do you know?


Around 39% Internet users worldwide experienced a cybercrime incident in 2022! In the first half of 2023 alone, the number of email-based phishing attacks surged 464% globally when compared to 2022?

Sufficient reasons to take cybersecurity seriously, right?

Come join us as partners with The CARE Lab at Temple University, Philadelphia, to create awareness about this global threat. Hear the facts from the experts, participate in exciting contests and prove that you too are a youth cybersecurity hero!

Read More

Event Details

Event Details
  • Online Cyber Security Sessions
  • PSA Video Making Contest
  • Poster Design and Slogan Writing Contest
jagran josh

Online Cyber Security Sessions

Tune in for super-informative sessions with CyberSecurity Experts from India and abroad .

Poster Design and Slogan Writing Contest

Design thought-provoking posters and slogans that convey essential cyber security tips Know More .

PSA Video Making Contest

Create impactful videos that raise awareness about cyber security Know More .

Key Themes and Sessions

Key Themes and Sessions
  • Why Cyber Security?

    Thе CIA Triad consists of thrее еssеntial componеnts - Confidentiality, Integrity, and Availability. Confidеntiality acts as thе guardian of digital sеcrеts, еnsuring that information is sharеd only with authorizеd individuals. Intеgrity is akin to a rеfеrее in a gamе, making surе that data rеmains unchangеd and reliable. Availability еnsurеs that digital rеsourcеs arе accеssiblе whеnеvеr nееdеd, similar to your favoritе toy always bеing availablе to play with.

    To ensure a cybersecure environment it is important to safeguard our data, use strong passwords, seek help if something goes wrong, keep all devices and softwares updated, and more.

    Read more to know about CIA Triad in detail along with their salient features.

  • Phishing

    Phishing is a type of cybercrime that involves tricking someone into disclosing private information, like passwords, bank account information, or personal information. This is usually done through email, by means of misleading correspondence that looks to be from reliable sources, such as banks or respectable organisations. The intention is to scare the recipients into performing urgent or fearful tasks, like downloading dangerous attachments or clicking on suspicious URLs.

    The attackers play on feelings such as trust, curiosity, or fear. Cybercriminals pretend to be from trustworthy organisations in order to spread malware or steal important data. Because phishing attacks are a common cybersecurity issue, it's important for people and organisations to stay vigilant, use email filters, and educate themselves on how to spot and avoid them.

    Read more to know about phishing in detail, features of phishing emails, and tips to protect ourselves from phishing attacks.

  • Incident Response

    The nature of cyber threats is constantly changing, and incident response is a critical element of cyber security. It is a systematic approach to addressing and managing security incidents. It is important to detect and identify security incidents with the help of different tools and techniques. Once the incident is identified, it is important to evaluate its level of severity. Simultaneously, measures are taken to prevent further damage. Finally, it is important to completely remove the threat from the system.

    A well-organised incident response strategy should be in place in the case of a cyber attack to minimise damage, safeguard sensitive data, and preserve business continuity. An organisation or person can react to security breaches and bounce back from them.

    Read more to know about incident response in detail and its key components.

  • Deepfakes

    Deepfakes are hyper-realistic images, video, and audio that are digitally manipulated to depict people saying and doing things that never actually happened. In simpler terms, a deepfake is a synthetic medium in which a person in an existing image or video is replaced with someone else's likeness. While faking videos and images is not new, deepfakes utilise powerful techniques from machine learning and artificial intelligence to manipulate and/or generate visual and audio content. These are extremely realistic and have a high potential to deceive the users.

    Deepfakes pose significant threats to various aspects of society, including journalism, national security, public trust in information, and cybersecurity. To detect deepfake attacks, there are several key indicators to watch for in both video and pictures, like facial positioning, unnatural facial or body movement, strange colour grading, and more.

    Read more to know about deepfakes in detail, the technologies used in creating deepfakes pictures, audio or video, and their detection and prevention.

  • Romance Scam

    A romance scam is an online fraud or a way to fool people and earn money. The fraudsters, with no interest in the person, target individuals on dating websites and social media platforms to gain their interest and trust. Once the trust-building phase has been crossed, they manipulate victims into sending money or personal information.

    Romance scams are on the rise. Scammers employ various tactics, such as catfishing, passing flattering compliments, and discussing sob stories. They do all this to manipulate victims, both emotionally and financially. It is important to identify the initial signs of a romance scam like, over-flattering comments, reluctance to meet, and more, and report such scams immediately.

    Read more to know about romance scams in detail, clues to identify a romance scam, common tactics used by scammers, and reporting a romance scam.

  • Personal Security

    Personal security, in the context of cybersecurity, is the practice of safeguarding our personal information and devices from online malicious activities. For instance, if hackers gain access to your email, they could exploit your personal content, change passwords for critical accounts like online banking, or even engage in identity theft. Awareness and proactive measures are essential to protect individuals and their families from data breaches, threats, and extortion.

    It is important to keep strong passwords and avoid name and date of birth in your passwords, enable Multi-Factor Authentication (MFA) for financial and personal data access, regularly update antivirus software, avoid clicking on unknown emails, and be careful about sharing personal information on the internet.

    Read more to know about personal security in detail and important cyber security habits to ensure personal security.

  • Ransomware

    Ransomware is a type of cyberattack that encrypts a user's data or system and demands a ransom to release it. Attackers most commonly introduce harmful software through misleading emails or hacked websites. Once triggered, it restricts the victim from accessing their own data or system, and attackers demand a ransom, typically in crypto currencies, to maintain anonymity, to misuse data, or threaten the victim with the permanent destruction of data.

    Promptly reporting ransomware attacks to law enforcement agencies is vital for tracking and mitigating the impact of such attacks.

    Read more to know about ransomware in detail, the mechanics of ransomware attacks, and strategies for mitigation.

jagran josh


Speaker Profile

Dr.Rakshit Tandon

Cyber Security Evangelist- Risk Advisory, Cyber Detect & Respond Leader

Speaker Profile

Sudeep Goenka

Assistant Inspector General (AIG) - Special Branch, Cyber-Intelligence, Madhya Pradesh

Speaker Profile

Dr. Aunshul Rege

Director, CARE Lab, Temple University, Philadelphia

Speaker Profile

Sachin Kalra

Global Solutions Manager, Google

Sachin Kalra

Mr Sachin Kalra is a technology leader within the Google Cloud Solutions Engineering organization, with 18+ years of technology, customer engineering and thought leadership experience. He is responsible for helping drive vision, mission, and strategy around security solutions, deliver impactful, customer-relevant business outcomes and enable repeatable, low-friction solutions-based selling.

Speaker Profile

Na. Vijayashankar

Cyber Law Expert, Visiting Faculty - NLSIU & NALSAR

Speaker Profile

Yasir Arafat Shaikh

Cyber Security Researcher & Experienced Cyber Security Trainer

jagran josh

Dr Rakshit Tandon

Dr Rakshit Tandon has more than a decade of experience in the CyberSecurity Domain and is widely recognized as a pioneer and early thought leader in the Cybersecurity awareness space in India. In his personal capacity, he has sensitized more than 5.6 million students on the issue of Cyber Safety across the nation covering more than 25 states, and 4 union territories.

He is the Cyber Security Consultant to the Internet and Mobile Association of India (IAMAI) and a Visiting Faculty for Cyber Crime Investigations at the Bureau of Police Research and Development (BPRD) for Training Law Enforcement Officers across the Country. He is the Chairman of India Against Child Abuse, a National Outreach Program by Justice Mohan Children University and NCSSS.

He has made valuable contributions to the Child Online Protection in India Report by UNICEF and is a training consultant with the United Nations Office on Drugs and Crime (UNODC). He is also the President of the Joint Action Team for Combating Cyber Crime against Women and Children.He is also a prolific speaker and has spoken extensively at “Talks at Google” and “TEDx“.

Sudeep Goenka

Mr Sudeep Goenka is Assistant Inspector General (AIG) - Special Branch, Cyber-Intelligence, Madhya Pradesh.

Dr. Aunshul Rege

Dr Aunshul Rege directs the Cybersecurity in Application, Research, and Education (CARE Lab) at Temple University. She holds a PhD and MA in Criminal Justice, an MA and BA (Hons.) in Criminology, and a BSc in Computer Science.

She has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her National Science Foundation-funded (CAREER, CPS, EAGER) research examines adversarial and defender behaviour, decision-making, adaptations, modus operandi, and group dynamics.

More recently, she has started researching Social Engineering, which is the psychological manipulation of individuals to start and maintain cyberattacks via her NSF SaTC EDU grant. Dr Rege has been hosting international social engineering competitions for high school, undergraduate, and graduate students since 2021.

Dr Rege's research has been published in several outlets, such as the Journal of Information Warfare, the Journal of Homeland Security and Emergency Management, the Security Journal, and the IEEE Intelligent Systems. She serves on the Advisory Board of Black Girls Hack, Raices Cyber, and Breaking Barriers Women in Cybersecurity and she is the research lead for the DefCon SE Community. Dr Rege and her work have been featured in several media outlets, such as WHYY/PBS/NPR Studio 2, BBC World Service, Security Week, and Dark Reading, to name a few.

Sachin Kalra

Sachin Kalra is the Global Solutions Manager at Google. He is a technology leader within the Google Cloud Solutions Engineering organization, with 18+ years of technology, customer engineering and thought leadership experience. He is responsible for helping drive vision, mission, and strategy around security solutions, deliver impactful, customer-relevant business outcomes and enable repeatable, low-friction solutions-based selling. He is a certified professional (CISSP) in the field of Information Security and has been contributing in the Cybersecutity space for years. He has extensive knowledge and experience in protecting networks, systems, and data from cyberattacks. Proven ability to identify, assess, and mitigate cybersecurity risks, develop and implement security policies and procedures, and respond to security incidents.

Na. Vijayashankar (Naavi)

Mr Vijayashankar is popularly known as Naavi in the cyber space. He specializes in Consultancy related to Regulatory compliance in the areas of ITA 2000/8, HIPAA, GDPR, CCPA, DPDPA (Digital Personal Data Protection Act of India) etc. Naavi is also a Registered Independent Director with the Ministry of Corporate Affairs, Government of India.

Has nearly 50 years of domain expertise including Banking, Advertising, Cyber Law, Education, Information and Data Security compliance. He is a visiting faculty at the National Law School Bangalore (NLSIU) and NALSAR, Hyderabad, among others.

He has authored several books including the first book on Cyber Laws in India in 1999. Also authored a book titled "Personal Data Protection Act of India (PDPA 2020)" to mark the beginning of a new era of data protection in India. Naavi has also been at the forefront of the Netizen movement in India. He is the founder and secretary of the Cyber Society of India and has been a member of several working groups of the Government of India involved in Information Technology-related matters

Yasir Arafat Shaikh

Yasir Arafat Shaikh is a highly decorated cyber security trainer, recognized as the Best Cyber Security Trainer in 2018 and a two-time recipient of the EC-Council Instructor Circle of Excellence Award for the years 2020-2021 and 2021-2022. With extensive experience in training law enforcement agencies, Yasir has successfully trained various batches of the Maharashtra Police and has been invited to speak at numerous national-level conferences on cyber security. He is also an active corporate trainer, specializing in web and network penetration testing, and is continuously learning to enhance his skills.

Yasir's expertise in the field has earned him recognition from various news channels such as News18 and ABP News, as well as national-level newspapers such as Mid-Day and Deccan Herald, where he has been featured in articles on cyber security. With his exceptional knowledge and ability to communicate complex concepts effectively, Yasir is a trusted resource for organizations seeking to enhance their cyber security measures.

Cyber Security Sessions

Cyber Security Sessions