EFY Times  
Sunday, October 04, 2015

On National Cyber Security Policy 2013 - From Jay Bavisi - Winner Of Industry Leadership Award 2013 Awarded By National Security Agency (NSA)
Home >> Infotech >> Awards and Recognition                                                                                PRESS RELEASE
On National Cyber Security Policy 2013 - From Jay Bavisi - Winner Of Industry Leadership Award 2013 Awarded By National Security Agency (NSA)  
Rate this news:  (1 Votes)
Wednesday, July 03, 2013 This policy was much needed and this initiative by the Government was long overdue. With 13,000 cyber attacks witnessed in India in 2011 and 10,000 email ids of top government officials targeted on a single day in July 2012 it is critical to address the cyber issues that are creating a menace is the country. Industry data states that more than 1,000 government websites, storing critical and sensitive data concerning national security, have been hacked by cyber criminals in the last three years. This cannot be the state of the software and outsourcing capital of the world.

Also, to achieve the objectives mentioned in the policy, it is important to understand, India needs the required expertise of trained security professionals to support the national needs. India, like many countries of the world is struck by a cyber plague and India needs to be ready with a robust cyber vaccination program to eradicate or at least control it. One of the solutions to curb this menace is to, use an active vaccine - i.e., to provide the necessary security education and training to the technical community and to inject them into our critical infrastructure. That will help us achieve what we as a nation have set out to do via the new policy, framework and infrastructure.

Consulting over 100 Governments across the globe, Jay Bavisi brings a global perspective on the subject. He has recently won an award from National Security Agency USA (NSA) for Leadership in the Cyber Security Industry. The only Indian and non US citizen to win this award.

EC-Council is one of the world’s largest certification bodies for Information Security professionals and Jay brings in a complete perspective on the state of Cyber Security in India, a global outlook and trend of ethical hacking, cyber crime and the need of security programmers in India and globally, and how India compares to US and China. He has spoken on the subject at various forums internationally and has also been on FoxNews , CNN among other media.

Formed following the 9/11 incident, EC-Council addresses issues of cyber terrorism raised at the forefront of security of nations at large. It is the owner and developer of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), Secure Analyst (ECSA), and Licensed Penetration Tester (LPT) programs. These programs are offered in over 92 countries and over have trained over 120,000 & certified more than 60,000 security professionals through a training network of over 500 training partners globally.

EC-Council (International Council of E-Commerce Consultants) is world’s largest certification body for Information Security professionals. EC-Council is a member-based organization that certifies individuals in various information security and e-business skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs. These programs are offered in over 92 countries and over have trained over 120,000 & certified more than 60,000 security

professionals through a training network of over 500 training partners globally. The certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). The United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP). Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations. EC-Council has also been featured in internationally acclaimed publications and media.

Print Email Post Comment 
(Total Views: 1347)

Infotech News
Ingram Micro Capitalizes On Cloud Service Adoption, Extending "CSP Accelerator" Worldwide Promotion
Radiall And FCI Announce Joint Partnership For OCTIS
CRAIC Technologies Goes Beyond With Photoluminescence Microspectroscopy
Asus joins the “Make in India” initiative
Mindteck Chooses AuthShield Multifactor Authentication For Authentication Security
Most popular


Latest Release Of Powerful 3D Design Applications Portfolio Introduces New User Interface, Features And Enhanced Capabilities For Design
Matrix To Showcase Its Comprehensive Range Of Security Solutions At IISE, Delhi 2015
L-Com Introduces Cat6a Lightning And Surge Protector For 10/100/1000/10000 Ethernet Applications
Convergence Will Be The Game Changer, Disrupting And Transforming Business In The Subcontinent - Notes Frost & Sullivan
Radiall And FCI Announce Joint Partnership For OCTIS
RenXSol Offer Hybrid Solar Solution Options To Meet BESCOM Power Cuts And Also Benefit From BESCOM Net Metering Policies
Ingram Micro Capitalizes On Cloud Service Adoption, Extending "CSP Accelerator" Worldwide Promotion
LabBazaar, Exclusive E –Marketplace For Quality Testing And Calibration Equipments Now Launched
MedSys Group, LLC Awarded Defense Healthcare Management System Modernization Program Subcontract
OTA Radiated Performance Capacity And Capabilities Expanded At SGS North America


Registrations Open for OSI Days 2015, Asia's Largest Show on Open Source
China’s Home Grown Operating System Is A Windows XP Clone
5 Tips To Boost Your Home WiFi
Will WhatsApp Ever Land On Ubuntu?
5 Ways Microsoft Office 2016 Can Make Your Life Easier
Apogee Electronics Receives 3 TEC Award Nominations For Audio Recording Products
Linux Kernel 4.2.2 Now Available For Download
'Made In India' Forgotten Over A Newly Launched Foreign Product
Parsix GNU/Linux 8.5 (Atticus) To Be Based On GNOME 3.18
New Version Of Vivaldi Released With Major Changes
Infosys Joins Hands With General Electric To Bring New IoT Solutions
5 Devices Unveiled At Yesterday's Google Event
More Secrets Of OTA-7 Revealed
HID Global Drives The Evolution Of Secure Identity Solutions At ASIS 2015
Ubuntu To Receive Updates Even After Its Stable Release
OpenShot 2.0 Open-Source Video Editor To Be Launched Soon


5 Ways Microsoft Office 2016 Can Make Your Life Easier
Microsoft Office 2016 is a comprehensive solution that is designed to make your work life easier....
5 Ways To Speed Up Your Mac
Sluggish computing experience is frustrating. Here are 5 ways to help you speed up your Macintosh computer....
5 Tips To Boost Your Home WiFi
You can get the most out of your home WiFi by using simple tricks....
5 Unique Features Of Microsoft Office 2016
Office 2016 brings tons of new features and apps to boost productivity of users....
Top 5 Heroes Of The Linux World
The world of open source is driven by key people who control it....
Top 5 Open Source Software Foundations
Open Source projects are supported and promoted by Open Source Software Foundations. ...
Top 6 Plugins And Extensions For Gmail
These Gmail extensions can boost your email productivity....
6 Hidden Design Features In Apple Products
Apple is known for paying keen attention to design aspects of Apple products. ...
5 Technologies That Tick Off Linus Torvalds
Linux creator is known for making harsh comments on technologies that don't appeal to him!...
Top 5 Open Source Storage Solutions
The right storage solution is crucial for business. Open source tools can minimize the investment cost....
5 Ways To Get Student Contributors For Open Source Project
Community managers are always keen on attracting student volunteers to open source project!...
5 Open Source Alternatives To Gmail
Here are open source webmails that are as good as Gmail!...
Five Simple Reasons Why We Love iPhones
Apple is all geared up for its much hyped event on September 9. While the countdown has already begun, we bring you five simple reasons why we are in ...
QuickHeal Detects New Dangerous Computer Malware
This malware can breach sandbox protection of computers....
Hack 2.0, An Open Source Typeface Is Here!
Bring design to your source code with this open source typeface....
  View All
Meet Pranjal Saxena, India's 21 Year Old Electronics Wizard
Milan Ondhia of EFYTimes was in a forthright conversation with the 21 year old Pranjal Saxena from New Delhi; an aspirant at the WorldSkills meet, in ...
“We Offer Managed Document Solutions To CIO And IT Decision Makers”: Canon
Manufacturing within the country will surely reduce the cost of our devices, but manufacturing can begin only if there is the desired eco-system and w...
“One Day The End User Can Open Up A Used Battery, And Use What’s Inside As Barbecue Sauce”
Of course that is not something currently possible, but what B&B Batteries does have are some secret recipes for their very specialised battery design...
We Wish To Procure All The LED Components Within India: Avni Energy
G. Gururaja, director, Avni Energy Solutions Pvt Ltd, shares his views about the expanding LED industry in the Indian market and the company's plans i...
We Have Registered 50 Per Cent Growth In The Last Two Years: Arihant Lighting
Apart from LEDs, Arihant is associated with the promotion of renewable energy in India and therefore, manufactures various energy saving products....
  View All
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
View All
IFA 2014
IFA 2014: LG Launches 34-Inches Curved Monitor
The company is yet to confirm price and availability of the device....
IFA 2014: Intel Launches First Core M Range Of Processors
This range of processors is tailor-made for 2-in-1 devices which include a tablet and a laptop....
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
View All
19th Consumer Electronic Imaging Fair To Be Held On ...

View All

home archives contact us advertise with us
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
Electronics Annual Guide
EFY Awards
Linux & Open Source
Consumer Electronics
Science & Technology
EFY Techcenter

Educational Kits
© Copyright 2015 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions