secureit 2013 event report
TRANSCRIPT
-
8/14/2019 SecureIT 2013 Event Report
1/8
EVENT SecureIT 2013
58 egov / egov.eletsonline.com / April 2013
Te 4thSecureI 2013, the National Conerence on IC in Public Saety, Security and Disaster Management, took place at Te Oberoi,New Delhi, on March 8, 2013. Te conerence was presented by eGov Magazine and jointly organised by Elets echnomedia Pvt Ltd andCentre or Science, Development and Media Studies (CSDMS).
Te SecureI 2013 saw healthy debate on new technology applications and services that are already being or will be deployed in utureto improve national security and moderate the afermath o natural and manmade disasters. Tere were discussions on critical issuessuch as threat o cyber terrorism, data security, security against malware and use o IC in border security.
National Security is a vast subject, but the SecureI 2013 did manage to bring to light some o the most innovative ideas or nationalsecurity and effective disaster management.
Developing a road map for NationalSecurity and Disaster Management
EVENT SecureIT 2013
58 egov / egov.eletsonline.com / April 2013
-
8/14/2019 SecureIT 2013 Event Report
2/8
SecureIT 2013 EVENT
59April 2013 / egov.eletsonline.com/ egov
Te concept o state has originated rom security because people want tohave security. In due course o time that concept became the concept ostate and kingdom. Tere are three type o security physical security,security in the financial wealth and the intellectual property.
In physical security each and every person should be well protected
against all kinds o problems and aggression. Secondly, there is the aspecto security in the field o finances; this means that each and every personshould be able to secure his or her wealth, whether it is in digital ormor in physical orm. And the intellectual property. We have to ensurethat intellectual property is also secured. In all these three areas IC canplay a very important role. We got to create large number o awarenessamong people regarding cyber security.
I we want to grow, the citizens o that society must have the sense osecurity. oday IC is playing a vital role in creation o security systemsbeing used around the world. We have to try to come with a mechanismthat will ensure that all human beings are secured.
In case o terrorism and anti-social elements, we can make use o digi-
tal cameras, we can make use o UAVs. In all these systems IC can playa very very important role. Te MHA and lot o other departments andorganisations are working on this area and i we can create a collaborativeplatorm where academia, industry, bureaucracy and the implementingagencies get together, we may find solutions to many o these problems.
Te nature o external threat has changed over the years. Tesecurity threat due to cyber aspects have become ar moreimportant as compared to the physical aspects. We have to takethe new technological developments into account and accordinglyorumate our strategies.
I think there is need or much greater awareness, consciousnessand preparedness in our security ramework. Tis is true on aglobal scale. Governments are starting to become aware o thethreats that emanate rom cyber verticals. In order to saeguard ournational interests we have to prepare ourselves ully or meetingnew challenges in the cyberspace.
I think there is need or much greater awareness, consciousness
and preparedness at all levels at the operational level, strategiclevel and policy level. Tere needs to be awareness about theimplications o cyber security, how it is transorming the nature owarare, the nature o threats internal and external.
In February 2013, the European Union issued ComprehensiveNew Cyber Security Directives, which mandate all its membercountries to put in place new and comprehensive cyber securitymeasures. India too needs to update its systems or meeting thecyber security threats.
Shankar Agarwal
Additional secretary, Ministry of Defence,
Government of India
Rajiv Gauba
Additional Secretary, DeitY, Ministry of
Communications & IT, Government of India
-
8/14/2019 SecureIT 2013 Event Report
3/8
EVENT SecureIT 2013
60 egov / egov.eletsonline.com / April 2013
e-Governance is
All about Inclusive
Growth????
When you monitor everybody, you and me are also getting monitored
and then we come to the privacy issues. We come to the question of
who is going to monitor the people who are monitoring us? Because
so long as the crooks are doing it, we have the police to sort them out.
And when look at privacy issues I think these issues are of very serious
concern. It involves human rights.
Maj Gen Dhruv C Katoch,SM, VSM (Retd), Director, Centre for
Land Warfare Studies (CLAWS)
By 2001 and 2002 we found that most of the crimi-
nal elements and most of the terrorists are making
use of the Internet, which we could not follow at
that point of time. Technological preparedness can
do more for securing the nation than our physicalpresence at the borders. We have now started
taking a serious look at the issues of cyber security
for securing the nation on this new frontier.
ArunChaudhar
y
DirectorGenera
l,
SashastraSeem
aBal
Dr Ashwini Kumar Sharma
Managing Director, NIELIT
Cyber-crimes are new class of
crimes. The government of India is
planning that services have to be
delivered at the doorstep of the citi-
zens. It has to be ensured that it is
done in a transparent way. Now we
have to go for a system where we
can go for periodic or non-periodic
survey of making a system secure.
Alok Tripathi
Joint-Director, NIELIT
Capacity building in IT security
and cyber crime and forensic is
quite different from the traditional
IT environment. For traditional IT
environment, we need IT infra-
structure, we require people to be
trained, we require software and
tools and then the trainer has to
train the people.
A K Sharma
Director, Delhi Fire Service
Saving life in a blazing fire situa-
tion is a tedious task. Technology
can make the work of firefighters
much safer. Fire services must
utilise the latest technology in the
field. GPS and GIS can be put effec-
tively in our day-to-day activities.
-
8/14/2019 SecureIT 2013 Event Report
4/8
SecureIT 2013 EVENT
61April 2013 / egov.eletsonline.com/ egov
We have very regular dialogue with the homeland security department.
Ministry of Home Affairs is the nodal agency for dialogue on various
aspects of airport security, counter terrorism or border management. It
is happening regularly between India and Washington and we learn lot
of things from them. We learn about how systemically they have made
changes in their processes, all this is very helpful to us.
Loknath Behra,Inspector General of Police, National
Investigating Agency
Security is never perfect. The matter is how do we
secure our things with available technologies. There
will always be a next generation technology, more
powerful, more costly. Privacy and security comes
at the cost of the other. These are the huge chal-lenges that we must address in the coming years.
DrGovind
SeniorDirector,
DeitY
,
GovernmentofIndiaand
CEO
,NationalIn
ternet
ExchangeofInd
ia(NIXI)
Dr Hanuman Prasad Shukla
Director, National Institute ofElectronics and Information
Technology (NIELIT)-Gorakhpur
We need to implement innovative
strategies for safeguard the nation.
We have to out-think the attacker
and predict his next step.
Maj Gen (Dr) J K Bansal
Member, National DisasterManagement Authority
Disaster management definitely
needs technology. Whatever
technology we develop, it should
be used and implemented. First
and foremost, technology should
be made available to all those
who are involved in disaster
managemet.
Col KPM Das
Vice President, National Secu-rity Solutions, Cisco Systems
The proposition here is that while
the systems are getting deployed,
there should be an underlying
assurance that all the security
related systems are being imple-
mented. The gaps in the network
level should not be exploited by
criminals and aliens.
-
8/14/2019 SecureIT 2013 Event Report
5/8
EVENT SecureIT 2013
62 egov / egov.eletsonline.com / April 2013
For tidal observation we have got 125-year old data. In most of the
sea ports there is tidal observatory. These are online transmitted to a
national data centre and integrated with the national GPS data centre
so that the locations and data are located in real time and it is available
to all user groups in real time.
Major General Ramesh Padhi
Military Survey (MoGSGS)
The whole idea of passport seva project is people
centric. It is service oriented project. This has
set a high benchmark for the country to emulate
in terms of swift project execution. It is a truly
universal and global project. It can happen in
India or Guatemala, where we have our embassy
or consulate, you will serviced through the same
application and same portal. The project has thus,
global footprint.
MukteshKPardeshiJoint
Secretary(PSP)
&Chief
PassportOfficer,Ministry
ofExternalAffairs
,Govern-
mentofIndia
M Moni
Deputy Director General ,National Informatics Center,
Government of India
National animal disease reporting
system and the other one is national
database on fishing vessels. There
are 200,000 fishing vessels which are
operational and this database is being
used by Navy, coast guards, marine
police and is being used by all organisa-
tion associated with marine fishing.
Lt General Rajesh Pant
VSM, Commandant, MilitaryCollege of Telecommunication
Engineering
The three issues of concern for the
future of information security profes-
sional the first one is a convergence
of the electronic warfare and cyber
security. Second aspect is related to
embedded malware. And the third one
is insider attack, or the man in the
middle becoming a vehicle for attack.
Dr Rajendra Kumar
Joint Secretary, DeitY,Government of India
Now that we have multiple serviceproviders, vendors, implementers,
we are grappling with major securityrelated issues. Different vendors may
enter at different points of time andthey may follow different procedures,
which may be relevant at that pointof time, but with passage of time they
lose relevance. These proceduresneed to be changed and advanced.
-
8/14/2019 SecureIT 2013 Event Report
6/8
SecureIT 2013 EVENT
63April 2013 / egov.eletsonline.com/ egov
We cannot say that we can eliminate threat or breaches. These things
will always be there no matter how secure we become. But we have to
see that the breach, which has been done in any organization cannot
harm the organisation.
Ruchin Kumar
Security Evangelist, SafeNet India Pvt Ltd
Cyberspace does not require a passport, it does
not have a national boundary. The risk today is
huge; the consequences of any criminal activity
can be quite significant and even disastrous. This
is because the systems are being managed andrun through software soloutions. These software
solutions can be targetted remotely leading to lot
of damage.
RaviSaxena
AdditionalChief
Secretary
,Department
ofScience&Tec
hnology
,
GovernmentofGujarat
Rajesh Agarwal
Secretary IT, Government ofMaharashtra
Mostly we think of cyber security
as something that is equivalent to
fighting an external attack, but the
truth is that the cyber security is
being fought within the systems.
Today any database in the country
is purchaseable, and that is the
reality.
Renu Budhiraja
Sr Director & HOD State DataCentres, e-Governance, DeitY,
Government of India
When you talk about e-Governance
scenario, the security has to be dealt
end-to-end. It is a big challenge.
The number of infected computers
is enormous, 20 lakh plus. That is
the challenge we need to look and
address. There is also issue regarding
implementation of security policies.
Ram Narain
Deputy Director General(Security), Department of
Telecom, Ministry of Communi-
cation and Information Technol-
ogy, Government of India
We have one philosophy and
principle. The philosophy was that
let us build in security into the
system rather than having add-on
feature into it.
-
8/14/2019 SecureIT 2013 Event Report
7/8
EVENT SecureIT 2013
64 egov / egov.eletsonline.com / April 2013
For the last three years, I had been managing Delhi traffic. The traffic
police is prosecuting around 10,000 people every day and the act,
which governs traffic enforcement is Motor Vehicle Act 1988 and I think
it looks ridiculous that every time a traffic offender is caught he is
caught as a first offender because there is no digitization of facts.
Satyendra Garg
Inspector General of Police, Mizoram
I look at cyber security from three different
angles one is application security and
the user, second is system security and the
third is network security. If we have to have
secured networks, it is essential we haveend-to-end security. It is essential for each
user to be fully educated.
LtGeneralSP
Kochhar
AVSM
,SM
,VSM
,Signal
Officer-in-C
hief
&Senior
ColonelComma
ndant
S Suresh Kumar
Joint Secretary (Centre-State),Ministry of Home Affairs,
Government of India
Looking at a country like India, with
different culture, different milieu,
If anyone wants to do a project, he also
has to look at in terms of what is going
to be the evolving technologies, can you
do it within three years in a very very
very close fashion. Any optimism and
ambition in that process is not called for.
Subrata Das
Industry Director, PublicServices, SAP India
SAP tries to address community
preparedness, volunteer manage-
ment and critical area infrastruc-
ture management.
Sajan K Paul
Director Systems Engineer-ing India & SAARC, Juniper
Networks
We are doing device tagging, we
are going beyond IP address. If the
hacker is coming from website, we
can actually inject (even with his
privacy settings on) around 20 plus
cookies into his browser and then
track him from other areas.
-
8/14/2019 SecureIT 2013 Event Report
8/8
SecureIT 2013 EVENT
65April 2013 / egov.eletsonline.com/ egov
V L Kantha Rao
President & CEO,
National e-Governance
Division (NeGD), DeitY,
Government of India
We have lot of infrastruc-
ture and applications in
the e-governance domain.
We have realised that
the measures regarding
the cyber security in the
egovernance domain is
piecemeal.
Vikas Yadav
Senior Sales Engineer,
Websense
We should have modern
security for modern
threats. Threat comes
from outside to inside, we
should also analyse what
is going from inside to
outside.
BJ Shrinath
Senior Director, CERT-
In, DeitY, Governmentof India
Awareness about cyber
security can make a lot
of difference and I think
thats what w all should
be doing. Technology in
one hand gives you the
freedom but on the other
hand it immediately takes
away your freedom that
you will not realize.
Puneet Ahuja
Senior TechnicalConsultant, Juniper
Networks
The security threat
approach has to be two-
leveled approach one is
the service provider level
and second at the enter-
prise level. Data passing
from one organization to
another should be logged
somewhere.
We are looking for location finders. Once we get the exact location
through GPS it is not difficult for us. So technology and innovation
can make a great difference in disaster response and disaster pre-
vention. There is a lot to be done in integrating technology with the
security system.
PM Nair
IPS, Director General, National Disaster Response Force
The statistic shows that insider attacks count
for as much as 85 percent of computer
internet related crime. Out of these majority
of the insiders are priviledged users and
a large number of attacks occur throughthem. Most of the attacks are due to weak
authentication. Authentication in the security
arena is a very big player.
VibhaAgrawal
VicePresident,
GovernmentVertical,
CATechnologies