Book Online Tickets for National Conference on Cyber Space Secur, Bengaluru. 

Hotel Atria, Palace Road, Bangalore
13 &  14 March 2015
Theme: “Secured Cyberspace for Digital India”

Prime Minister Modihas envisioned an ambitious&nbs

National Conference on Cyber Space Security March 2015


  • CSI-Member


    Sale Date Ended

    INR 3500
    Sold Out
  • Non-Member

    Non Member

    Sale Date Ended

    INR 4000
    Sold Out
  • Faculty


    Sale Date Ended

    INR 2500
    Sold Out
  • CSI Student Member

    CSI Student Member

    Sale Date Ended

    INR 1800
    Sold Out
  • Other Student

    Sale Date Ended

    INR 2000
    Sold Out

Invite friends

Contact Us

Page Views : 1123

About The Event


Hotel Atria, Palace Road, Bangalore

13 &  14 March 2015

Theme: “Secured Cyberspace for Digital India”


Prime Minister Modihas envisioned an ambitious Digital India project, which aims at harnessing the power of the digital technology for better Governance and prosperity.  The project aims at ensuring the availability of digital infrastructure and Government services on demand (via mobile phone), as well as the digital empowerment of all Indians. 

The Theme of “Digital India” encompasses innovative thoughts such as the “Internet of Things", "Smart Cities", “Smart Governance”, “E- Commerce” etc. While India pursues this digital route to prosperity, the security threats that can thwart our progress and endanger the lives of our people in “Digital India” cast a dark shadow on our dreams.

The recent attack on Sony’s digital assets in USA by a foreign State actor has changed the threat perception and woken up all IT users to the dark realities of dangers that are lurking around the corner. Are Indian Companies capable of surviving such attacks? Is Our E Governance structure capable of defending against a Cyber terrorist attack? Are our “Smart Cities” capable of withstanding a Cyber War? … are thoughts that cross our minds both as citizens of India and as professionals.

If the future dreams of “Digital India” are to be realized, then we need to collectively address the issue of security threats that confront the Cyber World.

This National Conference on Cyber Space Security-2015 will discuss the emerging Cyber Space threats from the perspectives of Technology, Legal and Human aspects.  Experts from different fields will discuss both the components of the envisioned “Digital India Project” as well as the threats that confront the project and the solutions.

How can we meet the targetted Advanced Persistent Threats, How can we secure our citizen’s Health Records, How can we safely use Aadhar and JandhanYojana against the looming  Cyber threats, What is the role of Government and the Private Companies?, How do we address the Social Media threats? What are the problems of Internet Addiction? How do we address the issues of Privacy Vs Anonymity?... and many other issues will be debated and analysed in detail during the Seminar.

If you are anybody having a stake in the Digital India, you must be there to participate and enhance your vision on the unfolding future of Digital India. This seminar is a “Can’t Miss Opportunity” for the CXO’s from Corporate sector, Software, Hardware and Telecom Personnel from IT Companies, Government Departments, BFSI, Enforcement, Legal experts, policy makers and Personnel from Academia.

Keynote Speech1: On Convention Theme



Norms for Responsible State Behaviour in Cyberspace

Although there are significant differences in the Internet governance approaches advocated by the Global North and the Global South, with further divergence within the BRICS grouping, it is possible to identify specific governance issues around which coalitions of like-minded states may be developed. For example, together with their Global North counterparts, India and Brazil have emerged as powerful champions of the right to the freedom of expression online – an issue around which it may be possible to forge a significant degree of international consensus.

The panel discussion on state norms can highlight the importance of recognizing the limits imposed by geopolitics when designing cyber governance approaches; adopting a piecemeal or sectoral approach to consensus-building (i.e. focusing on issues that are both narrow in scope and on which there is already some consensus); and pursuing opportunities for bilateral or regional cooperation on cyber governance issues..



  1. Internet of everything

The Internet of Things is forcing government agencies to rethink their IT security strategy and to include security from the beginning. According to Gartner there will be nearly 26 billion devices on the Internet of Things by 2020. This session would explore a strategy to assist these organizations in ensuring security is an enabler to their business drivers, mission and strategic initiatives. The presentation will cover the blueprints for building a solid Security Program across their endpoints, mobile devices and tablets for administrators and use.


A look at the “Internet of Everything” including the bad things coming to your organization and home soon. This presentation takes a serious look at the future and risks of living in a continuous and over connected environment. In addition to the normal business of running a secure data center, organizations have adapted, with mixed success, to the need for remote providers to maintain the basic building requirements of electric, air, water and life safety systems.

Invited talk on

•What is the “internet of everything”?

•What forces are driving the “internet of everything”?

•Does the end user really benefit from all of these devices? If not, who does?

•The absence of security and privacy protocol standardization within “the internet

of everything” and the resultant risks to government entities and businesses.

•A look at some of the devices and “things”, and the data they collect, who sees the data,

and how it might be used and misused.

•The blurring and disillusion of boundaries between business and personal as a result of “the internet of everything”

•A study of possible negative scenarios that could result due to data leakage.


  1. Malware identification by verification – model-checking techniques can be used to check semantic properties of code. A piece of code which can generate a modified piece of code with essentially the same semantics is probably a virus.
  2. "E-Governance Thrust",

Electronic government (e-government), the ability for government to provide access to services and information twenty-four hours a day, seven days a week, is an emerging force today. In the aftermath of a successful Y2K rollover, government is turning attention and resources to providing information and services on-line, exploring digital democracy, and using technology for economic development. As a result, government service will be revolutionized as we progress into the Digital Age. In this new age, good government is accessible government. Good government correlates to immediate access to pertinent information. Good government is faster cheaper and more efficient.


Developing a Successful E-Government Strategy Page 2

Public Technology, Incorporated, a non-profit technology research and development organization for local government, has identified three key areas they believe should be addressed by e-government. These areas are service provision, digital democracy, and economic development.

Invited talk on


A. .  Security issues in Aadhar and JandhanYojana.

3. Emerging Legal Situation, the problems of Internet Addiction, Criminal tendencies and Anonymity, Privacy Vs Security

Anonymity in cyberspace is a major concern for the global community. The introduction, growth and utilisation of information and communication technologies (ICTs) have been accompanied by an increase in criminal activities. With respect to cyberspace; identities are easily cloaked in anonymity.

Social networking technologies have added a new sense of urgency and new layers of complexity to the existing debates among philosophers about computers and informational privacy. For example, standing philosophical debates about whether privacy should be defined in terms of control over information (Elgesem 1996), restricting access to information (Tavani 2007) or contextual integrity (Nissenbaum 2004) must now be re-examined in the light of the privacy practices of Facebook and other SNS. This has become a locus of much critical attention.

Some fundamental practices of concern include: the potential availability of users' data to third parties for commercial, surveillance or data mining purposes; the capacity of facial-recognition software to automatically identify persons in uploaded photos; the ability of third-party applications to collect and publish user data without their permission or awareness; the frequent use by SNS of automatic ‘opt-in’ privacy controls;

Invited talk on


  1. Recent Attacks on the Third Party Rule  Creates Greater Risk of Allegations of Eavesdropping and Illegal Sea
  2. Ethics of social networking.
  3. Privacy vs. Security.
  4. Mobile Security Trackand  BYOD – A Big Piece to Solving the Security Puzzle.

Mobile security has evolved from a traditional Mobile Device Management targeted towards Corporate Owned devices to a model supporting an increasingly BYOD (individually owned devices) adoption. The challenges have increased and the liability of separation between privacy and protecting corporate data has grown for companies. This presentation will outline the criterion to address these challenges and provide a framework for incorporating your business operations for the secure mobile workplace while maintaining the employee’s personal privacy and experience.

Invited talk on


Framework for incorporation of Business Operations for Secure Mobile Transactions.

5. Big Data Use in Identifying Cyber & Operational Threats.


Covers the acquisition, management, and exploitation of data in a wide variety of contexts. Security and privacy concerns often arise here – and may conflict with each other – together with issues for public policy and economic concerns. Not only must emerging security challenges be ad-dressed, new potential attack vectors arising from the volume and form of the data, such as enhanced risks of de-anonymisation, must be anticipated – having regard to major technical and design challenges. A major application area for this research is in medical research, as the formerly expected boundaries between public data, research, and clinical contexts crumble: in the handling of genomic data, autonomous data collection, and the co-management of personal health data.

Potential Doctoral Project: Powerful statistical tests for undesired behaviour have been developed in steganography: can modifications of these mine social media data for security threats?

     Invited talk on


  1.  Best Practices in Implementing Modern IT Security Technologies and Applying them to OT (Operational Technology) Environments..
  2. Identifying and classifying security threats via social media.
  3. Securing Health Records.

Continuous collection of data from webcams, keyboards, touchpads, etc., can extract a behavioural fingerprint for a user. What are the storage-performance-accuracy-privacy trade- offs entailed in presenting this as provenance information and post-hoc access control data, to track integrity and confidentiality in the long term?

6. BFSI & E-Commerce

Emerging Challenges and Opportunities in the Banking Sector

i.  Digital Revolution: migration from cash to electronic payments

ii. New Thrust Areas: mobile banking – BBPS - TReDS

iii. Security vs Convenience



Event Chair:

Mr. Iqbal Ahmed,

Acharya Institutes, Bangalore

Program Committee:

Mr. NaVijayashankar Chair

Mr. T. Sabapathy-Co-Chair


Organising Committee


Mr. Chandar P. Mannar


Ms. Bhanumathi K.S

Event Co-Chair:

Mr. Bindumadhava B.S, C-DAC, Bangalore

Finance Committee:

Mr. Anbunathan R.


Industy Liasoning:

Mr. J. Srinivas Raju - UTL



Dr. C.R. Chakravarthy, CSI

Shri. Rajeev Chawla IAS, Principal Secretary, Horticulture & Sericulture Department.

Shri. M.N. Vidyashankar, IAS, Additional Chief Secretary to Government (R) President, IESA

Shri. Pronab Mohanty-IGP-CID Bangalore Police

Shri. Pradeep Doshi, Sr. Vice-President, Electronics Sector Skills Council of India

Dr. Ashish Bhardwaj, CIO, University of Petroleum & Energy Studies.

Dr. N Sarat Chandra, Executive Director, C-DAC

Shri. Alok Gupta, Founder & MD, Pyramid Cyber Security & Forensic (P) Ltd.,

Sai Lakshmi, Independent Security Strategist and Consultant.

Shri. Vijay Kumar, President, MAIT

Venue Map