup ecosystem (funds, incubation, infrastructure, IP-Patent issues etc.) to be developed; single window or distributed? System Integrators (SIs) to include and promote startups in solutioning eg. internal incubation programs Procurement (including tendering) & audit processes of govt. to encourage startups eg. EMD requirements, market share restrictions, etc. 3. Showcasing Indian industry abroad international delegations, conferences, road shows etc. 4. Testing and Assurance mechanisms Test Labs, Certifications harmonized with global standards, domestic + global market + becoming global delivery hub 5. Enabling Framework Cyber Commission; Privacy Law, Info exchange framework, encryption policy, Cyber Security Act (mandatory disclosures on structure, investments, etc.), LEA capability building, international cooperation etc.; whistleblowing provisions and policies in government & private sector; e-security index 6. Inputs from Industry, Skills and Technology WG A NASSCOM Initiative
16 Thank You
Overview of Cloud Computing in India
Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market
More informationRECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationDevelopment of a BPO Industry in Kenya: Critical Success Factors. CSFs and Policy Recommendations
1. Introduction Development of a BPO Industry in Kenya: Critical Success Factors CSFs and Policy Recommendations Prof. Timothy M. Waema Intercontinental Hotel, Nairobi 10 th September, 2009 1. Introduction
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationDSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security
More informationCyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
More informationCanada 2017! A Digital Nation Focus on ICT
Canada 2017! A Digital Nation Focus on ICT Growing Canada s Prosperity Used for Ministerial Briefing www.itac.ca Page 1 Introduction ICT & Canada s prosperity Importance of ICT to Canada s prosperity:
More informationJob Title: Executive Director for Strategy, Transformation & Commissioning Support
Job Title: Executive Director for Strategy, Transformation & Commissioning Support Job Reference Number: T2STC1 Job Band: Band 13 Functional Area: Strategy, Transformation & Commissioning Support Accountable
More informationGuidance on Providing Learning and Development (L & D) Services and Cabinet Office (CO) Controls
Annex 11.1 Guidance on Providing Learning and Development (L & D) Services and Cabinet Office (CO) Controls 1. Readership All L & D leads (Departments, Agencies, and NDPBs) All Finance leads All L & D
More informationGuidelines. for setting up. Dedicated Project Team. Page 1 of 14
Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance
More informationSESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY?
SESSION #1: THE REVOLUTION HAS ARRIVED: ARE YOU READY? Dato Dan E Khoo, Vice President Corporate Strategy, MDeC Presented by: THE 3 RD INDUSTRIAL REVOLUTION IS MADE POSSIBLE WITH DIGITAL TECHNOLOGY 1 st
More informationDSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events
Vol. 3 No. 2 DSCI NEWS DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Harness data protection as a lever for economic development of India through global integration of practices and standards
More informationHow To Bridge The Skill Gap In Tourism And Hospitality
Skill Development initiatives of Ministry of Tourism for the Tourism & Hospitality Sector Government of India Ministry of Tourism New Delhi NIRVANA FILM.mpg Future Manpower Requirement Market Pulse report
More informationDEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION
DEFINING CYBERSECURITY GROWTH CATALYSTS & LEGISLATION GROWTH CATALYSTS & LEGISLATION The current policy funding and policy landscape surrounding cybersecurity initiatives and funding is convoluted with
More informationOffshore Models for Engineering Product Development
Offshore Models for Engineering Product Development Captive Center Vs Vendor Partner Vijay Machigad, KNS Acharya In today s global economy, the word outsourcing has become synonymous with offshoring. Having
More informationHow To Get A Good Job In Karnataka
Department of Information Technology & Bio Technology Government of Karnataka Karnataka the Advantage Largest hub of STPI s in India Largest Software exporter in India 3 rd largest number of engineering
More informationIndustry Engagement: Canada s Military Procurement System Canadian Association of Defence and Security Industries (CADSI)
Industry Engagement: Canada s Military Procurement System Canadian Association of Defence and Security Industries (CADSI) On behalf of: Industry Canada, National Defence, and Public Works and Government
More informationExecutive summary. Key trends. Market overview
Executive summary The animation and gaming industry have undergone a metamorphosis in the past two years. The ride has been eventful from the highs of 2006-07 where expectations were immense to the lows
More informationAGIMO and whole-of-government ICT Policy
AGIMO and whole-of-government ICT Policy Overview DAMA Canberra July 2013 Meeting Brian Catto Andrew McGalliard James Woods ICT Policy Team AGIMO 1 Agenda Who are AGIMO? What is AGIMOs role? APS ICT Strategy
More informationGlobal Sourcing of Business Services
Prof. Stephan Manning UMB College of Management What does sourcing mean? What does sourcing mean?! Organizing supply of inputs/resources needed for primary and support activities Inputs Focal Firm Outputs
More information2/9/2012. 2012 HIPAA Privacy and Security Audit Readiness. Table of contents
2012 HIPAA Privacy and Security Audit Readiness Mark M. Johnson National HIPAA Services Director Table of contents Page Background 2 Regulatory Background and HITECH Impacts 3 Office of Civil Rights (OCR)
More informationCYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationCYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
More informationCybersecurity Credentials Collaborative (C3) cybersecuritycc.org
Cybersecurity Credentials Collaborative (C3) cybersecuritycc.org October 2015 Collaboration Members Certification Matters The Cybersecurity Credentials Collaborative (C3) was formed in 2011 to provide
More informationKarnataka Electronic System Design and Manufacturing (ESDM) Policy 2013
Karnataka Electronic System Design and Manufacturing (ESDM) Policy 2013 1 Preamble 1. Electronic System Design and Manufacturing (ESDM) is the fastest growing segment of the Information and Communications
More informationPUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT
PUBLIC DATA AT RISK: CYBER THREATS TO THE NETWORKED GOVERNMENT Ms LIM May-Ann, Managing Director, TRPC Pte Ltd, & Executive Director, Asia Cloud Computing Association (ACCA) mayann@trpc.biz @eilonwy @accacloud
More informationThe International ICT Sourcing Ecosystem Key value enablers
The International ICT Sourcing Ecosystem Key value enablers Dr. Randhir Mishra Regional Director Central and Eastern Europe Satyam Computer Services Ltd randhir_mishra@satyam.com Agenda The ICT value enablers
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationCONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
More informationAGENCY: International Trade Administration, Department of Commerce.
This document is scheduled to be published in the Federal Register on 09/30/2014 and available online at http://federalregister.gov/a/2014-23210, and on FDsys.gov DEPARTMENT OF COMMERCE International Trade
More informationJyväskylä Cyber Security Ecosystem
Jyväskylä Cyber Security Ecosystem Adjunct Professor, Dr. (Military Sciences), Col (ret.) Martti Lehto 30.9.2015 High Level Cyber Security Comment 4.2.2014 President Sauli Niinistö highlighted cyber security.
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationCritical building blocks for collaboration and growth in the global aerospace supply chain
Critical building blocks for collaboration and growth in the global aerospace supply chain Jim Walters, Commercial Director Who are we? DNA Group provides Global Supply Chain Development Supply Chain Development
More informationWhy compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards
Why compromise on the quality of your cyber security training? How APMG, CESG and QA accreditations ensure the highest possible training standards Cyber Security CESG Certified Training // 2 Contents 3
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationCybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
More informationMaking our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
More informationSecuring the Nation: Creating cyber security, resilience and readiness
NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:
More informationAustralian Government Cyber Security Review
Australian Government Cyber Security Review The Cisco Response Today, governments are almost universally pursuing a development and modernisation agenda to nurture their society into the digital age, and
More informationPriority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
More informationHolcim Leadership Journey 2012-2014. May 14, 2012
Holcim Leadership Journey 2012-2014 Summary of the Holcim Leadership Journey 2012-2014 Focus on health and safety strengthen the social dialog Development and generation of leaders and talents By 2014
More informationCreating and supporting high-growth entrepreneurs
Creating and supporting high-growth entrepreneurs Overview The National Entrepreneurship Network (NEN) is Wadhwani Foundation s flagship initiative in India. It was co-founded in 2003 with IIT Bombay,
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationCyber Security Initiatives in India
Cyber Security Initiatives in India Nandkumar Saravade Director, Cyber Security and Compliance NASSCOM Some Numbers: Internal and External Growth of Internet User Population Electronic Banking in India
More informationMeasuring Business Process Outsourcing
Measuring Business Process Outsourcing Survey on Computer Software and Information Technology Enabled Services Export from India Regional Seminar on International Trade Statistics Nov 3 6, 2014 New Delhi
More informationPUBLIC HEALTH WALES NHS TRUST CHIEF EXECUTIVE JOB DESCRIPTION
PUBLIC HEALTH WALES NHS TRUST CHIEF EXECUTIVE JOB DESCRIPTION Post Title: Accountable to: Chief Executive and Accountable Officer for Public Health Wales NHS Trust Trust Chairman and Board for the management
More informationHOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
More informationOUTSOURCED PROCUREMENT TRAINING FOR DEFENCE IN AUSTRALIA Richard Doyle* INTRODUCTION
INTERNATIONAL PUBLIC PROCUREMENT CONFERENCE PROCEEDINGS 21-23 September 2006 OUTSOURCED PROCUREMENT TRAINING FOR DEFENCE IN AUSTRALIA Richard Doyle* ABSTRACT. The Defence Materiel Organisation, a prescribed
More informationCYBER ZONE INTRODUCING THE 10% CALL FOR EXHIBITORS
CALL FOR EXHIBITORS 10% DISCOUNT FOR FIRST TIME EXHIBITORS* INTRODUCING THE CYBER ZONE Get ready to really showcase your products and services to a specific and vetted audience in a distinctive, dedicated
More informationNorthrop Grumman Cybersecurity Research Consortium
Northrop Grumman Cybersecurity Research Consortium GUIRR Spring Meeting Washington DC 9 February 2011 Robert F. Brammer, Ph.D. VP Advanced Technology and Chief Technology Officer Northrop Grumman Information
More informationEUROPEAN CYBERSECURITY FLAGSHIP SUMMARY
EUROPEAN CYBERSECURITY FLAGSHIP SUMMARY OVERALL VISION & OBJECTIVES Europe is developing its common cybersecurity approach on the principles laid down by the EU Cybersecurity Strategy, also tackling the
More informationContext. UK-lndia Education and Research Initiative (UKlERl)
Joint Statement between the Ministry of Human Resources Development of the Government of lndia and the Department of Business, Innovation and Skills on behalf of the Government and the Devolved Administrations
More informationDraft Policy on Internet of Things
Draft Policy on Internet of Things Department of Electronics & Information Technology(DeitY) Ministry of Communication and Information Technology Government of India Table of Contents 1.0 PREAMBLE... 3
More informationDr. B.K. Murthy Director & Head NKN, E-infra & Internet Governance Div. Department of IT Ministry of Communications and IT Government of India
Indian ICT Landscape and Road Map Dr. B.K. Murthy Director & Head NKN, E-infra & Internet Governance Div. Department of IT Ministry of Communications and IT Government of India Key Factors of Knowledge
More informationStrategic Progress Update July 2014 March 2015
Strategic Progress Update July 2014 March 2015 Presented to the SUS Board of Governors By Sri Sridharan, FC 2 Managing Director and Chief Operating Officer March 18, 2015 Mission / Goals 1. Position Florida
More informationAgenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014
OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2 Linda Sanches, MPH Senior Advisor, Health Information Privacy HCCA Compliance Institute March 31, 2014 Agenda Background Audit Phase
More informationCommonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative
Commonwealth Advanced Data Analytics Alliance & The President s Precision Medicine Initiative Deputy Secretary Anthony Fung Presentation to the Health IT Standards Advisory Committee December 17, 2015
More informationGenpact Services LLC (India Branch), a Genpact Entity. Corporate Social Responsibility (CSR) Policy
Genpact Services LLC (India Branch), a Genpact Entity Corporate Social Responsibility (CSR) Policy 1 Table of contents INTRODUCTION AND BACKGROUND 3 Our CSR Philosophy. 3 OBJECTIVES OF THE POLICY. 3 CSR
More informationCybersecurity Competence Building Trends
Cybersecurity Competence Building Trends GFCE, June 2016 Vladimir Radunović DiploFoundation Context Challenges Threats to institutions, business, CI Multidisciplinary area (technology, law, diplomacy,
More informationGeneral Manager, Economic Development and Culture
STAFF REPORT ACTION REQUIRED Women's Entrepreneurship Roundtable Date: March 31, 2014 To: From: Wards: Economic Development Committee General Manager, Economic Development and Culture All Reference Number:
More informationOpen Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
More informationCreative Cluster Challenge Fund for Screen Industries Guidelines for applicants
Creative Cluster Challenge Fund for Screen Industries Guidelines for applicants Closing date for applications: 18 September 2015 The BFI reserves the right to amend these guidelines from time to time or
More informationData Security Council of India (DSCI) Response to
Data Security Council of India (DSCI) Response to A Comprehensive Approach on Personal Data Protection in the European Union Communication from the Commission to the European Parliament, The Council, The
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationFor Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
More informationVirginia Joint Commission on Technology and Science. Cybersecurity Legislation
Virginia Joint Commission on Technology and Science Cybersecurity Legislation Pending Legislation Widespread agreement of need for legislation Three approaches CISPA Cybersecurity Act of 2012 SECURE IT
More informationDeveloping HR Strategies in Public Administration Institutions Recruitment and Retention Strategies and Workforce Plans
Developing HR Strategies in Public Administration Institutions Recruitment and Retention Strategies and Workforce Plans 27th to 29th May 2014 and October 2014 Danilovgrad, Montenegro PROVISIONAL PROGRAMME
More informationIndia IT-BPM sector and Economic growth in Bengaluru. 4 August 2015 Ashok Pamidi
India IT-BPM sector and Economic growth in Bengaluru 4 August 2015 Ashok Pamidi About NASSCOM Driving thought leadership and collaboration for 25+ years Premier trade body and chamber of commerce of the
More informationNASSCOM. Copyright 2014
1 Copyright 2014 NASSCOM International Youth Center, Teen Murti Marg, Chanakyapuri, New Delhi 110 021, India Phone: 91-11-23010199, Fax: 91-11-23015452 E-mail: research@nasscom.in First Print: July 2014
More informationREPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY
REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come
More informationThe National Cybersecurity Workforce Framework. 2015 Delaware Cyber Security Workshop September 29, 2015
The National Cybersecurity Workforce Framework 2015 Delaware Cyber Security Workshop September 29, 2015 Bill Newhouse NICE Program Office at the National Institute of Standards and Technology NICE is a
More informationUpdate on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
More informationEXECUTIVE SUMMARY. EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium
EXECUTIVE SUMMARY EU Multi Stakeholder Forum on Corporate Social Responsibility 3-4 February, 2015 Brussels, Belgium The Multi Stakeholder Forum on Corporate Social Responsibility (CSR) was held in Brussels
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationICT and Globalization
ICT and Globalization Developments and Perspectives from the Indian IT-ITES Experience Presented to the OECD Working Party on the Information Economy Paris, June 2006 This material was used by NASSCOM
More informationINVITATION OF PROPOSAL
INVITATION OF PROPOSAL for Study on Status and Opportunities for Indian Consulting Industry CONSULTANCY DEVELOPMENT CENTRE (Autonomous Institution of DSIR, Ministry of Science & Technology) 2 nd Floor,
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationState University System Florida Board of Governors Request to Establish Market Tuition Rates Regulation 7.001(15)
University: University of South Florida Proposed Market Tuition Program: Master s of Science in Cyber Security University Board of Trustees approval date: Date Proposed Implementation Date (month/year):
More informationNetwork for global. Indians. Initiative
Network for global Indians Business Connect Startup Connect Initiative Social Impact Investment About OIFC Who we are? Overseas Indian Facilitation Centre (OIFC) is a not-for-pro t Trust set-up by the
More informationCRC/C/OPAC/NLD/CO/1. Convention on the Rights of the Child. United Nations
United Nations Convention on the Rights of the Child CRC/C/OPAC/NLD/CO/1 Distr.: General 5 June 2015 ADVANCE UNEDITED VERSION Original: English Committee on the Rights of the Child Concluding observations
More informationSempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013
Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR 29 2013 Sempra Energy s gas and electric utilities collaborate with industry leaders and a wide range of
More informationData Security Council of India
A Comparison of the APEC CBPR and DSCI Privacy Assessment Systems Josh Harris Future of Privacy Forum - On Behalf of - Data Security Council of India A NASSCOM Initiative About DSCI Established by The
More informationOpening a Science Industry Partnership (SIP) account
Opening a Science Industry Partnership (SIP) account Access to SIP grant funding The programmes we are developing through the SIP will have a direct impact on our productivity, allowing people coming into
More information2012 Public Policy Priorities A pro-growth, pro-jobs agenda for New York
2012 Public Policy Priorities A pro-growth, pro-jobs agenda for New York 2 Partnership for New York City About the Partnership The Partnership is dedicated to ensuring that New York remains a thriving
More informationCAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationCURRICULUM FOR BACHELOR PROGRAMME MANAGEMENT AND BUSINESS ADMINISTRATION
VILNIUS UNIVERSITY CURRICULUM FOR BACHELOR PROGRAMME MANAGEMENT AND BUSINESS ADMINISTRATION IDENTIFICATION Name of programme Qualification awarded Level Study field Scope of programme (ECTS) Language of
More informationJHANSI CANTONMENT BOARD
JHANSI CANTONMENT BOARD Govt of India, Ministry of Defence Expression of Interest (EOI) for Procurement, Installation, Commissioning of the CCTV Cameras and Video Surveillance Systems (using Video Management
More informationHigh Performance Computing
High Parallel Computing Hybrid Program Coding Heterogeneous Program Coding Heterogeneous Parallel Coding Hybrid Parallel Coding High Performance Computing Highly Proficient Coding Highly Parallelized Code
More informationNITRD: National Big Data Strategic Plan. Summary of Request for Information Responses
NITRD: National Big Data Strategic Plan Summary of Request for Information Responses Introduction: Demographics Summary of Responses Next generation Capabilities Data to Knowledge to Action Access to Big
More informationCyber Security Strategy(Information Security Policy Council, June 10, 2013)
Environmental Change Vision to aim as a Goal Basic Principles Cyber Security Strategy(Information Security Policy Council, June 10, 2013) Areas of Efforts Increasing severity of the risk surrounding cyberspace
More informationPROPOSED MODEL FOR THE US COMMUNITY COLLEGES TO BUILD STRATEGIC PARTNERSHIP IN THE FIELD OF SKILL DEVELOPMENT IN INDIA
PROPOSED MODEL FOR THE US COMMUNITY COLLEGES TO BUILD STRATEGIC PARTNERSHIP IN THE FIELD OF SKILL DEVELOPMENT IN INDIA Preamble It is estimated that in 2022, when India turns 75 years, 50% of the Indian
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationThe development of Shinawatra University s international graduate program in joint public and business administration (PBA)
The development of Shinawatra University s international graduate program in joint public and business administration (PBA) Introduction: Given the fact that management challenges in terms of political-economic-societaltechnological
More informationNeed for a bridge to bridge. Network Security. skills gap. The. Network Security. Academy academy.cyberoam.com
White paper Need for a bridge to bridge Network Security skills gap A collaborative vision on network security education and cyber-security workforce development Academy Learning The Network Security Academy
More information[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
More information