National Cyber Security gets a boost with M U Nair as the new Coordinator
Cybersecurity

National Cyber Security gets a boost with M U Nair as the new Coordinator

M U Nair

Lt Gen MU Nair has been named the new National Cyber Security Coordinator (NCSC), taking over for Lt Gen (retd.) Dr. Rajesh Pant, according to the National Cyber Coordination Centre (NCCC), the government of India’s cybersecurity and e-surveillance agency.

He assumed his position as the 28th signal officer-in-chief in July 2022. He is a graduate of the prestigious National Defence Academy. Additionally, he has served as the additional director general, head of signal intelligence, chief of staff of a corps, and command.

The NCSC, which reports to the National Security Council Secretariat, is essential to coordinating with various central-level organizations on cybersecurity issues of critical and national importance. Monitoring communication metadata is one of the agency’s main duties, giving law enforcement agencies useful information for potential cybercrime investigations.

The 2013 National Cyber Security Strategy is being updated and replaced by the NCSC, which will place an emphasis on a “common but differentiated approach.” In spite of the fact that the overall goal of cybersecurity remains the same for all stakeholders, this would entail having customized goals for government organizations, private institutions, academia, and other stakeholders.

Also Read:- Government unveils new Cybersecurity Policy to Combat Malware Attacks

The National Cyber Security Reference Framework (NCRF), which will take the place of the 2013 strategy, will serve as a document to direct crucial industries, including banking, telecom, power and energy, banking and financial services, transportation, strategic and government enterprises, healthcare companies, among others, in areas of internet governance and network management as well as response strategies in the event of cyber-attacks. The document will also include the best practices for recovering and resuming operations after systems have been compromised.