<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/cyfy-2018"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong">
    <title>CIS Cybersecurity Series (Part 6) - Lhadon Tethong</title>
    <link>https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong</link>
    <description>
        &lt;b&gt;CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;"In authoritarian states, and in this case, in Tibet, I think that every person that we can teach and pass knowledge to, that can help them stay out of jail, stay in the streets, for one, two, three days longer, one week longer, that is a valuable time of time and resources. And I think we cannot rely on only tools and technology solutions to protect people. I think we can't just rely on government policies at the highest levels, and on export controls... the approach to digital security has to be comprehensive and we have to engage citizens. And not just in cases like the Tibetans or for activists or for people living under repression, but for people in free and open societies too." -  Lhadon Tethong, Tibetan human rights activist.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its sixth installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS interviews Lhadon Tethong, Tibetan human rights activist. Lhadon is the Director of the Tibet Action Institute, where she leads a team of technologists and human rights advocates in developing and advancing open-source communication technologies, nonviolent strategies and innovative training programs for Tibetans and other groups facing heavy repression and human rights abuses.&lt;/p&gt;
&lt;p&gt;Link for Tibet Action Institute: &lt;a href="https://tibetaction.net/"&gt;https://tibetaction.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RzlvdY_DAe8" width="560"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong'&gt;https://cis-india.org/internet-governance/cis-cybersecurity-series-part-6-lhadon-tethong&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-08-01T09:54:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs">
    <title>CIS Cybersecurity Series (Part 11) - Anja Kovacs</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs</link>
    <description>
        &lt;b&gt;CIS interviews Anja Kovacs, researcher and activist, and director of the Internet Democracy, Project as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"Having the cyber security debate become more and more important was a real challenge for civil society. I think in part because many of us who were&amp;nbsp;focused&amp;nbsp;on human rights aren't necessarily techies. And so, when you have a conversation with a government bureaucrat,&amp;nbsp;and ask questions about the kind of decisions they decided to take, very often they will come up with a technical answer in response. And then, if you don't have that expertise, it is difficult to react. In the meantime though, I think it has become clear that this is one of the biggest issues in the internet field at the moment. It is also one of the big issues that is driving the desires of governments to have a bigger role to play in internet&amp;nbsp;governance. So it is an area that is unavoidable for activists. What has happened slowly is that we have come to realize that the first thing, as in most other areas, is not the technical details, but principles, and those&amp;nbsp;principles&amp;nbsp;are fairly similar to how they are in many other fields." - Anja Kovacs, Internet Democracy Project&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its eleventh installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;In this installment, CIS speaks to Anja Kovacs, director of the Internet Democracy Project. Her&amp;nbsp;work focuses on a wide range of questions regarding freedom of expression, cybersecurity and the architecture of Internet governance as they relate to the Internet and democracy. Anja is currently also a member of the of the Investment Committee of the Digital Defenders Partnership and of the interim Steering Group of Best Bits, a global network of civil society members.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;(Bio from internetdemocracy.in)&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Internet Democracy Project homepage:&amp;nbsp;http://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;iframe src="//www.youtube.com/embed/uWH2oup6ND8" frameborder="0" height="315" width="420"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-11-anja-kovacs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-10-15T15:25:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws">
    <title>National Seminar on Cyber Security &amp; Cyber Laws - Issues and Concerns</title>
    <link>https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram was a panelist at this seminar organized by the Advanced Centre for Research, Development &amp; Training in Cyber Laws &amp; Forensics on December 27 and 28, 2014 at the National Law School of India University in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sharath was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". He  spoke about 'multi-stakeholderim in cyber security and CERT programs of nations'.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PROGRAMME SCHEDULE &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 1 - 27&lt;sup&gt;th&lt;/sup&gt; December 2014 &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:00- 10:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;REGISTRATION&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;10:00- 11:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;INAUGURAL &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Welcome &amp;amp; Introduction:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt; Seminar Director&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Inaugural Address:&lt;b&gt; Shri. Pratap Reddy,&lt;/b&gt; IPS, IGP, Internal Security Division, Karnataka Police, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Key Note Address:&lt;b&gt; Dr. R. Venkata Rao, &lt;/b&gt;Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Vote of Thanks:&lt;b&gt; Dr. T. V. Subba Rao, &lt;/b&gt;Senior Professor, NLSIU&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00-11:45&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;GROUP PHOTO &amp;amp; TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;11:45-01:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PLENARY&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt; &lt;/b&gt;&lt;b&gt;"MULTI-DISCIPLINARY CHALLENGES IN ENSURING CYBER SECURITY"&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Mr. Subrahmanya Boda, &lt;/b&gt; CISO, GMR&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Mr. Sunil Varkey, &lt;/b&gt; CISO, WIPRO&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Mr. Ramesh Kauta&lt;/b&gt; , CISO, GE [India]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Mr. T T Thomas, &lt;/b&gt; CTO Synergia Technologies,&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Rahul Matthan, &lt;/b&gt; Partner, Trilegal.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan), &lt;/b&gt; Researcher at Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Mr. Srinivas P, &lt;/b&gt; CISO, Infosys &amp;amp; Anchor, DSCI Bangalore Chapter [Moderator of the session]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:00-02:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:00-03:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;03:30-04:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 3&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 4&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;6:00 to 7. 00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;CULTURAL EVENING &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Venue: Quad, Academic Block &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 2 - 28&lt;sup&gt;th&lt;/sup&gt; December 2014&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;08:00-09:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;BREAK FAST&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:30- 11:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 5&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 6&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Technical Session 7&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00- 11:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:30-1:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 8&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 9&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 10&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:30-02:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:30-03. 45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;PLENARY&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SESSION&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt;"SECURING CYBER SPACE THROUGH INSTITUTIONAL INVOLVEMENT" &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Dr. Kamble, &lt;/b&gt;Director, Computer Emergency Response Team [CERT] India, Dept of Electronics &amp;amp; IT, Ministry of IT, 					Government of India&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Dr. S.B.N. Prakash, &lt;/b&gt;Senior Professor of Law, NLSIU&lt;/p&gt;
&lt;p&gt;3. &lt;b&gt;Mr. Naa Vijay Shankar,&lt;/b&gt; Cyber Law Consultant, Bangalore&lt;/p&gt;
&lt;p&gt;4. &lt;b&gt;Mr. Balasubramanya, &lt;/b&gt;Vice President, Tata Consultancy Services, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Ranganath,&lt;/b&gt; Delivery Project Executive, IBM, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Mr. Venkatesh Murthy, &lt;/b&gt; Senior Manager, Cyber Forensics, Data Security Council of India [DSCI], Bangalore.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;b&gt;Mr. M. D. Sharath, &lt;/b&gt;Dy. S. P., Cyber Police, Bangalore&lt;/p&gt;
&lt;p&gt;8. &lt;b&gt;Dr. Nagarathna. A.,&lt;/b&gt; Senior Assistant Prof of Law, NLSIU [Moderator]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;3. 45 to 4. 00 &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:00 AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;VALEDICTORY SESSION &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seminar Resolutions:&lt;b&gt; Dr. T. V. Subba Rao, Senior Professor, NLSIU&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Valedictory Address &amp;amp; Distribution of Certificates: : &lt;b&gt;Dr. R. Venkata Rao,&lt;/b&gt; Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;Vote of thanks:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt;Seminar Director&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws'&gt;https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-31T02:04:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues">
    <title>Bali meet to discuss Internet governance issues</title>
    <link>https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues</link>
    <description>
        &lt;b&gt;Four-day event hosted by Internet Governance Forum to also discuss Internet access and diversity, privacy, security.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Politics/nSMWfhzTld5AHD3lJFrv3L/Bali-meet-to-discuss-Internet-governance-issues.html"&gt;published in Livemint&lt;/a&gt; on October 22, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Representatives of governments around the world,  technology executives and activists will discuss issues such as Internet  access and diversity, privacy, security, inter-governmental  corporation, and Internet governance at a four-day event hosted by the  Internet Governance Forum (IGF) that begins on Tuesday in Bali,  Indonesia.&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/J.%20Satyanarayana"&gt;J. Satyanarayana&lt;/a&gt;&lt;/span&gt;,  secretary, ministry of communications and information technology,  confirmed India’s participation in the forum and said the country would  be represented by Dr Govind, a senior director and head of department,  e-infrastructure and Internet governance division, department of  information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We  will also be taking part in a working group on Internet governance and  enhanced cooperation, which will be convened by the United Nations  Commission on Science and Technology for Development in November,” said  Satyanarayana.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“IGF  is a valuable learning forum wherein different stakeholders can discuss  Internet governance policy issues without any antagonism. Other fora for  Internet policy like ICANN, WIPO (World Intellectual Property  Organization), ITU (International Telecommunication Union), etc., are  places where international law and policy are developed, and do not  allow for such learning because negotiations are always very  acrimonious. Since IGF is only meant for learning, it does not directly  address the global policy vacuum that exists for cyber crime, data  protection and privacy,” said &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of Bangalore-based Centre for Internet and Society, who will be participating in the Bali event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Indian  government, private sector, civil society, technical and academic  community can become more competent and effective through such a  dialogue in other multilateral and multi-stakeholder fora where  international Internet standards, policies and laws are formulated. It  also helps the stakeholders contribute to the development of  internationally interoperable domestic policy,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2006, the UN secretary general established a small secretariat in Geneva  to assist him in the convening of IGF. The first meeting was convened  in October-November 2006 in Athens. In December 2010, IGF’s mandate was  extended for five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its  eighth edition, IGF will have detailed discussions on issues such as  free flow of information on the Internet, regulatory approaches to  privacy, and protection of interests of individuals and communities in  cyberspace, Internet surveillance and legal framework for cyber crime,  said the forum in a statement on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the four-event, for instance, one of the workshops “will explore what  core principles and strategies are needed to achieve a balanced and fair  approach to data protection that is effective internationally and  regionally”, according to IGF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the prominent speakers in the event include &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Jari%20Arkko"&gt;Jari Arkko&lt;/a&gt;&lt;/span&gt;, chairman, Internet Engineering Task Force, Finland; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Virat%20Bhatia"&gt;Virat Bhatia&lt;/a&gt;&lt;/span&gt;, president, South Asia, &lt;span class="company"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/AT&amp;amp;T%20Inc."&gt;AT&amp;amp;T Inc.&lt;/a&gt;&lt;/span&gt;; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Chris%20Painter"&gt;Chris Painter&lt;/a&gt;&lt;/span&gt;, coordinator for cyber issues, US department of state; &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Karen%20Mulberry"&gt;Karen Mulberry&lt;/a&gt;&lt;/span&gt;, policy adviser, Internet Society; and &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Matthew%20Shears"&gt;Matthew Shears&lt;/a&gt;&lt;/span&gt;, director of Internet policy and human rights, Center for Democracy and Technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to industry estimates, over 2.5 billion Internet users interact in  shared cross-border online spaces where they can post content  potentially accessible worldwide.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No  clear frameworks exist yet to handle the tensions between these  competing normative orders or values and enable peaceful cohabitation in  cross-border cyberspace. This challenge constitutes a rare issue of  common concern for all stakeholder groups,” said IGF on its website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According  to a UN estimate, nearly 40% of the world’s population will be online  by the end of 2013. “The Internet has become an essential tool for the  creation of jobs and the delivery of basic public services,” said the UN  undersecretary-general for economic and social affairs, &lt;span class="person"&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/Wu%20Hungbo"&gt;Wu Hungbo&lt;/a&gt;&lt;/span&gt;,  in a statement, adding that it is also essential “for improving access  to knowledge and education, for empowering women, for enhancing  transparency, and for giving marginalized populations a voice in  decision-making processes”.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues'&gt;https://cis-india.org/news/livemint-moulishree-srivastava-october-22-2013-bali-meet-to-discuss-internet-governance-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T08:29:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra">
    <title>CIS Cybersecurity Series (Part 12) - Namita Malhotra</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra</link>
    <description>
        &lt;b&gt;CIS interviews Namita Malhotra, researcher and lawyer at Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;"In a strange mix of how both capitalism and state control work, what is happening is that more and more of these places that one could access, for various reasons, whether it is for ones own pleasure or for political conversations, are getting further and further away from us. And I think that that mix of both corporate interests and state control is particularly playing a role in this regard." - Namita Malhotra, researcher and lawyer, Alternative Law Forum&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Centre for Internet and Society presents its twelfth installment of the CIS Cybersecurity Series.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p&gt;Namita Malhotra is a researcher and lawyer at Alternative Law Forum (ALF).&amp;nbsp;She has a keen interest in working on law, technology and media through legal research, cultural studies, new media practices and film making.&lt;/p&gt;
&lt;p&gt;ALF homepage: www.altlawforum.org&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/R9bSvrs5w74" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-12-namita-malhotra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    

   <dc:date>2013-11-18T10:03:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">
    <title>First Look: CIS Cybersecurity documentary film</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</link>
    <description>
        &lt;b&gt;CIS presents the trailer of its documentary film DesiSec: Cybersecurity &amp; Civil Society in India&lt;/b&gt;
        
&lt;p&gt;The Centre for Internet and Society is pleased to release the trailer of its first documentary film, on cybersecurity and civil society in India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The documentary is part of the CIS Cybersecurity Series, a work in progress which may be found &lt;a class="external-link" href="http://cismetamedia.tumblr.com"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/3134xVvMmfc" frameborder="0" height="315" width="560"&gt;&lt;/iframe&gt;
&lt;p&gt;&lt;strong&gt;DesiSec: Cybersecurity and Civil Society in India&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The trailer of&amp;nbsp;&lt;em&gt;DesiSec: Cybersecurity and Civil Society in India&lt;/em&gt;&amp;nbsp;was shown at the Internet Governance Forum in Bali on October 24. It was a featured presentation at the Citizen Lab workshop,&amp;nbsp;&lt;em&gt;Internet Governance For The Next Billion Users.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The transcript of the workshop is available here:&amp;nbsp;&lt;a href="http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users"&gt;http://www.intgovforum.org/cms/component/content/article/121-preparatory-process/1476-ws-344-internet-governance-for-the-next-billion-users&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Film</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>Cyber Security</dc:subject>
    

   <dc:date>2013-12-17T08:16:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police">
    <title> India needs better cyber police</title>
    <link>https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police</link>
    <description>
        &lt;b&gt;On Wednesday, one of the largest online shopping and auction portals, eBay, revealed that earlier this year, cybercriminals accessed details of 145 million of its customers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Surabhi Agarwal was &lt;a class="external-link" href="http://www.business-standard.com/article/international/india-needs-better-cyber-police-114052201689_1.html"&gt;published in the Business Standard&lt;/a&gt; on May 23, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even though eBay's customers' financial details are said to be safe, the  incident is being termed a "historic breach" given the enormity of the  data compromised.  Globally, eBay is being criticised not just for its  laxity in securing the digital perimeter but also for reacting too late.  The company has said that it first came to know of the breach "two  weeks" ago. Records that have been accessed contain passwords as well as  email addresses, birth dates, mailing addresses and other personal  information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The situation is worse when it comes to reporting such instances in &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=India" target="_blank"&gt;India&lt;/a&gt;, say &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security&lt;/a&gt; experts. The Indian Information Technology Act requires companies to  adopt "reasonable security measures" to protect consumers' sensitive  personal information such as passwords and financial details. It also  makes companies duty bound to report breaches and also defines  liabilities in case a firm is found not to be adhering to best data  security practices. However, implementation is patchy and most such  instances go unreported.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate specialising in cyber security, says most  users do not come to know if there has been a breach. "Awareness is also  low among consumers about the legal recourse available in case their  data has been compromised," he adds. Unlike in the West, lack of a  proper data protection and privacy law in India is to be blamed for  this. "Companies, too, are inclined not to report such instances as they  fear being negatively impacted in the market," he points out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In case of a breach, a user can contact the adjudicating officer, which  is the state infotech secretary, for legal recourse. However, the onus  is on the user to prove the breach. In the US, a consumer can get a  subpoena (court order) issued against a company that makes it duty bound  to provide details of the breach. "In India, the regime is too lax. It  is very difficult to notify the government," says Sunil Abraham,  executive director of the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are stringent compliance requirements in countries such as the US. The laws in India need to come tougher if we want companies to become more serious about this," adds Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;eBay has advised consumers, many of whom could be Indians, to immediately change their passwords. While people  tend to use the same password across many sites, emails and phones  numbers act as verifying tools for several financial transactions and  could be misused. Moreover, unlike India, the US does not require  additional authentication apart from credit card and CVV number, which  makes transactions slightly more vulnerable. "It may be a good idea to  include a one-time password as a security layer," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over 200 million Indians are online. The Indian &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=E-commerce" target="_blank"&gt;e-commerce&lt;/a&gt; market is estimated at $2 billion (Rs 12,000 crore) and is expected to cross $20 billion over the next four years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There is no such thing as 100 per cent protection in the digital world.  The choice is between transacting online or not," says Akhilesh Tuteja,  executive director of consulting firm KPMG. "Technology is becoming so  sophisticated that what was good yesterday is not good today." A bigger  dialogue is needed on people treating theft of digital assets just as  they would physical assets, he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last big breach was reported at software maker Adobe Systems in  October 2013, when it was uncovered that hackers accessed about 152  million user accounts. Last December Target said some 40 million payment  card numbers and another 70 million customer records were hacked into.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police'&gt;https://cis-india.org/news/business-standard-may-23-2014-surabhi-agarwal-india-needs-better-cyber-police&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-06-04T07:56:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018">
    <title>IEEE-SA InDITA Conference 2018</title>
    <link>https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018</link>
    <description>
        &lt;b&gt;Gurshabad Grover participated in the IEEE-SA InDITA Conference 2018 organized by IEEE Standards Association held IIIT-Bangalore on July 10 and 11, 2018.&lt;/b&gt;
        &lt;p&gt;Gurshabad gave a brief presentation on how we could apply or reject 'Trust Through Technology' principles in the design of public biometric authentication. The agenda for the event can be &lt;a class="external-link" href="https://ieee-dita.org/indita18/agenda/"&gt;accessed here&lt;/a&gt;. More details on event &lt;a class="external-link" href="https://ieee-dita.org/indita18/"&gt;website here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018'&gt;https://cis-india.org/internet-governance/news/ieee-sa-indita-conference-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-08-01T23:04:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy">
    <title>Symposium on India’s Cyber Strategy</title>
    <link>https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy</link>
    <description>
        &lt;b&gt;CIS organised a Symposium on India’s Cyber Strategy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The event saw a total of around 30 participants from industry, academia, law/policy, media, and civil society, and had a panel comprised of Asoke Mukerji, Madhulika Srikumar, and Parminder Jeet Singh.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Presentations&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cis-presentation-on-cyber-security"&gt;India’s Strategic Interests in the Norms Setting Process in Cyberspace&lt;/a&gt; (Presentation by Ambassador Asoke Kumar Mukerji, Former Permanent Representative of India to the United Nations)&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/arindrajit-presentation"&gt;The Potential for the Normative Regulation of Cyberspace&lt;/a&gt; (Presentation by Arindrajit Basu)&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy'&gt;https://cis-india.org/internet-governance/events/symposium-on-india2019s-cyber-strategy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-02T06:02:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/cyfy-2018">
    <title>CyFy 2018 </title>
    <link>https://cis-india.org/internet-governance/news/cyfy-2018</link>
    <description>
        &lt;b&gt;Swaraj Paul Barooah and Arindrajit Basu participated in CyFy 2018 organized by Observer Research Foundation at Hotel Taj Mahal, New Delhi from October 3 - 5, 2018.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cyfy-2018-agenda"&gt;Click to see the agenda&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/cyfy-2018'&gt;https://cis-india.org/internet-governance/news/cyfy-2018&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-08T15:36:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector">
    <title>Roundtable on Cyber-security and the Private Sector</title>
    <link>https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a roundtable discussion on cyber-security and the private sector. The event will be held at Omidyar Network office in Bangalore from 10.00 a.m. to 4.00 p.m.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;An increased proliferation of cyber attacks from multiple vectors and a  variety of actors has necessitated a multi-stakeholder response to  cyber-security that requires private sector involvement, both at the  policy and technical fields. This contribution has come in the recent  past not only through active involvement at the domestic levels but also  through norm-setting in the international arena.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This symposium seeks to discuss the various cyber-security concerns in  the Indian private sector and maps initiatives being undertaken by  various actors towards furthering cyber-security in an attempt to  identify challenges, points of tension, brainstorm solutions-thereby  mapping the way forward through engagement not only with private sector  actors but also in dialogue with civil society and policy-makers. CIS  has undertaken some preliminary research in this area to further  discussion in this area and serve as a forum for sharing perspectives  for various stakeholders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The symposium will be divided into three sessions, broadly in the form  of a roundtable with different modus operandi in each session.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Concept Note for the event can be found &lt;a href="https://cis-india.org/internet-governance/concept-note-pvt-sector-cybersecurity-roundtable" class="internal-link" title="Concept Note: Pvt Sector Cybersecurity Roundtable"&gt;here&lt;/a&gt;, and the agenda can be found &lt;a href="https://cis-india.org/internet-governance/pvt-sector-cyber-security-agenda" class="internal-link" title="Pvt Sector Cyber-security Agenda"&gt;here&lt;/a&gt;. If you would like to attend, please rsvp pranav@cis-india.org, or register &lt;a class="external-link" href="https://goo.gl/forms/j3PSo56sdLyX8aNw2"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector'&gt;https://cis-india.org/internet-governance/events/roundtable-on-cyber-security-and-the-private-sector&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-15T09:18:35Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace">
    <title>Conceptualizing an International Security Regime for Cyberspace</title>
    <link>https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace</link>
    <description>
        &lt;b&gt;This paper was published as part of the Briefings from the Research and Advisory Group (RAG) of the Global Commission on the Stability of Cyberspace (GCSC) for the Full Commission Meeting held at Bratislava in 2018.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Policy-makers often use past analogous situations to reshape questions and resolve dilemmas in current issues. However, without sufficient analysis of the present situation and the historical precedent being considered, the effectiveness of the analogy is limited.This applies across contexts, including cyber space. For example, there exists a body of literature, including The Tallinn Manual, which applies key aspects (structure, process, and techniques) of various international legal regimes regulating the global commons (air, sea, space and the environment) towards developing global norms for the governance of cyberspace.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the recent deadlock at the Group of Governmental Experts (GGE), owing to a clear ideological split among participating states, it is clear that consensus on the applicability of traditional international law norms drawn from other regimes, will not emerge if talks continue without a major overhaul of the present format of negotiations. The Achilles Heel of the GGE thus far has been a deracinated approach to the norms formulation process. There has been excessive focus on the content and the language of the applicable norm rather than the procedure underscoring its evolution, limited state and non state participation, and a lack of consideration for social, cultural, economic and strategic contexts through which norms emerge at the global level. Even if the GGE process became more inclusive and included all United Nations members, strategies preceding the negotiation process must be designed in a manner to facilitate consensus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There exists to date, no scholarship that traces the negotiation processes that lead to the forging of successful analogous universal regimes or an investigation into the nature of normative contestation that enabled the evolution of the core norms that shaped these regimes. To develop an effective global regime governing cyberspace, we must consider if and how existing international law or norms for other global commons might also apply to ‘cyberspace’, but also transcend this frame into more nuanced thinking around techniques and frameworks that have been successful in consensus building. This paper focuses on the latter and embarks on an assessment of how regimes universally maximized functional utility through global interactions and shaped legal and normative frameworks that resulted, for some time, at least, in  broad consensus.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/gcsc-research-advisory-group.pdf"&gt;Click to read more&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace'&gt;https://cis-india.org/internet-governance/blog/conceptualizing-an-international-security-regime-for-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-10-26T15:09:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks">
    <title>Lessons from US response to cyber attacks</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks</link>
    <description>
        &lt;b&gt;Publicly attributing the attacks to a state or non-state actor is vital for building a credible cyber deterrence strategy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.thehindubusinessline.com/opinion/lessons-from-us-response-to-cyber-attacks-ep/article25372326.ece"&gt;Hindu Businessline&lt;/a&gt; on October 30, 2018. The article was edited by Elonnai Hickok.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In September, amidst the brewing of a new found cross-continental romance between Kim Jong-Un and Donald Trump, the US Department of Justice filed a criminal complaint indicting North Korean hacker Park Jin Hyok for playing a role in at least three massive cyber operations against the US. This included the Sony data breach of 2014; the Bangladesh bank heist of 2016 and the WannaCry ransomware attack in 2017. This indictment was followed by one on October 4, of seven officers in the GRU, Russia’s military agency, for “persistent and sophisticated computer intrusions.” Evidence adduced in support included forensic cyber evidence like similarities in lines of code or analysis of malware and other factual details regarding the relationship between the employers of the indicted individuals and the state in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is unlikely that prosecutions will ensue, indicting  individuals responsible for cyber attacks offers an attractive option  for states looking to develop a credible cyber deterrence strategy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Attributing cyber attacks&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Technical  uncertainty in attributing attacks to a specific actor has long  fettered states from adopting defensive or offensive measures in  response to an attack and garnering support from multilateral fora.  Cyber attacks are multi-stage, multi-step and multi-jurisdictional,  which complicates the attribution process and removes the attacker from  the infected networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts at the RAND Corporation have argued  that technical challenges to attribution should not detract from  international efforts to adopt a robust, integrated and  multi-disciplinary approach to attribution, which should be seen as a  political process operating in symbiosis with technical efforts. A  victim state must communicate its findings and supporting evidence to  the attacking state in a bid to apply political pressure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clear  publication of the attribution process becomes crucial as it furthers  public credibility in investigating authorities; enables information  exchange among security researchers and fosters deterrence by the  adversary and potential adversaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although public attributions  need not take the form of a formal indictment and are often conducted  through statements by foreign ministries, a criminal indictment is more  legitimate as it needs to comply with the rigorous legal and evidentiary  standards required by the country’s legal system. Further, an  indictment allows for the attack to be conceptualised as a violation of  the rule of law in addition to being a geopolitical threat vector.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Lessons for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;India  is yet to publicly attribute a cyber attack to any state or non-state  actor. This is surprising given that an overwhelming percentage of  attacks on Indian websites are perpetrated by foreign states or  non-state actors, with 35 per cent of attacks emanating from China, as  per a report by the Indian Computer Emergency Response Team (CERT-IN),  the national nodal agency under the Ministry of Electronics and  Information Technology (MEITY) which deals with cyber threats.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along  with other bodies, such as the National Critical Information Protection  Centre (NCIIPC) which is the nodal central agency for the protection of  critical information infrastructure, CERT-IN forms part of an ecosystem  of nodal agencies designed to guarantee national cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  are three key lessons that policy makers involved in this ecosystem can  take away from the WannaCry attribution process and the Park  indictment. First, there is a need for multi-stakeholder collaboration  through sharing of research, joint investigations and combined  vulnerability identification among the various actors employed by the  government, law enforcement authorities and private cyber security  firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The affidavit suggested that the FBI had used information  from various law enforcement personnel, computer scientists at the FBI;  Mandiant — a cyber security firm retained by the US Attorney’s Office  and publicly available materials produced by cyber security companies.  Second, the standards of attribution need to demonstrate compliance both  with the evidentiary requirements of Indian criminal law and the  requirements in the International Law on State Responsibility. The  latter requires an attribution to demonstrate that a state had  ‘effective control’ over the non-state actor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the  attribution must be communicated to the adversary in a manner that does  not risk military escalation. Despite the delicate timing of the  indictment, Park’s prosecution by the FBI did not dampen the temporary  thaw in relations between US and North Korea.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While building  capacity to improve resilience, detect attacks and improve attribution  capabilities should be a priority, we need to remember that regardless  of the breakthrough in both human and infrastructural capacities,  attributing cyber attacks will never be an exercise in certainty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  will need to marry its improved capacity with strategic geopolitical  posturing. Lengthy indictments may not deter all potential adversaries  but may be a tool in fostering a culture of accountability in  cyberspace.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks'&gt;https://cis-india.org/internet-governance/blog/hindu-businessline-arindrajit-basu-october-30-2018-lessons-from-us-response-to-cyber-attacks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-11-01T05:53:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering">
    <title>CIS Cybersecurity Series (Part 21) – Gyanak Tsering</title>
    <link>https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering</link>
    <description>
        &lt;b&gt;CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;“I have three mobile phones but I use only one to exchange information to and from Tibet. I don't give that number to anyone and nobody knows about it. High security forces me to use three phones. Usually a mobile phone can be tracked easily in many ways, especially by the network provider but my third mobile phone is not registered so that makes sure that the Chinese government cannot track me. The Chinese have a record of all mobile phone numbers and they can block them at anytime. But my third number cannot be traced and that allows me to communicate freely. This is only for security reasons so that my people in Tibet don't get into trouble.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society presents its twenty-first installment of the CIS Cybersecurity Series.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gyanak Tsering is a Tibetan monk in exile, studying at Kirti Monastery, Dharamshala. He came to India in 1999, and has been using the internet and mobile phone technology, since 2008, to securely transfer information to and from Tibet. Tsering adds a new perspective to the cybersecurity debate and explains how his personal security is interlinked with internet security and mobile phone security.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Video&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/mqSw3cy7MEc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;i&gt;This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering'&gt;https://cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-21-gyanak-tsering&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>purba</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Cyber Security Interview</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-06T05:08:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
