Speaking at the Asia Economic Dialogue on March 1, 2026, former Indian foreign secretary Nirupama Rao issued a stark warning about the geopolitical implications of technology dependence. She argued that for India to maintain its strategic autonomy, it must develop sovereign capabilities in critical technology sectors, most notably Artificial Intelligence (AI). Rao cautioned that an over-reliance on "borrowed algorithms" from foreign nations could lead to a trade-off where India "may gain efficiency but lose autonomy." Her address framed technological sovereignty not as a commercial goal but as a national security imperative, listing AI, semiconductors, telecommunications, space, and cybersecurity as foundational "sovereignty platforms."
The core of Rao's argument is a call for a national strategy focused on achieving technological self-reliance to navigate a volatile global landscape. This landscape is defined by great power competition, the "weaponisation of interdependence," and fragile global institutions.
Key Policy Points:
This policy perspective has wide-ranging implications for various sectors in India:
A national strategy centered on technological sovereignty would have profound long-term impacts:
For organizations and policymakers in India, Rao's speech suggests a clear action plan:
Nirupama Rao speaks at the Asia Economic Dialogue.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.