Introduction and Overview
Welcome remarks and an overview of the 11 UN norms for responsible state behaviour in cyberspace.
State Cooperation and Information Exchange
Discussing state cooperation in developing ICT security measures and the importance of information exchange to combat cyber threats.
Human Rights and Privacy Protection
Ensuring ICT security measures respect human rights, privacy, and the promotion of freedom of expression in the digital age.
Securing the ICT Supply Chain
Steps for states to ensure the integrity and security of the ICT supply chain, and preventing the spread of malicious ICT tools and techniques.
1 Subject
Jyothi Ramaswamy
Expertise: Cyber Security Specialist, Consultant, Trainer, Head of Cyber Security Delivery Services, and Security Auditor.
Current Role: Enhancing cybersecurity posture and ensuring regulatory compliance.
Certifications: BTech in Electronics and Communication, MS in Software Systems, CISM, CRISC, and CRISP.
Contributions: Developed security awareness programs and improved risk management practices.
Previous Experience: 25 years at Tata Consultancy Services, focusing on information security and cybersecurity.
Jyothi's vast expertise and commitment to advancing cybersecurity practices make her a highly respected figure in the cybersecurity domain.
We have answered all common questions below that you might have about the event. For any further queries, Kindly contact at team@globalcybersecurityassociation.com
6 Courses • 199 Students
Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.
By clicking on Continue, I accept the Terms & Conditions,
Privacy Policy & Refund Policy