Sunteți pe pagina 1din 2

Centre for Development of

Advanced Computing

Seminar on
Business Impacts of Cyber Attacks &
Its Counter Measures
Wednesday, 19 March 2014: CII NR Headquarters, Chandigarh

Programme
1700 1715 hrs

Registration

1715 1845 hrs

Session on Changing Paradigms of How to Live & Thrive in Cyberspace


Numerous organizations have experienced significant attacks and breaches involving
both public and private sectors. Today, the world faces increasingly serious
consequences of a cyber-breach within critical infrastructures, including banking and
finance, energy, telecommunications, and essential government services. Weve
entered an age of interdependence. Insights - Critical areas of cyber security
affecting government, industry, and academic leaders throughout world. HighlightThe progress being made both domestically and internationally through cooperation,
including: government, business, and educational imperatives; how to address issues
involving cyber war.

1715 1720 hrs

Welcome Remarks

Mr Darpan Kapoor
Chairman, CII Chandigarh Council &
Vice Chairman, Kapsons Group

1720 1725 hrs

Overarching Remarks by
Session Chairman

Mr Sameer Goel
Past Chairman, CII Chandigarh Council &
Delivery Manager, Infosys Ltd

1725 1735 hrs

Setting the Context

Mr J S Bhatia
Executive Director
CDAC Noida

1735 1805 hrs

Introduction : Cyber Privacy and


Challenges

Mr Magesh Ethirajan
Director &
CDAC Hyderabad
Mr Ch A S Murty
Pr Tech Officer
CDAC Hyderabad

1805 1835 hrs

Business Confidentiality:
You Think You Own
Your Business?

Mr Niyam Bhushan
Independent IT Professional and
Consultant, New Delhi

1835 1840 hrs

Concluding Remarks

Mr Sameer Goel

1840 1900 hrs

Tea Break

1900 2035 hrs

Session on Implementing the Cyber Security Framework and Birds eye


view of Cyber Laws
Cybersecurity framework standards are security standards which enable
organizations to practice safe security techniques to minimize the number of
successful cybersecurity attacks. These guides provide general outlines as well as
specific techniques for implementing cybersecurity.

Know Gaining the institutional understanding to identify what systems need


to be protected, assess priority in light of organizational mission, and manage
processes to achieve cost effective risk management goals
Prevent Categories of management, technical, and operational activities that
enable the organization to decide on the appropriate outcome-based actions to
ensure adequate protection against threats to business systems that support
critical infrastructure components.
Detect Activities that identify (through ongoing monitoring or other means of
observation) the presence of undesirable cyber risk events, and the processes
to assess the potential impact of those events.
Respond Specific risk management decisions and activities enacted based
upon previously implemented planning relative to estimated impact. Birds eye
view on Government Initiative towards Cyber Crime Prevention and Cyber
Laws.
Recover - Categories of management, technical, and operational activities that
restore services that have previously been impaired through an undesirable
cybersecurity risk

1900 1905 hrs

Overarching Remarks by

Mr Pratap K Agarwal
Past Chairman, CII Chandigarh Council &
Managing Director, IDS Infotech Ltd

1905 1945 hrs

InfoSec in Practice:
Aligning Risk and Compliance

Mr Sastry Tumuluri
CISO & Consultant
Government of Haryana

1945 2015 hrs

Cyber Security to Cyber Intelligence Dr Maninder Singh


Professor
Thapar University

2015 2025 hrs

Information Technology Act, 2008 : Ms Geeta Gulati


Crimes under the Act,
Advocate
Case studies & Limitations
Punjab & Haryana High Court

2025 2030 hrs

Concluding Remarks

Mr Pratap K Agarwal

2030 2035 hrs

Vote of Thanks

Mr D K Jain
Director
CDAC Mohali

2035 hrs

Dinner

*****

S-ar putea să vă placă și