DSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events
|
|
- Bridget Watts
- 8 years ago
- Views:
Transcription
1 Vol. 3 No. 2 DSCI NEWS DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Harness data protection as a lever for economic development of India through global integration of practices and standards conforming to various legal regimes. Our Mission To create trustworthiness of Indian companies as global sourcing service providers, and to assure clients worldwide that India is a secure destination for outsourcing where privacy and protection of customer data are enshrined in the global best practices followed by the industry. Our Objectives Public Advocacy on Data Protection and Cyber Security Capacity Building on Security and Privacy Thought Leadership through Best Practices Independent Oversight for Assurance & Dispute resolution through ADR towards Self-Regulation Cyber Crime Speedier Trial through training of Law Enforcement Agencies and Judiciary Upcoming Events DSCI Best Practices Meet 2012 on July 12 in Hotel Vivanta by Taj, Banagalore Pl refer: about/1021 Cyber Crime Awareness Workshop for Law Enforcement Agencies (LEA), on July 20-21, in Ahmedabad DSCI Excellence Awards: Nominations open from August 1, 2012 Editorial Board Kartik Korpal Asst. Manager Marketing & Communications, DSCI Rahul Jain Senior Consultant, DSCI Contact Us DATA SECURITY COUNCIL OF INDIA Niryat Bhawan, 3rd Floor, Rao Tula Ram Marg, New Delhi , India Phone: , Fax: info@dsci.in, Website: QUARTERLY NEWSLETTER OF DATA SECURITY COUNCIL OF INDIA Public Advocacy NASSCOM-DSCI Report Securing Our Cyber Frontiers Union Home Minister Shri. P Chidambaram released the NASSCOM-DSCI Report Securing Our Cyber Frontiers, on April 3, 2012 in New Delhi. Speaking on the occasion, Shri. Chidambaram said, From a national security point of view, this is an important report and law enforcement agencies should quickly scale up their capacity to deal with these new crimes. We look forward to working with NASSCOM-DSCI in implementing the recommendations of NASSCOM-DSCI Report- Securing Our Cyber Frontiers". The Report highlights cyber security issues at the national and global level; need for cooperation, and for information age response to the cyber challenge. It identifies priority areas for action, including 10 key Facebook: Linkedin: Twitter: DSCI Corporate Membership is open Visit: taxonomypage/105
2 recommendations in which the roles of government and the industry have been outlined. These recommendations take into consideration the ongoing global cyber security efforts and developments while keeping the Indian environment in context. India s current infrastructure development process is making greater use of IT applications, which makes it vulnerable to cyber attacks that can have serious implications for the nation and economy at large. Cyber security has direct bearing on national security since cyberspace merges seamlessly with the physical world and cyber attacks can disrupt critical infrastructure of the country producing effects similar to those of physical attacks on the infrastructure. Recognizing the fact that more and more critical infrastructure is being owned and operated by the private enterprises, NASSCOM-DSCI constituted the Cyber Security Advisory Group (CSAG), under the chairmanship of Mr. Rajendra Pawar, Chairman-NASSCOM Executive Council, with Dr. Kamlesh Bajaj, CEO, DSCI as Member Secretary and experts from public and private sector and law enforcement. The Group was mandated to come up with recommendations for consideration by the government on public-private partnership in capacity building and policy making. DSCI consolidated the preliminary recommendations provided by the CSAG members and also did an extensive study on polices and initiatives of developed countries and India s initiatives to develop its own recommendations. Finally, it emerged that the Committee should prioritize the existing recommendations to provide the government key priority areas for action, detailing the role of the industry in each such area. As a result, the Securing Our Cyber Frontiers has come out with ten key pragmatic and actionable recommendations which also detail the role of the government and industry. (We invite you to refer the report at Consultations with Dy. NSA DSCI is engaged with the Deputy NSA, Ms. Latha Reddy in defining the role of private sector in strengthening cybersecurity in the country. DSCI proposed specific areas for PPP including Critical Information Infrastructure, Testing Labs for Accreditation of ICT Products, Security Audits and Testing, Building Cyber Security Workforce, Capacity Building of LEAs. The consultations take forward the points of engagement highlighted in the NASSCOM-DSCI Report Securing Our Cyber Frontiers. Consultations with Ministry of Commerce DSCI held consultations with the concerned Joint Secretary, in the Ministry of Commerce for the ongoing Indo-EU Trade Negotiations, highlighting India's data protection regime and how it is commensurate with EU adequacy standard for Privacy protection. Consultations with Ministry of External Affairs DSCI provided inputs on Cyber Security Norms and Technology Related Issues to the Ministry of External Affairs. In particular, it highlighted the Emergence of Cyber Diplomacy Norms, Initiatives led by Russia and China, US International Strategy for Cyberspace, and emergence of the cyberspace as global commons. Thought Leadership Advisory Groups DSCI has set up 2 Advisory Groups - Privacy Assessment Advisory Group and Security Assessment Advisory Group - to guide DSCI in designing DSCI Privacy Assessment Framework and DSCI Security Assessment Framework respectively. The Groups comprise members from public and private enterprises, and draws on inputs from DSCI Frameworks DPF and DSF. Awarded project on e-security Index for India by Department of Information Technology DSCI has been awarded the project by DIT to develop an e- Security Index Framework for India. The project will cover: Study of similar existing models / frameworks developed internationally; Development of e-security Index Framework, including the statistical model; Testing of e-security Index Framework using test data Refinement of e-security Index Framework based on test results; and Development of a roadmap to take it forward. Engagements with Analysts In its efforts to reach out to the analysts firms to apprise them on the developments in data protection, DSCI updated Gartner analysts on DSCI Frameworks DSCI Privacy and Security Assessment, Privacy Law, encryption and outsourcing issues. rd EWI 3 Worldwide Cybersecurity Summit, Delhi EWI has partnered with NASSCOM and DSCI for 3rd Worldwide Cybersecurity Summit scheduled to be held in New Delhi on October DSCI is supporting EWI in the content development and organization of the Summit. 2
3 Outreach and Awareness This quarter saw DSCI organizing focused group discussions and workshops on various facets of data protection. 'Cyber Crimes & Computer Forensics Awareness Program' for the officers of a leading PSU Bank DSCI organized a 5 day training program for 16 officers from various departments of IT, Cyber Crime Monitoring cell, Law division, etc of a leading PSU Bank. Topics covered include Emerging Trends in Cyber Crimes, Economic offences- from a law enforcement perspec tive, I nformation Technology (Amendment) Act, 2008, Internet Banking issues and RBI guidelines on Internet Banking (Gopal Krishna committee recommendations), Dealing with Law Enforcement in the event of incident/criminal activity, Introduction to Computer & Mobile Forensic tools, Investigations and Information Rights Management, Banking frauds- Case studies and interactive session, among other issues relevant to Banks. Workshop on Indian Data Protection Regime 30 participants from various industry verticals and consulting firms attended DSCI Workshop on Indian Data Protection Regime. The Workshop focussed on IT (Amendment) Act, 2008 & issued clarifications: What it is and Why it's needed, and provided Clarity on existing rules and their applicability to businesses. NASSCOM half-a-day Session on Data Security DSCI presented strategies to address Concerns, Imperatives and Liabilities associated with the data, at the sessions held in Hyderabad and Visakhapatnam. DSCI-WebSense Data Security Strategy Series DSCI and WebSense have planned a series of RTCs as a Step Towards Creating Awareness in the Country. This quarter saw RTCs held in Mumbai, Bangalore, in month of May and June and another scheduled for Mumbai. The RTCs were attended by personnel from Public and Private enterprises and focused on comprehending the imperatives of data security, Understanding of regulatory ecosystem in India and those emerging across the globe & their impact, evaluating approaches for data security initiatives. DSCI-HP RTC on 'The Cyber Security Ecosystem DSCI and HP organized a RTC focused on developing the response to managing attacks on enterprise data consists of an entire cyber security ecosystem. It was attended by around 20 senior ranking officials from Government and Public departments and received speakers including Dr. Prescott Winter, CTO, Public Sector, Enterprise Security and Dr. Jaijit Bhattacharya, Director, Government Affairs, Global Government Affairs, HP. DSCI-Codenomicon RTC on Critical Components of National Cyber Security DSCI and Codenomicon organized a RTC on Critical Components of National Cyber Security focused on Cyber Threat Monitoring, Mitigation & Prevention and Situational Awareness. It was attended by around 40 senior ranking government officials and public departments. DSCI-Cisco Workshop on Common Criteria Countries are struggling to understand risks associated with Global ICT Supply Chains in an attempt to mitigate them. Governments are formulating policies to minimize such risks, especially in telecom, defence and critical infrastructure sectors. Common Criteria Labs are emerging as an assurance mechanism in this area. With this background DSCI and Cisco organized a Workshop on Common Criteria to develop an understanding of the Common Criteria, the developments in it, and the way forward. Senior officials from Cisco made presentations while CEO, DSCI provided the inaugural remarks. DSCI- Microsoft India Privacy Meet DSCI, Microsoft and Grey Head organized the India Privacy Meet to promote dialogue among all stakeholders: individuals, governments, businesses, NGOs and academics. CEO, DSCI provided the keynote address and the theme address was provided by Mr. Deepak Rout from Microsoft. The Meet featured 2 panel discussions on the contemporary topics of privacy: Consumer Privacy Creating the Right Balance and Citizen Privacy - Transparency, Accountability and Social Progress. Featuring senior leadership of government, including 3
4 Shri. Nirmaljeet Singh Kalsi, Jt. Secretary, MHA, Shri. A P Singh, DDG, Unique Identification Authority of India (UIDAI), and representation from IT service providers, telecom companies, consulting firms, the well defined discussions addressed some of the often raised queries on privacy of individuals as citizens of a nation and consumers of the services. Outreach through seminars organized by other associations/entities DSCI reached out to more number of stakeholders through conferences organized by other associations and through publications in leading journals. These include Institute of Defence Studies and Analyses' (IDSA) report on India's Cyber Security Challenges CEO, DSCI is a member of IDSA's Cyber Security Task Force. IDSA has come out with a report on India's cyber Security Challenges, which was released by National Security Advisor (NSA) Shri. Shiv Shankar Menon, on May 16, 2012 in New Delhi. The report discussed around the role of government and private sector in recognizing the aspects of cyber security and prioritized security and risk management plans jointly. While highlighting the need and relevance of the Report, NSA mentioned that the government will work with NASSCOM & DSCI in the areas of PPP, while Dy NSA referred to the NASSCOM-DSCI report. National Seminar on Information Security in Cloud Computing- Implications for MSMEs, organized by PHD Chambers of Commerce government and LEAs, covering the Privacy approaches of EU Data Protection Directive, US Sector-specific Approach, APEC Self-Regulation, and IT (Amendment) Act, Seminar on Cyber security and Information Assurance, organized by IIT Delhi The seminar feature presentations by IIT Delhi's research group covering various aspects of Cyber security at National level. Dr. Gulshan Rai, DG, CERT-In and Mr. Vinayak Godse, DSCI provided the keynote, while Wg Cdr MM Chaturvedi presented the highlights of National Cyber Security Index. 5th ASSOCHAM International Conference on Cyber & Network Security DSCI presented its views on the Security Policy, Compliance and Assurance, Security and Incident Early Warning & Responses. The highlights of the NASSCOM-DSCI Report Securing Our Cyber Frontiers were presented at the seminars organized by BSE and UBM DSCI Articles "Global Cyber Commons - Addressing Cyber Security Issues" (New Europe Post, June). Pl visit: Cyberspace Global Commons or a National Asset (DATAQUEST, April-May) Pl visit: DSCI presented on the Cloud Security, Policy, Privacy, Legal and Compliance challenges in it, and Indian Regulatory Regime & Implications for Cloud. It proposed recommendations for user organizations, cloud service providers and government, while providing an insight into The 7 top-level Categories of Service Measurement Index (SMI). Bangalore Cyber Security Summit 3rd Edition, organized by Government of Karnataka DSCI shared the perspectives on Privacy in a Connected World : The Indian Context. It highlighted the Privacy issues and challenges in India for individuals, businesses, technology, 4
5 Capacity Building Cyber labs LEA Training program Program Quarter 5 day Course 533 Short Course 796 Guest Lecture 27 LEA Support 59 Industry Support 2 Total day Level-II Cyber Crimes training at CBI Academy. 18 officers from CBI, State police, Dept of Public prosecution attended this program Assisted the CBI Academy in conducting 3 day cyber crime training for Himachal Pradesh Police. 27 police officers attended this program. Short courses on cyber crimes for Indian Navy and Corps of Military Police Cyber Crime Awareness Workshop for Law Enforcement Agencies (LEA) officers, Special Training programs Session on Information Technology Act 2000 & Usage of technology in detection of crimes at Karnataka Judicial Academy, Bangalore. 15 Judges attended this program 4 day training program on Cyber Crimes, Cyber law and Cyber forensics at MHA's North Eastern Police Academy, Meghalaya DSCI will carry out 2 awareness workshop in the state of Gujarat and Punjab for spreading awareness to police officers, Judiciary, Public Prosecutors, adjudicating officers for combating cyber crimes. The first workshop is planned to be carried out on July 20-21, 2012 This quarter also saw Level - II training material standardized and PRSG for DIT Project held at Pune 5 4 5
Data Security Council of India (DSCI) Response to
Data Security Council of India (DSCI) Response to A Comprehensive Approach on Personal Data Protection in the European Union Communication from the Commission to the European Parliament, The Council, The
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationData Security Council of India
A Comparison of the APEC CBPR and DSCI Privacy Assessment Systems Josh Harris Future of Privacy Forum - On Behalf of - Data Security Council of India A NASSCOM Initiative About DSCI Established by The
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationMinutes of the meeting of the Copyright Enforcement Advisory Council.
The Government has set up on November 6, 1991 a Copyright Enforcement Advisory Council (CEAC) to review the progress of enforcement of Copyright Act periodically and to advise the Government regarding
More informationOverview of Cloud Computing in India
Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market
More informationBuilding an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure
www.ijcsi.org 414 Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure Shashi Ranjan, Manoj Kumar Maurya, Apurva Krishna
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationNASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015
NASSCOM Cyber Security Task Force Working Group Discussion Slides June 10, 2015 CSTF Working Plan NASSCOM Cyber Security Task Force Scope / Charter Recommendations Four Working Groups Industry Development
More informationGlobal Cybersecurity Index Good Practices
AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation
More informationHow To Discuss Cybersecurity In European Parliament
! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact
More informationRECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY
RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationMaking our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationDIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations
DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European
More informationFor Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationVenue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001
Invitation for Continuing Professional Education Session On January 11, 2014 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 02:30
More informationCYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison
CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers
More informationNational Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA
FEATURE ADDRESS BY THE HON. KHEMRAJ RAMJATTAN, M.P., VICE-PRESIDENT AND MINISTER OF PUBLIC SECURITY AT THE OPENING OF A National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA August 12 13,
More informationBusiness-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY
B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov
More informationInfocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
More informationNATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES & CONCERNS 27 TH & 28 TH DECEMBER 2014
NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BANGALORE ADVANCED CENTRE FOR RESEARCH, DEVELOPMENT AND TRAINING IN CYBER LAWS AND FORENSICS [ACRDTCLF] NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES &
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More informationITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
More informationEnhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
More informationCyber Security Initiatives in India
Cyber Security Initiatives in India Nandkumar Saravade Director, Cyber Security and Compliance NASSCOM Some Numbers: Internal and External Growth of Internet User Population Electronic Banking in India
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationHonourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
More informationCyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
More informationControl Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department
Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, email=office@jpcert.or.jp, o=japan Computer
More information3rd OWASP Information Security
OWASP InfoSec India Conference 2012 August 24th & 25th, 2012, 3rd OWASP Information Security International Conference About OWASP Open Web Application Security Project (OWASP) is a global open source application
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationCyber security in an organization-transcending way
Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security
More informationDSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services
DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security
More informationNGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka
Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?
More informationAn ISO 9001 : 2008 Certified Company WINNING AND SUSTAINING CUSTOMER TRUST
An ISO 9001 : 2008 Certified Company WINNING AND SUSTAINING CUSTOMER TRUST. 15 YEARS OF INSURANCE BROKING WELCOME TO INDIA INSURE India s first Licensed Insurance Broker with a Team of 150 professionals
More informationCitizen's Charter Department of Defence Research and Development Government of India 2015
Citizen's Charter Department of Defence Research and Development Government of India 2015 1 Vision Make India prosperous by establishing world class science and technology base and provide our Defence
More informationSeminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014
Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues Palace Hotel Saigon, HCMC, November 19 th 2014 Cyber Security and Supply Chain Integrity as Risk Factors
More informationCYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE
CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,
More informationMODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY
MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers
More informationPreventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
More informationCybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards
More informationBIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)
Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical
More informationTowards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT
Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April
More informationInternational Criminal Court. Strategic Plan
International Criminal Court Strategic Plan 2013 2017 Structure 2 Mission 2 Strategic Goals (2013-2017) 3 Strategic s (2013-2014) per Goal 4 Goal 1: Judicial and prosecutorial 4 Goal 2: Managerial 5 Goal
More informationJust Net Coalition statement on Internet governance
Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a
More informationsecuring our cyber frontiers
NASSCOM PROMOTING DATA PROTECTION NASSCOM-DSCI CYBER SECURITY ADVISORY GROUP REPORT securing our cyber frontiers About NASSCOM NASSCOM is the premier body and the chamber of commerce of the IT-BPO industries
More informationaecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA
aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National
More informationASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA
ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA NEWS BULLETIN OCTOBER 2014 AUSPI NEWS BULLETIN DECEMBER 2013 1 AUSPI NEWS BULLETIN OCTOBER
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationThe Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry
The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation
More informationGuidelines. for setting up. Dedicated Project Team. Page 1 of 14
Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance
More informationGLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
More informationRE: Comments on Vietnam s Draft Law on Information Security, version 2.22
July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology
More informationCYSPA launch event - Turkey
CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June
More informationC H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A
C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A W I L L I A M L. K O V A C S S E N I O R V I C E P R E S I D E N T E N V I R O N M E N T, T E C H N O L O G Y & R E G U
More informationHPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042
HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360
More informationCyber security Indian perspective & Collaboration With EU
Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of
More informationNational Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA
National Information Technology Center (NITC) National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA Ahmed Otoom, Ph.D. Disclaimer This presentation does
More informationBefore the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket
More informationStrategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region
CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted
More informationAn Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
More informationSTRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION
Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;
More informationService Provider Assessment Framework
Service Provider Assessment Framework A Platform for Building Synergies between Clients and Service Providers for Trusted Global Sourcing A Study Report Data Security Council of India in collaboration
More informationToday s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns
Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace
More informationDeveloping and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
More informationC ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
More informationState Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
More informationGOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
More informationCYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationCapacity Building to Strengthen Cybersecurity: Thailand Update
Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as
More informationA COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY
APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationBuilding International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech
Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationCyber Legislation & Policy Developments 2014
Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal
More informationState of Data Security and Privacy in the Indian Banking Industry
PROMOTING DATA PROTECTION A NASSCOM Initiative State of Data Security and Privacy in the Indian Banking Industry DSCI-KPMG Survey 2010 In association with Handling Computer Security Incidents Under the
More informationASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
More informationPosition Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security
Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic
More informationCYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationSecurity and Privacy in Cloud Computing
Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges
More informationCritical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity
More informationNERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
More informationMULTI ANNUAL WORK PLAN 2013 2015
MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic
More informationSTATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
More informationGermany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
More informationCybersecurity in Nepal
Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security
More informationNASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
More informationCloud Channel Summit 2015 @rhipecloud #RCCS15
Cloud Channel Summit 2015 @rhipecloud #RCCS15 About the Cloud Security Alliance Global, not-for-profit organisation 300 member driven organization with over 56,000 individual members in 65 chapters worldwide
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationPOLICIES TO MITIGATE CYBER RISK
POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various
More informationBT Quick Starts for Retail Banking Customers
BT Quick Starts for Retail Banking Customers An overview of BT s Quick Start services The retail banking industry continues to be heavily influenced by national and international issues including tax regimes,
More informationPragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group
Pragati Maidan, New Delhi 20-22 May, 2015 er Solutions for a Better Tomorrow Organiser www.smartcitiesindia.com Exhibitions India Group SMART Cities INDIA er Solutions for a Better Tomorrow As India s
More informationIndustry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws
Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services
More informationPresidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
More information