ICT for Masses New Environment Opportunities and Threats

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Ministry of Interior of Montenegro,,The Fight against corruption and organized crime in Montenegro Ministry of Interior of Montenegro,,The Fight against.
CUBIC DEFENSE APPLICATIONS Security Summit Discussions Jeff Snyder Vice President, Cyber Programs Cubic Defense Applications.
E Europe and e L e a r n i n g European strategic answers to the challenge of the knowledge society Philippe Chauve, European Commission.
2012 Outlook for Federal Contractors Kevin Plexico Vice President, Federal Information Services Deltek, Inc. September 15, 2011.
IMPACT of the GLOBALIZATION PHENOMENA on HIGHER EDUCATION Ljerka Luić b4b, Zagreb, Croatia
June 15, 2005 Presented by Cabell Cropper Executive Director National Criminal Justice Association Grant Opportunities in the Justice Community Fiscal.
What is a Comprehensive Campaign? An intensive, organized fundraising initiative using a sequential process to secure philanthropic gifts (including but.
Visby Agenda – Creating Impact for an eUnion November 2009 se2009.eu/visbyagenda.
Office of Education and Sustainable Development The Challenge To Create A NOAA Education/Outreach Program.
Federal Office for Communications Digital Agenda for Europe Going local 2013: Switzerland.
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
Civil Society and Nuclear Disarmament – What Role Do We Play And What Responsibility Do We Hold?
Closing Plenary Dr. Les Lenert Wednesday, January 14, 2009.
ELearning: a Perspective from the University of the Air by Toshihiko Hayashi
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
National Information Communication Technologies Strategy Vasif Khalafov “National strategy” working group - Web -
FOWG-OGP On Access to Budget Information & Fiscal Transparency Portals Asia Pacfic Workshop - September 2015 Juan Pablo Guerrero
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
1 RIC 2009 Cyber Security at Nuclear Facilities Scott A. Morris Office of Nuclear Security & Incident Response March 11, 2009.
Campus-Wide Budget Forum December 10, Discussion Topics Context in terms of global, national, and state economic environments UW responses to date.
EM-1 Office of Environmental Management SAFEGUARDS AND SECURITY Post September 11 events have required EM to increase the level of protection at DOE sites.
Social Exclusion in an Information Age Multimedia Training Kit.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
By. Andrew Largent COSC-480. Upstream Intelligence (UI) is data about IP’s, domains and Autonomous System Numbers (ASN) acting or representing the presence.
ADDRESS BY MINISTER OF COMMUNICATIONS Dr Ivy Matsepe-Casaburri LAUNCH OF ELECTRONIC COMMERCE POLICY July 1999.
Broadband Challenges 2017 Christopher Tamarin
Smart Living Ali Hosseini / SenRa.
What is Happening in Washington?
Community Foundation of the Ozarks Philanthropy Initiative Phase II
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Aerospace and Defense Market in India to hit $23bn by 2024.
Institute of modern technology Montenegro - IMTM
Almaty, Kazakhstan 27 September, 2016
Crisis management related research at
Elements for an AGORA Studio
NSF Commitment to Diversity NAC Meeting September 16, 2017
Chancellor Pam Shockley-Zalabak
E-commerce and E-logistics Trends from an European perspective
The Middle East Cyber Threat Index
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Michael Nawrocki, Vice President of Technology and Solutions ATIS
America’s First National Critical Infrastructure Exercise
The MITRE Corporation Team
Content ICT ecosystem - challenges of national public policy and regulation in competitive global markets Linkages between regulatory environment and.
Overview Transition State of CDC IT CDC IT Strategic Plan
Day One Activities Day Two Activities Strengths and Challenges –
Trust and Security Unit
Internet Governance -Government Perspective
I UNDERSTAND CONCEPTS OF CYBERSECURITY
Committed to connecting the world
Industry Overview The global AI in cyber security market is predicted to grow at 35.0% CAGR during the forecast period with the market size reaching USD.
Cyber Security Ecosystem of Georgia. Experience and Challenges
Securing free and fair European elections
APNIC Foundation Update
World-Leading Research with Real-World Impact!
Community of Users.
Commonwealth Cyber Initiative (CCI)
New Services for Ageing Well in the Information Society
Institute for Cyber Security Overview
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
S&T Main Focus Areas Linkages to 2018 NDS
Cyber Security R&D: A Personal Perspective
Funding Rates at NSF June 2016.
DistanceLearning.edu.in is a portal focused on distance learning courses where you can see a lot of courses starting from Certificate level to Masters.
5th PASET Forum Kigali, Rwanda| May 22, 2019
Innovation policy for sustainable development by Azerbaijan Rashad Azizov Head of Innovational Development Department Ministry of Transport, Communication.
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

ICT for Masses New Environment Opportunities and Threats PTC India Foundation Mid-Year 2016 Seminar Friday, 23 September 2016 by Prof. Rakesh Mehrotra

New Environment Two different domains Real world and Cyber world How the rules of real world control the cyber world A lot of development and new services but we have seen only 5% of internet sofar Machine to Machine Communication Artificial Intelligence AI based Prediction and preemption

All personal, organizational and state information will pass through broadband networks and becomes transparent Threat to global society due to state sponsored non-state actors How to protect personal, organizational and national security related information Scary situation Even US Administration has raised alarm and taking emergent actions. What we can do from Indian perspective?

The Comprehensive National Cybersecurity Initiative In December 2015 US Cyber Security Act was passed In Feb 2016 US$ 3.1 billion Information Technology Modernization Fund was sanctioned National Cybersecurity Awareness Campaign Invest over $19 billion for cybersecurity as part of the President’s Fiscal Year (FY) 2017 Budget. Commission on Enhancing National Cybersecurity FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT STRATEGIC PLAN