Search

Advanced Search

Haryana:- Direct Benefit Transfer Regional Level Workshop at Chandigarh on September 11, 2018

Deepak Sawant, Haryana sawant[dot]deepak[at]nic[dot]in
  |   Sep 24, 2018
Dr. Susheel Kumar, Senior Technical Director, NIC Haryana Presenting DBT status in Haryana
Dr. Susheel Kumar, Senior Technical Director, NIC Haryana Presenting DBT status in Haryana

Ms Indira Murthy, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India with prominent participants
Ms Indira Murthy, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India with prominent participants

One day regional workshop on DBT was organised by DBT Mission, Cabinet Secretariat,  Delhi and NCAER (National Council of Applied Economics Research) on 11th September 2018 at Chandigarh. Representative of all northern states Jammu & Kashmir, Himachal Pradesh, Haryana, Punjab, Uttarakhand, Delhi, Rajasthan and UT Chandigarh participated and presented status of DBT implementation in their states in line with State DBT portal and Bharat DBT portal.  The foremost objective of the workshop was to review the DBT implementation in the states and knowledge sharing of effective usage of Aadhaar.

The inaugural session was addressed by Ms  Indira Murthy, IAS, Joint Secretary, DBT Mission, Cabinet Secretariat, Government of India followed by Sh. Sunil Sharan, Secretary-cum-Advisor, Finance, Haryana and Dr. Rajesh Chadha, Senior Research Counsellor, NCAER. During this session, Mr. Soumitra Mandal, Director, DBT Mission, Cabinet Secretariat, Government of India, introduced the key enablers of DBT within the present framework of DBT. He also shared about  recent developments and progress/ performance of participating states.

The Post Lunch session was dedicated to States where participating states presented their DBT implementation status, progress and prospects. Haryana was the first participating state and  Dr. Susheel Kumar, Senior Technical Director, NIC Haryana presented the Haryana DBT status and also shared the best practices and challenges being faced in maintaining and updation of beneficiaries data and response files received from banking agencies.

During presentation, he talked about data cleaning and de-duplication status, live status of Haryana DBT portal, methodology used during the process, capacity building and progress review, change management requirement, benefits, challenges and roadmap. He also explained how the RGI death data has been integrated with social sector pension schemes and flagged the death as it was not reported by banks or field officers.

The DBT Mission Delhi team appreciated the efforts made by NIC Haryana.

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...