NCSC floats G20 Delhi declaration on preventing cybercrime incidents

National Cyber Security Coordinator Rajesh Pant on Monday proposed "Delhi Declarations" for G20 nations to promote cyber peace

G20
Press Trust of India New Delhi
2 min read Last Updated : Jun 05 2023 | 9:57 PM IST

National Cyber Security Coordinator Rajesh Pant on Monday proposed "Delhi Declarations" for G20 nations to promote cyber peace and cooperation to prevent, mitigate and investigate cyber incidents in cyberspace.

While speaking at the B20 Conference on Cyber Security organised by CII, Pant cited various G20 action plans around cyberspace and said that the G20 supports the existing UN cybersecurity norms.

"I want to propose today something that I'm calling the Delhi Declaration," Pant said.

He said that the G20 encourages states to adopt norms of responsible state behaviour in cyberspace and Delhi Declarations comprises four to five norms that have already been accepted by the UN and the open ended working groups.

"We commit to protect, not damage critical infrastructure or other essential and peaceful systems from cyber-related or enabled means, commit to cooperate to prevent, mitigate and investigate cyber incidents, and other malicious activities in cyberspace. In particular, when it comes to ransomware," Pant said while reading excerpts of the proposed Delhi Declarations.

"Commit to protect and not disturb the software supply chain and finally, commit to respect international law and the rule of law in cyberspace and commit to protecting the humanitarian sector. There is also a longer-term plan that has been made to help support the implementation of the framework. This is what I bring to the table," Pant said.

He also said that it is necessary to have governance structures in place, and the people have to be trained on cyber hygiene, which involves standard operating procedures for various actions, cyber crisis management plans, audits etc.

"Technology will involve everything, which is today being discussed as part of zero trust architecture. So, right from the endpoint, the identity and access management to the network security to data security to cloud and to applications, everything will have to be catered for," Pant said.

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

*Subscribe to Business Standard digital and get complimentary access to The New York Times

Smart Quarterly

₹900

3 Months

₹300/Month

SAVE 25%

Smart Essential

₹2,700

1 Year

₹225/Month

SAVE 46%
*Complimentary New York Times access for the 2nd year will be given after 12 months

Super Saver

₹3,900

2 Years

₹162/Month

Subscribe

Renews automatically, cancel anytime

Here’s what’s included in our digital subscription plans

Exclusive premium stories online

  • Over 30 premium stories daily, handpicked by our editors

Complimentary Access to The New York Times

  • News, Games, Cooking, Audio, Wirecutter & The Athletic

Business Standard Epaper

  • Digital replica of our daily newspaper — with options to read, save, and share

Curated Newsletters

  • Insights on markets, finance, politics, tech, and more delivered to your inbox

Market Analysis & Investment Insights

  • In-depth market analysis & insights with access to The Smart Investor

Archives

  • Repository of articles and publications dating back to 1997

Ad-free Reading

  • Uninterrupted reading experience with no advertisements

Seamless Access Across All Devices

  • Access Business Standard across devices — mobile, tablet, or PC, via web or app

More From This Section

Topics :CybercrimeDelhiG20

First Published: Jun 05 2023 | 9:57 PM IST

Next Story