3
Centre for Development of Advanced Computing Seminar on Business Impacts of Cyber Attacks & Its Counter Measures Wednesday, 19 March 2014: CII NR Headquarters, Chandigarh Programme 1700 – 1715 hrs Registration 1715 – 1845 hrs Session on Changing Paradigms of How to Live & Thrive in Cyberspace Numerous organizations have experienced significant attacks and breaches involving both public and private sectors. Today, the world faces increasingly serious consequences of a cyber-breach within critical infrastructures, including banking and finance, energy, telecommunications, and essential government services. We’ve entered an age of interdependence. Insights - Critical areas of cyber security affecting government, industry, and academic leaders throughout world. Highlight- The progress being made both domestically and internationally through cooperation, including: government, business, and educational imperatives; how to address issues involving cyber war. 1715 – 1720 hrs Welcome Remarks Mr Darpan Kapoor Chairman, CII Chandigarh Council & Vice Chairman, Kapsons Group 1720 – 1725 hrs Overarching Remarks by Mr Sameer Goel Session Chairman Past Chairman, CII Chandigarh Council & Delivery Manager, Infosys Ltd 1725 – 1735 hrs Setting the Context Mr J S Bhatia Executive Director CDAC Noida 1735 – 1805 hrs Introduction : Cyber Privacy and Mr Magesh Ethirajan Challenges Director & CDAC Hyderabad Mr Ch A S Murty

Cyber Security - Programme

Embed Size (px)

DESCRIPTION

cyber security

Citation preview

Page 1: Cyber Security - Programme

Centre for Development ofAdvanced Computing

Seminar on Business Impacts of Cyber Attacks &

Its Counter MeasuresWednesday, 19 March 2014: CII NR Headquarters, Chandigarh

Programme

1700 – 1715 hrs Registration

1715 – 1845 hrs Session on Changing Paradigms of How to Live & Thrive in CyberspaceNumerous organizations have experienced significant attacks and breaches involving both public and private sectors. Today, the world faces increasingly serious consequences of a cyber-breach within critical infrastructures, including banking and finance, energy, telecommunications, and essential government services. We’ve entered an age of interdependence. Insights - Critical areas of cyber security affecting government, industry, and academic leaders throughout world. Highlight- The progress being made both domestically and internationally through cooperation, including: government, business, and educational imperatives; how to address issues involving cyber war.

1715 – 1720 hrs Welcome Remarks Mr Darpan KapoorChairman, CII Chandigarh Council &Vice Chairman, Kapsons Group

1720 – 1725 hrs Overarching Remarks by Mr Sameer GoelSession Chairman Past Chairman, CII Chandigarh Council &

Delivery Manager, Infosys Ltd

1725 – 1735 hrs Setting the Context Mr J S BhatiaExecutive DirectorCDAC Noida

1735 – 1805 hrs Introduction : Cyber Privacy and Mr Magesh Ethirajan Challenges Director &

CDAC Hyderabad

Mr Ch A S Murty Pr Tech OfficerCDAC Hyderabad

1805 – 1835 hrs Business Confidentiality: Mr Niyam BhushanYou Think You Own Independent IT Professional and Your Business? Consultant, New Delhi

1835 – 1840 hrs Concluding Remarks Mr Sameer Goel

1840 – 1900 hrs Tea Break

Page 2: Cyber Security - Programme

1900 – 2035 hrs Session on Implementing the Cyber Security Framework and Bird’s eyeview of Cyber LawsCybersecurity framework standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cybersecurity attacks. These guides provide general outlines as well as specific techniques for implementing cybersecurity.

• Know – Gaining the institutional understanding to identify what systems need to be protected, assess priority in light of organizational mission, and manage processes to achieve cost effective risk management goals

• Prevent – Categories of management, technical, and operational activities that enable the organization to decide on the appropriate outcome-based actions to ensure adequate protection against threats to business systems that support critical infrastructure components.

• Detect –Activities that identify (through ongoing monitoring or other means of observation) the presence of undesirable cyber risk events, and the processes to assess the potential impact of those events.

• Respond – Specific risk management decisions and activities enacted based upon previously implemented planning relative to estimated impact. Bird’s eye view on Government Initiative towards Cyber Crime Prevention and Cyber Laws.

• Recover - Categories of management, technical, and operational activities that restore services that have previously been impaired through an undesirable cybersecurity risk

1900 – 1905 hrs Overarching Remarks by Mr Pratap K AgarwalPast Chairman, CII Chandigarh Council &Managing Director, IDS Infotech Ltd

1905 – 1945 hrs InfoSec in Practice: Mr Sastry TumuluriAligning Risk and Compliance CISO & Consultant

Government of Haryana

1945 – 2015 hrs Cyber Security to Cyber Intelligence Dr Maninder SinghProfessorThapar University

2015 – 2025 hrs Information Technology Act, 2008 : Ms Geeta GulatiCrimes under the Act, AdvocateCase studies & Limitations Punjab & Haryana High Court

2025 – 2030 hrs Concluding Remarks Mr Pratap K Agarwal

2030 – 2035 hrs Vote of Thanks Mr D K JainDirectorCDAC Mohali

2035 hrs Dinner

* * * * *