August 16, 2016 By Amit Kumar 3 min read

India is gearing up to bring in new encryption and privacy policies to take on growing cybersecurity challenges. It may also amend the existing laws to make cyberspace more secure.

Digital India Marches On

In recent times, India has launched a series of cybersecurity initiatives to digitally empower its citizens and safeguard cyberspace. As the Digital India initiative progresses, cyberattacks have doubled year over year, and Indian businesses and government sites have become more vulnerable.

In the wake of increasing cyberthreats, India appointed its first chief information security officer (CISO). The appointment underlines India’s commitment to combating cyberattacks. It will help India develop the vision and policy to fight cybercrime and manage cybersecurity more effectively.

India is also in the process of setting up national cybersecurity architecture. The architecture will provide a framework for designated agencies to monitor, certify and fortify India’s networks in accordance with the law.

However, there is currently no national agency to assess the nature of cyberthreats and respond to them effectively. Some analysts recommend the creation of a National Cyber Security Agency (NCSA) as an answer to the challenge. An NCSA would improve India’s resilience and defense systems. It would also be responsible for a wide range of cybersecurity transformations in the area of policy formulation and its implementation at the national level.

Global Cooperation

India and the U.S. agreed to cooperate on cybersecurity issues during Prime Minister Narendra Modi’s recent trip to the U.S. As a part of the U.S.-India Cyber Relationship Framework, both countries agreed to share cybersecurity best practices, share threat information on a real-time basis, promote cooperation between law enforcement agencies and encourage collaboration in the field of cybersecurity research. India and the U.S. will also establish joint mechanisms to mitigate cyberthreats and protect internet infrastructure and information.

In 2015, India and the U.K. made a joint statement about cooperation in the cybersecurity space. The two countries agreed to work together to provide professional development and establish a Cyber Security Training Centre of Excellence. The U.K. also agreed to help launch the proposed National Cyber Crime Coordination Centre in India.

India has also entered into cybersecurity cooperation with Malaysia and the European Union. There is a strong case for India to collaborate with more countries, but in the meantime, these partnerships are a great foundation.

Growing Cybersecurity Challenges

Though India has taken a series of steps to harden its security posture, the number of cyberattacks and average cost of a data breach have increased significantly.

The “2016 Cost of Data Breach Study: India” reported that the average total cost of a data breach paid by Indian companies increased by 9.5 percent, while the per capita cost increased by 8.7 percent and the average size of a breach grew by 8.1 percent. Additionally, 41 percent of Indian companies experienced a data breach as a result of a malicious or criminal attack — the most common root cause of a data breach.

India needs a comprehensive cybersecurity law to be prepared to tackle cybersecurity challenges more effectively. Singapore’s proposed Cyber Security Bill will offer a good template. A new cybersecurity law would enable India to protect critical infrastructure more effectively. It would also empower cybersecurity agencies to manage incidents quickly and mandate reporting of significant cybersecurity incidents. Additionally, it would create a stronger cybersecurity culture among businesses and Indian government agencies.

Establishing a national cybersecurity command center, such as the recently announced National Cyber Security Center created by IBM for Australia, would boost India’s cybersecurity defenses, make Indian businesses globally competitive and create a safer Digital India.

Download the 2016 Ponemon Institute Cost of Data Breach Study: India

More from Data Protection

SpyAgent malware targets crypto wallets by stealing screenshots

4 min read - A new Android malware strain known as SpyAgent is making the rounds — and stealing screenshots as it goes. Using optical character recognition (OCR) technology, the malware is after cryptocurrency recovery phrases often stored in screenshots on user devices.Here's how to dodge the bullet.Attackers shooting their (screen) shotAttacks start — as always — with phishing efforts. Users receive text messages prompting them to download seemingly legitimate apps. If they take the bait and install the app, the SpyAgent malware gets…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Skills shortage directly tied to financial loss in data breaches

2 min read - The cybersecurity skills gap continues to widen, with serious consequences for organizations worldwide. According to IBM's 2024 Cost Of A Data Breach Report, more than half of breached organizations now face severe security staffing shortages, a whopping 26.2% increase from the previous year.And that's expensive. This skills deficit adds an average of $1.76 million in additional breach costs.The shortage spans both technical cybersecurity skills and adjacent competencies. Cloud security, threat intelligence analysis and incident response capabilities are in high demand. Equally…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today