<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 101 to 115.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/workshop-on-cyber-ethics-values-driven-innovative-solutions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyber-policy-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/improving-the-processes-for-disclosing-security-vulnerabilities-to-government-entities-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/shining-light-into-darkness-encouraging-greater-transparency-of-government-offensive-practices-in-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ground-zero-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions">
    <title>'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions</title>
    <link>https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions</link>
    <description>
        &lt;b&gt;Twenty-two year old Saket Modi is the CEO and co-founder of Lucideus, a leading cyber security company in India which claims to have worked with 4 out of 5 top global e-commerce companies, 4 out of 10 top IT companies in the world, and 3 out of 5 top banks of the Asia Pacific. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the Confederation of Indian Industry (CII) conference on July 13, titled “&lt;a href="https://cis-india.org/internet-governance/blog/cii-conference-on-act" class="external-link"&gt;ACT – Achieving Cyber-Security Together&lt;/a&gt;,” Modi as the youngest speaker on the agenda delivered an impromptu talk which lambasted the weaknesses of modern cyber security discussions, enlightened the audience on modern capabilities and challenges of leading cyber security groups, and ultimately received a standing ovation from the crowd. As a later speaker commented, Modi’s controversial opinions and practitioner insight had "set the auditorium ablaze for the remainder of the evening". Since then the Centre for Internet and Society (CIS) has had the pleasure of interviewing Saket Modi over Skype.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is quite easy to find accounts of Saket Modi's introduction into hacking just by typing his name in the search engine. Faced with the pressure of failing, a teenage Saket discovered how to hack into his high school Chemistry teacher’s test and answer database. After successfully obtaining the answers, and revealing his wrong doings to his teacher, the young man grew intrigued by the possibilities of hacking. "I thought, if I could do this in a couple hours, four hours, then what might I be able to do in four days, four weeks, four months?"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nowadays, Modi describes himself and his Lucideus team as "ethical hackers", a term recently espoused by hacker groups in the public eye. As opposed to "hacktivists", who utilize hacking methods (including attacks) to achieve or bring awareness to political issues, ethical hackers claim to exclusively use their computer skills to support defenses. At first, incorporation of &lt;i&gt;ethics&lt;/i&gt; into a for-profit organization’s game plan may seem confusing, as it leaves room for key questions, like how does one determine which clients constitute ethical business? When asked, however, Modi clarifies by explaining how the ethics are not manifest in the entities Lucideus supports, but instead inherent in the choice of building defensive networks as opposed to using their skills for attack or debilitation. Nevertheless, considerations remain as to whether supporting the cyber security of some entities can lead to the insecurity of others, for example, strengthening the agencies which work in covert cyber espionage. On this point, Modi seems more ambivalent, saying "it depends on a case by case basis". But he still believes cyber security is a right that should be enjoyed by all, "entitled to [you] the moment you set foot on the internet".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an experienced professional in the field who often gives input on major cyber policy decisions, Modi emphasizes the necessity of youth engagement in cyber security practice and policy. He calls his age bracket the “web generation,” those who have “grown with technology.” According to Modi, no one over 50 or 60 years of age can properly meet the current challenges of the cyber security realm. It is "a sad thing" that those older leaders carry the most power in policy making, and that they often have problems with both understanding and acceptability of modern technological capabilities. For the public, businesses, and also government, there are misconceptions about the importance of cyber security and the extent of modern cyber threats, threats which Modi and his company claim to combat regularly. "About 90 per cent of the crimes that take place in cyber space are because of lack of knowledge, rather than the expertise of the hacker,” he explains. Modi mentions a few basic misconceptions, as simple as, "if I have an anti-virus, my system is secured" or "if you have HTTPS certificate and SSL connection, your system is secured". “These are like wearing an elbow guard while playing cricket,” Modi tells. “If the ball comes at the elbow then you are protected, but what about the rest of the body?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This highlights another problem evident in India’s current cyber security scene, the problem of lacking “quality institutes to produce good cyber security experts.” For example, Modi takes offence at there not being “a single institute which is providing cyber security at the undergraduate level [in India].” He alludes to the recently unveiled National Cyber Security Policy, specifically the call for five lakh cyber security experts in upcoming years. He calls this “a big figure,” but agrees that there needs to be a lot more awareness throughout the nation. “You really have to change a lot of things,” he says, “in order to get the right things in the right place here in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When considering citizen privacy in relation to cyber security, and the relationship between the two (be it direct or inverse), Saket Modi says the important factor is the governing body, because the issue ultimately resolves to trust. Citizens must trust the “right people with the right qualifications” to store and protect their sensitive data, and to respect privacy. Modi is no novice to the importance of personal data protection, and his company works with a plethora of extremely sensitive information relating to both their clients and their clients’ clients data, so it operates with due care lest it create a “wikileaks part two.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On internationalization and cyber security, he views the connection between the two as natural, intrinsic. “Cyberspace has added a new dimension to humanity,” says Modi, and tells how former constructs of physical constraints and linear bounds no longer apply. International cooperation is especially pertinent, according to Modi, because the greatest challenge for catching today’s criminal hackers is their international anonymity, “the ability to jump from one country to the other in a matter of milliseconds.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the extent of the challenges facing cyber defense specialists, and with the somewhat disorderly current state of Indian cyber security, it is curious to see that Saket Modi has devoted himself to the "ethical" side of hacking. Why hasn’t he or the rest of the Lucideus team resorted to offensive hacking, since Modi claims the majority of cyber attacks of the world who are committed by people also fall between the ages of 15 and 24? Apparently, the answer is simple. “We believe in the need for ethical hacking,” he defends. “We believe in the purpose of making the internet safer.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions'&gt;https://cis-india.org/internet-governance/blog/saket-modi-calls-for-stronger-cyber-security-discussions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-08-05T13:11:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang">
    <title>CIS Cybersecurity Series (Part 10) - Lawrence Liang</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang</link>
    <description>
        &lt;b&gt;CIS interviews Lawrence Liang, researcher and lawyer, and co-founder of Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"The right to privacy and the right to free speech have often been understood as distinct rights. But I think in the ecology of online communication, it becomes crucial for us to look at the two as being inseparable. And this is not entirely new in India. But, interestingly, a lot of the cases that have had to deal with this question in the Indian context, have pitted one against the other. Now, India doesn't have a law for the protection of whistle-blowers. So how do we now think of the idea of whistle-blowers being one of the subjects of speech and privacy coming together? How do we use the strong pillars that have been established, in terms of a very rich tradition that Indian law has, on the recognition of free speech issues but slowly start incorporating questions of privacy?" - Lawrence Liang, researcher and lawyer, Alternative Law Forum.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its tenth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Lawrence Liang is one of the co-founders of the Alternative Law Forum where he works on issues of intellectual property, censorship, and the intersection of law and culture. He is also a fellow with the Centre for Internet and Society and serves on its board.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/odQajlxcLLA" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-10-lawrence-liang&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-09-10T08:31:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011">
    <title>Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011</title>
    <link>https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011</link>
    <description>
        &lt;b&gt;The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The consultation will bring together various stakeholders to discuss the initial stages of framing the draft rules for the legislation. It will take place from 10:00 a.m. to 5:00 p.m. on July 5, 2014 at National Law University, Delhi. Bhairav Acharya will be participating in this event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Click to download:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consultation-to-frame-rules-under-whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;Consultation to Frame Rules under the Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/whistle-blowers-protection-act-2014.pdf" class="internal-link"&gt;The Whistle Blowers Protection Act, 2014&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011'&gt;https://cis-india.org/news/consultation-to-frame-rules-under-whistle-blowers-protection-act-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-02T08:03:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year">
    <title>Cyber crimes shoot up 52% in India over last year</title>
    <link>https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year</link>
    <description>
        &lt;b&gt;There has been a sharp increase in the incidence of cyber crime in the country. The number of cases registered in 2013 under the IT Act has gone up by 52 per cent to 4,192 as against 2,761 in the previous year. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by K.V.Kurmanath was &lt;a class="external-link" href="http://www.thehindubusinessline.com/news/cyber-crimes-shoot-up-52-in-india-over-last-year/article6168812.ece?utm_source=RSS_Feed&amp;amp;utm_medium=RSS&amp;amp;utm_campaign=RSS_Syndication"&gt;published in the Hindu Businessline&lt;/a&gt; on July 2, 2014. Bhairav Acharya gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If you add the cases registered under the IPC, the total number of cyber crime cases crosses the 5,500-mark. Police across the country arrested 3,301 persons in connection with these cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maharashtra and Andhra Pradesh (undivided) have topped the list with 681 and 635 cases respectively under the IT Act, both showing an almost 50 per cent growth in cyber crimes over the previous year. In the previous year, Maharashtra had registered 471 and Andhra Pradesh 429.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security experts have been cautioning people to be careful while using the Internet. Besides increasing the security of the networks they are using, users must be careful while engaging with strangers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent Microsoft report said many customer infections involve users tricked to install secondary offers, indicating a shift in malware proliferation. According to the latest data provided by the National Crime Records Bureau, the official chronicler of crime in the country, cyber crime registered under the Indian Penal Code (IPC) has shown a much higher growth rate of 122 per cent in 2013 over the previous year’s figure. IPC cases went up to 1,316 in 2013 from 595 in the previous year. Maharashtra topped the list here too with the cops booking 226 cases in this category.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wrong nomenclature?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya of the Centre for Internet and Society feels that the term cyber crime has not been defined well. “It is time we do away with the practice of calling any crime a ‘cyber crime’ just because the person who does it uses a computer,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Instead, I think the term ‘cyber crime’ should only be used in relation to offences that can only be committed by using information and communications technology (ICT) such as the internet (which is comprised of the world wide web, email protocols, file transfer protocols, and more) as well as network infrastructure that is not the internet,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, only if there is a direct causal link between the crime and ICT and network technology should a crime be called a cyber crime, Acharya says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other States with a high number of cases booked under the IT Act include Karnataka (513), Kerala (349), Madhya Pradesh (282) and Rajasthan (239). Gujarat showed a decline with the number coming down to 61 from 68 in the previous year.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year'&gt;https://cis-india.org/news/the-hindu-business-line-july-2-2014-kv-kurmanath-cyber-crimes-shoot-up-in-india-over-last-year&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    

   <dc:date>2014-07-03T10:14:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression">
    <title>Digital Citizens: Why Cyber Security and Online Privacy are Vital to the Success of Democracy and Freedom of Expression</title>
    <link>https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression</link>
    <description>
        &lt;b&gt;Michael Oghia will give a presentation which will show why cyber security and online privacy are vital for democracy and freedom of expression.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the time when Edward Snowden is fighting for both clemency and to be known as a brave whistle blower that exposed government wrongdoing, cyber security and online privacy have never been more important. As &lt;a class="external-link" href="https://www.youtube.com/watch?feature=player_embedded&amp;amp;v=H0I7wi3ZLG8&amp;amp;noredirect=1"&gt;Jacob Applebaum discussed in May last year&lt;/a&gt;, and CIS’ Maria Xynou &lt;a href="https://cis-india.org/internet-governance/events/big-democracy-big-surveillance-a-talk-by-maria-xynou" class="external-link"&gt;presented recently in December&lt;/a&gt;, surveillance throughout the world is increasing. With security apparatus’ likethe NSA and now India’s Central Monitoring System, coupled with corporate data centers around the world storing our e–mails, address books, preferences, and passwords, it is easy to see how our online privacy is increasingly being threatened and often, violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, online privacy is inextricably linked to freedom of expression, and freedom of expression is a fundamental civil liberty imperative to democracy. Moreover, online security and privacy are essential to good, transparent, and accountable democratic governance. This is largely because surveillance, censorship, and monitoring ultimately create environments where self-censorship is the norm, as is the fear of the government instead of spaces that allow for freedom of expression and democratic dialogue and dissent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What I would like to accomplish my speaking at CIS is not to merely educate about the dangers posed to Internet security or to world democracy, but rather to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Reiterate the importance of digital privacy and cyber security to the success of democracy and the continued protection of free expression.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Encourage citizens, technology specialists, Internet and privacy advocates, and others to see themselves as part of a larger system of democratic governance and civic participation. This means understanding how technical capabilities intersect with civil society, and then use them to advocate for a more open, accessible, and private cyberspace.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reinforce that digital media literacy education is vital to ensuring a free, open, accessible, and democratic Internet.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Additionally, I want to present ideas and recommendations for what you can do to engage with these problems, and how we can collaborate together to address them.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Public Intelligence Project&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Public Intelligence Project is an independent, non-partisan, not-for-profit think tank conducting research, education, and advocacy on the importance of diversity, critical thinking, dialogue, and freedom of expression. We seek to promote more robust systems of participatory democracy, civic engagement, and conflict prevention in order to create a culture of democracy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Michael Oghia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Michael is responsible for a new project at Meta-Culture called the Public Intelligence Project, which focuses on expanding participatory democracy, civic engagement, and conflict prevention by conducting research, education, and advocacy on the intersections between diversity, dialogue, critical thinking, and freedom of expression. While new to the conflict resolution field, as a poet, musician, editor, writer, blogger, and activist, he is well-versed in the importance of freedom of expression and participating in the democratic process. He was born in Kentucky to Lebanese-Syrian parents, and after graduating with a BS in sociology from the University of Louisville, he moved to Lebanon to pursue an MA in sociology from the American University of Beirut. There, he had the opportunity to witness the Arab Revolutions first-hand while research about topics such as Internet ownership in the Middle East, social movements, Arab media, globalization, Arab youth and family, and his thesis subject, romantic love in the Arab world. Michael enjoys engaging Twitter conversations, and has an unnatural affinity for crunchy peanut butter.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Date: Tuesday, January 14, 2014&lt;br /&gt;Time: 6.30 p.m. to 8.00 p.m.&lt;br /&gt;Talk by: Michael Oghia&lt;br /&gt;Title: Research &amp;amp; Advocacy Consultant, and Project Manager&lt;br /&gt;Organisation: Meta-Culture / Public Intelligence Project&lt;br /&gt;Websites: &lt;a class="moz-txt-link-abbreviated" href="http://www.meta-culture.in"&gt;www.meta-culture.in&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.meta-culture.in"&gt;&amp;lt;http://www.meta-culture.in&amp;gt;&lt;/a&gt; &amp;amp; &lt;a class="moz-txt-link-abbreviated" href="http://www.publicintelligenceproject.org"&gt;www.publicintelligenceproject.org&lt;/a&gt; &lt;a class="moz-txt-link-rfc2396E" href="http://www.publicintelligenceproject.org"&gt;&amp;lt;http://www.publicintelligenceproject.org&amp;gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression'&gt;https://cis-india.org/events/why-cyber-security-and-online-privacy-are-vital-for-success-of-democracy-and-freedom-of-expression&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2014-01-08T04:59:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india">
    <title>People Driven and Tech Enabled – How AI and ML are Changing the Future of Cyber Security in India</title>
    <link>https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india</link>
    <description>
        &lt;b&gt;On the 27th of February, Peter Sparkes the Senior Director, Cyber Security Services, Symantec conducted a webinar on the ‘5 Essentials of Every Next-Gen SOC’.  In this webinar, he evaluated the problems that Security Operations Centers (SOCs) are currently facing, and explored possible solutions to these problems. The webinar also put emphasis on AI and ML as tools to improve cyber security. This blog draws key insights from the webinar, and explains how AI and ML can improve the cyber security process of Indian enterprises.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a study conducted by Cisco, it was found that in the past 12-18 months,     cyber attacks have caused Indian companies to incur financial damages     amounting to USD 500,000.     &lt;a name="fr1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a need to strengthen the nodal agencies in an enterprise that can     deal with these threats to prevent irreparable damage to enterprises and     their customers. An SOC within any organization is the team responsible for     detecting, monitoring, analyzing, communicating and remedying security     threats. The SOC technicians employ a combination of technologies and     processes to ensure that an enterprise’s security is not compromised. As     instances of cyber attacks increase both in number and sophistication, SOCs     need to use state of the art technologies to stay one step ahead of the     attackers. Presently, SOCs face a number of infrastructural problems such     as the low priority given to a cyber security budget, slower and passive     response to threats, dearth of skilled technicians, and the absence of a     global intelligence network for cyber-threats. This is where technologies     such as Artificial Intelligence and Machine learning are helping, by     monitoring the system to identify cyber attacks, and analyse the severity     of the threat, and in some cases by blocking such threats.     &lt;a name="fr2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Evolution of Security Operations Centers&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the same study, Cisco looked at the evolution of cyber threats and how     companies were using technologies such as AI and ML to ameliorate those     threats. Another key insight the study brought out was that 53 and 51     percent of the subject companies were reliant on ML and AI respectively.     One of the reasons behind AI and ML’s effectiveness in cyber security is     their capacity not only to detect known threats but also to use their     learnings from data to detect unknown threats. In his webinar, Peter     Sparkes also stated that SOCs were evolving into a ‘people driven and tech     enabled’ system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;People Driven and Tech Enabled&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of cyber security, which in itself is a relatively new field,     technologies such as AI and ML are helping companies to not only overcome     infrastructural barriers but also to respond proactively to threats. A     study conducted by the Enterprise Strategy Group, revealed that one-third     of the respondents believed that ML technology could detect new and unknown     malware.&lt;a name="fr3"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The study also stated that the use of machine learning to detect and     prevent threats from unknown malware reduced the number of cases the cyber     security team had to investigate.&lt;a name="fr4"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the tasks of monitoring and blocking which were earlier     conducted by entry level analysts were now done by systems, using machine     learning. Typically, the AI acts as the first monitoring system after which     the threat is examined by the company’s technicians who possess the     requisite skill set and experience. By delegating the time consuming task     of continuous monitoring to an ML system, the technicians now have time to     look at serious threats. In this way AI and humans are working together to     build a stronger and responsive security protocol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Detecting the Unknown&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber criminals are becoming increasingly sophisticated, and in order to     prevent attacks the monitoring systems (both human and automated) need to     be able to detect them before the security is compromised. The detection of     threats through AI and ML is done in a similar way as it is done for the     identification of spam, where the system is trained on a large amount of     data which teaches the algorithm to identify right from wrong.&lt;a name="fr5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been numerous cases of stealthy cyber attacks such as wannacry     and ransomware, that have evaded detection by conventional security     firewalls and caused crippling damage. There is also the need to use     deception technology which involves automatic detection and analysis of     attacks. This technology then tricks the attackers and defeats them to     bring back normalcy to the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The systems that can handle threats by themselves do so by following a     predetermined procedure, or playbook where the AI detects activities that     go against the procedure/playbook. This is more effective compared to the     earlier system where the technicians would analyse the attacks on a case by     case basis.&lt;a name="fr6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AI and ML can help in reducing the time required to detect threats enabling     technicians to act proactively and prevent damage. As AI and ML systems are     less prone to make mistakes compared to human beings, each threat is dealt     with in a prompt and accurate manner. AI systems also help by categorising     attacks based on their propensity for damage. These systems can use the     large volumes of data collected about previous attacks and adapt over time     to give enterprises a strong line of defence against attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Passive to Active Defense&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Threat to cyber security can emerge even in seemingly safe departments,     such as Human Resources. It is therefore important to proactively hunt for     threats across all departments uniformly.&lt;a name="fr7"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order to detect an anomaly, the AI and ML system will require both large     volumes of data as well as a significant amount of processing power, which     is difficult for smaller companies to provide. A possible solution to     improve defense is to have a system of sharing SOC data between companies,     and thereby creating a global database of intelligence. A system of global     intelligence and threat data sharing could help smaller companies combat     cyber threats without having to compromise on core business development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Use of AI in Cyber Security in India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2017, Indian enterprises were infected by two lethal cyber attacks     called Nyetya that crept through a trusted software - Ccleaner and infected     computers&lt;a name="fr8"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;. These attacks may just be the tip of the iceberg , since there may be     many other attacks that might have gone unreported, or worse, undetected.     Cisco reported that less than 55 per cent of the Indian enterprises were     reliant on AI or ML for combating cyber threats. Although the current     numbers seem bleak, there are a number of Indian enterprises that have     recently begun using AI and ML in cyber security.&lt;a name="fr9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One such example is HDFC bank which is in the process of introducing an AI     based Cyber Security Operations Centre (CSOC).&lt;a name="fr10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This CSOC is based on a four point approach to dealing with threats -     prevent, detect, respond and recover. The government of India has also     taken its first step towards the use of AI in cyber security through a     project that aims to provide cyber forensic services to the various     agencies of the government including law enforcement.&lt;a name="fr11"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian intelligence agencies have also entered into an agreement with tech     startup Innefu, which utilizes AI, to process data and decipher threats by     looking at the patterns of past threats.&lt;a name="fr12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As India is increasingly becoming data dense both private and public     organizations need to consider cyber security with utmost seriousness and     protect the data from crippling attacks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enterprises have become storehouses of user data and the SOCs have a     responsibility to protect this data. The companies’ SOCs have been plagued     with several problems such as lack of skilled technicians, delay in     response time and the inability to proactively respond to attacks. AI and     ML can help in a system of continuous monitoring as well as take over the     more repetitive and time consuming tasks, leaving the technicians with more     time to work on damage control. Although it must be kept in mind that AI is     not a silver bullet, since attackers will try their best to confuse the AI     systems through evasion techniques such as adversarial AI (where the     attackers design machine learning models that are intended to confuse the     AI model into making a mistake).&lt;a name="fr13"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, human intervention and monitoring of AI and ML systems in cyber     security is essential to maintain the defence and protection mechanisms of     enterprises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few topics that Indian SOCs need to consider while using AI and ML    &lt;strong&gt;:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The companies need to understand that AI and ML need human expertise and     supervision to be effective and hence substituting people for AI is not     ideal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The companies need to give equal if not more importance to data     security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The companies need to constantly upgrade their systems and re-skill     their technicians to combat cyber security threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. The AI and ML systems need to be regularly audited to ensure that they     are not compromised by cyber attacks and also to ensure that they are not     generating false positives.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;]. &lt;span&gt;Cisco, (2018, February). Annual Cybersecurity Report. Retrieved             March 8, 2018, from             https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&amp;amp;ccid=cc000160&amp;amp;oid=anrsc005679&amp;amp;ecid=8196&amp;amp;elqTrackId=686210143d34494fa27ff73da9690a5b&amp;amp;elqaid=9452&amp;amp;elqat=2&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn2"&gt;&lt;/a&gt;]. &lt;span&gt;Ibid.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn3"&gt;&lt;/a&gt;]. &lt;span&gt;Enterprise Strategy Group (2017, March ). Top-of-mind Threats and Their Impact on Endpoint Security Decisions. Retrieved March 8, 2018 from             https://www.cylance.com/content/dam/cylance/pdfs/reports/ESG-Research-Insights-Report-Summary-Cylance-Oct-2017.pdf&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a name="fn4"&gt;&lt;/a&gt;]. &lt;span&gt;Ibid.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn5" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Vorobeychik,Y (2016). Adversarial AI. Retrieved March 8, 2018, from  https://www.ijcai.org/Proceedings/16/Papers/609.pdf&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn6" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Quora. ( 2081, February 15). How Will Artificial Intelligence And             Machine Learning Impact Cyber Security? Retrieved March 8, 2018,             from             https://www.forbes.com/sites/quora/2018/02/15/how-will-artificial-intelligence-and-machine-learning-impact-cyber-security/#569454786147&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn7" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Sparkes, P. (2018, February 27). The 5 Essentials of Every Next-Gen             SOC. Retrieved March 8, 2018, from             https://www.brighttalk.com/webcast/13389/303251/the-5-essentials-of-every-next-gen-soc&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn8" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;PTI. ( 2018, February 21).Indian companies lost $500,000 to             cyber.Retrieved March 8, 2018, from             https://economictimes.indiatimes.com/tech/internet/indian-companies-lost-500000-to-cyber-attacks-in-1-5-years-cisco/articleshow/63019927.cms&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn9" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Cisco, (2018, February). Annual Cybersecurity Report. Retrieved March 8, 2018, from             https://www.cisco.com/c/dam/m/digital/elq-cmcglobal/witb/acr2018/acr2018final.pdf?dtid=odicdc000016&amp;amp;ccid=cc000160&amp;amp;oid=anrsc005679&amp;amp;ecid=8196&amp;amp;elqTrackId=686210143d34494fa27ff73da9690a5b&amp;amp;elqaid=9452&amp;amp;elqat=2&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn10" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Raval, A. ( 2018,January 30). AI takes cyber security to a new             level for HDFC Bank.Retrieved March 8, 2018, from             http://computer.expressbpd.com/magazine/ai-takes-cyber-security-to-a-new-level-for-hdfc-bank/23580/&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn11" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;“The Centre for Development of Advanced Computing (C-DAC) under the             Ministry of Electronics and Information Technology (MeitY) is             working on a project to provide cyber forensic services to             law-enforcing and other government and non-government agencies.”             Ohri, R. (2018, February 15. Government readies AI-muscled cyber             security plan. Retrieved March 8, 2018, from             https://economictimes.indiatimes.com/news/politics-and-nation/government-readies-ai-muscled-cyber-security-plan/articleshow/62922403.cms             utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn12" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Chowdhury, P.A. (2017, January 30). Cyber Warfare at large in             Southeast Asia, India leverages AI for the same cause Retrieved             March 8, 2018, from             https://analyticsindiamag.com/cyber-warfare-large-southeast-asia-india-leverages-ai-cause/&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;[&lt;/span&gt;&lt;a name="fn13" style="text-align: justify; "&gt;&lt;/a&gt;&lt;span style="text-align: justify; "&gt;]. &lt;/span&gt;&lt;span&gt;Open AI.(2017 February 24). Attacking Machine Learning with             Adversarial Examples. Retrieved March 8, 2018, from             https://blog.openai.com/adversarial-example-research/&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india'&gt;https://cis-india.org/internet-governance/blog/people-driven-and-tech-enabled-2013-how-ai-and-ml-are-changing-the-future-of-cyber-security-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-03-11T15:30:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/workshop-on-cyber-ethics-values-driven-innovative-solutions">
    <title>Workshop on Cyber-Ethics: Values-driven Innovative Solutions</title>
    <link>https://cis-india.org/internet-governance/news/workshop-on-cyber-ethics-values-driven-innovative-solutions</link>
    <description>
        &lt;b&gt;Arindrajit Basu moderated a discussion on Cyber-Ethics at Swiss Nex (Consulate General of Switzerland, Bangalore on 28 June 2019.  The event was organized by the Embassy of Switzerland.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Cyber-space – the virtual reality – influences all countries in the world and all sectors of society. The cyber-world of e-mails, e-commerce, e-government, e-education, e-music, e-prosecutors, artificial intelligence, crypto-currencies are daily reality, with new opportunities. On the other hand, cyber-bullying, cyber-criminality, cyber-security, cyber-war etc. are great challenges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber-ethics looks for values-driven innovative solutions to these challenges and opportunities between freedom and privacy, security and peace. Switzerland is a world leader in innovation, India is a world leader in information technologies. How can both countries strengthen ethical, values-driven solutions for the cyber-world? Indian and Swiss Experts present challenges and solutions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Programme&lt;/h3&gt;
&lt;p class="Standard"&gt;10.00     Registration &amp;amp; welcome tea n coffee&lt;/p&gt;
&lt;p class="Standard"&gt;10:30     &lt;b&gt;Welcome remarks&lt;/b&gt;&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;b&gt;Mr.Sebastien Hug&lt;/b&gt;, CEO, swissnex India and Consul General of Switzerland&lt;/p&gt;
&lt;p class="Standard"&gt;10:35     &lt;b&gt;Keynote address: Cyber-Ethics between Global Values and Contextual Interests&lt;/b&gt;&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;b&gt;Prof. Dr. H.C. Christoph Stückelberger&lt;/b&gt;, Founder and President of Globethics.net, Visiting Professor of Ethics in Nigeria, Russia, China&lt;/p&gt;
&lt;p class="Standard"&gt;11:05      &lt;b&gt;Moderated panel discussion&lt;/b&gt;&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;i&gt;Moderator&lt;/i&gt;: &lt;b&gt;Arindrajit Basu, &lt;/b&gt;Senior Policy Officer, Center for Internet and Society,&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;i&gt;Panelists&lt;/i&gt;:&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;b&gt;Dr. Pavan Duggal&lt;/b&gt;, Founder and President of the International Commission on Cyber Security Law, Advocate at Supreme Court of India&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;b&gt;Dr Siobhán Martin&lt;/b&gt;, Deputy Head, Leadership, Crisis and Conflict Management, Geneva Centre for Security Policy&lt;/p&gt;
&lt;p class="Standard"&gt;&lt;b&gt;Mr Sameer Chothani&lt;/b&gt;, Managing Director - Group Technology, India, UBS&lt;/p&gt;
&lt;p class="Standard"&gt;12:15     Q&amp;amp;A&lt;/p&gt;
&lt;p class="Standard"&gt;12:45     Networking lunch&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/workshop-on-cyber-ethics-values-driven-innovative-solutions'&gt;https://cis-india.org/internet-governance/news/workshop-on-cyber-ethics-values-driven-innovative-solutions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-07-06T00:51:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india">
    <title>Private Sector and the cultivation of cyber norms in India</title>
    <link>https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india</link>
    <description>
        &lt;b&gt;Information Communication Technologies (ICTs) have become a regular facet of modern existence. The growth of cyberspace has challenged traditional notions of global order and uprooted the notion of governance itself. All over the world, the private sector has become a critical player, both in framing cyber regulations and in implementing them.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindrajit Basu was published by &lt;a class="external-link" href="http://nextrendsindia.org/private-sector-and-the-cultivation-of-cyber-norms-in-india/"&gt;Nextrends India&lt;/a&gt; on August 5, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While the United Nations ‘Group of Governmental experts’ (GGE), tried and failed to establish a common law for governing the behavior of states in cyberspace, it is Big Tech who led the discussions on cyberspace regulations. Microsoft’s &lt;a class="addbackground" href="https://www.microsoft.com/en-us/cybersecurity/content-hub/a-digital-geneva-convention-to-protect-cyberspace"&gt;Digital Geneva Convention&lt;/a&gt; which devised a set of rules to protect civilian use of the internet was a notable initiative on that front. Microsoft was also a major driver of the &lt;a class="addbackground" href="https://cybertechaccord.org/"&gt;Tech Accords&lt;/a&gt; — a public commitment made by over 100 companies “agreeing to defend all customers everywhere from malicious attacks by cyber-criminal enterprises and nation-states.” The &lt;a class="addbackground" href="https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/france-and-cyber-security/article/cybersecurity-paris-call-of-12-november-2018-for-trust-and-security-in"&gt;Paris Call for Trust and Security in Cyberspace&lt;/a&gt; was a joint effort between the French government and Microsoft that brought in (as of today) 66 states, 347 private sector entities, including Indian business guilds such as FICCI and the Mobile Association of India and 139 organisations from civil society and academia from all over the globe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the entry of Big tech into the business of framing regulation has raised eyeballs across jurisdictions. In India, the government has attempted to push back on the global private sector due to arguably extractive economic policies adopted by them, alongside the threats they pose to India’s democratic fabric. The Indian government has taken various steps to constrain Big Tech, although some of these policies have been hastily rolled out and fail to address the root of the problem.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I have identified two regulatory interventions that illustrate this trend. First, on &lt;a class="addbackground" href="https://www.thehindubusinessline.com/opinion/resurrecting-the-marketplace-of-ideas/article26313605.ece"&gt;intermediary liability&lt;/a&gt;, Rule 3(9) of the Draft of the Information Technology 2018 released by the Ministry of Electronics and Information Technology (MeiTy) last December. The rule follows the footsteps of countries like Germany and France by mandating that platforms use “automated tools or appropriate mechanisms, with appropriate controls, for proactively identifying and removing or disabling public access to unlawful information or content.” These regulations have resulted in criticism from both the private sector and civil society as they fail to address concerns around algorithmic discrimination, excessive censorship and gives the government undue power. Further, the regulations paint all the intermediaries with the same brush, thus not differentiating between platforms such as Whatsapp who thrive on end-to-end encryption and public platforms like Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another source of discord between the government and the private sector has been the government’s localisation mandate, featuring in a slew of policies. Over the past year, the Indian government has &lt;a class="addbackground" href="https://twitter.com/cis_india/status/1143096429298085889"&gt;introduced a range of policy instruments&lt;/a&gt; which&lt;br /&gt;demand that certain kinds of data must be stored in servers located physically within India — termed “&lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;data localization&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this serves &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;a number of policy objectives&lt;/a&gt;, the two which stand out are (1) the presently complex process for Indian law enforcement agencies to access data stored in the U.S. during criminal investigations, and (2) extractive economic models used by U.S. companies operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;study&lt;/a&gt; I co-authored earlier this year on the issue found that foreign players and smaller Indian private sector players were against this move due to the high compliance costs in setting up data centres.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On this question, we &lt;a class="addbackground" href="https://cis-india.org/internet-governance/resources/the-localisation-gambit.pdf"&gt;recommended a dual approach&lt;/a&gt; that involves mandatory sectoral localisation for critical sectors such as defense or payments data while adopting ‘conditional’ localisation for all other data. Under ‘conditional localisation,’&lt;br /&gt;data should only be transferred to countries that (1)Agree to share the personal data of Indian citizens with law enforcement authorities based on Indian criminal procedure laws and (2) Have equivalent privacy and security safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These two instances demonstrate that it is important for the Indian government to engage with both the domestic and foreign private sector to carve out optimal regulatory interventions that benefit the Indian consumer and the private sector as a whole rather than a few select big players. At the same time, it is important for the private sector to be a responsible stakeholder and comply both with existing laws and accepted norms of ‘good behaviour.’&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going forward, there is no denying the role of the private sector in the development of emerging technologies. However, a balance must be struck through continued engagement and mutual respect to create a regulatory ecosystem that fosters innovation while respecting the rule of law with every stakeholder – government, private sector and civil society. India’s position could set the trend for other emerging economies coming online and foster a strategic digital ecosystem that works for all&lt;br /&gt;stakeholders.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india'&gt;https://cis-india.org/internet-governance/blog/nextrends-india-arindrajit-basu-august-5-2019-private-sector-and-the-cultivation-of-cyber-norms-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-07T15:18:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyber-policy-2.0">
    <title>Cyber Policy 2.0</title>
    <link>https://cis-india.org/internet-governance/news/cyber-policy-2.0</link>
    <description>
        &lt;b&gt;National Law University organized an executive education program in Bangalore on August 17, 2019.  Arindrajit Basu was a speaker. He spoke on Deconstructing the India regulatory approach to data governance and cyber security.&lt;/b&gt;
        &lt;p&gt;For more details about the program, &lt;a class="external-link" href="http://policyandgovernance.in/cyber-policy-2/"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyber-policy-2.0'&gt;https://cis-india.org/internet-governance/news/cyber-policy-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyberspace</dc:subject>
    

   <dc:date>2019-08-19T14:18:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/improving-the-processes-for-disclosing-security-vulnerabilities-to-government-entities-in-india">
    <title>Improving the Processes for Disclosing Security Vulnerabilities to Government Entities in India</title>
    <link>https://cis-india.org/internet-governance/blog/improving-the-processes-for-disclosing-security-vulnerabilities-to-government-entities-in-india</link>
    <description>
        &lt;b&gt;The aim of this policy brief is to recommend changes pertaining to current legislation, policy and practice to the Government of India regarding external vulnerability reporting and disclosure. The changes we recommend within this brief aim to strengthen the processes around voluntary vulnerability and bug disclosure by third parties. &lt;/b&gt;
        
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;This is an update to our previously released paper titled "Leveraging the Coordinated Vulnerability Disclosure Process to Improve the State of Information Security in India". The full document can be accessed &lt;a href="https://cis-india.org/internet-governance/resources/Improving%20the%20Processes%20for%20Disclosing%20Security%20Vulnerabilities%20to%20Government%20Entities%20in%20India.pdf"&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;hr width="50%" /&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;p id="docs-internal-guid-5561d8e6-7fff-16c2-47f6-6fe5dc991e98" dir="ltr"&gt;The ubiquitous adoption and integration of information and communication technologies in almost all aspects of modern life raises with it the importance of being able to ensure the security and integrity of the systems and resources that we rely on. This importance is even more pressing for the Government, which is increasing its push of efforts towards digitising the operational infrastructure it relies on, both at the State as well as the Central level.&lt;/p&gt;
&lt;p dir="ltr"&gt;This policy brief draws from knowledge that has been gathered from various sources, including information sourced from newspaper and journal articles, current law and policy, as well as from interviews that we conducted with various members of the Indian security community. This policy brief touches upon the issue of vulnerability disclosures, specifically those that are made by individuals to the Government, while exploring prevalent challenges with the same and making recommendations as to how the Government’s vulnerability disclosure processes could potentially be improved.&lt;/p&gt;
&lt;br /&gt;
&lt;h3 dir="ltr"&gt;Key learnings from the research include:&lt;/h3&gt;
&lt;ul&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;There is a noticeable shortcoming in the availability of information with regard to current vulnerability disclosure programmes and process of Indian Government entities, which is only exacerbated further by a lack of transparency;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;There is an observable gap in the amount and quality of interaction between security researchers and the Government, which is supported by the lack of proper channels for mediating such communication and cooperation;&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: disc;" dir="ltr"&gt;
&lt;p dir="ltr"&gt;There are several sections and provisions within the Information Technology Act, 2000, which have the potential to disincentivise legitimate security research, even if the same has been carried out in good faith.&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/improving-the-processes-for-disclosing-security-vulnerabilities-to-government-entities-in-india'&gt;https://cis-india.org/internet-governance/blog/improving-the-processes-for-disclosing-security-vulnerabilities-to-government-entities-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Karan Saini, Pranesh Prakash and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Vulnerability Disclosure</dc:subject>
    

   <dc:date>2019-04-01T12:02:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/shining-light-into-darkness-encouraging-greater-transparency-of-government-offensive-practices-in-cyberspace">
    <title>Shining light into darkness: Encouraging greater transparency of government offensive practices in cyberspace</title>
    <link>https://cis-india.org/internet-governance/news/shining-light-into-darkness-encouraging-greater-transparency-of-government-offensive-practices-in-cyberspace</link>
    <description>
        &lt;b&gt;RightsCon is organizing a summit on human rights in the digital age in Tunis in June 2019. Sunil Abraham will be attending a  conversation on encouraging greater transparency of government offensive practices in cyberspace on June 12.&lt;/b&gt;
        &lt;p class="moz-quote-pre" style="text-align: justify; "&gt;In the plethora of different cybersecurity benchmark reports today, one is conspicuously missing. No entity has so far found a way to highlight and measure the different cyber offensive and deterrence doctrines, policies, or capabilities on a country-by-country basis. Similarly, there have been limited attempts to not only map, but monitor adherence to, international law and emerging international norms of behaviour in cyberspace.&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;During this session, pulled together by Microsoft, the Hewlett Foundation and Mastercard, we will explore whether there is value in developing either one or the other product, and assess how difficult they would be to realize.  Would such a report encourage greater transparency of these policies and as a result drive international discussion about responsible behaviour in cyberspace? What would data would be required for it to generate a meaningful impact?&lt;/p&gt;
&lt;p class="moz-quote-pre" style="text-align: justify; "&gt;We will also examine whether there are lessons that can be learnt on the development, use, and impact of seminal benchmarking reports, such as the Global Peace Index, the Nuclear Security Index, Human Rights Watch’s World Report, and others.  This gap is being examined in the light of the potential creation of a CyberPeace Institute, an independent non-profit organization to empower the global community with the knowledge and capabilities to protect civilians in cyberspace from sophisticated systemic cyber-attacks. It is envisioned that the CyberPeace Institute would perform three key functions: a) increase transparency of information on cyberattacks that are perpetrated by sophisticated actors and have significant, direct harm on civilians and civilian infrastructure; b) advance the role of international law and norms in governing the behavior of states and other actors in cyberspace; and c) deliver assistance at scale to the most vulnerable victims of qualifying cyberattacks, accelerating victims’ recovery and increasing their resilience. More information on the proposed Institute can be find in the attached overview.&lt;/p&gt;
&lt;p class="moz-quote-pre"&gt;The conversation will take place at RightsCon, in the Erythrean room on Wednesday, June 12 from 4:30 p.m - 5:30 p.m.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/shining-light-into-darkness-encouraging-greater-transparency-of-government-offensive-practices-in-cyberspace'&gt;https://cis-india.org/internet-governance/news/shining-light-into-darkness-encouraging-greater-transparency-of-government-offensive-practices-in-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-06-05T06:53:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy">
    <title>Parsing the Cyber Security Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy</link>
    <description>
        &lt;b&gt;An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun's article was published in&lt;a class="external-link" href="http://www.thehoot.org/web/Parsing-the-cyber-security-policy/6899-1-1-19-true.html"&gt; the Hoot&lt;/a&gt; on July 13, 2013 and later cross-posted in the &lt;a class="external-link" href="http://thefsiindia.wordpress.com/2013/07/13/indias-national-cyber-security-policy-preliminary-comments/"&gt;Free Speech Initiative &lt;/a&gt;the same day.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;We  often forget how vulnerable the World Wide Web leaves us. If walls of  code prevent us from entering each other’s systems and networks, there  are those who can easily pick their way past them or disable essential  digital platforms. We are reminded of this by the doings of &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.thedailybeast.com/articles/2013/04/17/anonymous-next-move.html" target="_blank"&gt;&lt;span&gt;Anonymous&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which carried out a series of &lt;/span&gt;&lt;a href="http://www.pcmag.com/article2/0,2817,2404554,00.asp" target="_blank"&gt;&lt;span&gt;attacks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, including the website &lt;span&gt;run by Computer Emergency Response Team India (CERT-In)&lt;span&gt; which is the government agency in charge of cyber-security. Even more  serious, are cyber-attacks (arguably cyber warfare) carried out by other  states, using digital weapons such as &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/" target="_blank"&gt;&lt;span&gt;Stuxnet&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, the digital worm&lt;span&gt;. More proximate and personal are perhaps the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2013-06-22/internet/40133370_1_phishing-attacks-kaspersky-lab-unsuspecting-user" target="_blank"&gt;&lt;span&gt;phishing attacks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, which are on the rise. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;We therefore run a great risk if we leave&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://abcnews.go.com/US/story?id=95993&amp;amp;page=1" target="_blank"&gt;&lt;span&gt; air-traffic control&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.bbc.co.uk/news/world-us-canada-22692778" target="_blank"&gt;&lt;span&gt;defense resources&lt;/span&gt;&lt;/a&gt; &lt;span&gt; or databases containing several &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://www.nytimes.com/2013/05/10/us/hackers-access-personal-data-in-washington-state.html" target="_blank"&gt;&lt;span&gt;citizens’ personal data&lt;/span&gt;&lt;/a&gt;&lt;span&gt; vulnerable. Sure, there is no doubt that efforts towards better  cyber-security are needed. A cyber-security policy is meant to address  this need, and to help manage threats to individuals, businesses and  government agencies. We need to carefully examine the government’s  efforts to handle cyber-security, how effective it is and whether its  actions do not have too many negative spillovers.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  National Cyber-Security Policy, unveiled last week, is merely a  statement of intention in broad terms. Much of  its real impact will be  ascertainable only after the language to be used in the law is  available.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; Nevertheless, the scope of the policy &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;a href="http://www.rediff.com/news/report/national-cyber-security-policy-fails-on-many-fronts/20130703.htm" target="_blank"&gt;&lt;span&gt;remains ambiguous&lt;/span&gt;&lt;/a&gt;&lt;span&gt; so far, leading to &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="http://groundreport.com/privacy-ignored-by-the-cyber-security-policy-of-india/" target="_blank"&gt;&lt;span&gt;much speculation&lt;/span&gt;&lt;/a&gt;&lt;span&gt; about the different ways in which it might be intrusive. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br /&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;One Size Fits All?&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy covers very different kinds of entities: government agencies,  private companies or businesses, non-governmental entities and  individual users. These entities may need to be handled differently  depending on their nature. Therefore, while direct state action may be  most appropriate to secure government agencies’ networks, it may be less  appropriate in the context of purely private business. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;For  example, securing police records would involve the government directly  purchasing or developing sufficiently secure technology. However,  different private businesses and non-governmental entities may be left  to manage their own security. Depending on the size of each entity, each  may be differently placed to acquire sophisticated security systems. A  good policy would encourage innovation by those with the capacity to do  this, while ensuring that others have access to reasonably sound  technology, and that they use it. Grey-areas might emerge in contexts  where a private party is manages critical infrastructure. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;It  will also be important to distinguish between smaller and larger  organisations whilst creating obligations. Unless this distinction is  made at the implementation stage, start-up businesses and civil society  organisations may find requirements such as earmarking a budget for  cyber security implementation or appointing a Chief Information Security  Officer onerous. Additionally, the policy will need to translate into a  regulatory solution that provides under-resourced entities with ready  solutions to enable them to make their information systems secure, while  encouraging larger entities with greater purchasing power to invest in  procuring the best possible solutions. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;Race to the Top&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Security  on the Internet works only if it stays one step ahead the people trying  to break in. An effective cyber-security policy must keep up with the  rapid evolution of technology, and must never become obsolete. The  standard-setting and review bodies will therefore need to be very  nimble.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy contemplates working with industry and supporting academic  research and development to achieve this. However the actual manner in  which resources are distributed and progress is monitored may make the  crucial difference between a waste of public funds and acquisition of  capacity to achieve a reasonable degree of cyber security.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally  the flow of public funds under this policy, particularly to purchase  technology, should be examined very carefully to see whether it is  justified. For example, if the government chooses to fund (even by way  of subsidy) a private company’s cyber-security research and development  rather than an equivalent public university’s endeavour, this decision  should be scrutinized to see whether it was necessary. Similarly, if  extensive public funds are spent training young people as a  capacity-building exercise, we should watch to see how many of these  people stay in India and how many leave such that other countries end up  benefiting from the Indian government’s investment in them!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;&lt;span&gt;Investigation of Security Threats&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Although  much of the policy focuses on defensive measures that can be taken  against security breaches, it is intended not only to cover  investigation subsequent to an attack but also to pinpoint ‘potential  cyber threats’ so that proactive measures may be taken. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  policy has outlined the need for a ‘Cyber Crisis Management Plan’ to  handle incidents that impact ‘critical national processes or endanger  public safety and security of the nation’. This portion of the policy  will need to be watched closely to ensure that the language used is very  narrow and allows absolutely no scope for misinterpretation or misuse  that would affect citizens’ rights in any manner. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;This  caution will be necessary both in view of the manner in which  restraints on freedom of speech permitted in the interests of public  safety have been flagrantly abused, and because of the &lt;/span&gt;&lt;span&gt;kind of paternalistic &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;a href="https://www.eff.org/deeplinks/2009/04/cybersecurity-act" target="_blank"&gt;&lt;span&gt;state intrusion&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt; that might be conceived to give effect to this.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally,  since the policy also mentions information sharing with internal and  international security, defence, law enforcement and other such  agencies, it will also be important to find out the exact nature of  information to be shared.&lt;/span&gt;&lt;/span&gt; Of  course, how the policy will be put into place will only become clear as  the terms governing its various parts emerge. But one hopes the  necessary internal direct action to ensure the government agencies’  information networks are secure is already well underway.&lt;/div&gt;
&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;It  is also to be hoped that the government chooses to take implementation  of privacy rights at least as seriously as cyber-security. If some parts  of cyber security involve ensuring that user data is protected, the  decision about what data needs protection will be important to this  exercise. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;Additionally,  although the policy discusses various enabling and standard-setting  measures, it does not discuss the punitive consequences of failure to  take reasonable steps to safeguard individuals’ personal data online.  These consequences will also presumably form a part of the privacy  policy, and should be put in place as early as possible.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-july-13-2013-chinmayi-arun-parsing-the-cyber-security-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-22T06:37:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ground-zero-summit">
    <title>Ground Zero Summit</title>
    <link>https://cis-india.org/internet-governance/blog/ground-zero-summit</link>
    <description>
        &lt;b&gt;The Ground Zero Summit which claims to be the largest collaborative platform in Asia for cyber-security was held in New Delhi from 5th to 8th November. The conference was organised by the Indian Infosec Consortium (IIC), a not for profit organisation backed by the Government of India. Cyber security experts, hackers, senior officials from the government and defence establishments, senior professionals from the industry and policymakers attended the event. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Keynote Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Union Home Minister, Mr. Rajnath Singh, inaugurated the conference. Mr Singh described cyber-barriers that impact the issues that governments face in ensuring cyber-security. Calling the cyberspace as the fifth dimension of security in addition to land, air, water and space, Mr Singh emphasised the need to curb cyber-crimes in India, which have grown by 70% in 2014 since 2013. He highlighted the fact that changes in location, jurisdiction and language made cybercrime particularly difficult to address. Continuing in the same vein, Mr. Rajnath Singh also mentioned cyber-terrorism as one the big dangers in the time to come. With a number of government initiatives like Digital India, Smart Cities and Make in India leveraging technology, the Home Minister said that the success of these projects would be dependent on having robust cyber-security systems in place.&lt;br /&gt;&lt;br /&gt;The Home Minister outlined some initiatives that Government of India is planning to take in order to address concerns around cyber security - such as plans to finalize a new national cyber policy. Significantly, he referred to a committee headed by Dr. Gulshan Rai, the National Cyber Security Coordinator mandated to suggest a roadmap for effectively tackling cybercrime in India. This committee has recommended the setting up of Indian Cyber Crime Coordination Centre (I-4C). This centre is meant to engage in capacity building with key stakeholders to enable them to address cyber crimes, and work with law enforcement agencies. Earlier reports about the recommendation suggest that the I-4C will likely be placed under the National Crime Records Bureau and align with the state police departments through the Crime and Criminal Tracking and Network Systems (CCTNS). I-4C is supposed to be comprised of high quality technical and R&amp;amp;D experts who would be engaged in developing cyber investigation tools. &lt;br /&gt;&lt;br /&gt;Other keynote speakers included Alok Joshi, Chairman, NTRO; Dr Gulshan Rai, National Cyber Security Coordinator; Dr. Arvind Gupta, Head of IT Cell, BJP and Air Marshal S B Dep, Chief of the Western Air Command.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Technical Speakers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were a number of technical speakers who presented on an array of subjects. The first session was by Jiten Jain, a cyber security analyst who spoke on cyber espionage conducted by actors in Pakistan to target defence personnel in India. Jiten Jain talked about how the Indian Infosec Consortium had discovered these attacks in 2014. Most of these websites and mobile apps posed as defence news and carried malware and viruses. An investigation conducted by IIC revealed the domains to be registered in Pakistan. In another session Shesh Sarangdhar, the CEO of Seclabs, an application security company, spoke about the Darknet and ways to break anonymity on it. Sarangdhar mentioned that anonymity on Darknet is dependent on all determinants of the equation in the communication maintaining a specific state. He discussed techniques like using audio files, cross domain on tor, siebel attacks as methods of deanonymization. Dr. Triveni Singh. Assistant Superintendent of Police, Special Task Force, UP Police made a presentation on the trends in cyber crime. Dr. Singh emphasised the amount of uncertainty with regard to the purpose of a computer intrusion. He discussed real life case studies such as data theft, credit card fraud, share trading fraud from the perspective of law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Anirudh Anand, CTO of Infosec Labs discussed how web applications are heavily reliant on filters or escaping methods. His talk focused on XSS (cross site scripting) and bypassing regular expression filters. He also announced the release of XSS labs, an XSS test bed for security professionals and developers that includes filter evasion techniques like b-services, weak cryptographic design and cross site request forgery. Jan Siedl, an authority on SCADA presented on TOR tricks which may be used by bots, shells and other tools to better use the TOR network and I2P. His presentation dealt with using obfuscated bridges, Hidden Services based HTTP, multiple C&amp;amp;C addresses and use of OTP. Aneesha, an intern with the Kerala Police spoke about elliptical curve cryptography, its features such as low processing overheads. As this requires elliptic curve paths, efficient Encoding and Decoding techniques need to be developed. Aneesha spoke about an algorithm called Generator-Inverse for encoding and decoding a message using a Single Sign-on mechanism. Other subjects presented included vulnerabilities that remained despite using TLS/SSL, deception technology and cyber kill-chain, credit card frauds, Post-quantum crypto-systems and popular android malware.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Panels&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There were also two panels organised at the conference. Samir Saran, Vice President of Observer Research Foundation, moderated the first panel on Cyber Arms Control. The panel included participants like Lt. General A K Sahni from the South Western Air Command; Lt. General A S Lamba, Retired Vice Chief Indian Army, Alok Vijayant, Director of Cyber Security Operation of NTRO and Captain Raghuraman from Reliance Industries. The panel debated the virtues of cyber arms control treaties. It was acknowledged by the panel that there was a need to frame rules and create a governance mechanism for wars in cyberspace. However, this would be effective only if the governments are the primary actors with the capability for building cyber-warfare know-how and tools. The reality was that most kinds of cyber weapons involved non state actors from the hacker community. In light of this, the cyber control treaties would lose most of their effectiveness. &lt;br /&gt;&lt;br /&gt;The second panel was on the Make for India’ initiatives. Dinesh Bareja, the CEO of Open Security Alliance and Pyramid Cyber Security was the moderator for this panel which also included Nandakumar Saravade, CEO of Data Security Council of India; Sachin Burman, Director of NCIIPC; Dr. B J Srinath, Director General of ICERT and Amit Sharma, Joint Director of DRDO. The focus of this session was on ‘Make in India’ opportunities in the domain of cyber security. The panelist discussed the role the government and industry could play in creating an ecosystem that supports entrepreneurs in skill development. Among the approaches discussed were: involving actors in knowledge sharing and mentoring chapters which could be backed by organisations like NASSCOM and bringing together industry and government experts in events like the Ground Zero Summit to provide knowledge and training on cyber-security issues.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exhibitions&lt;/h3&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference was accompanied by a exhibitions showcasing indigenous cybersecurity products. The exhibitors included Smokescreen Technologies, Sempersol Consultancy, Ninja Hackon, Octogence Technologies, Secfence, Amity, Cisco Academy, Robotics Embedded Education Services Pvt. Ltd., Defence Research and Development Organisation (DRDO), Skin Angel, Aksit, Alqimi, Seclabs and Systems, Forensic Guru, Esecforte Technologies, Gade Autonomous Systems, National Critical Information Infrastructure Protection Centre (NCIIPC), Indian Infosec Consortium (IIC), INNEFU, Forensic Guru, Event Social, Esecforte Technologies, National Internet Exchange of India (NIXI) and Robotic Zone.&lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The conference also witnessed events such Drone Wars, in which selected participants had to navigate a drone, a Hacker Fashion Show and the official launch of the Ground Zero’s Music Album.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ground-zero-summit'&gt;https://cis-india.org/internet-governance/blog/ground-zero-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-03T06:06:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes">
    <title>NASSCOM-DSCI Annual Information Security Summit 2015 - Notes</title>
    <link>https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes</link>
    <description>
        &lt;b&gt;NASSCOM-DSCI organised the 10th Annual Information Security Summit (AISS) 2015 in Delhi during December 16-17. Sumandro Chattapadhyay participated in this engaging Summit. He shares a collection of his notes and various tweets from the event.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Details about the Summit&lt;/h2&gt;
&lt;p&gt;Event page: &lt;a href="https://www.dsci.in/events/about/2261"&gt;https://www.dsci.in/events/about/2261&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Agenda: &lt;a href="https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf"&gt;https://www.dsci.in/sites/default/files/Agenda-AISS-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Notes from the Summit&lt;/h2&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr.G.K.Pillai ,Chairman DSCI addressing the audience @ 10th Annual Information Security Summit '15 &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/JVcwct3HSF"&gt;pic.twitter.com/JVcwct3HSF&lt;/a&gt;&lt;/p&gt;
— DSCI (@DSCI_Connect) &lt;a href="https://twitter.com/DSCI_Connect/status/676979952277987328"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. G. K. Pillai, Chairman of Data Security Council of India (DSCI), set the tone of the Summit at the very first hour by noting that 1) state and private industries in India are working in silos when it comes to preventing cybercrimes, 2) there is a lot of skill among young technologists and entrepreneurs, and the state and the private sectors are often unaware of this, and 3) there is serious lack of (cyber-)capacity among law enforcement agencies.&lt;/p&gt;
&lt;p&gt;In his Inaugural Address, Dr. Arvind Gupta (Deputy National Security Advisor and Secretary, NSCS), provided a detailed overview of the emerging challenges and framework of cybersecurity in India. He focused on the following points:&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; Dy NSA Dr Arvind Gupta calls 4 &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; by &lt;a href="https://twitter.com/hashtag/design?src=hash"&gt;#design&lt;/a&gt; in &lt;a href="https://twitter.com/hashtag/ICT?src=hash"&gt;#ICT&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/79kq9lWGtk"&gt;pic.twitter.com/79kq9lWGtk&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/676980799347023872"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Security is a key problem in the present era of ICTs as it is not in-built. In the upcoming IoT era, security must be built into ICT systems.&lt;/li&gt;
&lt;li&gt;In the next billion addition to internet population, 50% will be from India. Hence cybersecurity is a big concern for India.&lt;/li&gt;
&lt;li&gt;ICTs will play a catalytic role in achieving SDGs. Growth of internet is part of the sustainable development agenda.&lt;/li&gt;
&lt;li&gt;We need a broad range of critical security services - big data analytics, identity management, etc.&lt;/li&gt;
&lt;li&gt;The e-governance initiatives launched by the Indian government are critically dependent on a safe and secure internet.&lt;/li&gt;
&lt;li&gt;Darkweb is a key facilitator of cybercrime. Globally there is a growing concern regarding the security of cyberspace.
&lt;/li&gt;&lt;li&gt;On the other hand, there exists deep divide in access to ICTs, and also in availability of content in local languages.&lt;/li&gt;
&lt;li&gt;The Indian government has initiated bilateral cybersecurity dialogues with various countries.&lt;/li&gt;
&lt;li&gt;Indian government is contemplating setting up of centres of excellence in cryptography. It has already partnered with NASSCOM to develop cybersecurity guidelines for smart cities.&lt;/li&gt;
&lt;li&gt;While India is a large global market for security technology, it also needs to be self-reliant. Indian private sector should make use of government policies and bilateral trust enjoyed by India with various developing countries in Africa and south America to develop security technology solutions, create meaningful jobs in India, and export services and software to other developing countries.&lt;/li&gt;
&lt;li&gt;Strong research and development, and manufacturing base are absolutely necessary for India to be self-reliant in cybersecurity. DSCI should work with private sector, academia, and government to coordinate and realise this agenda.&lt;/li&gt;
&lt;li&gt;In the line of the Climate Change Fund, we should create a cybersecurity fund, since it is a global problem.&lt;/li&gt;
&lt;li&gt;Silos are our bane in general. Bringing government agencies together is crucial. Trust issues (between government, private sector, and users) remain, and can only be resolved over time.&lt;/li&gt;
&lt;li&gt;The demand for cybersecurity solutions in India is so large, that there is space for everyone.&lt;/li&gt;
&lt;li&gt;The national cybersecurity centre is being set up.&lt;/li&gt;
&lt;li&gt;Thinktanks can play a crucial role in helping the government to develop strategies for global cybersecurity negotiations. Indian negotiators are often capacity constrained.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Rajendra Pawar, Chair of the NASSCOM Cyber Security Task Force,  NASSCOM Cybersecurity Initiative, provided glimpses of the emerging business opportunity around cybersecurity in India:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In next 10 years, the IT economy in India will be USD 350 bn, and &lt;a href="https://blogs.dsci.in/building-usd-35-billion-cyber-security-industry-how-do-we-do-it/"&gt;10% of that will be the cybersecurity pie&lt;/a&gt;. This means a million job only in the cybersecurity space.&lt;/li&gt;
&lt;li&gt;Academic institutes are key to creation of new ideas and hence entrepreneurs. Government and private sectors should work closely with academic institutes.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Companies+Govt+Academia= High growth of the cybersecurity industry' - Rajendra Pawar at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/676995090955530246"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Globally, cybersecurity innovation and industries happen in clusters. Cities and states must come forward to create such clusters.&lt;/li&gt;
&lt;li&gt;2/3rd of the cybersecurity market is provision of services. This is where India has a great advantage, and should build on that to become a global brand in cybersecurity services.&lt;/li&gt;
&lt;li&gt;Everyday digital security literacy and cultures need to be created.&lt;/li&gt;
&lt;li&gt;Publication of cybersecurity best practices among private companies is a necessity.
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Corporate disclosures of breaches being considered with Nasscom under cybersec task force: Rajendra Pawar &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/ETtech"&gt;@ETtech&lt;/a&gt;&lt;/p&gt;
— Neha Alawadhi (@NehaAlawadhiET) &lt;a href="https://twitter.com/NehaAlawadhiET/status/676994553799417856"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;/li&gt;
&lt;li&gt;Dedicated cybersecurity spending should be made part of the e-governance budget of central and state governments.&lt;/li&gt;
&lt;li&gt;DSCI should function as a clearing house of cybersecurity case studies. At present, thought leadership in cybersecurity comes from the criminals. By serving as a use case clearing house, DSCI will inform interested researchers about potential challenges for which solution needs to be created.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Manish Tiwary of Microsoft informed the audience that India is in the top 3 positions globally in terms of malware proliferation, and this ensures that India is a big focus for Microsoft in its global war against malware. Microsoft India looks forward to work closely with CERT-In and other government agencies.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;RSA's Kartik Shahani &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; Adopt a Deep &amp;amp; Pervasive Level of True Visibility Everywhere &lt;a href="https://t.co/2U8J8WkWsI"&gt;pic.twitter.com/2U8J8WkWsI&lt;/a&gt;&lt;/p&gt;
— Debjani Gupta (@DebjaniGupta1) &lt;a href="https://twitter.com/DebjaniGupta1/status/676999786722156544"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Data localization; one of the stumbling blocks that undermine investments in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/vrff3Amcv0"&gt;pic.twitter.com/vrff3Amcv0&lt;/a&gt;&lt;/p&gt;
— Appvigil (@appvigil_co) &lt;a href="https://twitter.com/appvigil_co/status/677043180731301888"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Trust verification 4 embedded devices isnt complex bt much desired as people lives r dependent on that-cld cause physical damage &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677057992831860736"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;"Most compromised OS in 2k15: iOS"-Riyaz Tambe, Palo Alto Networks &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677015382356533249"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Security by default in IOS architecture  tho' can't verify code as noṭ open - is it security by obscurity? &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/kbPZgH8oA0"&gt;pic.twitter.com/kbPZgH8oA0&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677055086611173376"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Catching Fraudsters&lt;/strong&gt; had two insightful presentations from Dr. Triveni Singh, Additional SP of Special Task Force of UP Police, and Mr. Manoj Kaushik, IAS, Additional Director of FIU.&lt;/p&gt;
&lt;p&gt;Dr. Singh noted that a key challenge faced by police today is that nobody comes to them with a case of online fraud. Most fraud businesses are run by young groups operating BPOs that steal details from individuals. There exists a huge black market of financial and personal data - often collected from financial institutions and job search sites. Almost any personal data can be bought in such markets. Further, SIM cards under fake names are very easy to buy. The fraudsters are effective using all fake identity, and is using operational infrastructures outsourced from legitimate vendors under fake names. Without a central database of all bank customers, it is very difficult for the police to track people across the financial sector. It becomes even more difficult for Indian police to get access to personal data of potential fraudsters when it is stored in a foreign server. which is often the case with usual web services and apps. Many Indian ISPs do not keep IP history data systematically, or do not have the technical expertise to share it in a structured and time-sensitive way.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Mr. Triveni Singh talks about raiding fake call centres in Delhi NCR that scam millions every year &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/EmE4y3jux2"&gt;pic.twitter.com/EmE4y3jux2&lt;/a&gt;&lt;/p&gt;
— pradyumn nand (@PradyumnNand) &lt;a href="https://twitter.com/PradyumnNand/status/677063276442738689"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. Kaushik explained that no financial fraud is uniquely committed via internet. Many fraud begin with internet but eventually involve physical fraudulent money transaction. Credit/debit card frauds all involve card data theft via various internet-based and physical methods. However, cybercrime is continued to be mistakenly seen as frauds undertaken completely online. Further, mobile-based frauds are yet another category. Almost all apps we use are compromised, or store transaction history in an insecure way, which reveals such data to hackers. FIU is targeting bank accounts to which fraud money is going, and closing them down. Catching the people behind these bank accounts is much more difficult, as account loaning has become a common practice - where valid accounts are loaned out for a small amount of money to fraudsters who return the account after taking out the fraudulent money. Better information sharing between private sector and government will make catching fraudsters easier.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/AkhileshTuteja"&gt;@AkhileshTuteja&lt;/a&gt;  With data overload and big data being prevalent are we considering privacy elements &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/KpmgIndiaCyber?src=hash"&gt;#KpmgIndiaCyber&lt;/a&gt;&lt;/p&gt;
— Atul Gupta (@AtulGup15843145) &lt;a href="https://twitter.com/AtulGup15843145/status/677082045701488640"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Tech solns today designed to protect security - solns for privacy need to evolve'- &lt;a href="https://twitter.com/Mayurakshi_Ray"&gt;@Mayurakshi_Ray&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066470325534721"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;In-house tools important but community collaboration critical to fight security threats &lt;a href="https://twitter.com/tata_comm"&gt;@tata_comm&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/ZjbCnaROXC"&gt;pic.twitter.com/ZjbCnaROXC&lt;/a&gt;&lt;/p&gt;
— aparna  (@aparnag14) &lt;a href="https://twitter.com/aparnag14/status/677067260268187648"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Orgns in India have a long way to go b4 they internalise privacy principles' Subhash S, CISO ICICI &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt;&lt;/p&gt;
— Shivangi Nadkarni (@shivanginadkarn) &lt;a href="https://twitter.com/shivanginadkarn/status/677066928880410624"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Prof PK giving an interesting brief on Academia role in Cyber Security. &lt;a href="https://twitter.com/ponguru"&gt;@ponguru&lt;/a&gt; &lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; at &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/MEiO6sCJwu"&gt;pic.twitter.com/MEiO6sCJwu&lt;/a&gt;&lt;/p&gt;
— Vikas Yadav (@VikasSYadav) &lt;a href="https://twitter.com/VikasSYadav/status/677088566871101440"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Potential for interaction between Academia, Government and Industry but not an established reality yet. &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/MappingCyberEducation?src=hash"&gt;#MappingCyberEducation&lt;/a&gt;&lt;/p&gt;
— Indira Sen (@drealcharbar) &lt;a href="https://twitter.com/drealcharbar/status/677089590717517824"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;I have figured out why information security is not in any boardroom discussions. Cause there are no good speakers / orators . &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Virag Thakkar (@viragthakkar) &lt;a href="https://twitter.com/viragthakkar/status/677078491699871745"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;The session on &lt;strong&gt;Smart Cities&lt;/strong&gt; focused on discussing the actual cities coming up India, and the security challenges highlighted by them. There was a presentation on Mahindra World City being built near Jaipur. Presenters talked about the need to stabilise, standardise, and securitise the unique identities of machines and sensors in a smart city context, so as to enable secured machine-to-machine communication. Since 'smartness' comes from connecting various applications and data silos together, the governance of proprietary technology and ensuring inter-operable data standards are crucial in the smart city.&lt;/p&gt;
&lt;p&gt;As Special Purposed Vehicles are being planned to realise the smart cities, the presenters warned that finding the right CEOs for these entities will be critical for their success. Legacy processes and infrastructures (and labour unions) are a big challenge when realising smart cities. Hence, the first step towards the smart cities must be taken through connected enforcement of law, order, and social norms.&lt;/p&gt;
&lt;p&gt;Privacy-by-design and security-by-design are necessary criteria for smart cities technologies. Along with that regular and automatic software/middleware updating of distributed systems and devices should be ensured, as well as the physical security of the actual devices and cables.&lt;/p&gt;
&lt;p&gt;In terms of standards, security service compliance standards and those for protocols need to be established for the internet-of-things sector in India. On the other hand, there is significant interest of international vendors to serve the Indian market. All global data and cloud storage players, including Microsoft Azure cloud, are moving into India, and are working on substantial and complete data localisation efforts.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Session - Why should you hire Women Security Professionals?... Balancing gender diversity 
&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/DSCI_Connect?src=hash"&gt;#DSCI_Connect&lt;/a&gt; &lt;a href="https://t.co/uIMfG9PvAb"&gt;pic.twitter.com/uIMfG9PvAb&lt;/a&gt;&lt;/p&gt;
— Jagan Suri (@jsuri90) &lt;a href="https://twitter.com/jsuri90/status/677109792679157760"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;gender Diversity in cybersecurity critical 4 India's future. &lt;a href="https://twitter.com/symantec"&gt;@symantec&lt;/a&gt; partnered with &lt;a href="https://twitter.com/nasscom"&gt;@nasscom&lt;/a&gt; via 1000 women scholarships &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677118674197602304"&gt;December 16, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Dialogue with CERT-In 
.. Starting 2nd Day of &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;
.. B J Srinath, DG, CERT 
&lt;a href="https://twitter.com/DSCI_Connect"&gt;@DSCI_Connect&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/security?src=hash"&gt;#security&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/privacy?src=hash"&gt;#privacy&lt;/a&gt; &lt;a href="https://t.co/cvDcrgkein"&gt;pic.twitter.com/cvDcrgkein&lt;/a&gt;&lt;/p&gt;
— Vinayak Godse (@godvinayak) &lt;a href="https://twitter.com/godvinayak/status/677342972170493952"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;New &lt;a href="https://twitter.com/hashtag/problems?src=hash"&gt;#problems&lt;/a&gt; can't b solved w old &lt;a href="https://twitter.com/hashtag/solutions?src=hash"&gt;#solutions&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG BJ Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341246281539585"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;17 entities within &lt;a href="https://twitter.com/hashtag/Indian?src=hash"&gt;#Indian&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/government?src=hash"&gt;#government&lt;/a&gt; engaged in &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT head &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677341728282533888"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Scope of activities by CERT in &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; way more than its counterparts elsewhere &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677342193854451712"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT looks 8 prediction &amp;amp; &lt;a href="https://twitter.com/hashtag/prevention?src=hash"&gt;#prevention&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/emergency?src=hash"&gt;#emergency&lt;/a&gt; not just &lt;a href="https://twitter.com/hashtag/response?src=hash"&gt;#response&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343140630540288"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT willing to &lt;a href="https://twitter.com/hashtag/share?src=hash"&gt;#share&lt;/a&gt; &lt;a href="https://twitter.com/hashtag/information?src=hash"&gt;#information&lt;/a&gt; rather than just receiving &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677343512833101824"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Savita CERTin outlines drill initiatives taken 4 preparedness-detect (protect), defend attacks wth response &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/wXrkgoLzr2"&gt;pic.twitter.com/wXrkgoLzr2&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677346822449303553"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;CERTin also offers incident predicatibility,Crisis mgmt plans, &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; assurance ladder (7 levels) besides 24 x 7 prevention &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677348506869239809"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; has 7.2 million bot infected &lt;a href="https://twitter.com/hashtag/machines?src=hash"&gt;#machines&lt;/a&gt;: &lt;a href="https://twitter.com/hashtag/India?src=hash"&gt;#India&lt;/a&gt; CERT DG Srinath &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Deepak Maheshwari (@dmcorpaffair) &lt;a href="https://twitter.com/dmcorpaffair/status/677355051308871680"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;Seizure &amp;amp; protection of electronic devices as admissible evidence (certificate u Sec 65B) imperative under Forensics investigation &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;&lt;/p&gt;
— Lokesh Mehra (@lokesh_mehra) &lt;a href="https://twitter.com/lokesh_mehra/status/677364713005576192"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;'Law enforcement agency&amp;amp;corporate world must collaborate to fight cybercrime'-Atul Gupta,Partner-Risk Adv. @ &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; &lt;a href="https://t.co/GwAQWhYMmK"&gt;pic.twitter.com/GwAQWhYMmK&lt;/a&gt;&lt;/p&gt;
— KPMG India (@KPMGIndia) &lt;a href="https://twitter.com/KPMGIndia/status/677373217711919104"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;Mr. R. Chandrasekhar, President of NASSCOM, foregrounded the recommendations made by the Cybersecurity Special Task Force of NASSCOM, in his Special Address on the second day. He noted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;There is a great opportunity to brand India as a global security R&amp;amp;D and services hub. Other countries are also quite interested in India becoming such a hub.&lt;/li&gt;
&lt;li&gt;The government should set up a cybersecurity startup and innovation fund, in coordination with and working in parallel with the centres of excellence in internet-of-things (being led by DeitY) and the data science/analytics initiative (being led by DST).&lt;/li&gt;
&lt;li&gt;There is an immediate need to create a capable workforce for the cybersecurity industry.&lt;/li&gt;
&lt;li&gt;Cybersecurity affects everyone but there is almost no public disclosure. This leads to low public awareness and valuation of costs of cybersecurity failures. The government should instruct the Ministry of Corporate Affairs to get corporates to disclose (publicly or directly to the Ministry) security breeches.&lt;/li&gt;
&lt;li&gt;With digital India and everyone going online, cyberspace will increasingly be prone to attacks of various kinds, and increasing scale of potential loss. Cybersecurity, hence, must be part of the core national development agenda.&lt;/li&gt;
&lt;li&gt;The cybersecurity market in India is big enough and under-served enough for everyone to come and contribute to it.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Keynote Address by Mr. Rajiv Singh, MD – South Asia of Entrust Datacard, and Mr. Saurabh Airi, Technical Sales Consultant of Entrust Datacard, focused on trustworthiness and security of online identities for financial transactions. They argued that all kinds of transactions require a common form factor, which can be a card or a mobile phone. The key challenge is to make the form factor unique, verified, and secure. While no programme is completely secure, it is necessary to build security into the form factor - security of both the physical and digital kind, from the substrates of the card to the encryption algorithms. Entrust and Datacard have merged in recent past to align their identity management and security transaction workflows, from physical cards to software systems for transactions. The advantages of this joint expertise have allowed them to successfully develop the National Population Register cards of India. Now, with the mobile phone emerging as a key financial transaction form factor, the challenge across the cybersecurity industry is to offer the same level of physical, digital, and network security for the mobile phone, as are provided for ATM cards and cash machines.&lt;/p&gt;
&lt;p&gt;The following Keynote Address by Dr. Jared Ragland, Director - Policy of BSA, focused on the cybersecurity investment landscape in India and the neighbouring region. BSA, he explained, is a global trade body of software companies. All major global software companies are members of BSA. Recently, BSA has produced a study on the cybersecurity industry across 10 markets in the Asia Pacific region, titled &lt;a href="http://cybersecurity.bsa.org/2015/apac/"&gt;Asia Pacific Cybersecurity Dashboard&lt;/a&gt;. The study provides an overview of cybersecurity policy developments in these countries, and sector-specific opportunities in the region. Dr. Ragland mentioned the following as the key building blocks of cybersecurity policy: legal foundation, establishment of operational entities, building trust and partnerships (PPP), addressing sector-specific requirements, and education and awareness. As for India, he argued that while steady steps have been taken in the cybersecurity policy space by the government, a lot remains to be done. Operationalisation of the policy is especially lacking. PPPs are happening but there is a general lack of persistent formal engagement with the private sector, especially with global software companies. There is almost no sector-specific strategy. Further, the requirement for India-specific testing of technologies, according to domestic and not global standards, is leading to entry barrier for global companies and export barrier for Indian companies. Having said that, Dr. Ragland pointed out that India's cybersecurity experience is quite representative of that of the Asia Pacific region. He noted the following as major stumbling blocks from an international industry perspective: unnecessary and unreasonable testing requirements, setting of domestic standards, and data localisations rules.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;The Policy Makers' panel in &lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt; in progress. Arvind Gupta, Head, BJP IT cell (&lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt;) speaks. &lt;a href="https://t.co/9yWR0gMwf5"&gt;pic.twitter.com/9yWR0gMwf5&lt;/a&gt;&lt;/p&gt;
— Nandkumar Saravadé (@saravade) &lt;a href="https://twitter.com/saravade/status/677437443356798977"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;One of the final sessions of the Summit was the Public Policy Dialogue between &lt;a href="https://twitter.com/rajeevgowda"&gt;Prof. M.V. Rajeev Gowda&lt;/a&gt;, Member of Parliament, Rajya Sabha, and &lt;a href="https://twitter.com/buzzindelhi"&gt;Mr. Arvind Gupta&lt;/a&gt;, Head of IT Cell, BJP.&lt;/p&gt;
&lt;p&gt;Prof. Gowda focused on the following concerns:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;We often freely give up our information and rights over to owners of websites and applications on the web. We need to ask questions regarding the ownership, storage, and usage of such data.&lt;/li&gt;
&lt;li&gt;While Section 66A of Information Technology Act started as a anti-spam rule, it has actually been used to harass people, instead of protecting them from online harassment.&lt;/li&gt;
&lt;li&gt;The bill on DNA profiling has raised crucial privacy concerns related to this most personal data. The complexity around the issue is created by the possibility of data leakage and usage for various commercial interests.&lt;/li&gt;
&lt;li&gt;We need to ask if western notions of privacy will work in the Indian context.&lt;/li&gt;
&lt;li&gt;We need to move towards a cashless economy, which will not only formalise the existing informal economy but also speed up transactions nationally. We need to keep in mind that this will put a substantial demand burden on the communication infrastructure, as all transactions will happen through these.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt; Mr. Gupta shared his keen insights about the key public policy issues in &lt;em&gt;digital India&lt;/em&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The journey to establish &lt;em&gt;the digital&lt;/em&gt; as a key political agenda and strategy within BJP took him more than 6 years. He has been an entrepreneur, and will always remain one. His approached his political journey as an entrepreneur.
&lt;/li&gt;&lt;li&gt;While we are producing numerous digitally literate citizens, the companies offering services on the internet often unknowingly acquire data about these citizens, store them, and sometimes even expose them. India perhaps produces the greatest volume of digital exhaust globally.&lt;/li&gt;
&lt;li&gt;BJP inherited the Aadhaar national identity management platform from UPA, and has decided to integrate it deeply into its digital India architecture.&lt;/li&gt;
&lt;li&gt;Financial and administrative transactions, especially ones undertake by and with governments, are all becoming digital and mostly Aadhaar-linked. We are not sure where all such data is going, and who all has access to such data.&lt;/li&gt;
&lt;li&gt;Right now there is an ongoing debate about using biometric system for identification. The debate on privacy is much needed, and a privacy policy is essential to strengthen Aadhaar. We must remember that the benefits of Aadhaar clearly outweigh the risks. Greatest privacy threats today come from many other places, including simple mobile torch apps.&lt;/li&gt;
&lt;li&gt;India is rethinking its cybersecurity capacities in a serious manner. After Paris attack it has become obvious that the state should be allowed to look into electronic communication under reasonable guidelines. The challenge is identifying the fine balance between consumers' interest on one hand, and national interest and security concerns on the other. Unfortunately, the concerns of a few is often getting amplified in popular media.&lt;/li&gt;
&lt;li&gt;MyGov platform should be used much more effectively for public policy debates. Social media networks, like Twitter, are not the correct platforms for such debates.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;&lt;a href="https://twitter.com/hashtag/AISS15?src=hash"&gt;#AISS15&lt;/a&gt;: &lt;a href="https://twitter.com/rajivgowda"&gt;@rajivgowda&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/buzzindelhi"&gt;@buzzindelhi&lt;/a&gt; are talking abt proactive disclosure as a key part of &lt;a href="https://twitter.com/hashtag/cybersecurity?src=hash"&gt;#cybersecurity&lt;/a&gt; strategy &lt;a href="https://twitter.com/hashtag/openData?src=hash"&gt;#openData&lt;/a&gt; &lt;a href="https://twitter.com/DataPortalIndia"&gt;@DataPortalIndia&lt;/a&gt;&lt;/p&gt;
— sumandro (@ajantriks) &lt;a href="https://twitter.com/ajantriks/status/677447609502445568"&gt;December 17, 2015&lt;/a&gt;&lt;/blockquote&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes'&gt;https://cis-india.org/internet-governance/blog/nasscom-dsci-annual-information-security-summit-2015-notes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>NASSCOM</dc:subject>
    
    
        <dc:subject>DSCI</dc:subject>
    
    
        <dc:subject>Information Security</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2016-01-19T07:58:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh">
    <title>CIS Cybersecurity Series (Part 24) – Shantanu Ghosh</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh</link>
    <description>
        &lt;b&gt;CIS interviews Shantanu Ghosh, Managing Director, Symantec Product Operations, India, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;“Remember
that India is also a land where there are a lot of people who are beginning to
use computing devices for the first time in their lives. For many people, their
smartphone is their first computing device because they have never had
computers in the past. For them, the challenge is how do you make sure that
they understand that that can be a threat too. It can be a threat not only to
their bank accounts, with their financial information, but even to their
private lives.”&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twenty fourth
installment of the CIS Cybersecurity Series.”&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.&lt;/p&gt;
&lt;p&gt;Shantanu Ghosh is the Managing Director of Symantec
Product Operations, India. He also runs the Data Centre Security Group for
Symantec globally.&lt;/p&gt;
&lt;iframe src="https://www.youtube.com/embed/dFN2_R0HzbA" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-24-2013-shantanu-ghosh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2015-07-15T14:58:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
