You are here: Home
112 items matching your search terms.
Filter the results.
Item type



















New items since



Sort by relevance · date (newest first) · alphabetically
Blog Entry Lessons from US response to cyber attacks
by Arindrajit Basu published Nov 01, 2018 — filed under: ,
Publicly attributing the attacks to a state or non-state actor is vital for building a credible cyber deterrence strategy.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 21) – Gyanak Tsering
by Purba Sarkar published Aug 31, 2014 last modified Sep 06, 2014 05:08 AM — filed under: , , ,
CIS interviews Gyanak Tsering, Tibetan monk in exile, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Cybersecurity: The Intersection of Policy and Technology
by Admin published Mar 25, 2018 — filed under: ,
Sunil Abraham and Aayush Rathi attended a round-table on 'Cybersecurity: The Intersection of Policy and Technology'. The event was organised by Synergia Foundation, Bengaluru.
Located in Internet Governance / News & Media
File Cultivating India’s Cyber Defense Strategy
by Admin published Nov 13, 2019 — filed under: ,
Located in Internet Governance / Files
Blog Entry Draft Security Standards for The Financial Technology Sector in India
by Vipul Kharbanda published Nov 15, 2019 last modified Nov 18, 2019 09:51 AM — filed under: , ,
Information security standards provide a framework for the secure development, implementation and maintenance of information systems and technology architecture. This document includes draft information security standards, which seek to ensure that not only the data of users is dealt with in a secure and safe manner but also that the smaller businesses in the fintech industry have a specific standard to look at in order to limit their liabilities for any future breaches.
Located in Internet Governance / Blog
Blog Entry Response to GCSC on Request for Consultation: Norm Package Singapore
by Arindrajit Basu, Gurshabad Grover and Elonnai Hickok published Jan 22, 2019 last modified Jan 27, 2019 03:43 PM — filed under: , ,
The GCSC opened a public comment procedure to solicit comments and obtain additional feedback. CIS responded to the public call-offering comments on all six norms and proposing two further norms.
Located in Internet Governance / Blog
Blog Entry India's National Cyber Security Policy in Review
by Jonathan Diamond published Jul 31, 2013 — filed under: , ,
Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.
Located in Internet Governance / Blog
Blog Entry 'Ethical Hacker' Saket Modi Calls for Stronger Cyber Security Discussions
by Kovey Coles published Aug 05, 2013 last modified Aug 05, 2013 01:11 PM — filed under: , ,
Twenty-two year old Saket Modi is the CEO and co-founder of Lucideus, a leading cyber security company in India which claims to have worked with 4 out of 5 top global e-commerce companies, 4 out of 10 top IT companies in the world, and 3 out of 5 top banks of the Asia Pacific.
Located in Internet Governance / Blog
Blog Entry CIS Cybersecurity Series (Part 10) - Lawrence Liang
by Purba Sarkar published Sep 10, 2013 last modified Sep 10, 2013 08:31 AM — filed under: , , ,
CIS interviews Lawrence Liang, researcher and lawyer, and co-founder of Alternative Law Forum, Bangalore, as part of the Cybersecurity Series.
Located in Internet Governance / Blog
Consultation to Frame Rules under the Whistle Blowers Protection Act, 2011
by Prasad Krishna published Jul 02, 2014 — filed under: , ,
The National Campaign for People's Right to Information (NCPRI) and Centre for Communication Governance at National Law University, Delhi (CCG at NLUD) invite you to a consultation to draft rules under the Whistle Blowers Protection Act, 2011.
Located in News & Media