The Centre for Internet and Society
http://editors.cis-india.org
These are the search results for the query, showing results 1 to 15.
DesiSec: Episode 1 - Film Release and Screening
http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening
<b>The Centre for Internet and Society is pleased to to announce the release of the first documentary film on cybersecurity in India - DesiSec.
We hope you can join us for a special screening of the first episode of DesiSec, on 11th December, at CIS!</b>
<div>Early 2013, the Centre for Internet and Society began shooting its first documentary film project. After months of researching and interviewing activists and experts, CIS is thrilled to announce the release of the first documentary film on cybersecurity in India - <strong>DesiSec: Cybersecurity and Civi Society in India</strong>.</div>
<div> </div>
<div>Trailer link: <a href="http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer">http://cis-india.org/internet-governance/blog/cis-cybersecurity-series-film-trailer</a></div>
<div> </div>
<div>CIS is hosting a special screening of <strong>DesiSec: Episode 1</strong> on <strong>11th December, 2013, 6 pm</strong> and invites you to this event. The first episode is centered around the issue of privacy and surveillance in cyber space and how it affects Indian society.</div>
<div> </div>
<div>We look forward to seeing you there!</div>
<div> </div>
<div>RSVP: <a href="mailto:purba@cis-india.org" target="_blank">purba@cis-india.org</a></div>
<div>Venue: http://osm.org/go/yy4fIjrQL?m=</div>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening'>http://editors.cis-india.org/internet-governance/desisec-episode-1-film-release-and-screening</a>
</p>
No publisherpurbaCyberspacePrivacyCybersecurityInternet GovernanceSurveillanceCyber Security FilmCyber SecurityEvent2013-12-17T08:13:32ZEventCIS Cybersecurity Series (Part 13) - Pranesh Prakash
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash
<b>CIS interviews Pranesh Prakash, lawyer and policy director with Centre for Internet and Society, as part of the Cybersecurity Series.</b>
<div>
<div><i>"When it comes to things cyber we completely lose our sense of proportion. While killing someone by negligence only attracts two years of punishment, saying something that people can define "offensive" attracts even more under 66A of the Information Technology Act. Something that can be a nuisance, under the Criminal Laws, can attract up to six months punishment, whereas under the IT act, it is up to three years..." - Pranesh Prakash, lawyer and policy director, Centre for Internet and Society</i></div>
<div></div>
<div>Centre for Internet and Society presents its thirteenth installment of the CIS Cybersecurity Series.</div>
<div></div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div></div>
<div>Pranesh is a Policy Director with the Centre, and is a graduate of the National Law School of India University, Bangalore, with a degree in Arts and Law.</div>
<div></div>
</div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/gUDeTeQ6DAg" width="560"></iframe></p>
<div><b><i><br /></i></b></div>
<div><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-13-pranesh-prakash</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyber Security FilmCyberculturesCyber SecurityCyber Security Interview2014-01-20T06:20:44ZBlog EntryCIS Cybersecurity Series (Part 1) - Christopher Soghoian
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian
<b>CIS interviews Christopher Soghoian, cybersecurity researcher and activist, as part of the Cybersecurity Series</b>
<p><em>"We live in a surveillance state. The government can find out who we communicate with, who we talk to, who we are near, when we are at a protest, which stores we go to, where we travel to... they can find out all of these things. And it's unlikely it's going to get rolled back, but the best we can hope for is a system of law where the government gets to use its powers only in the right situation." – Christopher Soghoian, American Civil Liberties Union.</em></p>
<p>Centre for Internet and Society presents its first installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Christopher Soghoian, a privacy researcher and activist, working at the intersection of technology, law and policy. Christopher is the Principal Technologist and a Senior Policy Analyst with the Speech, Privacy and Technology Project at the American Civil Liberties Union (ACLU).</p>
<p>Christopher is based in Washington, D.C. His website is http://www.dubfire.net/</p>
<p><iframe src="http://www.youtube.com/embed/SQo4b-jTAWM" frameborder="0" height="315" width="320"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-1-christopher-soghoian</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:26:59ZBlog EntryCIS Cybersecurity Series (Part 22) - Anonymous
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous
<b>CIS interviews a Tibetan security researcher and information activist, as part of the Cybersecurity Series. He prefers to remain anonymous.</b>
<p><em>"I
don't know technology but I am aware of the information people share with me.
So yes, they can track you down through your mobile phone. The last time I was
in Nepal, I met a westerner. We went to this restaurant and she asked me to
take the battery out of the phone. That was the first time I had heard of this
and so when I asked why she said that it is possible that people had followed
us and it has happened to other Tibetans in Nepal..."</em></p>
<p>Centre for Internet and Society presents its twenty second installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic.</p>
<p><iframe src="https://www.youtube.com/embed/glsAFfj7tV4" frameborder="0" height="315" width="560"></iframe></p>
<p><em>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development Research
Centre, Ottawa, Canada.</em></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-22-anonymous</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-13T13:40:42ZBlog EntryCIS Cybersecurity Series (Part 23) – Justin Searle
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle
<b>CIS interviews Justin Searle, security expert, as part of the Cybersecurity Series.</b>
<p><em>"I think that people here in India, just like everywhere else, are broadening the areas where security can be applied. We see elsewhere, like in the United States and in Europe, that a lot of security researchers are starting to get into not just control systems, but also embedded devices and hardware and wireless... And we are seeing the same trends here in India as well. It is fun to see that growth and continual development, and not only that, but we are seeing security projects and research coming out of India, that's unqiue and fresh and contributing back to what originally came more from the United States and Europe."</em></p>
<p>Centre for Internet and Society presents its twenty
third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly
debated aspects of cybersecurity and hopes to encourage wider public discourse
around the topic. </p>
<p>Justin Searle is the managing partner for Utilisec.
Utisix provides security services to the energy sector. They also assist oil,
water, gas, and manufacturing companies. Justin specializes in security
assessments and finding vulnerabilities in systems. </p>
<iframe src="https://www.youtube.com/embed/ufOV8DXzQuA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber
Stewards Network with aid of a grant from the International Development
Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-23-2013-justin-searle</a>
</p>
No publisherpurbaPrivacyCybersecurityInternet GovernanceCyber Security FilmCyber SecurityCyber Security Interview2015-07-15T14:44:38ZBlog EntryCIS Cybersecurity Series (Part 8) - Jeff Moss
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss
<b>CIS interviews Jeff Moss, Chief Security Officer for ICANN, as part of the Cybersecurity Series.</b>
<p><em>"Most consumers don't understand the privacy trade offs when they browse the web... the data that is being collected about them, the analytics that is being run against their buying behaviour, it is invisible... it is behind the scenes... and so it is very difficult for the consumer to make an informed decision." - Jeff Moss, Chief Security Officer, ICANN.</em></p>
<p>Centre for Internet and Society presents its eighth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS interviews Jeff Moss. Jeff is the chief security officer for ICANN. He founded Black Hat Briefings and DEF CON, two of the most influential information security conferences in the world. In 2009, Jeff was sworn in as a member of the U.S. Department of Homeland Security Advisory Council (DHS HSAC), providing advice and recommendations to the Secretary of the Department of Homeland Security on matters related to domestic security. </p>
<iframe src="//www.youtube.com/embed/VuarlhLqBII" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-8-jeff-moss</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-30T09:25:44ZBlog EntryCIS Cybersecurity Series (Part 2) - Ram Mohan
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan
<b>CIS interviews Ram Mohan, a pioneer in the field of Internet security and internationalization, as part of the Cybersecurity Series</b>
<p><em>"In the Indian context, I think the government does have a significant responsibility to protect its citizenry from cybercrime. There is a greater need for the government to work with private industries as well as academic institutions to ensure a strong understanding of the threats unique to India. After all there are many threats that either originate in the context of the Indian sub-continent and are specific to India." - Ram Mohan, Executive Vice President, & Chief Technology </em><em>Officer of Afilias Limited.</em></p>
<p>Centre for Internet and Society presents its second installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Ram Mohan, a pioneer in the field of Internet security and internationalization. Ram Mohan is Executive Vice President, & Chief Technology Officer of Afilias Limited. He also serves on the Board of Directors of the Internet Corporation for Assigned Names and Numbers (ICANN).</p>
<p> </p>
<p><iframe src="http://www.youtube.com/embed/Riub6EIwCgk" frameborder="0" height="315" width="560"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<div><strong><em><br /></em></strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-2-ram-mohan</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:27:26ZBlog EntryCIS Cybersecurity Series (Part 3) - Eva Galperin
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin
<b>CIS interviews Eva Galperin, Global Policy Analyst at the Electronic Frontier Foundation (EFF).</b>
<p><i>"It is a vital tool for speaking truth to power. Unless you are able to speak anonymously, you are not really free to espouse unpopular ideas to people who have the power to do bad things to do... I think the value of anonymous speech vastly outweighs the difficulties that you can sometimes get into because people can speak anonymously. And on the whole, I think anonymity is worth protecting." - Eva Galperin, Global Policy Analyst at EFF. </i></p>
<p>Centre for Internet and Society presents its third installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>In this installment, CIS speaks to Eva Galperin, the Global Policy Analyst at the Electronic Frontier Foundation (EFF).She has worked for the EFF in various capacities for the last five years, applying the combination of her political science and technical background to organizing activism campaigns, and doing education and outreach on intellectual property, privacy, and security issues.</p>
<p>EFF homepage: <a href="https://www.eff.org/">https://www.eff.org/</a></p>
<div></div>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/BLtiuVX0nEM" width="560"></iframe></p>
<div></div>
<div>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
</div>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-3-eva-galperin</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyberculturesCyber Security Interview2013-08-01T09:55:23ZBlog EntryCIS Cybersecurity Series (Part 4) - Marietje Schaake
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake
<b>CIS interviews Marietje Schaake, member of the European parliament, as part of the Cybersecurity Series</b>
<div><em>"It is important that we don't confine solutions in military head quarters or in government meeting rooms but that consumers, internet users, NGOs, as well as businesses, together take responsibility to build a resilient society where we also don't forget what it is we are defending, and that is our freedoms... and we have learned hopefully from the war on terror, that there is a great risk to compromise freedom for alleged security and that is a mistake we should not make again." - Marietje Schaake, member of European parliament.</em></div>
<div><em><br /></em></div>
<div>Centre for Internet and Society presents its fourth installment of the CIS Cybersecurity Series.</div>
<div> </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</div>
<div> </div>
<div>In this installment, CIS interviews Marietje Schaake, member of the European Parliament for the Dutch Democratic Party (D66) with the Alliance of Liberals and Democrats for Europe (ALDE) political group. She serves on the Committee on Foreign Affairs, where she focuses on neighbourhood policy, Turkey in particular; human rights, with a specific focus on freedom of expression, Internet freedom, press freedom; and Iran. In the Committee on Culture, Media, Education, Youth and Sports, Marietje works on Europe’s Digital Agenda and the role of culture and new media in the EU´s external actions. In the Committee on International Trade, she focuses on intellectual property rights, the free flow of information and the relation between trade and foreign affairs.</div>
<div> </div>
<div>Marietje's website is: http://www.marietjeschaake.eu/</div>
<div> </div>
<p><iframe src="http://www.youtube.com/embed/F7IIHCu2D4g" frameborder="0" height="315" width="560"></iframe></p>
<p> </p>
<p><strong><em>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</em></strong></p>
<p><strong><em><br /></em></strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-4-marietje-schaake</a>
</p>
No publisherpurbaCybersecurityCyberspaceCyberculturesCyber Security Interview2013-07-12T10:24:14ZBlog EntryCIS Cybersecurity Series (Part 5) - Amelia Andersdotter
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter
<b>CIS interviews Amelia Andersdotter, member of the European parliament, as part of the Cybersecurity Series</b>
<p><i>"Normally a good security policy will also provide privacy to the citizen that is encompassed by the security policy. So things like encryption, for instance, bring a more secure communication, more private communication, where you are able to interact with other people on equal terms and you don't have to fear outside interference. And that is obviously good for both the individual and for security. But then of course, security policies can be framed in different ways. It depends on who you are trying to protect with the security policy. Are you trying to create a secure situation for a copyright holder, or are you trying to create a secure situation for a law enforcement officer, or for a private citizen?" - Amelia Andersdotter, member of European parliament.</i></p>
<p>Centre for Internet and Society presents its fifth installment of the CIS Cybersecurity Series.</p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p>Amelia Andersdotter is a Member of the European Parliament for the Pirate Party in Sweden. She works with industrial policy in the parliamentary committee of Industry, Research and Energy and is a substitute member of the committees for international trade, INTA, and budget control, CONT. Amelia is the Patron of the European Parliament Free Software User Group (EPFSUG), and also works in the delegations for the Andean community and Korean peninsula.</p>
<p>Amelia's website is: http://ameliaandersdotter.eu/</p>
<p> </p>
<p><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/RPh7RF2dkcw" width="560"></iframe></p>
<div></div>
<div>
<p><b><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</i></b></p>
</div>
<div><b><i><br /></i></b></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-5-amelia-andersdotter</a>
</p>
No publisherpurbaCyberspaceCybersecurityInternet GovernanceCyberculturesCyber Security Interview2013-08-01T09:54:14ZBlog EntryCIS Cybersecurity Series (Part 14) – Menaka Guruswamy
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy
<b>CIS interviews Menaka Guruswamy, lawyer at the Supreme Court of India, as part of the Cybersecurity Series.</b>
<div><em>"The courts have rarely used privacy to stop the Indian state from getting into someone's business. So jurisprudentially, it is a weak challenge when you mount a rights based or a privacy right challenge against surveillance by the state. Because the answer of the state to that has always been, and as has been Obama's answer in the United States, that there are national security concerns. And usually national security will trump individual privacy."</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fourteenth installment of the CIS Cybersecurity Series. </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, and a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India. She has law degrees from all three schools, with a focus on Constitutional Law and Public International Law. Guruswamy has worked at the Office of the Attorney General of India, the highest office that represents the federal government of India in the Supreme Court of India.</div>
<div> </div>
http://youtu.be/GCDD6Z-UrGI
<div> </div>
<div> </div>
<iframe src="//www.youtube.com/embed/GCDD6Z-UrGI" frameborder="0" height="315" width="560"></iframe>
<div>
<div><strong><br /></strong></div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
</div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-14-2013-menaka-guruswamy</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security Interview2014-07-21T10:39:03ZBlog Entry CIS Cybersecurity Series (Part 17) – Nishant Shah
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah
<b>CIS interviews Nishant Shah, researcher and academic, as part of the Cybersecurity Series.</b>
<p><em>“Given the political nature of social life in India, I always grew up thinking that I could speak my mind about anything to anybody unless they can hit me, more or less, and sometimes also to people who can hit me. So there has always been a very vibrant atmosphere, at least of expression, which is not necessarily a bad thing; it’s not only a good thing because it allows for, I don’t know, the first thing that comes to mind is hate speeches during the 1992 communal violences in Bombay. But it also allows for people to sit on a park bench, in a garden, at 4 o'clock in the afternoon and have a very strong critical reaction to whatever is happening around them, and sometimes it can be around celebrities, political figures, India's foreign policy and so on and so forth. I am saying that it would be unfair to think that people are not equipped to deal with questions of anonymous speech and the conditions that are necessary for it.”</em></p>
<p>Centre for Internet and Society presents its seventeenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Nishant Shah is the co-founder and director of research at the Centre for Internet and Society. He studies questions of governance, identity, planning and body at the intersections of digital technologies, law and everyday cultural practice. He is a visiting researcher at the Centre for Digital Cultures at Leuphana University, Germany, and an International Knowledge Partner on 'Youth, Technology and Change' with Hivos, Netherlands. He recently co-edited the four-volume book series "Digital AlterNatives with a Cause?" that captures discourse, practice and policy as it shapes and is shaped by youth driven, everyday practices of digital technologies and is currently working on looking at civic action in networked society. </p>
<iframe src="//www.youtube.com/embed/ea3kANxsEVE?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p><strong><br /></strong></p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-17-2013-nishant-shah</a>
</p>
No publisherpurba2014-07-31T05:48:14ZBlog EntryCIS Cybersecurity Series (Part 15) – Malavika Jayaram
http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram
<b>CIS interviews Malavika Jayaram, lawyer and researcher, as part of the Cybersecurity Series.</b>
<div><em>"So, civil society has a very interesting role in the whole internet governance debate because on one hand, they are the other ones are sort of pushing the agenda, and disseminating information and creating a public discourse around the shrinkage of the private sphere and free speech, but at the same time they, they are also the one most impacted by it. So the message that they are trying to get out is often the one that governments seek to filter at the first place. And they are most at harm.”</em></div>
<div> </div>
<div>Centre for Internet and Society presents its fifteenth installment of the CIS Cybersecurity Series. </div>
<div> </div>
<div>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </div>
<div> </div>
<div>Malavika works in the areas of privacy, identity, free expression and internet policy in India. She is a fellow at the Centre for Internet and Society in Bangalore, India and follows legislative and policy developments in the privacy and internet governance domains. She is also a Fellow at the Berkman Center for Internet and Society at Harvard University. </div>
<div> </div>
<iframe src="//www.youtube.com/embed/N_F5lpjt-VE" frameborder="0" height="315" width="560"></iframe>
<div> </div>
<div> </div>
<div><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></div>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram'>http://editors.cis-india.org/internet-governance/cis-cybersecurity-series-part-15-2013-malavika-jayaram</a>
</p>
No publisherpurba2014-07-07T13:34:36ZBlog EntryCIS Cybersecurity Series (Part 18) – Lobsang Gyatso Sither
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither
<b>CIS interviews Lobsang Gyatso Sither, Tibetan field coordinator and activist, as part of the Cybersecurity Series.</b>
<p><em>“The digital arms trade and the digital arms race, that is going on right now is a huge problem, in terms of what is happening around the world. A lot of people talk about digital arms like it’s just digital technology; it’s just surveillance technology; it’s just censorship technology; it’s just technology; it doesn’t kill anyone, but the fact of the matter is that it does kill. It’s as bad as a gun; it’s as bad as a weapon. It's the same thing in my opinion and it has to be restricted; it has to be curtailed, it has to be controlled so that it doesn’t go to places where there are no human rights and where there are rampant human rights violations. People know what it is going to be used for and it is going to be used for human rights violations and that is something that has be kept in mind before the whole aspect of digital arms trade and it has to be treated as any other arms trade</em>.”</p>
<p>Centre for Internet and Society presents its eighteenth installment of the CIS Cybersecurity Series. </p>
<p>The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic. </p>
<p>Lobsang Gyatso Sither is a Tibetan born in exile dedicated to increasing cybersecurity among Tibetans inside Tibet and in the diasporas. He has helped to develop community-specific technologies and educational content and deploys them via training and public awareness campaigns at the grassroots level. Lobsang works with key communicators and organizations in the Tibetan community, including Voice of Tibet Radio and the Tibetan Centre for Human Rights and Democracy.</p>
<iframe src="//www.youtube.com/embed/OtLkgoiTBeo?list=UUwD4YvZvns0xOedAnzt6CYA" frameborder="0" height="315" width="560"></iframe>
<p> </p>
<p><strong>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada.</strong></p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-18-2013-lobsang-gyatso-sither</a>
</p>
No publisherpurba2014-07-31T05:34:34ZBlog EntryCIS Cybersecurity Series (Part 20) – Saumil Shah
http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah
<b>CIS interviews Saumil Shah, security expert, as part of the Cybersecurity Series.</b>
<blockquote class="quoted" style="text-align: justify; "><i>“If you look at the evolution of targets, from the 2000s to the present day, the shift has been from the servers to the individual. Back in 2000, the target was always servers. Then as servers started getting harder to crack, the target moved to the applications hosted on the servers, as people started using e-commerce applications even more. Eventually, as they started getting harder to crack, the attacks moved to the user's desktops and the user's browsers, and now to individual user identities and to the digital personas.”</i></blockquote>
<p style="text-align: justify; ">Centre for Internet and Society presents its twentieth installment of the CIS Cybersecurity Series.</p>
<p style="text-align: justify; ">The CIS Cybersecurity Series seeks to address hotly debated aspects of cybersecurity and hopes to encourage wider public discourse around the topic.</p>
<p style="text-align: justify; ">Saumil Shah is a security expert based in Ahmedabad. He has been working in the field of security and security related software development for more than ten years, with a focus on web security and hacking.</p>
<h3 style="text-align: justify; ">Video</h3>
<table class="plain">
<tbody>
<tr>
<th><iframe frameborder="0" height="315" src="http://www.youtube.com/embed/2V39K8y68mc?list=UUwD4YvZvns0xOedAnzt6CYA" width="560"></iframe></th>
</tr>
</tbody>
</table>
<p><i>This work was carried out as part of the Cyber Stewards Network with aid of a grant from the International Development Research Centre, Ottawa, Canada</i>.</p>
<p>
For more details visit <a href='http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah'>http://editors.cis-india.org/internet-governance/blog/cis-cybersecurity-series-part-20-saumil-shah</a>
</p>
No publisherpurbaCyber SecurityInternet GovernanceCyber Security InterviewPrivacy2014-09-06T05:03:00ZBlog Entry