Securing India’s Digital Future: Lessons from Health, Identity, and Infrastructure

Vulncon 2025

2025/06/15

Discuss the unique challenges and best practices from securing healthcare, identity systems, and other citizen-facing critical infrastructure.

Panel Discussion Video

Related Blog Post

AI Generated Summary

AI Generated Content Disclaimer

Note: This summary is AI-generated and may contain inaccuracies, errors, or omissions. If you spot any issues, please contact the site owner for corrections. Errors or omissions are unintended.

This panel discussion at VULNCON 2025 brought together key leaders from defense, government, and private sectors to discuss “Securing India’s Digital Future”. Moderated by Anant Shrivastava, the panel featured Sandeep Khanna (Director & CISO, UIDAI), Chaitanya K K (Wing Commander, Indian Air Force), and Lt Cdr Amit Pal Singh (retired Indian Navy, now with Siemens Healthineers).

Panelists

Key Themes

1. Mission Differences: National Security vs. Business Goals

2. Resilience by Default

3. Healthcare Digital Complexities

Legacy Systems Challenge:

Data and Research:

Shared Responsibility Model:

4. Agility, Governance, and Scale at UIDAI

Operating at India’s population scale (10 crore transactions per day) requires agility and innovation:

5. Challenges in Large Federated Networks

Technical Challenges:

Organizational Challenges:

Future Threats - Quantum Computing:

6. Complexity Management at UIDAI

7. Compliance and Regulations

8. User Awareness and Shared Responsibility

Key Insights:

9. Final Thoughts from Panelists

What securing citizen-scale systems means:

Core Takeaway: Securing citizen-scale systems goes beyond technology - it’s fundamentally about earning trust at a population scale. This requires:

Important Concepts:

Actionable Takeaways:

  1. Build systems with security and privacy by design from day one - cannot bolt on later
  2. Adopt resilience by default - assume systems will face threats and disruptions
  3. Implement shared responsibility models - both vendors and end users have responsibilities
  4. Ensure user-friendly systems while educating users about security awareness
  5. Establish baseline security standards for all participants in federated networks
  6. Start preparing for Post-Quantum Cryptography now - begin with digital signatures
  7. Balance agility and innovation with security, governance, and compliance
  8. Build trust at population scale - this is the core of securing citizen-scale systems
  9. Implement three-level audit systems and enforce compliance strictly
  10. Focus on operational continuity under threat, not just compliance