DSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events

Size: px
Start display at page:

Download "DSCI NEWS. Public Advocacy. NASSCOM-DSCI Report Securing Our Cyber Frontiers. April - June 2012 Vol. 3 No. 2. Upcoming Events"

Transcription

1 Vol. 3 No. 2 DSCI NEWS DATA SECURITY COUNCIL OF INDIA A Initiative Our Vision Harness data protection as a lever for economic development of India through global integration of practices and standards conforming to various legal regimes. Our Mission To create trustworthiness of Indian companies as global sourcing service providers, and to assure clients worldwide that India is a secure destination for outsourcing where privacy and protection of customer data are enshrined in the global best practices followed by the industry. Our Objectives Public Advocacy on Data Protection and Cyber Security Capacity Building on Security and Privacy Thought Leadership through Best Practices Independent Oversight for Assurance & Dispute resolution through ADR towards Self-Regulation Cyber Crime Speedier Trial through training of Law Enforcement Agencies and Judiciary Upcoming Events DSCI Best Practices Meet 2012 on July 12 in Hotel Vivanta by Taj, Banagalore Pl refer: about/1021 Cyber Crime Awareness Workshop for Law Enforcement Agencies (LEA), on July 20-21, in Ahmedabad DSCI Excellence Awards: Nominations open from August 1, 2012 Editorial Board Kartik Korpal Asst. Manager Marketing & Communications, DSCI Rahul Jain Senior Consultant, DSCI Contact Us DATA SECURITY COUNCIL OF INDIA Niryat Bhawan, 3rd Floor, Rao Tula Ram Marg, New Delhi , India Phone: , Fax: info@dsci.in, Website: QUARTERLY NEWSLETTER OF DATA SECURITY COUNCIL OF INDIA Public Advocacy NASSCOM-DSCI Report Securing Our Cyber Frontiers Union Home Minister Shri. P Chidambaram released the NASSCOM-DSCI Report Securing Our Cyber Frontiers, on April 3, 2012 in New Delhi. Speaking on the occasion, Shri. Chidambaram said, From a national security point of view, this is an important report and law enforcement agencies should quickly scale up their capacity to deal with these new crimes. We look forward to working with NASSCOM-DSCI in implementing the recommendations of NASSCOM-DSCI Report- Securing Our Cyber Frontiers". The Report highlights cyber security issues at the national and global level; need for cooperation, and for information age response to the cyber challenge. It identifies priority areas for action, including 10 key Facebook: Linkedin: Twitter: DSCI Corporate Membership is open Visit: taxonomypage/105

2 recommendations in which the roles of government and the industry have been outlined. These recommendations take into consideration the ongoing global cyber security efforts and developments while keeping the Indian environment in context. India s current infrastructure development process is making greater use of IT applications, which makes it vulnerable to cyber attacks that can have serious implications for the nation and economy at large. Cyber security has direct bearing on national security since cyberspace merges seamlessly with the physical world and cyber attacks can disrupt critical infrastructure of the country producing effects similar to those of physical attacks on the infrastructure. Recognizing the fact that more and more critical infrastructure is being owned and operated by the private enterprises, NASSCOM-DSCI constituted the Cyber Security Advisory Group (CSAG), under the chairmanship of Mr. Rajendra Pawar, Chairman-NASSCOM Executive Council, with Dr. Kamlesh Bajaj, CEO, DSCI as Member Secretary and experts from public and private sector and law enforcement. The Group was mandated to come up with recommendations for consideration by the government on public-private partnership in capacity building and policy making. DSCI consolidated the preliminary recommendations provided by the CSAG members and also did an extensive study on polices and initiatives of developed countries and India s initiatives to develop its own recommendations. Finally, it emerged that the Committee should prioritize the existing recommendations to provide the government key priority areas for action, detailing the role of the industry in each such area. As a result, the Securing Our Cyber Frontiers has come out with ten key pragmatic and actionable recommendations which also detail the role of the government and industry. (We invite you to refer the report at Consultations with Dy. NSA DSCI is engaged with the Deputy NSA, Ms. Latha Reddy in defining the role of private sector in strengthening cybersecurity in the country. DSCI proposed specific areas for PPP including Critical Information Infrastructure, Testing Labs for Accreditation of ICT Products, Security Audits and Testing, Building Cyber Security Workforce, Capacity Building of LEAs. The consultations take forward the points of engagement highlighted in the NASSCOM-DSCI Report Securing Our Cyber Frontiers. Consultations with Ministry of Commerce DSCI held consultations with the concerned Joint Secretary, in the Ministry of Commerce for the ongoing Indo-EU Trade Negotiations, highlighting India's data protection regime and how it is commensurate with EU adequacy standard for Privacy protection. Consultations with Ministry of External Affairs DSCI provided inputs on Cyber Security Norms and Technology Related Issues to the Ministry of External Affairs. In particular, it highlighted the Emergence of Cyber Diplomacy Norms, Initiatives led by Russia and China, US International Strategy for Cyberspace, and emergence of the cyberspace as global commons. Thought Leadership Advisory Groups DSCI has set up 2 Advisory Groups - Privacy Assessment Advisory Group and Security Assessment Advisory Group - to guide DSCI in designing DSCI Privacy Assessment Framework and DSCI Security Assessment Framework respectively. The Groups comprise members from public and private enterprises, and draws on inputs from DSCI Frameworks DPF and DSF. Awarded project on e-security Index for India by Department of Information Technology DSCI has been awarded the project by DIT to develop an e- Security Index Framework for India. The project will cover: Study of similar existing models / frameworks developed internationally; Development of e-security Index Framework, including the statistical model; Testing of e-security Index Framework using test data Refinement of e-security Index Framework based on test results; and Development of a roadmap to take it forward. Engagements with Analysts In its efforts to reach out to the analysts firms to apprise them on the developments in data protection, DSCI updated Gartner analysts on DSCI Frameworks DSCI Privacy and Security Assessment, Privacy Law, encryption and outsourcing issues. rd EWI 3 Worldwide Cybersecurity Summit, Delhi EWI has partnered with NASSCOM and DSCI for 3rd Worldwide Cybersecurity Summit scheduled to be held in New Delhi on October DSCI is supporting EWI in the content development and organization of the Summit. 2

3 Outreach and Awareness This quarter saw DSCI organizing focused group discussions and workshops on various facets of data protection. 'Cyber Crimes & Computer Forensics Awareness Program' for the officers of a leading PSU Bank DSCI organized a 5 day training program for 16 officers from various departments of IT, Cyber Crime Monitoring cell, Law division, etc of a leading PSU Bank. Topics covered include Emerging Trends in Cyber Crimes, Economic offences- from a law enforcement perspec tive, I nformation Technology (Amendment) Act, 2008, Internet Banking issues and RBI guidelines on Internet Banking (Gopal Krishna committee recommendations), Dealing with Law Enforcement in the event of incident/criminal activity, Introduction to Computer & Mobile Forensic tools, Investigations and Information Rights Management, Banking frauds- Case studies and interactive session, among other issues relevant to Banks. Workshop on Indian Data Protection Regime 30 participants from various industry verticals and consulting firms attended DSCI Workshop on Indian Data Protection Regime. The Workshop focussed on IT (Amendment) Act, 2008 & issued clarifications: What it is and Why it's needed, and provided Clarity on existing rules and their applicability to businesses. NASSCOM half-a-day Session on Data Security DSCI presented strategies to address Concerns, Imperatives and Liabilities associated with the data, at the sessions held in Hyderabad and Visakhapatnam. DSCI-WebSense Data Security Strategy Series DSCI and WebSense have planned a series of RTCs as a Step Towards Creating Awareness in the Country. This quarter saw RTCs held in Mumbai, Bangalore, in month of May and June and another scheduled for Mumbai. The RTCs were attended by personnel from Public and Private enterprises and focused on comprehending the imperatives of data security, Understanding of regulatory ecosystem in India and those emerging across the globe & their impact, evaluating approaches for data security initiatives. DSCI-HP RTC on 'The Cyber Security Ecosystem DSCI and HP organized a RTC focused on developing the response to managing attacks on enterprise data consists of an entire cyber security ecosystem. It was attended by around 20 senior ranking officials from Government and Public departments and received speakers including Dr. Prescott Winter, CTO, Public Sector, Enterprise Security and Dr. Jaijit Bhattacharya, Director, Government Affairs, Global Government Affairs, HP. DSCI-Codenomicon RTC on Critical Components of National Cyber Security DSCI and Codenomicon organized a RTC on Critical Components of National Cyber Security focused on Cyber Threat Monitoring, Mitigation & Prevention and Situational Awareness. It was attended by around 40 senior ranking government officials and public departments. DSCI-Cisco Workshop on Common Criteria Countries are struggling to understand risks associated with Global ICT Supply Chains in an attempt to mitigate them. Governments are formulating policies to minimize such risks, especially in telecom, defence and critical infrastructure sectors. Common Criteria Labs are emerging as an assurance mechanism in this area. With this background DSCI and Cisco organized a Workshop on Common Criteria to develop an understanding of the Common Criteria, the developments in it, and the way forward. Senior officials from Cisco made presentations while CEO, DSCI provided the inaugural remarks. DSCI- Microsoft India Privacy Meet DSCI, Microsoft and Grey Head organized the India Privacy Meet to promote dialogue among all stakeholders: individuals, governments, businesses, NGOs and academics. CEO, DSCI provided the keynote address and the theme address was provided by Mr. Deepak Rout from Microsoft. The Meet featured 2 panel discussions on the contemporary topics of privacy: Consumer Privacy Creating the Right Balance and Citizen Privacy - Transparency, Accountability and Social Progress. Featuring senior leadership of government, including 3

4 Shri. Nirmaljeet Singh Kalsi, Jt. Secretary, MHA, Shri. A P Singh, DDG, Unique Identification Authority of India (UIDAI), and representation from IT service providers, telecom companies, consulting firms, the well defined discussions addressed some of the often raised queries on privacy of individuals as citizens of a nation and consumers of the services. Outreach through seminars organized by other associations/entities DSCI reached out to more number of stakeholders through conferences organized by other associations and through publications in leading journals. These include Institute of Defence Studies and Analyses' (IDSA) report on India's Cyber Security Challenges CEO, DSCI is a member of IDSA's Cyber Security Task Force. IDSA has come out with a report on India's cyber Security Challenges, which was released by National Security Advisor (NSA) Shri. Shiv Shankar Menon, on May 16, 2012 in New Delhi. The report discussed around the role of government and private sector in recognizing the aspects of cyber security and prioritized security and risk management plans jointly. While highlighting the need and relevance of the Report, NSA mentioned that the government will work with NASSCOM & DSCI in the areas of PPP, while Dy NSA referred to the NASSCOM-DSCI report. National Seminar on Information Security in Cloud Computing- Implications for MSMEs, organized by PHD Chambers of Commerce government and LEAs, covering the Privacy approaches of EU Data Protection Directive, US Sector-specific Approach, APEC Self-Regulation, and IT (Amendment) Act, Seminar on Cyber security and Information Assurance, organized by IIT Delhi The seminar feature presentations by IIT Delhi's research group covering various aspects of Cyber security at National level. Dr. Gulshan Rai, DG, CERT-In and Mr. Vinayak Godse, DSCI provided the keynote, while Wg Cdr MM Chaturvedi presented the highlights of National Cyber Security Index. 5th ASSOCHAM International Conference on Cyber & Network Security DSCI presented its views on the Security Policy, Compliance and Assurance, Security and Incident Early Warning & Responses. The highlights of the NASSCOM-DSCI Report Securing Our Cyber Frontiers were presented at the seminars organized by BSE and UBM DSCI Articles "Global Cyber Commons - Addressing Cyber Security Issues" (New Europe Post, June). Pl visit: Cyberspace Global Commons or a National Asset (DATAQUEST, April-May) Pl visit: DSCI presented on the Cloud Security, Policy, Privacy, Legal and Compliance challenges in it, and Indian Regulatory Regime & Implications for Cloud. It proposed recommendations for user organizations, cloud service providers and government, while providing an insight into The 7 top-level Categories of Service Measurement Index (SMI). Bangalore Cyber Security Summit 3rd Edition, organized by Government of Karnataka DSCI shared the perspectives on Privacy in a Connected World : The Indian Context. It highlighted the Privacy issues and challenges in India for individuals, businesses, technology, 4

5 Capacity Building Cyber labs LEA Training program Program Quarter 5 day Course 533 Short Course 796 Guest Lecture 27 LEA Support 59 Industry Support 2 Total day Level-II Cyber Crimes training at CBI Academy. 18 officers from CBI, State police, Dept of Public prosecution attended this program Assisted the CBI Academy in conducting 3 day cyber crime training for Himachal Pradesh Police. 27 police officers attended this program. Short courses on cyber crimes for Indian Navy and Corps of Military Police Cyber Crime Awareness Workshop for Law Enforcement Agencies (LEA) officers, Special Training programs Session on Information Technology Act 2000 & Usage of technology in detection of crimes at Karnataka Judicial Academy, Bangalore. 15 Judges attended this program 4 day training program on Cyber Crimes, Cyber law and Cyber forensics at MHA's North Eastern Police Academy, Meghalaya DSCI will carry out 2 awareness workshop in the state of Gujarat and Punjab for spreading awareness to police officers, Judiciary, Public Prosecutors, adjudicating officers for combating cyber crimes. The first workshop is planned to be carried out on July 20-21, 2012 This quarter also saw Level - II training material standardized and PRSG for DIT Project held at Pune 5 4 5

Data Security Council of India (DSCI) Response to

Data Security Council of India (DSCI) Response to Data Security Council of India (DSCI) Response to A Comprehensive Approach on Personal Data Protection in the European Union Communication from the Commission to the European Parliament, The Council, The

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

Data Security Council of India

Data Security Council of India A Comparison of the APEC CBPR and DSCI Privacy Assessment Systems Josh Harris Future of Privacy Forum - On Behalf of - Data Security Council of India A NASSCOM Initiative About DSCI Established by The

More information

How To Write An Article On The European Cyberspace Policy And Security Strategy

How To Write An Article On The European Cyberspace Policy And Security Strategy EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

Minutes of the meeting of the Copyright Enforcement Advisory Council.

Minutes of the meeting of the Copyright Enforcement Advisory Council. The Government has set up on November 6, 1991 a Copyright Enforcement Advisory Council (CEAC) to review the progress of enforcement of Copyright Act periodically and to advise the Government regarding

More information

Overview of Cloud Computing in India

Overview of Cloud Computing in India Overview of Cloud Computing in India NIST Standards in Trade Workshop with India Rahul Jain Principal Consultant Data Security Council of India September 17, 2014 Opportunities in the Cloud Cloud Market

More information

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure

Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure www.ijcsi.org 414 Building an Information Security Infrastructure - A Comprehensive Framework towards a Robust, Resilient and Dependable Infrastructure Shashi Ranjan, Manoj Kumar Maurya, Apurva Krishna

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015

NASSCOM Cyber Security Task Force Working Group Discussion Slides. June 10, 2015 NASSCOM Cyber Security Task Force Working Group Discussion Slides June 10, 2015 CSTF Working Plan NASSCOM Cyber Security Task Force Scope / Charter Recommendations Four Working Groups Industry Development

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

How To Discuss Cybersecurity In European Parliament

How To Discuss Cybersecurity In European Parliament ! Moderator: Carlo Schüpp! Non-Executive Director and cofounder of LSEC! In his opening comments, the moderator Mr Schüpp suggested that many of the issues surrounding cybersecurity are linked to the fact

More information

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY

RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY RECOMMENDATIONS OF JOINT WORKING GROUP ON ENGAGEMENT WITH PRIVATE SECTOR ON CYBER SECURITY NATIONAL SECURITY COUNCIL SECRETARIAT Salient Features of the JWG Report on Engagement with Private Sector on

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

Making our Cyber Space Safe

Making our Cyber Space Safe Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001

Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Invitation for Continuing Professional Education Session On January 11, 2014 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 02:30

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA

National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA FEATURE ADDRESS BY THE HON. KHEMRAJ RAMJATTAN, M.P., VICE-PRESIDENT AND MINISTER OF PUBLIC SECURITY AT THE OPENING OF A National Cyber Security Sensitisation Workshop PEGASUS HOTEL GUYANA August 12 13,

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES & CONCERNS 27 TH & 28 TH DECEMBER 2014

NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES & CONCERNS 27 TH & 28 TH DECEMBER 2014 NATIONAL LAW SCHOOL OF INDIA UNIVERSITY, BANGALORE ADVANCED CENTRE FOR RESEARCH, DEVELOPMENT AND TRAINING IN CYBER LAWS AND FORENSICS [ACRDTCLF] NATIONAL SEMINAR ON CYBER SECURITY & CYBER LAWS ISSUES &

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda

More information

Cyber Security Initiatives in India

Cyber Security Initiatives in India Cyber Security Initiatives in India Nandkumar Saravade Director, Cyber Security and Compliance NASSCOM Some Numbers: Internal and External Growth of Internet User Population Electronic Banking in India

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department

Control Systems Security: Australian Government Activities. Dr. Jason Smith Asst. Director, Operations CERT Australia Attorney-General s Department Japan Computer Emergency Response Team Coordination Center 電子署名者 : Japan Computer Emergency Response Team Coordination Center DN : c=jp, st=tokyo, l=chiyoda-ku, email=office@jpcert.or.jp, o=japan Computer

More information

3rd OWASP Information Security

3rd OWASP Information Security OWASP InfoSec India Conference 2012 August 24th & 25th, 2012, 3rd OWASP Information Security International Conference About OWASP Open Web Application Security Project (OWASP) is a global open source application

More information

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security

3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda

More information

Cyber security in an organization-transcending way

Cyber security in an organization-transcending way Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security

More information

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services

DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT services April 24, 2015 DSCI Inputs on TRAI Consultation on Regulatory Framework for OTT Services 1 Question 6: How should the security

More information

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka

NGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?

More information

An ISO 9001 : 2008 Certified Company WINNING AND SUSTAINING CUSTOMER TRUST

An ISO 9001 : 2008 Certified Company WINNING AND SUSTAINING CUSTOMER TRUST An ISO 9001 : 2008 Certified Company WINNING AND SUSTAINING CUSTOMER TRUST. 15 YEARS OF INSURANCE BROKING WELCOME TO INDIA INSURE India s first Licensed Insurance Broker with a Team of 150 professionals

More information

Citizen's Charter Department of Defence Research and Development Government of India 2015

Citizen's Charter Department of Defence Research and Development Government of India 2015 Citizen's Charter Department of Defence Research and Development Government of India 2015 1 Vision Make India prosperous by establishing world class science and technology base and provide our Defence

More information

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014 Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues Palace Hotel Saigon, HCMC, November 19 th 2014 Cyber Security and Supply Chain Integrity as Risk Factors

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Preventing and Defending Against Cyber Attacks November 2010

Preventing and Defending Against Cyber Attacks November 2010 Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing

More information

Cybersecurity Framework: Current Status and Next Steps

Cybersecurity Framework: Current Status and Next Steps Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor Adam.Sedgewick@nist.gov National Institute of Standards

More information

BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs)

BIC a multi-lateral international cooperation strategy based on in-country Extended Working Groups (EWGs) Mr. James Clarke, Waterford Institute of Technology, Telecommunications Software and Systems Group In cooperation with Dr. Barend Taute, BIC IAG member, CSIR Meraka Institute & EuroAfrica ICT/P8 Technical

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

International Criminal Court. Strategic Plan

International Criminal Court. Strategic Plan International Criminal Court Strategic Plan 2013 2017 Structure 2 Mission 2 Strategic Goals (2013-2017) 3 Strategic s (2013-2014) per Goal 4 Goal 1: Judicial and prosecutorial 4 Goal 2: Managerial 5 Goal

More information

Just Net Coalition statement on Internet governance

Just Net Coalition statement on Internet governance Just Net Coalition statement on Internet governance (Just Net Coalition is a global coalition of civil society actors working on Internet governance issues) All states should work together to provide a

More information

securing our cyber frontiers

securing our cyber frontiers NASSCOM PROMOTING DATA PROTECTION NASSCOM-DSCI CYBER SECURITY ADVISORY GROUP REPORT securing our cyber frontiers About NASSCOM NASSCOM is the premier body and the chamber of commerce of the IT-BPO industries

More information

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA Agenda Introduction aecert Vision & Mission The need to establish a UAE National CERT Constituent Framework & Service Catalog National

More information

ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA

ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA ASSOCIATION OF UNIFIED TELECOM SERVICE PROVIDERS OF INDIA NEWS BULLETIN OCTOBER 2014 AUSPI NEWS BULLETIN DECEMBER 2013 1 AUSPI NEWS BULLETIN OCTOBER

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry Yves Lagoude, Director of European Affairs and Thales & Member of the Board of Directors of EOS European Organisation

More information

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14

Guidelines. for setting up. Dedicated Project Team. Page 1 of 14 Guidelines for setting up Dedicated Project Team Page 1 of 14 Foreword The National e-governance Plan of Indian Government seeks to lay the foundation and provide the impetus for long-term growth of e-governance

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22

RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology

More information

CYSPA launch event - Turkey

CYSPA launch event - Turkey CYSPA launch event - Turkey Rome, 09 June 2014 Ankara 17th February, 2015 Luigi REBUFFI CEO EOS CYSPA Coordination www.cyspa.eu CYSPA launch events 6 June 2014 - UK: London 9 June 2014 IT: Rome 30 June

More information

C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A

C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A C H A MB E R O F C O M ME R C E O F T H E U N IT E D S T A T E S OF A M E R IC A W I L L I A M L. K O V A C S S E N I O R V I C E P R E S I D E N T E N V I R O N M E N T, T E C H N O L O G Y & R E G U

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Cyber security Indian perspective & Collaboration With EU

Cyber security Indian perspective & Collaboration With EU Cyber security Indian perspective & Collaboration With EU Abhishek Sharma, BIC IAG member, On behalf of Dr. A.S.A Krishnan, Sr. Director, Department of Electronics & Information Technology Government of

More information

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA

National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA National Information Technology Center (NITC) National Information Assurance and Cyber Security Strategy (NIACSS) Jordan s Approach to National CS&IA Ahmed Otoom, Ph.D. Disclaimer This presentation does

More information

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )

Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) ) Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket

More information

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region

Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region CyberCrime@EAP EU/COE Eastern Partnership Council of Europe Facility: Cooperation against Cybercrime Strategic Priorities for the Cooperation against Cybercrime in the Eastern Partnership Region Adopted

More information

An Overview of Cybersecurity and Cybercrime in Taiwan

An Overview of Cybersecurity and Cybercrime in Taiwan An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

Service Provider Assessment Framework

Service Provider Assessment Framework Service Provider Assessment Framework A Platform for Building Synergies between Clients and Service Providers for Trusted Global Sourcing A Study Report Data Security Council of India in collaboration

More information

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns Benjamin GITTINS Ronald KELSON What is cyberspace and why is it so important? US Government Cyberspace

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

GOVERNMENT OF THE REPUBLIC OF LITHUANIA

GOVERNMENT OF THE REPUBLIC OF LITHUANIA GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

Capacity Building to Strengthen Cybersecurity: Thailand Update

Capacity Building to Strengthen Cybersecurity: Thailand Update Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech Objectives/Challenges/Timeline Int l cooperation (INCO) between the EU and the programme agencies

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

State of Data Security and Privacy in the Indian Banking Industry

State of Data Security and Privacy in the Indian Banking Industry PROMOTING DATA PROTECTION A NASSCOM Initiative State of Data Security and Privacy in the Indian Banking Industry DSCI-KPMG Survey 2010 In association with Handling Computer Security Incidents Under the

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security

Position Paper: Berlin, 31 March 2014. Legislative intentions to increase IT Security Position Paper: Berlin, 31 March 2014 Legislative intentions to increase IT Security eco the Association of the sees itself as lobbyist and supporter of all companies that are involved in the economic

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information

OUTCOME OF PROCEEDINGS

OUTCOME OF PROCEEDINGS Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November

More information

Security and Privacy in Cloud Computing

Security and Privacy in Cloud Computing Security and Privacy in Cloud Computing - Study Report Sai Lakshmi General Manager Enterprise Security Solutions 2 Agenda Background & Objective Current Scenario & Future of Cloud Computing Challenges

More information

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order 13636 Improving Critical Infrastructure Cybersecurity Critical Infrastructure Cybersecurity Framework Overview and Status Executive Order 13636 Improving Critical Infrastructure Cybersecurity Executive Order: Improving Critical Infrastructure Cybersecurity

More information

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to

More information

MULTI ANNUAL WORK PLAN 2013 2015

MULTI ANNUAL WORK PLAN 2013 2015 MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information

More information

Cybersecurity in Nepal

Cybersecurity in Nepal Cybersecurity in Nepal Presenter: Ambika Shrestha Chitrakar PhD candidate at Gjøvik University College Representing Nepal Linkedin: https://no.linkedin.com/in/ambikash IFIP TC3 ISES (Information Security

More information

NASCIO 2014 State IT Recognition Awards

NASCIO 2014 State IT Recognition Awards NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos

More information

Cloud Channel Summit 2015 @rhipecloud #RCCS15

Cloud Channel Summit 2015 @rhipecloud #RCCS15 Cloud Channel Summit 2015 @rhipecloud #RCCS15 About the Cloud Security Alliance Global, not-for-profit organisation 300 member driven organization with over 56,000 individual members in 65 chapters worldwide

More information

Cybersecurity for ALL

Cybersecurity for ALL Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund

More information

POLICIES TO MITIGATE CYBER RISK

POLICIES TO MITIGATE CYBER RISK POLICIES TO MITIGATE CYBER RISK http://www.tutorialspoint.com/information_security_cyber_law/policies_to_mitigate_cyber_risk.htm Copyright tutorialspoint.com This chapter takes you through the various

More information

BT Quick Starts for Retail Banking Customers

BT Quick Starts for Retail Banking Customers BT Quick Starts for Retail Banking Customers An overview of BT s Quick Start services The retail banking industry continues to be heavily influenced by national and international issues including tax regimes,

More information

Pragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group

Pragati Maidan, New Delhi 20-22 May, 2015. Smarter Solutions for a Better Tomorrow. Organiser. www.smartcitiesindia.com. Exhibitions India Group Pragati Maidan, New Delhi 20-22 May, 2015 er Solutions for a Better Tomorrow Organiser www.smartcitiesindia.com Exhibitions India Group SMART Cities INDIA er Solutions for a Better Tomorrow As India s

More information

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws IEEE Gujarat Section In association with CLS- Cyberra Legal Services

More information

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY

Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND

More information