School Training On Child Abuse And Cyber Security

India’s Prime Minister Narendra Modi’s constituency Varanasi, an awareness campaign was held for school students making them aware of child abuse and cybersecurity.

The school children’s massive awareness campaign titled “BeAware” was launched by Dr Jagadeesh Pillai and two of his disciples and Social Activists Anand Js and Sushma Choubey in Cantonment Board School.

The campaign focuses on creating awareness among school children about Child Abuse and various threats on the Internet which includes Blue Whale, Momo Challenge etc.

This is the first time in the state that such a voluntary campaign on these two topics are being conducted.

“The energy and enthusiasm of the kids are really wonderful. It gives us the energy and motivation to continue our mission. We are sure that our campaign will bring a positive impact on the safety and security of the children,” said Sushma Choubey.

While the brain behind this initiative Dr Jagadeesh Pillai, a four times Guinness World Records Holder and the First Guinness World Records holder from Varanasi, said that he is really proud of what they (Anand & Sushma) are doing for the society. 

“It gives me immense pleasure to see that two of my disciples working towards the betterment of the society. It is like a dream come true for me. We look forward to creating more and more awareness among children on issues like these in the future.”

Anand was excited as ever. He said “It was a month back when he (Dr Jagadeesh Pillai) told me that we should conduct free awareness classes to children against issues like cyber threats and child abuse. I also understood the relevance of it. 

“Then Sushma Choubey, a noted Social Activist and a Political Science student of Vasant Kanya Mahavidyalaya, Varanasi joined us. Her support was incredible. The three of us then started the campaign in Cantonment Board School. Really happy to see the support given by the staffs and management. 

“Moreover, we have the satisfaction that we have done something useful for society. More than 600 students were trained in the first phase. There is a long way to go.”

East Coast Daily:

You Might Also Read:

Cybersecurity Training For High School Students

« British Airways Hack Was Much Bigger Than First Admitted
Realistic Fake Videos Threaten Democracy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Institute for Cybersecurity & Privacy (ICSP) -  University of Georgia

Institute for Cybersecurity & Privacy (ICSP) - University of Georgia

The goal of ICSP is to become a state hub for cybersecurity research and education, including multidisciplinary programs and research opportunities, outreach activities, and industry partnership.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Rocheston

Rocheston

Rocheston is an innovation company with cutting-edge research and development in emerging technologies such as Cybersecurity, Internet of Things, Big Data and automation.

IQ4 - Cybersecurity Workforce Alliance (CWA)

IQ4 - Cybersecurity Workforce Alliance (CWA)

Cybersecurity Workforce Alliance, a division of iQ4, is an organization comprised of a diverse range of professionals dedicated to the development of the cybersecurity workforce.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.