ismg summit logo

November 13, 2024

Cybersecurity Summit: Mumbai

Grand Hyatt, Mumbai

Event Overview

As one of the world’s leading digital economies, India is witnessing significant investments in cybersecurity aimed at safeguarding its critical infrastructure, businesses and citizen data. The country’s cybersecurity landscape is characterized by rapid technological advancements, resulting in digital disruptions, and exposing it to cyberthreats and vulnerabilities.

CISOs have the daunting task of defending against the digital disruptions by applying three key principles to cybersecurity: refresh, redefine and reimagine.

Security leaders face a constant challenge in spearheading change to make security possible across the organization by exploring new ways of conducting business and establishing innovation and leadership.

To explore their innovation and experiential learning, ISMG Cybersecurity Summit: Mumbai will bring together leading cybersecurity digital experts and thought leaders to discuss digital resilience. The conference will cover various topics, including IoT risk, India’s cybersecurity initiatives, the Digital Personal Data Protection Act and its implications, decoding security, and critical infrastructure vulnerabilities, among other pressing issues. Security experts from technology partner organizations will share insights on the best practices for business transformation and protecting organizations against emerging threats.

You can earn CPE credits by attending ISMG’s Cybersecurity Summit. 

Venue

Grand Hyatt, Mumbai

Bandra Kurla Complex, Mumbai, Maharashtra – 400055

Advisors

Guiding Our Summit With Industry Expertise

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities, enabling attendees to apply the insights and learnings to their daily work.

Shivangi Nadkarni

Co-founder & CEO, Arrka

Mathan Babu Kasilingam

CISO, Vodafone Idea Limited

Balaji Venkateshwar

Former CISO, Bombay Stock Exchange Limited

Kavita Kadambi

CISO, Infosys Ltd

Preet Paramjit Singh

Group Chief Information Security & Privacy Officer, Avenue Supermarts Ltd

Nirav Hiradhar

CISO, CDSL Insurance Repository Limited

Deval Mazmudar

Cybersecurity Advisory, TJSB Bank and former CISO, IndusInd Bank

Dr. Pawan K Sharma

CISO, Tata Motors

Sunil Kulkarni

CISO, Protean eGov Technologies

Mihirr P Thaker

Chief Information Security Officer, ALLCARGO LOGISTICS LIMITED

AVM (Dr) Devesh Vatsa

Advisor Cyber Security and Critical Technologies, DATA SECURITY COUNCIL OF INDIA (DSCI)

Pawan Chawla

CISO and Data Privacy and Protection Officer, Tata AIA Life Insurance

Vikram Dhanda

CISO, Virtusa

Prof. Ganesh Ramakrishnan

Bank of Baroda Chair Professor in Digital Entrepreneurship, Dept of CSE, PI of BharatGen initiative funded by DST.

Amit Dubey

Cyber Security Expert and Member Police Technology Mission, Govt. of UP

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Agenda Highlights

  • Quantum Agility: A Cybersecurity Perspective
  • AI Powered Cybersecurity: Advanced Threat Detection and Response
  • Demystifying the DPDP Act
  • Acquiring and Operationalizing Threat Intelligence
  • Innovating and Thriving in a Digital Economy

Agenda

Registration & Breakfast

Welcome and Opening Remarks

Jaspal Singh Sawhney

Chief Information Security and Privacy Officer, Tata Communications

Plenary: Demystifying the DPDP Act: A Walkthrough of How Enterprises Need to Comply

With terms such as “data protection” and “privacy” having multiple interpretations, policymakers find it difficult to establish an appropriate framework.

How is India’s data protection and privacy policy defining the compromise of critical systems and information, targeted scanning or probing of critical networks, data breach reporting, and establishing privacy while enabling a secure ecosystem?

The session will cover:

  • Changes in data protection and privacy frameworks in this digitization era;
  • The importance of balancing security and convenience while ensuring data protection and privacy;
  • What does the DPDP Act mean for CISOs, and how ready are they to comply?
  • Jaspal Singh Sawhney, Chief Information Security and Privacy Officer, Tata Communications

AVM (Dr) Devesh Vatsa

Advisor Cyber Security and Critical Technologies, DATA SECURITY COUNCIL OF INDIA (DSCI)

Keynote: Is Enterprise Security Leadership on the Right Path to Build a Cyber-Resilient Organization? What Needs to Change?

With cyber threats rampant, enterprise security leadership plays a crucial role, whether it gives the organization a cybersecurity advantage or puts it at risk.

The big focus across enterprises today is to build resiliency across and how effective is the leadership in guiding the organization in the right path. While the top leaders and management play a critical role, the security leadership is going to change the shape of the organization, as collaborative leaders promote cross-functional communication and cooperation, break down silos. What needs to change from our traditional forms of leadership and evolve as new leaders?

The keynote session will discuss:

  • Ways to build situation and people-first leaders;
  • Strong decision-making leaders that can influence the board;
  • How to establish cybersecurity accountability across the organization.
  • AVM (Dr) Devesh Vatsa, Advisor Cyber Security and Critical Technologies, DATA SECURITY COUNCIL OF INDIA (DSCI)

Sujith Immanuel Pellican

Head of IT Security - IAM & SIEM, ManageEngine

AI-Driven Threat Intelligence: Is Enterprise Security Tuned In?

It is a big concern for the professional to assess and automate the process of threat detection, anticipate its impact on the organization, and come up with simulation exercises.

Further to this, the daunting task for the CISOs to comply with the DPDP Act also enhances the challenge of understanding where and how to use AI in the threat intelligence action plan, given that the new identities throw up a huge concern.

Against the growing complexities of AI, it is critical to understand how the data is classified, how to protect identities and build continuous monitoring processes in developing a good threat intelligence modelling.

The session will discuss:

  • Understanding the AI maturity across threat intelligence framework;
  • Building an AI-assisted cyber exercise framework for web monitoring;
  • A walk-through of AI models and methodologies in threat detection.
  • Sujith Immanuel Pellican, Head of IT Security – IAM & SIEM, ManageEngine

Ankit Wasnik,

Security Solutions Architect, Qualys

Leveraging Cloud-Native Application Protection Platforms to Enhance Cloud Security and Operational Efficiency

This challenge is particularly critical during the implementation stage of cloud applications, as integrating cloud-native platforms with existing infrastructure can be intricate. As cloud environments grow more dynamic and complex, establishing and maintaining visibility, control, robust security, compliance, effective cost management, and scalability becomes increasingly difficult. To address these challenges, security leaders need to develop a comprehensive, adaptable solution.

The session will cover:

  • How to use cloud-native application protection platforms to streamline integration processes.
  • Building a comprehensive framework for monitoring and analytics to improve visibility.
  • Approaches to optimize performance for cloud environments.
  • Best practices for automating security and compliance processes to ensure scalability and cost-effectiveness.
  • Ankit Wasnik, Security Solutions Architect, Qualys

Networking Break

Panel: AI-Powered Cybersecurity: Advanced Threat Detection and Response

The panelists will examine how AI-powered tools boost the effectiveness of cybersecurity defenses by predicting, identifying and mitigating threats in real time. The session will explore the integration of AI with existing cybersecurity frameworks, the challenges faced in deployment and the future outlook of AI in cybersecurity. 

The session will cover: 

  • The effectiveness of AI algorithms in detecting sophisticated cyberthreats; 
  • How the integration of AI with traditional cybersecurity measures can enhance protection; 
  • Future trends and potential challenges in AI-driven cybersecurity. 
  • Abhijit Chakravarty, Executive Vice President – Networks & Cyber Security, Kotak Mahindra Bank 
  • Khushbu Jain, Managing Partner, Ark Legal 
  • Ritesh Bhatia, Founding Director – Cyber Crime Investigations, Cyber Security and Data Privacy, V4WEB Cybersecurity

Fireside: Are Organizations Ready for AI Governance? CISO’s Role

These frameworks are designed to ensure AI is used ethically and transparently, devoid of bias, thoroughly tested and accurate. Today’s CISOs play a crucial role in ensuring their organizations adhere to their respective AI governance frameworks. They are also responsible for ensuring that the use of AI does not compromise data security and privacy, preventing unauthorized use, collection or disclosure of customer data and mitigating vulnerabilities that could expose networks to malicious attacks.

The session will cover:

  • Top strategies for CISOs to ensure their organizations adhere to AI governance frameworks;
  • Key strategies for CISOs to prevent data leaks and maintain data security within AI systems;
  • How to improve monitoring capabilities to adapt to rapidly evolving AI tools and solutions.
  • Pramod Dubey, Executive Director, DPO & CISO, GreenPoint Global
  • Vikram Danda, CISO, Virtusa

Raja Ukil,

Chief Customer Success Officer and Global Head - Strategic Alliances, ColorTokens

Achieving True Digital Resilience: Creating a Breach-Ready Enterprise

This session covers the shift from a reactive defense to a proactive, breach-ready strategy. Discover how zero trust microsegmentation can reduce attack surfaces, contain threats in real time, and ensure agility and trust in a digital-first world. Join us to strengthen your enterprise against evolving threats.

The session will cover:

  1. Practical challenges in creating a breach-ready enterprise;
  2. How to build a companywide culture of cyber resilience;
  3. How to measure the ROI of resilience investments.
  • Raja Ukil, Chief Customer Success Officer and Global Head – Strategic Alliances, ColorTokens

Acquiring and Operationalizing Threat Intelligence in OT Environments

Security teams responsible for OT security and CISOs face difficulties in securing these networks, dealing with issues such as maintaining uptime, achieving visibility and asset discovery. Many of these networks use outdated operating systems and irreplaceable devices, complicating the task further. 

The session will cover: 

  • The nuances of gathering threat intelligence for OT environments and the availability of specialist feeds; 
  • Effective use of intelligence, linking cybersecurity concerns to business context and OT devices; 
  • Challenges in implementing threat intelligence-based mitigations in OT settings. 
  • Mihirr P Thaker,  Chief Information Security Officer, ALLCARGO LOGISTICS LIMITED
  • Yogesh Kulkarni, General Manager, Regional CISO -Intellectual Property, Head of Cyber Security Resilience, Wipro Limited
  • Aditya Sarangapani, Head- Cyber Threat Response Group, WNS

Fireside: OT & IoT Risks: Is It a CISO’s Problem?

The reason for this is a lack of understanding of how OT, IoT and cybersecurity are structured and how the entire ecosystem is built.

Threat actors target not only internet-connected devices and applications but also industrial control systems and associated OT infrastructure, which are essential components of critical infrastructure sectors.

The key argument that most witness is about accountability and how the responsibilities are defined for OT, IoT and cybersecurity in assessing their true potential for business growth.

The fireside chat will help understand how the entire structure is evolving and how CISOs need to be responsible for assessing OT risks.

The session will cover: 

  • Mapping all endpoints and identifying risk across IT, OT and ICS environments;
  • Use cases for developing a 360-degree enterprise security architecture;
  • Establishing accountability toward protecting the environment;
  • The challenges security leaders face in building a holistic security architecture. 
  • Sunil Kulkarni, CISO, Protean eGov Technologies
  • Kunal Dadia, Chief of R&D and Operations, Mishon Solutions

Panel: API Security: The New Battleground for CISOs. Can We Combat?

Although APIs are important for accelerating product delivery and enhancing customer experience, they pose a challenge for security leaders. As APIs make headlines with extensive data breaches and leaks, API security has become a new battleground for CISOs.  

  

Modern CISOs recognize the need to consolidate web applications and API security to safeguard customer data while fueling business innovation, but they often struggle to balance API security and innovation. 

The session will cover: 

  • Use cases related to how APIs can be vulnerable to breaches; 
  • Why attackers view APIs as easier targets and how to enhance API management; 
  • Methods to secure APIs and establish resiliency. 
  • Deval Mazmudar, Cybersecurity Advisory, TJSB Bank and former CISO, IndusInd Bank
  • Pawan Chawla, CISO and Data Privacy and Protection Officer, Tata AIA Life Insurance 
  • Abhishek Jha, CISO, Citi Global Markets India Pvt Limited
  • Sandesh Jadhav, Global Data Privacy Officer, Wipro

     

Fireside: Chronicles of AI: Driving Digital Innovation, Business Growth and Cybersecurity

As organizations build their AI strategies, they need to understand both its transformative potential and its practical implementation across the enterprise ecosystem.

The key challenge for business and security leaders lies in navigating these powerful new tools. How can they best understand AI’s capabilities and limitations? What strategies help mitigate algorithmic bias while ensuring positive outcomes? How can organizations balance innovation with security requirements?

This session explores real-world AI applications that have revolutionized business operations and strengthened cybersecurity defenses. Through practical examples, the session will examine how organizations are successfully leveraging AI to drive growth while maintaining robust security protocols.

 

The session will cover:

• How AI innovations deliver measurable business outcomes

• Building effective AI-powered security defenses and risk management systems

• Strategies for integrating AI to enhance both organizational growth and cybersecurity

  • Prof. Ganesh Ramakrishnan, Bank of Baroda Chair Professor in Digital Entrepreneurship, Dept of CSE, PI of BharatGen initiative funded by DST.
  • Balaji Venkateshwar, Former CISO, Bombay Stock Exchange Limited

Sachin Khalap

Practice Head-GRC & Data Privacy, Cybersecurity, Tata Consultancy

Shivani Arni

Deputy Group CISO, Mahindra Group

Vaishali Bhagwat

Cyber Law Practitioner

Panel: Breach Management: CISOs’ Practical Approach and Response

Recent incidents, including the ransomware attack on Star Health, underscore the need for security leaders to re-establish organizational reputation amid significant damages.

It is critical for security leaders to be adept at managing post-breach response for when the inevitable occurs, balancing the need to protect organizational reputation with the obligation to safeguard customer data security and privacy.

The session will cover:

  • Practical steps for managing post-breach response;
  • Crafting effective narratives in the age of social media;
  • Understanding tools, techniques and procedures used by attackers, and applying remediation measures to address vulnerabilities.
  • Sachin Khalap, Practice Head-GRC & Data Privacy, Cybersecurity, Tata Consultancy
  • Shivani Arni, Deputy Group CISO, Mahindra Group

Networking Break

CISO Circle: CISOs’ Vision for 2025: Technologies That Shape Enterprises

Progression into the new year of 2025 also calls for a renewed focus. Many factors could affect CISOs – including their role, leadership, priorities, investments, innovation and strategies.  

This session includes a deep dive into understanding CISOs’ vision for 2025 and the technologies they can use to drive enterprise growth and foster cyber resilience. 

  • Prof. (Adv.) Dipak G. Parmar, Founder, Cyber-IPR , Former DPIIT IPR Chair Professor
  • Hetal Presswala, CISO, Kalpataru Projects International Ltd
  • Rishi Das, Director – Information Security & Digital Transformation, Indian Navy

Closing Remarks & Cocktail Reception

Masterclass: Cyber Warriors of Tomorrow: Cybersecurity Lessons From the Trenches

Led by top-tier security practitioners, this masterclass is an interactive session focused on developing effective leadership skills essential for defending organizations against cyberthreats. As the cyber warriors of tomorrow, cybersecurity professionals need to identify the existing skills gap in the industry and learn how to bridge it. This includes developing soft skills and technological expertise while fostering an ethical approach to effective decision-making. Most importantly, security practitioners need to identify their own leadership qualities that reflect their passion and ambition.
 
Security professionals need to assess the evolving regulatory landscape, which is shaped by various regulatory bodies across sectors, and understand the compliance demands required to meet technological and organizational cybersecurity objectives. Understanding these dynamics is crucial in paving the way toward building leadership and decision-making skills. Throughout the session, practitioners will learn how to reassess their readiness and strengthen their skills to prepare for a cyberwar by developing techniques from military operations to assess risk while drawing parallels with the civil war.
 
The session will cover:
• The art of deterrence in cyberwar and key leadership lessons;
• Preparing for contingencies and understanding constraining factors;
• DPDP Act: A new approach to cybersecurity and what needs to change.
 
 

AVM (Dr) Devesh Vatsa, Advisor Cyber Security and Critical Technologies, DATA SECURITY COUNCIL OF INDIA (DSCI)

Our Partners

Express Interest

Individual Practitioner
Pass

Single Issue Pass
18,300
  • 1 Full Conference Access Pass
  • Multiple Networking Opportunities with industry leaders and peers
  • 7 hours of CPE Credits
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership
  • Professional Headshot
  • Access to Specialized Masterclasses
  • Exclusive Lunch and Cocktail Receptions
  • Participation in Interactive Workshops and Roundtables
  • Priority Seating at Keynote Sessions
  • Access to Exhibitor Showcases and Product Demonstrations

Team Practitioner
Pass

Buy 4 Passes, Get 1 Complimentary
91,500
  • 4+1 Full Conference Access Pass
  • Multiple Networking Opportunities with industry leaders and peers
  • 7 Hours of CPE Credits per team member
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership for Each Team Member
  • Access to Specialized Masterclasses
  • Exclusive Team Lunch and Cocktail Receptions
  • Priority Seating at Keynote Sessions
  • Access to Exhibitor Showcases and Product Demonstrations
  • Custom/Tailored Packages Available at Discounted Rates
Most Popular

Vendor/Commercial/Business
Pass

Single Issue Pass
54,900
  • Full Day Access to the conference
  • Designed for BD, Sales, and Marketing professionals from cybersecurity and IT solution providers, consultants, and legal firms
  • Connect with senior cybersecurity professionals and decision-makers
  • 3+ Hours of Face-to-Face Networking
  • Networking Lunch with Industry Peers
  • Evening Reception
  • Evaluate Sponsorship Opportunities for 2025
  • Explore Emerging Trends and Solutions with Key Stakeholders
  • Access to Key Sessions Relevant to Your Business Interests

*All prices are exclusive of GST

*Note – Full Conference pass is applicable to information security and IT practitioners. For profiles other than IT and IS practitioners, please get in touch with us apac.contact@ismg-events.com or contact our ISMG representative on  +91 9819036179

Submit Contact Details

The Summit Experience

Express Interest

Individual Pass

Single Issue Pass
12,500
  • 1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

Team Pass

Buy 4 Passes, Get 1 Complimentary
63000
50,000
  • 4+1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot
Popular

Enterprise Pass

Buy 7 Passes, Get 2 Complimentary
90000
87,500
  • 7+2 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

*All prices are exclusive of GST

Please get in touch with us apac.contact@ismg-events.com
or contact our ISMG representative on  +91 9819036179

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025