You are here: Home
115 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?
by Jonathan Diamond published Jul 31, 2013 last modified Aug 01, 2013 04:48 AM — filed under: , ,
July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.
Located in Internet Governance / Blog
Blog Entry India's National Cyber Security Policy in Review
by Jonathan Diamond published Jul 31, 2013 — filed under: , ,
Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.
Located in Internet Governance / Blog
Blog Entry Parsing the Cyber Security Policy
by Chinmayi Arun published Jul 22, 2013 — filed under: , ,
An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.
Located in Internet Governance / Blog
Blog Entry CII Conference on "ACT": Achieve Cyber Security Together"
by Kovey Coles published Jul 22, 2013 last modified Jul 26, 2013 08:17 AM — filed under: , ,
The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 6) - Lhadon Tethong
by Purba Sarkar published Jul 15, 2013 last modified Aug 01, 2013 09:54 AM — filed under: , , , ,
CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series
Located in Internet Governance