Wednesday, 25th June 2025

The Critical Role of the SOC in Modern Cyber Defense

6:30 PM to 9:30 PM IST | Jio Convention Center, Mumbai

Event Overview

In the evolving threat landscape, the rise of advanced persistent threats (APTs), ransomware, and insider attacks have amplified the need for a robust SOC solution. The global average cost of a data breach spiked in 2024, increasing by 10% in a year to USD 4.88 million, the biggest jump since the pandemic.

How can you confidently mitigate the impact of breaches? What role does a well-equipped SOC play in identifying threats in real time? The daunting task for security leaders is to transform SOC to establish a proactive threat-hunting and incident response. Are you able to apply continuous monitoring and threat detection capabilities to the modern SOC to identify threats in real time? Can you automate the incidence response mechanism in a SOC environment to reduce human error?

You are invited to join us at this exclusive CXO roundtable jointly hosted by Palo Alto Networks and IBM.

During this interactive session, learn from experts and network with industry peers to discover: 

  • Why a strong SOC solution is critical to your cybersecurity strategy;
  • How do you strengthen your security posture using the common interface of EDR, SIEM, and SOAR for effective detection;
  • How to contextualize threat intelligence to equip SOC teams for faster detection and response;
  • How to consolidate all the data and tools into a single AI-driven platform to enhance SOC efficiency and prevent threats at scale;
  • An integrated approach to building next-generation SOC to establish proactive risk-reduction, improved visibility, and faster response time.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.


Geetha Nandikotkur

VP and Conference Chair – Asia, Middle East and Africa

ISMG (Moderator)


Huzefa Motiwala

Sr. Director, Systems Engineering, India & SAARC

Palo Alto Networks

 

 
Shiva Swaroopa

Practice Head – Cybersecurity


IBM

Speakers

Join your peers and thought-leaders Munish Khetrapal and Rajesh Shewani with Geetha Nandikotkur to discuss AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI​.

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Venue

Jio Convention Center, Mumbai

Jio World Centre, G Block, Bandra Kurla Complex,

Bandra East, Mumbai, 

Underwritten by

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Its mission is to be the cybersecurity partner of choice, protecting the digital way of life. The company helps address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation and orchestration.

IBM is a leading provider of global hybrid cloud, AI and consulting expertise. It helps clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. More than 4,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on its hybrid cloud platform and Red Hat OpenShift. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and consulting deliver open and flexible options to its clients.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

August 19-20

Virtual Summit: Cybersecurity Implications of AI, Global

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap