Advanced Search

Tech-Bootcamp on Information and Cyber Security forSenior Officers of Government organised by NIC, Bhubaneswar

Hara Prasad Das, Odisha hp[dot]das[at]nic[dot]in
  |   Nov 29, 2022
Group photo of Participants and Speakers
Group photo of Participants and Speakers


The Tech-Bootcamp on information and cyber security was held on 10.11.2022 at National Informatics Center (NIC), Bhubaneswar for senior officers of the state government. More than 50 officers from various departments participated and received training in this workshop.

Inaugurating the workshop, Shri Y.V.Ramana, Deputy Director General (Technology), Department of Telecommunications, discussed the uses and challenges of '5-G' technology.

Speaking on the occasion, Mrs. Kabita Roy Das, DDG & State Informatics Officer, Odisha asked all officers to take cyber security very seriously. She requested to ensure security audit of every application software project every year and stressed the need for security audit even when there are any major changes in the application.

Mr. Kashi Vishwanath Kethineni, Scientist-C, National Infrastructure Unit (NIU), Hyderabad, Mr. Niladri Bihari Mohanty, Scientist-D, Bhubaneswar, and Mr. Vijay Bhushan Pandey, DDG (Security), Department of Telecommunications, discussed on Network Security, Email Security, Server Security etc. All departments were requested to ensure TSL protocol for all domains and regular updation of server or virtual machine software patches. There were detailed discussions on cyber security case studies and best practices, cyber security incident reporting etc.

Delivering vote of thanks, Mr. Sushant Kumar Mahapatra, DDG and Head, Training Division, NIC, informed that NIC is going to organize six such workshops for senior officers in various fields during this financial year.

Dr. Ashok Kumar Hota, Deputy Director General (NIC) successfully coordinated the workshop.


Recent Issues


Apr. ' 24 Issue

UEBA: An In-depth Exploration of User and Entity Behavior Analytics

UEBA revolutionises cybersecurity by scrutinising the behaviour of users and entities within a network...

TS-eMining: Geological & Mineral Resources Planning

TS-eMining application has digitized and streamlined mineral resource management processes in Telangana. It facilitates ...

Online Policy-Based Transfers System: A Comprehensive System for Implementation of Bulk Transfers

The Online Policy-Based Transfers System simplifies employee movement within the government, replacing paperwork ...

Jan. ' 24 Issue

Cyber Risk Insurance: Insurance Policy to cover financial liabilities arising from cyber incidents

Cyber Risk Insurance, also simply known as Cyber Insurance, is a kind of insurance policy which protects business ...

SATHI: An ecosystem where each seed tells its own story

SATHI, or Seed Authentication, Traceability & Holistic Inventory, strives to create a nurturing digital environment. ...

Unified Data Hub: Empowering Proactive Governance through Integrated Solutions

UDH has established an adaptable system for validating and eliminating duplicate beneficiaries. Presently, it encompasses ...

Oct. ‘ 23 Issue

Emerging AI/ML Attacks and Risks Navigating Emerging AI/ML Threats in Application Security

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications ...

Advanced Persistent Threats Threat Landscape and Countermeasure

In the digital age, Advanced Persistent Threats (APTs) pose a persistent and evolving menace. APTs, orchestrated by ...

TejasVI Empowering Data Driven Governance

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...