Upcoming event: DSCI – 7th Best Practices meet 2015

by | Jun 23, 2015

DSCI (Data Security Council of India), a focal body on data protection in India that was set up by NASSCOM, is organizing a two-day Best Practices meet. The two-day deliberations of BPM 2015 will reflect on policy matters, aggregated efforts taken at national and industry levels, proposed industry steps, market response, evolved practices, industry standards and technology designs and see how they play their roles in designing architectures.

Where : ITC Gardenia, Residency Road, Bengaluru, Karnataka, India
When : 09 Jul, 2015 to 10 Jul, 2015
Twitter hash tag: #BPM2015
Registration: https://in.explara.com/e/bpm2015/checkout
Website: https://www.dsci.in/events

THEME

Digital transformation calls for in-depth, structural and systematic analysis of security & stresses on derivation of security solutions which should factor multiple considerations. The 7th Best Practices Meet (BPM) 2015 focuses on Architecting Security for Digital Transformation.

The country is witnessing a great push for transforming the economy to a digital economy. Significant steps have been taken by the public sector, which promise to alter the nature and fabric of public services delivered to the citizens. The Digital India initiative would not only revitalize delivery of these services, but also unleash the potential of private sector lead technology makeover. This transformation is led by digitization of data, experimentations with technology enabled channels, adoption of mobile technologies, choice of using diverse devices and technology enabled transaction processing. Digital transformation is overcoming the problem posed by scale, quantum and complexity. Digital technologies create immense possibilities and unveil many ways to solve a specific business or governance problem. However, in the process they may expand the attack surface, introduce vulnerabilities, weaken the security posture and give birth many new possibilities of exploitation. Trust is a main catalyst for one to execute their personal, societal, business and public service transactions. Digital transformation may shake up this trust, unless security is taken care of. Security should be an inherent component of this transformation. It should be well thought of, structural in nature and organized in a predictable and productive manner.

The architectural process involves thinking in structures, arranging the components in systematic manner, ensuring that the composition delivers maximum benefits, making the structure future proof, striving for productivity and predictability, and finding ways to achieve a high level of governance. Digital transformation calls for in-depth, structural and systematic analysis of security. Derivation of security solution should factor multiple dimensions, aspects and considerations. Distant aspects such as expectations of cyber security, obligation and role of privacy and matters of public policies play a crucial role in organizational security. These aspects demand significant level of attention in the design of security. One needs to be familiar with the techniques, processes and practices to traverse the architectural path of designing security. DSCI Best Practices Meet (BPM), 2015 promises to take drive the participation on this path. Focused on ‘Architecting Security’, BPM 2015 would deliberate on how architectural views, approaches, frameworks, processes and practices work for security and what benefits they yield to security.

Dissecting the problem in a systematic manner is a critical first steps towards architecting. BPM 2015 will investigate a range of contemporary issues catching the attention of managers of security. It will take views on how these issues play at the national, industry and organizational levels, and how an organization can respond to them in a systematic and structured manner. It will examine different solutions provided by market forces as emerged from the experience and categorize them into point or transformative solutions. The character, nature and prospects of transformative solutions would be critically examined for their ability to provide organized, systematized and predictable security.

ABOUT DSCI

DSCI is a focal body on data protection in India, setup as an independent Self-Regulatory Organization (SRO) by NASSCOM®, to promote data protection, develop security and privacy best practices & standards and encourage the Indian industries to implement the same.

DSCI is engaged with the Indian IT/BPO industry, their clients worldwide, Banking and Telecom sectors, industry associations, data protection authorities and other government agencies in different countries. It conducts industry wide surveys and publishes reports, organizes data protection awareness seminars, workshops, projects, interactions and other necessary initiatives for outreach and public advocacy. DSCI is focused on capacity building of Law Enforcement Agencies for combating cyber crimes in the country and towards this; it operates several Cyber labs across India to train police officers, prosecutors and judicial officers in cyber forensics.

Public Advocacy, Thought Leadership, Awareness and Outreach and Capacity Building are the key words with which DSCI continues to promote and enhance trust in India as a secure global sourcing hub, and promotes data protection in the country.

————————————————————————————————————-

SOURCE: DSCI

Share This Article!

Brian Pereira
Brian Pereira
Brian Pereira is an Indian journalist and editor based in Mumbai. He founded Digital Creed in 2015. A technology buff, former computer instructor, and software developer, Brian has 29 years of journalism experience (since 1994). Brian is the former Editor of CHIP India, InformationWeek India and CISO Mag. He has served India's leading newspaper groups: The Times of India and The Indian Express. Presently, he serves the Information Security Media Group, as Sr. Director, Editorial. You'll find his most current work on CIO Inc. During his career he wrote (and continues to write) 5000+ technology articles. He conducted more than 450 industry interviews. Brian writes on aviation, drones, cybersecurity, tech startups, cloud, data center, AI/ML/Gen AI, IoT, Blockchain etc. He achieved certifications from the EC-Council (Certified Secure Computer User) and from IBM (Basics of Cloud Computing). Apart from those, he has successfully completed many courses on Content Marketing and Business Writing. He recently achieved a Certificate in Cybersecurity (CC) from the international certification body ISC2. Follow Brian on Twitter (@creed_digital) and LinkedIn. Email Brian at: [email protected]
Recommended Posts
The First 90 Days Are Crucial for the CISO and CIO

This book arms you with insights into crafting a robust 90-day plan, and you’ll be well-equipped to catapult into CIO or CISO roles successfully. Beyond technical proficiency, the book instills survival skills, ensuring longevity and helping you prevent burnout in these pivotal positions.

Similar Articles

Return to Business as Unusual
Return to Business as Unusual

Remote working is no longer a benefit, luxury or convenience. It’s also more than a current make-do for organizations looking to conduct business as usual.