EFY Times  
Tuesday, September 02, 2014

 
GO
 
 

On National Cyber Security Policy 2013 - From Jay Bavisi - Winner Of Industry Leadership Award 2013 Awarded By National Security Agency (NSA)
 
Home >> Infotech >> Awards and Recognition
 
On National Cyber Security Policy 2013 - From Jay Bavisi - Winner Of Industry Leadership Award 2013 Awarded By National Security Agency (NSA)  
 
   
Rate this news:  (0 Votes)
Wednesday, July 03, 2013 This policy was much needed and this initiative by the Government was long overdue. With 13,000 cyber attacks witnessed in India in 2011 and 10,000 email ids of top government officials targeted on a single day in July 2012 it is critical to address the cyber issues that are creating a menace is the country. Industry data states that more than 1,000 government websites, storing critical and sensitive data concerning national security, have been hacked by cyber criminals in the last three years. This cannot be the state of the software and outsourcing capital of the world.








Also, to achieve the objectives mentioned in the policy, it is important to understand, India needs the required expertise of trained security professionals to support the national needs. India, like many countries of the world is struck by a cyber plague and India needs to be ready with a robust cyber vaccination program to eradicate or at least control it. One of the solutions to curb this menace is to, use an active vaccine - i.e., to provide the necessary security education and training to the technical community and to inject them into our critical infrastructure. That will help us achieve what we as a nation have set out to do via the new policy, framework and infrastructure.

Consulting over 100 Governments across the globe, Jay Bavisi brings a global perspective on the subject. He has recently won an award from National Security Agency USA (NSA) for Leadership in the Cyber Security Industry. The only Indian and non US citizen to win this award.

EC-Council is one of the world’s largest certification bodies for Information Security professionals and Jay brings in a complete perspective on the state of Cyber Security in India, a global outlook and trend of ethical hacking, cyber crime and the need of security programmers in India and globally, and how India compares to US and China. He has spoken on the subject at various forums internationally and has also been on FoxNews , CNN among other media.

Formed following the 9/11 incident, EC-Council addresses issues of cyber terrorism raised at the forefront of security of nations at large. It is the owner and developer of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), Secure Analyst (ECSA), and Licensed Penetration Tester (LPT) programs. These programs are offered in over 92 countries and over have trained over 120,000 & certified more than 60,000 security professionals through a training network of over 500 training partners globally.

EC-Council (International Council of E-Commerce Consultants) is world’s largest certification body for Information Security professionals. EC-Council is a member-based organization that certifies individuals in various information security and e-business skills. It has been certified by American National Standards Institute to meet its ANSI 17024 standard. It is the owner and creator of the world famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and EC-Council Certified Security Analyst (ECSA)/License Penetration Tester (LPT) programs, and as well as many others programs. These programs are offered in over 92 countries and over have trained over 120,000 & certified more than 60,000 security

professionals through a training network of over 500 training partners globally. The certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). The United States Department of Defense has included the CEH program into its Directive 8570, making it as one of the mandatory standards to be achieved by Computer Network Defenders Service Providers (CND-SP). Individuals who have achieved EC-Council certifications include those from some of the finest organizations around the world such as the US Army, the FBI, Microsoft, IBM and the United Nations. EC-Council has also been featured in internationally acclaimed publications and media.



Print Email Post Comment 
(Total Views: 884)
 
Share

 
 
Infotech News
   
Blue Coat Reveals Security Risks From “One-Day Wonders” Websites
Now Do More, Play More With iBall Slide IPS20
ITC Infotech Offers Consumer Helpline To Answer IT Problems For Holiday-Makers
MTS Partners With Shotz7; Enables FREE Movie Viewing For Its Data & Smartphone Customers
Digital Academy Announces New Batches For Digital Marketing Training
 
 
 
     
     
     
     
     
     
Most popular
 

Daily

Weekly

Overall

Features
10 Must-Have Apps For Linux Users
Linux has a host of options when it comes to applications. Here we give 10 best choices for you....
4 Most Useful Hacking Tools For Your PC Protection
These tools are mostly used by security consultants and hackers which means you can rely on these utilities with closed eyes....
8 Most Frightening Black Hat Hack Attacks
In 2014, Black Hat attacks have become quite popular and these attacks suggest some future possible crimes too. Have a look....
5 Best Open Source Project Management Tools
If you are an Open Source using project manager or a team member of any project management and development, then you should know the best options for ...
10 Tips To Help Cover Your Home With Wi-Fi Completely
You cannot just avoid Wi-Fi usage these days and if your entire home is Wi-Fi connected then what can be better in your life!...
Some Cool Google Drive Features You Shouldn't Miss!
Get out of your love for Microsoft Office as Google Drive features have so many things to offer you extra. Explore them with us....
Know People Behind Corporate Security Threats
You should ensure that your company is protected from all kind of security breaches and for doing that knowing the enemies around you will always help...
10 Tips And Tricks To Fight Back Anonymous DDoS Attacks
Are you bothered about DDoS attacks and looking for some help? The following ten tips can show you the path how you can get rid off these attacks....
7 Super Cool Tips To Improve Your Linux Desktop!
Linux has always kept changing but when it comes to their desktop, there are so many things which still need to be done....
20 Tools For Best Torrent Practices
It's not always illegal to use Torrent if you are distributing files or downloading something. You just want to know the actual tools which serve the ...
Know 7 Types Of Hackers First To Stay Safe Online
If you are worried about hacking attacks, without knowing the hackers' motivation you can never succeed in your preventive measures!...
10 Reasons To Know About Java Virtualisation
Java platforms need virtualisation for better performance. But if you know the reasons behind it, it gets more exciting for you....
This Is How You Can Understand Load Average For Your Linux System
A number, which looks meaningless at first instance, can actually help you in understanding the performance level of your CPU....
Generate Random Names And Phone Numbers Using PowerShell
Now creating a list of random names and phone numbers is just a matter of steps away....
5 Reasons Why You Should Advance You Programming Skills!
Dreaming to become a better developer? We are here to tell you why you need to inspire yourself to become the best one....
 
  View All
Dialogue
 
10 Questions That Google Never Asks While Hiring!
Here is a list of 10 questions that Google just banned from their interviews....
For Enjay, Open Source Technology Is A Way Of Life
An entirely open source-based company, Enjay IT Solutions, has built itself a reputation in the OSS domain....
Switching To Tizen Doesn’t Mean We Are Abandoning Android: Samsung
The company has worked to build Tizen up from scratch and has now introduced it to developers and the general public with its latest range of wearable...
Venturing Into The Cloud? Develop A Customised Cloud Strategy First!
Diksha P Gupta speaks to Rushikesh Jadhav, cloud evangelist, ESDS Software Solution Pvt Ltd, on how the cloud has changed the way compan...
HTC Is Strong And There Are No Plans Of Sale Now Or In Future, Says HTC's Senior Director-Marketing
Atithya Amaresh from EFYTimes had an exclusive chat with Sirpa H. Ikola, senior director, Marketing, South Asia, HTC about its devices and its plans w...
   
  View All
Videos
 
First Look: LG Optimus G
The phone sports a high-end display and comes powered by a powerful processor. ...
Create QR-Codes For Free
TEC-IT releases the freeware QR-Code Studio to provide a quick and convenient way of QR code creation for every application scenario....
DoT Secretary Shares Plans For Growth Of Telecom Sector
M.F. Farooqui has recently taken charge as secretary, Department of Telecom....
Hands-On: Sony Xperia Z
Xperia Z is Sony's first entrant model in the big-screen smartphone category. ...
Hands On: Videocon A30 Smartphone
Videocon, the consumer electronics company which is known for its refrigerators, washing machine and air-conditioner has unveiled its Android-based sm...
   
View All
   
 
MWC 2014
 
MWC 2014: Tablet Lets People Feel Textures On Its Screen
Now feel what you see on your tablet, by way of ultrasonic waves....
MWC 2014: 4K Android Tablet Games To Kill Consoles, iPad
Tablet makers like Samsung want to beat the iPad by making 4K tabs. ...
MWC 2014: This Vodafone Backpack Helps Get Network In Disaster Situations
Two engineers of Vodafone New Zealand displayed the "mini" mobile network by Vodafone substructure in a backpack. ...
MWC 2014: Wilocity Chipset To Bring 'Lightening' Speed To Mobile Phones
Wilocity has developed a WiGig chipset for mobile phones that will bring lightning-fast wireless capability ...
MWC 2014: Samsung Introduces Octacore, Hexacore Chipsets
The Korean giant, Samsung unveiled two new octacore and hexacore chipsets at MWC 2014, in Barcelona. The company previously used Exynos 5 Octa 5410 ch...
MWC 2014: Alcatel Unveils PIXI 7 Tablet With Android 4.4
Alcatel arrived at the MWC 2014 with yet another low cost Android tablet, priced at $110 ...
MWC 2014: LG F70 Unveiled With Android 4.4
LG announced the new LTE-enabled Android smartphone, LG F70, at MWC 2014 in Barcelona. ...
   
View All
   
 
Events
 
19th Consumer Electronic Imaging Fair To Be Held On ...

View All
   
   
 
 

home archives contact us advertise with us
           
Magazines Portals Directories Events News Verticals Educational Institute  
Electronics for You
Open Source for You
Electronics Bazaar
electronicsforu.com
efytimes.com
opensourceforu.com
electronicsb2b.com
Electronics Annual Guide
EFY EXPO INDIA
EFY EXPO WEST
ELECTRONICS ROCKS
EFY Awards
OSIDAYS Expo
Electronics
Infotech
Linux & Open Source
Consumer Electronics
Science & Technology
BPO
EFY Techcenter 

Educational Kits
Kitsnspares.com
 
 
© Copyright 2014 EFY Enterprises Pvt. Ltd.
All rights reserved. Reproduction in whole or in part in any form or medium without written permission is prohibited.
Usage of the content from the web site is subject to Terms and Conditions