towards a (secure ? !) digital nation - nceg · 2018-04-20 · architecture, physical offices,...
TRANSCRIPT
![Page 1: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/1.jpg)
Towards a (Secure ? !) Digital Nation
Vision, Strategy and Roadmap
SanjayDeshpandeManagingPartner&ChiefScien1st
FortyTwo42LabsDate:9thJanuary2017
![Page 2: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/2.jpg)
The Structure
Real-Timee-Governance
[TheGoal]
DigitalTrust[Fidelity]
TheReality[Introspec=on]
TheVision[TheFuture]
TheStrategyandRoadmap
[GamePlan]Ac=onPlanandHope
![Page 3: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/3.jpg)
• UnitedKingdom:TimeboundprogramslaunchedforSecureSmartCi=esandFINTECHinnova=ons
• India:MassivepushforDigitalFinancialEcosystemandReal-Timee-Governance
• Switzerland:SwisscomSecureIOTnetwork
• SouthKorea:DeploymentofubiquitoussensornetworkdedicatedforIOTdrivenpublicservices
• Germany:Na=onalpriori=za=onforIndustry4.0
Key Global Initiatives in Secure Digital Transformations
![Page 4: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/4.jpg)
Towards a (Secure?) “Digital Na7onal” NextGenera=onStrategyforEconomicGrowth,GovernanceandPolicyExecu=on
![Page 5: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/5.jpg)
Makeeconomicenvironmentconduciveforinnova9onIns9tu9onbuilding,publicskilldevelopmentandtrainingEfficient,equal,transparent,servicesdeliverytoallci9zensCreateopendebateaboutacceptabilityofnewsystems,par=cularlyrelatedtoprivacy,safety,security,andresilienceCreateandsupportdynamic,compe99vemarket
Government’s Role in Accelerating Economic Growth
![Page 6: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/6.jpg)
PrimeMinisterShriNarendraModilaunchedtheDigitalIndiaprogramwithavision“totransformIndiaintoadigitallyempoweredsocietyandknowledgeeconomy”CoreAreas• Digitalinfrastructureasau=litytoeveryci=zen• Governance&servicesondemand• Digitalempowermentofci=zens• Digitaleconomy• Cyber-physicalengagement
The DIGITAL INDIA VISION
![Page 7: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/7.jpg)
Ref:LayneandLeeModelofe-Governance
eGovernment Maturity Model: Type 1
![Page 8: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/8.jpg)
Ref:AndersenandHenriksen
e-Government Maturity Model: Type 2
![Page 9: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/9.jpg)
Fidelity of Real-Time eGovernance
TransformingeGovernancetoReal-TimeeGovernance@theSpeedof“?”:Ci=zensareaveryimpa=entlotFidelityofeGovernanceanditsfundamentalroleWhataboutDigitalTrustandhowtoachieveit?
![Page 10: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/10.jpg)
IFWEDON’TFIXANDINSTALLANATIONALCYBERSECURITYINFRASTRUCTURE…WITHAMISSIONMODEPRIORITY….….WEAREHEADINGFORAMASSIVEDISRUPTIONINECONOMICGROWTH.PERIOD.
![Page 11: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/11.jpg)
DIGITAL TRUST Why,WhatandHow?
![Page 12: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/12.jpg)
PrivilegedandConfiden=alInforma=on12
Real-TimeeGovernanceneedstoensurefidelityoftheirdigitaltransac=ons,whiledeliveringdigitalservicesacrossvariouschannelstoitsusersinordertopreventcyberfraud.
What is Digital Trust?
![Page 13: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/13.jpg)
PrivilegedandConfiden=alInforma=on
Allthetransac=ngpar=esareauthen=cated
Transac=ondetailsareprivate
Transac=onisnotmodified/tamperedlater
Transac=ngPar=escannotdenythe
transac=oninthefuture
Transac=onisauthorized&verified
Mul9-PartyIDENTITY&
AUTHENTICATION
DynamicKeyDataENCRYPTION
EmbeddedDATAINTEGRITY
In-LineTransac9onSiging
NONREPUDIATION
WorkflowbasedAUTHORIZATION&
VERIFICATION
13
DeliveringTransac9onFidelitywithaSingleUnifiedTechnology.Seamlessly.
![Page 14: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/14.jpg)
The Reality Introspec=on
![Page 15: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/15.jpg)
• Theendusersofthee-GovernmentinfrastructureremainvulnerabletovarietyofthreatssuchasPacketSniffing,Probe,Malware,InternetInfrastructureAeacks,DenialofService(DOS)Aeack,RemotetoLocal(R2L)Aeack,UsertoRoot(U2R)Aeack
• Datathe],financial/digitaltransac9ona_acks,corrup=onofdata,defacement,extor=on,cyberbullying,intellectualpropertytheh,businessespionage.
• Governmentalins=tutesandcri=calinfrastructuresbearsignificantweightintheamountofaeackstheyencounter.
• Anaeackermayhavepoli9cal,economic,military,intellectualandfinancialaims.
• Mosthighimpacta_acksarenoworchestratedbyna9onstates.
Current Threat Landscape
![Page 16: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/16.jpg)
PrivilegedandConfiden=alInforma=on16
WeimportmostofthecybersecuritytechnologiesfromrestoftheworldTherearenoincen9vestructuresforbuildingindigenouscu`ngedgenextgenera9oncybersecuritytechnologiesAna9onalpriorityoncrea9ngarobustcybersecurityinfrastructureisfundamentallymissingAcultureofinnova9onandleadershipinbuildingbothdefenceand“a_ackfordefence”plabormsisdormantinspiteoftheavailabilityofvastamountoftalentandcapitalWeworkinsilosandgroups(whilethehackersworkcollec9velyasonevirtualunit)
Current Innovation Scenario
![Page 17: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/17.jpg)
PrivilegedandConfiden=alInforma=on17
LackofEnd-to-EndIden9ty,Authoriza9onandControlWorkflow
CostandComplexityofSecuritystSta9cSecurityPosture
PoorUsability
LowerAdop9onLoweradop=on,lowercustomeracquis=onandcannotbeprovisionedforalltransac=ontypes,customertypesandacrossalldigitalservicesduetocost.
Current Technology Scenario
![Page 18: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/18.jpg)
The Vision: Secure Hi-Fidelity Real-Time eGovernance LeadingtheWorldthroughCukngEdgeInnova=oninSecureCompu=ngandCommunica=ons
![Page 19: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/19.jpg)
To create a world-class secure and safe real-time eGovernance “ecosystem” that is built on top of a future proof, dynamic and evolving national cyber security infrastructure to protect the Citizens, the Financial, Industrial Ecosystem and Indian Defence from external and internal cyber threats to rapidly accelerate the economic growth of the country.
THE VISION
![Page 20: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/20.jpg)
Sohwaredefinedautomated,machinelearningadap=veagile
securitycontrolplalorm.
Adap9veDigitalControl
ControlLifeCycleManagement[Design,Provision,Opera9onalize,Monitor,Adapt]
So]wareDefinedControlModel
DigitalAssets[Transac9ons,IOT,Devices,Apps,Docs,Data]
So]wareDefinedIden9ty
Crypto-ID
PrivilegedandConfiden=alInforma=on20
Technology Vision : Towards Adaptive Security Control
![Page 21: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/21.jpg)
PrivilegedandConfiden=alInforma=on21
CryptographicIden=ty
UserIDsGoogle,Facebook,MobileNumber
EnterpriseIDsAccountNumber,
InternetBankingUserID
Users/Enterprises/
Things[Iden9tyChaining]
GovernmentIDs
Aadhaar,Passport,PAN
IDVxI-AM™Iden=ty
Verifica=onIndex
Iden==esareestablished
Transac=onisPrivate
Transac=onissealed NobodycandenyTransac=onisverified
IDENTITY ENCRYPTION DATAINTEGRITY
NONREPUDIATIONAUTHORIZATION
UnifiesEnd-UserIden99esEnablesIden9tyChaining
DynamicConfigurableVerifica9onIndexPKIGradeCryptoStrength
THE IDENTITY
![Page 22: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/22.jpg)
A Non-PKI Digital World::[An Example of Disruptive Innovation] @ FortyTwo Labs in Vizag
Computa=onally(QuantumCompu9ng)SecureCryptographicIden=ty
NoChainNoAuthority
MassivelyScalableSimpleCostEffec9ve
CredibilityBasedPeer-To-PeerTrustNetworks
UnifiedIden=tyModel
Media9onbasedIden9tyGenera9onandDistribu=onModel
Adap9veandEvolving
BEYOND PKI
![Page 23: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/23.jpg)
The Strategy and Roadmap A (7me bound!) Execu7on
![Page 24: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/24.jpg)
#1 End-to-End Integrated Adaptive Holistic Security Control Ecosystem
PeripheralDefense
NetworkDefense
HostComputersDefense
Applica=onProgramsDefense
DataDefense
PhysicalSecurity
![Page 25: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/25.jpg)
• Collabora9veModel
• Securingtheen9reinter-connectedchain
• CyberWarfareReadinessandAn9-Terrorism
• IntegratedReal-TimeCERTandCyberThreatIntelligence
• IndigenousPreven9on/Defense/A_ackSolu9ons
#2 Components of a Holistic End-To-End National Cyber Security Ecosystem
• BestinClassGlobaldetec9onsolu9ons&SIEM/SOC
• IncidentResponse(Tools,Processes,SkillsandValues)
• BusinessCon9nuityandDisasterRecovery
• PhysicalSecurity
![Page 26: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/26.jpg)
• Step1:Mapallthecri9calna9onaldigital(andsome9mesnon-digital)assetsvis-à-visthethreatvectors.Thismightincludesecurityprocedures,datastores,networkarchitecture,physicaloffices,centralservers,portabledevices.
• Step2:Conductadetailed/comprehensivena9onallevelthreatlandscapesurvey-thisanalysiswillhelpcreateacoherentriskmapthatenablescontrols,andsecuritymeasurestobeputintoplaceinanintelligentmannerwhiletakingintoconsidera=onthetruenatureoftheexposure.
• Step3:Iden9fyallthecontours/perimetersofdefense/a_ack–thisanalysisshouldcoveralltheusers,devices,applica=ons,servers,network,anddatacenter(hardwareandsohware).
• Step4:Define,ProvisionandEnforcePoliciesandrelevantsecuritytechnologiesforeachoftheassetsinthecontoursinrela=ontothecyberthreats
#3 Securing the National Digital Infrastructure : A Four Step Process
![Page 27: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/27.jpg)
• UserIden=tyandAuthen=ca=onPolicies/Technologies
• Device/IOTAuthen=ca=onPolicy
• DataEncryp=onStandards
• Applica=onDevelopmentProcess
• DataCenterAccessPolicies
• Applica=onandDeviceAccesspolicy
#4 Design and Deploy Holistic End-To End Security Controls
• Con=nuousThreatMonitoring
• Businesscon=nuitytechnologiesandpolicies.
• Iden=tyandAccessmanagementpoliciesandinfrastructure.
• Privilegedaccesscontrolpoliciesanddatabreach/leakagedetec=onandcontrol
SYSTEMSENGINEERINGAPPROACH
![Page 28: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/28.jpg)
• Na9onalCyberSecurityThreatindexshouldbedefinedandcomputedinreal-=meandcommunicatedtoalltheconcernedstakeholders.
• Suchanindex(likethestockmarket)willprovidethecurrent“temperature”ofthecyberthreattoalltheconcernedstakeholdersinreal-9meforthemtoac9vatetherequiredresponsestrategiesinreal-=metherebydras=callyreducingthethreatresponsereac=on=mes.
• TheNa9onal/StateLevelCyberSecurityIndexisareal-9memeasureoftherisktothecorporate,industrial,andgovernmentalinforma9oninfrastructurefromaspectrumofcybersecuritythreats.
• Itisbasedbothonthesen9mentaswellasreal9medatacollectedonthecyberthreatsfromacrosstheecosysteminrecogni=onoftherapidchangeincybersecuritythreatsandpostures,thestateofcybersecuritymetricsasaprac=calart,andthedegreeofuncertaintyinanyrisk-centeredfield.
#5 National and State Level Real Time Cyber Security Threat Index
![Page 29: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/29.jpg)
• CyberSecurityMaturityModelwillenablethestatetomeasurethecybersecuritymaturitylevelvis-à-visastandardmodel.
• Thesemodelscanbecustomizedforvariousdigitalen99eswithinthecybersecurityecosystem–ci=zens,enterprises,governmentdepartmentsandcri=calinfrastructure.
• Theoverallna9onalcybersecuritymaturitylevelcanbemodeledasanintegra=onoftheseindividualsub-models.
• Thestatecanfurtherenforce/recommendcompliancebyci9zens,enterprises,governmentdepartmentsinaccordancetothismaturitymodel.
#6 Cyber Security Maturity Model for eGovernance Ecosystem (CSM2 for eGov)
![Page 30: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/30.jpg)
CyberSecurityClusteris- anetworkofdedicatedcyberandinfosecurityspecialists,investors,start-ups,academia,researchins9tutes,privatelabscomingtogetheringroups
- whoac9velyworktocreateuniquesolu9onsandbuildIPfore-Governance,na9onalcri9calinfrastructuresecurityandothercommercialcybersecuritytechnologies.
# 7 Create World Class Cyber Security Clusters
![Page 31: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/31.jpg)
• TheseCybersecurityclusterswillactasacatalysttosupportthemembersoftheclusterbycommunica=ngstrategicini=a=vescri=caltostatee-Governanceimplementa=on
• Theywillprovideanetworkingplalormtoshareideasandbestprac=ce,canfindnewwaystogrowandspurinnova=onandtechnologyIPcrea=oninthefieldofcybersecurity.
• Specialistcybersecuritycompanies,labs,R&Dcenterswillbuildcybersecurityknowledge,skills,andcapabili=esintheregion,tomakebusinessesmoreresilienttocyber-aeacks.
• APGovt’sfastandcollabora=veapproachenablesandplacesAPGovt.tobealeaderinthefieldofcybersecurity.VizaghasalreadylaunchedIndia’sfirstCyberSecurityandFINTECHcluster.
# 7 Create World Class Cyber Security Clusters
![Page 32: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/32.jpg)
# 7 Create Frameworks and Policies for Secure IOT Infrastructure for Secure Smart Cities, Real-Time Sensor Data Networks for Agriculture and Home Land Security
• Ins=tu=onalizeandprovisionapolicyforsecuringIOTinfrastructuretoensurethesafetyofthecyber-physicalworld
• Set-upstateandna=onalLevelR&DCentersinaPPPmodeltodevelopnewsecuritymodelsandtechnologieswillberequiredtobeinnovated
• Iden=fycri=calinfrastructure(smartci=es,surveydata,agriculturedata,homelandsecurity/drones/surveillance)andsecurethemonhighestpriorityina=me-boundmanner
![Page 33: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/33.jpg)
Trustingovernmentisoneofthemostpreciousstateassets.Publicsupportcanhelpmobilizeambi9ousandinnova9vegovernmentpolicies.Necessarycybersecuritymeasuresmustbeincorporatedbydesignintothesystem.Aholis9ccybersecurityinfrastructureisthefundamentalbuildingblockontopofwhichsafeandsecureRealTimee-GovernancedeliverysystemscanbebuiltAPStateandVizagiswellpoisedtoleadthecountryandtheworld.Inordertofulfillthisvisionthestateleadershipwillhavetopriori9zeandallocatethenecessarybudgets,andexecutethecri9calcybersecurityrelatedini9a9vesina9meboundandmissionmode.
Way Forward The VIZAG Cyber Security Cluster
![Page 34: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal](https://reader034.vdocuments.us/reader034/viewer/2022042109/5e89e3329a546261064b637b/html5/thumbnails/34.jpg)
We should aim to be bold,
courageous, and innovative