{"id":205,"date":"2022-02-18T14:00:34","date_gmt":"2022-02-18T14:00:34","guid":{"rendered":"https:\/\/pc-keeper.tech\/index.php\/2022\/02\/18\/free-webinar-on-cyber-governance\/"},"modified":"2022-02-18T14:00:34","modified_gmt":"2022-02-18T14:00:34","slug":"free-webinar-on-cyber-governance","status":"publish","type":"post","link":"https:\/\/pc-keeper.tech\/index.php\/2022\/02\/18\/free-webinar-on-cyber-governance\/","title":{"rendered":"Free Webinar on Cyber Governance"},"content":{"rendered":"<p> [ad_1]<br \/>\n<\/p>\n<div>\n<p>IEEE Computer Society Team<\/p>\n<\/p><\/div>\n<div>\n<p>Register for Webinar<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Webinar Overview | Highlight Your Activities | About Region 10 | IEEE Computer Society Region 10 Home | Discover Professional Chapters<\/p>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-257303 img-responsive alignright\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/17201440\/Zoom-Flyer-Cyber-Governance-Insurance-to-Assurance-2.jpg\" alt=\"Cyber Governance Insurance to Assurance\" width=\"250\" height=\"250\" srcset=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/17201440\/Zoom-Flyer-Cyber-Governance-Insurance-to-Assurance-2.jpg 250w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/17201440\/Zoom-Flyer-Cyber-Governance-Insurance-to-Assurance-2-150x150.jpg 150w, https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/17201440\/Zoom-Flyer-Cyber-Governance-Insurance-to-Assurance-2-100x100.jpg 100w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\"\/>The IEEE Computer Society Region 10 of the Geographic Activities Committee is hosting a free webinar, <strong style=\"color: #00629b;\">Cyber Governance: Insurance to Assurance<\/strong>, by Professor K. Subramanian. The webinar will be on <strong style=\"color: #00629b;\">Saturday, 26 February 2022 at 3:30 PM IST (10:00 AM UTC)<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"text-align: center; color: #ff6600;\"><strong>Want More Tech News? Subscribe to ComputingEdge Newsletter Today!<\/strong><\/p>\n<p>\u00a0<\/p>\n<hr style=\"width: 100%;\"\/>\n<p>\u00a0<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-257304 img-responsive alignleft\" src=\"https:\/\/ieeecs-media.computer.org\/wp-media\/2022\/02\/17201633\/dr-ks-pic-111.jpg\" alt=\"dr ks\" width=\"216\" height=\"208\"\/>Dr. K Subramanian is the India Area Geographic Activities Coordinator. He was the first director and professor at the Advanced Center for Informatics and Innovative Learning (ACIIL) and introduced advanced technology, engineering, and management courses at the Master\u2019s level. Dr. Subramanian started research programs in the interdisciplinary areas of knowledge management, informatics, information, and communications technologies and management through partnership institutions at Indira Gandhi National Open University (IGNOU).<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Dr. Subramanian will discuss the ramifications of governing such cyberspace that impacts individual human life, social life, global business, and governments on such a massive scale in a borderless world. It describes the different facets of cyber governance, and the design and implementation of efficient, effective, and trustworthy cyber governance systems.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">For questions about the upcoming webinar, please email csr10@computer.org.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Save your seat for Cyber Governance: Insurance to Assurance webinar <strong style=\"color: #00629b;\">HERE<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"overview\">Webinar Overview<\/h2>\n<hr style=\"text-align: left; width: 40%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Internet, Globalization, Information technology, and web technologies have made the world flat today as a global village, transcending political and national boundaries. They interconnect people worldwide in the virtual world of cyberspace\u2013 the virtual space behind the computer screen. Innovations in communications technology keep us all wired 24\/7. Cyberspace is currently used for social interactions and networking through emails, instant messaging, or video telephony. At the same time, commercial enterprises and organizations transact business globally, transferring massive information and funds at phenomenal speed through optical fibers using wireless and satellite technology. It is also fraught with threats from organized criminals of the cyber underworld running an underground cyber economy. There is thus a need for governing this virtual world to support global social, political, economic collaboration and exchange while managing associated risks. The objective is to provide trustworthy and efficient computing in cyberspace, calling for effective cyberspace governance. This is a paradigm shift from eSecurity to eAssurance in cyberspace. This presentation outlines the ramifications of governing such cyberspace that impacts individual human life, social life, global business, and governments on such a massive scale in a borderless world. It describes the different facets of cyber governance and how we design and implement efficient, effective, and trustworthy cyber governance systems? Ultimately cyber governance must lead to cyber-assurance, that governance leads to IT value delivery and IT risk management, with due consideration of the Global, National, and corporate perspectives of Cyber governance and Cyber assurance. Enterprises of today and tomorrow need Cyber assurance.<\/p>\n<p>\u00a0<\/p>\n<h2 id=\"involved\">Get Involved<\/h2>\n<hr style=\"text-align: left; width: 40%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Include your local chapter\u2019s new activities in the upcoming newsletter by reaching out to ieeecs.r10nl@gmail.com.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Visit the IEEE Computer Society Region 10 website to stay up to date on everything happening in the region. You\u2019ll find:<\/p>\n<ul style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Chapter activities;<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Regional activities;<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 A quarterly, regionally-focused newsletter;<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 And, professional resources.<\/li>\n<\/ul>\n<p>\u00a0<\/p>\n<h2 id=\"region10\">About Region 10<\/h2>\n<hr style=\"text-align: left; width: 40%; height: 3px; color: #ffa300; background-color: #ffa300; border: none;\"\/>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">The IEEE Computer Society Region 10 consists of professionals from countries in Central, South, Southeast, and East Asia along with Australia and Pacific Island nations. Find a local chapter or be the first to start a chapter in your area.<\/p>\n<p style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">Countries in Region 10 include:<\/p>\n<ul style=\"color: #454545; font-size: 18px; line-height: 1.7em;\">\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Afghanistan<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Australia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Bangladesh<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Brunei Darussalam<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 China<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Fiji<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 French Polynesia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Hong Kong<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 India<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Indonesia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Japan<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Laos<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Macao<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Malaysia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Maldives<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Mongolia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Myanmar<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Nepal<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 New Caledonia<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 New Zealand<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Pakistan<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Papua New Guinea<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Philippines<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Singapore<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 South Korea<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Sri Lanka<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Taiwan<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Thailand<\/li>\n<li style=\"list-style-image: url('https:\/\/ieeecs-media.computer.org\/wp-media\/2021\/11\/17161248\/Icon_Right-Double-Arrow.png');\">\u00a0 Vietnam<\/li>\n<\/ul>\n<\/div>\n<p><script>\n    !function(f,b,e,v,n,t,s)\n    {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n      n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n      if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n      n.queue=[];t=b.createElement(e);t.async=!0;\n      t.src=v;s=b.getElementsByTagName(e)[0];\n      s.parentNode.insertBefore(t,s)}(window,document,'script',\n      'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n    fbq('init', '2406379906149876');\n    fbq('track', 'PageView');\n  <\/script><script>\n    !function(f,b,e,v,n,t,s)\n    {if(f.fbq)return;n=f.fbq=function(){n.callMethod?\n      n.callMethod.apply(n,arguments):n.queue.push(arguments)};\n      if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0';\n      n.queue=[];t=b.createElement(e);t.async=!0;\n      t.src=v;s=b.getElementsByTagName(e)[0];\n      s.parentNode.insertBefore(t,s)}(window,document,'script',\n      'https:\/\/connect.facebook.net\/en_US\/fbevents.js');\n    fbq('init', '721875948349197');\n    fbq('track', 'PageView');\n  <\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/www.computer.org\/publications\/tech-news\/events\/webinar-cyber-governance\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] IEEE Computer Society Team Register for Webinar Webinar Overview | Highlight Your Activities | About Region 10 | IEEE&hellip;<\/p>\n","protected":false},"author":1,"featured_media":206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[143,8,144,2,145],"tags":[],"class_list":["post-205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-governance","category-cybersecurity","category-region-10","category-tech-news-post","category-webinar"],"_links":{"self":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/comments?post=205"}],"version-history":[{"count":0,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/posts\/205\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media\/206"}],"wp:attachment":[{"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/media?parent=205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/categories?post=205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pc-keeper.tech\/index.php\/wp-json\/wp\/v2\/tags?post=205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}