{"id":274,"date":"2025-12-19T10:22:14","date_gmt":"2025-12-19T10:22:14","guid":{"rendered":"https:\/\/ignite.trithucmoi.us\/?p=274"},"modified":"2025-12-19T10:22:14","modified_gmt":"2025-12-19T10:22:14","slug":"vien-ignite-tham-du-toa-dam-luat-an-ninh-mang-2025-thuc-day-nang-luc-tu-chu-cong-nghe","status":"publish","type":"post","link":"https:\/\/ignitein.org\/en\/vien-ignite-tham-du-toa-dam-luat-an-ninh-mang-2025-thuc-day-nang-luc-tu-chu-cong-nghe\/","title":{"rendered":"IGNITE Institute Attends Seminar on \u201cCybersecurity Law 2025: Advancing Technological Autonomy\u201d"},"content":{"rendered":"<p class=\"translation-block\">On November 17, representing the IGNITE Institute, <strong>Assoc. Prof. Dr. Nguyen Ai Viet \u2013 Director<\/strong> \u2013 attended and presented at the seminar titled<strong>\u201cCybersecurity Law 2025: Advancing Technological Autonomy,\u201d <\/strong><strong>chaired by the National Cybersecurity Association.<\/strong> The event was attended by representatives from regulatory agencies, technology enterprises, and experts in the field of information security.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/ignite.trithucmoi.us\/wp-content\/uploads\/2025\/12\/image-1024x684.jpeg\" alt=\"\" class=\"wp-image-275\" srcset=\"https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-1024x684.jpeg 1024w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-300x200.jpeg 300w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-768x513.jpeg 768w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-1536x1025.jpeg 1536w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-18x12.jpeg 18w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image-600x400.jpeg 600w, https:\/\/ignitein.org\/wp-content\/uploads\/2025\/12\/image.jpeg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Perspectives on the Domestic Defense Layer in Cybersecurity Architecture<\/strong><\/h2>\n\n\n\n<p class=\"translation-block\">In his presentation, Director Nguyen Ai Viet emphasized the role of the domestic cyber defense layer \u2013 a critical component of the national cybersecurity architecture designed to ensure the capability to proactively respond to escalating threats.\n\nHe asserted that developing a Vietnam-owned ecosystem of cybersecurity products and services is a prerequisite for strengthening technological autonomy, reducing reliance on foreign solutions, and enhancing the ability to protect national digital sovereignty.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Solutions to Enhance Technological Autonomy<\/strong><\/h2>\n\n\n\n<p>During his speech and the open discussion session, Assoc. Prof. Dr. Nguyen Ai Viet proposed a series of key solutions to fortify Vietnam's endogenous capacity in cybersecurity, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\"><strong>Elevating cybersecurity governance awareness<\/strong>, standardizing the capabilities of technical staff, and intensifying specialized training.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Increasing budget investment<\/strong> while establishing mechanisms to mobilize social resources for national cybersecurity projects and programs.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Building a clear regulatory framework for the domestic defense layer<\/strong>, including evaluation criteria, quality standards, and transparency requirements for cybersecurity products.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Permitting experimentation \u2013 surveying \u2013 penetration testing, and deploying \"honeypot\" environments<\/strong> to improve detection capabilities, defense mechanisms, and increase the system's \"immunity\" against increasingly sophisticated attack methods.<\/li>\n<\/ul>\n\n\n\n<p>These proposals aim to create a favorable legal and technical environment for Vietnam to develop cybersecurity solutions that bear its own identity and capabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Multi-dimensional Dialogue Forum: Regulators \u2013 Enterprises \u2013 Experts<\/strong><\/h2>\n\n\n\n<p class=\"translation-block\">The seminar served as a gathering point for in-depth opinions from managers, businesses, and experts, focusing on the spirit of<strong> \u201cEcosystem thinking \u2013 Alliance action.\u201d<\/strong>.<br>The forum reaffirmed the United Nations' message:<br><strong>\n\u201cNo one is safe until everyone is safe online.\u201d<\/p>\n\n\n\n<p>The open exchange environment helped parties clarify cooperation needs, standardize processes, and build unified cybersecurity solutions, aiming to strengthen community power in cyber defense.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>IGNITE Institute's Cooperation Orientation<\/strong><\/h2>\n\n\n\n<p class=\"translation-block\">The contributions of the IGNITE Institute at the event affirm the role of technological autonomy in protecting digital sovereignty and developing a sustainable cybersecurity foundation for Vietnam.<br>The IGNITE Institute will continue to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Promote Research &amp; Development (R&amp;D) in cybersecurity and digital transformation;<br><\/li>\n\n\n\n<li>Accompany regulatory agencies, enterprises, and professional organizations in implementing cybersecurity standards and solutions;<br><\/li>\n\n\n\n<li class=\"translation-block\">Contribute to building a  <strong>safe \u2013 trusted \u2013 sustainable cyberspace <\/strong>serving the national digital transformation process.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Ng\u00e0y 17\/11, \u0111\u1ea1i di\u1ec7n Vi\u1ec7n IGNITE \u2013 PGS.TS Nguy\u1ec5n \u00c1i Vi\u1ec7t, Vi\u1ec7n tr\u01b0\u1edfng \u2013 \u0111\u00e3 tham d\u1ef1 v\u00e0 tr\u00ecnh b\u00e0y tham lu\u1eadn t\u1ea1i t\u1ecda \u0111\u00e0m&hellip;<\/p>","protected":false},"author":1,"featured_media":275,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tin-tuc"],"_links":{"self":[{"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/posts\/274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":1,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":276,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/posts\/274\/revisions\/276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/media\/275"}],"wp:attachment":[{"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ignitein.org\/en\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}