-
Guidelines for the Protection of National Critical Information Infrastructure: How Much Regulation?
-
by
Jonathan Diamond
—
published
Jul 31, 2013
—
last modified
Aug 01, 2013 04:48 AM
—
filed under:
Cyber Security,
Internet Governance,
Privacy
July has been a busy month for cyber security in India. Beginning with the release of the country’s first National Cyber Security Policy on July 2 and followed just this past week by a set of guidelines for the protection of national critical information infrastructure (CII) developed under the direction of the National Technical Research Organization (NTRO), India has made respectable progress in its thinking on national cyber security.
Located in
Internet Governance
/
Blog
-
India's National Cyber Security Policy in Review
-
by
Jonathan Diamond
—
published
Jul 31, 2013
—
filed under:
Cyber Security,
Internet Governance,
Privacy
Earlier this month, the Department of Electronics and Information Technology released India’s first National Cyber Security Policy. Years in the making, the Policy sets high goals for cyber security in India and covers a wide range of topics, from institutional frameworks for emergency response to indigenous capacity building.
Located in
Internet Governance
/
Blog
-
Parsing the Cyber Security Policy
-
by
Chinmayi Arun
—
published
Jul 22, 2013
—
filed under:
Cyber Security,
Internet Governance,
Privacy
An effective cyber-security policy must keep up with the rapid evolution of technology, and must never become obsolete. The standard-setting and review bodies will therefore need to be very nimble, says Chinmayi Arun.
Located in
Internet Governance
/
Blog
-
CII Conference on "ACT": Achieve Cyber Security Together"
-
by
Kovey Coles
—
published
Jul 22, 2013
—
last modified
Jul 26, 2013 08:17 AM
—
filed under:
Cyber Security,
Internet Governance,
Privacy
The Confederation of Indian Industries (CII) organized a conference on facing cyber threats and challenges at Hotel Hilton in Chennai on July 13, 2013. Kovey Coles attended this conference and shares a summary of the event in this blog post.
Located in
Internet Governance
/
Blog
-
CIS Cybersecurity Series (Part 6) - Lhadon Tethong
-
by
Purba Sarkar
—
published
Jul 15, 2013
—
last modified
Aug 01, 2013 09:54 AM
—
filed under:
Cybersecurity,
Internet Governance,
Cybercultures,
Cyber Security,
Cyber Security Interview
CIS interviews Lhadon Tethong, Tibetan human rights activist, as part of the Cybersecurity Series
Located in
Internet Governance