Cybersecurity Summit: Bengaluru
Hybrid Summit April 12 - 13, 2023
With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity Summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
S Srikanth (Advisory Member)
CISO
Tata Electronics
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Reddy is a distinguished fellow in the EastWest Institute in the U.S. and the Observer Research Foundation in India. As a former deputy national security advisor of India, she was responsible for cybersecurity and internal and external security issues. She...
Kumar K V
Group CIO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Prakash Padariya
Senior VP & Global CISO
OYO
Padariya is the head of information security at GE's India Technology Center. He has over 15 years of core information, cybersecurity, and technology experience with Fortune 100 companies such as Royal Bank of Scotland, IBM, and Accenture, with professional experience...
Jacxine Fernandez
Vice President - Information Security
Bangalore International Airport Ltd.
Fernandez is the vice president, information security, at Bangalore International Airport. He is a risk management, information security, and business continuity professional with experience in managing risk and security operations and business continuity within complex working environments.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.
View Agenda
Welcome and Opening Remarks - ISMG
  • 09:15 AM
  • 09:29 AM
Keynote: Macroeconomic Uncertainty: Impact on Cybersecurity and Innovations in Cyber Defenses

The macroeconomic uncertainty has put pressure on security practitioners with the daunting task of protecting critical infrastructures from ransomware attacks and managing the cybersecurity programs to support business growth, besides building innovations and counter strategies to fight evolving threats. 


The keynote will cover: 

  • Challenges and opportunities for enterprise security during the economic uncertainty 

  • New lessons for the CISOs based on past and new strategies to respond to the challenges 

  • New technologies to bolster cyber defenses 

  • 09:30 AM
  • 09:59 AM
Plenary: Dark Web and Threat Intelligence: Understanding Your Enemy

The big challenge impacting enterprise security today is the dark web - a seemingly ungovernable subset of the internet where you can browse and communicate with complete anonymity. Through the use of the dark web and cryptocurrencies, criminals have been able to successfully run the “crime-as-a-service" model. However, businesses and the security agencies have been able to make very little, if any, impact. 

 

How can you make your enterprises cybercrime-resilient, and how should law enforcement respond to this menace? How do security practitioners leverage threat intelligence capabilities to navigate through the dark web? 

  

The session will cover:   

  • Challenges posed by the dark web and cryptocurrencies for enterprise security   

  • How is law enforcement responding to the investigation process and building technical capabilities?  

  • New techniques and approaches used to combat security threats from the dark web   

  • Actionable threat intelligence capabilities in understanding the enemy 

  • 10:05 AM
  • 10:34 AM
Spotlight: Cloud Momentum: Are CISOs Making the Right Moves?

Statistics say over 90% of organizations have migrated to cloud, and this voluminous momentum has led to new risks with the challenge of limited visibility. This has made it more difficult for security and network operations to detect and respond to security threats. The public cloud providers also offer limited security controls, making it easier for threat actors to find and exploit vulnerabilities. 

 

Application insecurity continues to pose risks to organizations around the world, especially those that use weak credentials or do not patch vulnerabilities immediately. 

 

What should be the right move to secure applications and critical assets on cloud that has less visibility? Are CISOs and cloud service providers on the same track in deploying the right tools? 

 

The session will cover:  

  • Building a comprehensive security strategy that includes security controls, monitoring and incident response capabilities 

  • How to fix cloud misconfigurations, which is the primary cause of a data breach? 

  • Building visibility into the hybrid and multi-cloud environment

  • 10:40 AM
  • 11:09 AM
Networking Break
  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:49 AM
Track A
Moving Beyond SIEM: Readying Yourself to SOAR

As automation and cloud adoption become priorities, security teams are modernizing their security operations center. Legacy and outdated technologies like SIEM are being replaced with security orchestration, automation and response or SOAR. 

The two technologies share some common components but serve different purposes. What are the key things to consider before adopting SOAR? 

  

The session will cover: 

 

  • Has SIEM really lost its relevance? 

  • Can SIEM and SOAR coexist in a hybrid cloud environment? 

  • How can cloud adoption help in better SOAR adoption?

  • 11:30 AM
  • 11:49 AM
Track B
Cyber Insurance’s Response to Rising Ransomware Attacks: The Latest Hurdles

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of the unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are significant concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks.  Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is, “to what extent is cyber insurance fueling ransomware attacks”?   

    

The session will also cover:   

  •  Will ransomware ultimately lead to the fall of cyber insurance companies?   

  •  How the cyber insurance industry must approach the problem of ransomware   

  •  The growing influence of insurers on the security programs for enterprises 

  • 11:55 AM
  • 12:24 PM
Track A
Cutting Through the Reality Distortion Field of ChatGPT

ChatGPT and other transformative and generative models have awakened the business world to the realities of intelligent machine-human interfaces.  Advances in natural language processing will help machines understand human intent, thus providing better customer insights and experiences, for instance. These models will become more powerful and accurate with reinforced learning. 

  

The speaker will discuss what to expect with regard to ChatGPT’s potential, limitations and business use cases. 

  • 11:55 AM
  • 12:24 PM
Track B
EDR to XDR: A CISO’s Journey

Cybersecurity has evolved from securing siloed endpoint devices with EDR solutions to securing users, devices and workloads in a perimeter-less world. With employees working from multiple locations and workloads on multicloud, visibility has become a core challenge for CISOs. From EDR, we moved to managed detection and response to manage tens of thousands of endpoints, which helped in the face of cybersecurity skill shortages.  

 

The increased rate and sophistication of threats call for a more proactive approach with continuous monitoring, threat prioritization, and threat hunting. There is a need for threat response, immediate remediation and preventing breaches from spreading laterally. And this is what an XDR platform can offer.   

 

The session will cover: 

 

  • How to make a transition from EDR to XDR - the challenges 

  • Aligning XDR with the existing detection tools - use case 

  • Leveraging XDR to its fullest capabilities  

  • 12:25 PM
  • 12:44 PM
Track A
Operationalizing Zero Trust to Win Your Cyber War

The primary challenge with zero trust is keeping it simple, operationally efficient and easy to understand, with predictably positive outcomes.  This is achieved across various systems, not with different solutions, policies, and technologies, but with an effective strategy to ensure minimal friction.  

 

Operationalizing zero trust is critical for adding a layer of agility to modern networks that otherwise seems impossible in traditional network designs.  

 

Zero trust is said to deliver a security strategy that helps secure access in a way that frustrates attackers, not users.  

  

The session will cover:  

  • How zero trust will transform your network security and function as a business enabler by focusing on the top business objectives   

  • How to achieve tactical and operational goals with zero trust  

  • How to measure the success metrics of zero trust implementation 

  • 12:25 PM
  • 12:44 PM
Track B
Cybersecurity Mesh Architecture: Establishing a Collaborative Defense

The rapid evolution and sophistication of cyberattacks, and the migration of assets to hybrid multicloud, are creating a complete storm. It’s time to move past siloed security to a more collaborative and flexible approach to security. Organizations are trying cybersecurity mesh architecture designed to make security more composable and scalable by modularizing security functions and enabling them to interoperate through a set of supportive layers.  Like zero trust, the cybersecurity web is focused on reimagining the boundaries of the identity layer and bringing together disparate security tools into a single, interoperable ecosystem.  

The session will cover: 

  • How to secure more with less 

  • Establishing intelligent security by design 

  • Enhancing security collaboration and integration 

  • 12:50 PM
  • 01:14 PM
Track A
Data Privacy vs. Information Security: Being on the Same Track

A debate between a data privacy officer and a CISO on how to juxtapose privacy and security to achieve total compliance. 

 

The session will cover: 

 

  • Establishing compliance with complex regulations along with privacy and security 

  • Privacy by design in security controls 

  • Privacy journey from legacy to controls 

  • 12:50 PM
  • 01:14 PM
Track B
IoT Security: The Good, the Bad and the Ugly

Over the years, organizations have been building new tech and smart devices to autonomously optimize work. However, the increasing use of these connected devices often leads to a broader attack surface and ends up becoming the weakest links for cybercriminals to penetrate inside an organization’s network. 

 

IT leaders are securing more endpoints than ever. The proliferation of IoT devices brings numerous risks, but it also brings new business benefits. The threat is real for operators and manufacturers of connected devices.  

  

The session will cover:    

   

  • IoT risks and who is impacted by them   

  • A reality check of the security-by-design model in IoT   

  • How do malware developers and hackers plan an attack against IoT devices? 

Lunch Break
  • 01:15 PM
  • 01:59 PM
  • 02:00 PM
  • 02:29 PM
Track A
Panel Discussion: Are Digital Currencies the Future? The Security Debate

The Reserve Bank of India has been holding discussions to understand the scope of cryptocurrency in the Indian economy and to formulate regulations and a proper system to govern this. It is also warning cryptocurrency users and traders about the risks associated with the system.  

   

However, experts say bitcoin usage by Indian companies is gaining momentum, and cryptocurrency now has more than five million users in the country.  

 

Reports say over 3,000 investments in India were being done with bitcoin daily.    

   

The panel will discuss:  

   

  • Assessing the risks associated with the use of bitcoin  

  • Are security leaders prepared for the bitcoin regime?  

  • Establishing secure transactions using bitcoin   

  • 02:00 PM
  • 02:29 PM
Track B
Panel Discussion: Building Cyber Resiliency by Design: Effective Frameworks

As organizations embrace (and accelerate) digitalization to offer new and innovative services, the vulnerabilities associated with data and technology will increase. According to research, cybercrime damage is expected to reach $8 trillion in 2023. Almost every organization will be impacted by a cyberattack this year, and it is crucial for businesses to rethink their risk management and incident response strategies.  

  

In the face of an increasing threat landscape, with the growing volume and sophistication of attacks, companies need more than a security solution or governance policy to be prepared for these attacks.  

  

They need a proactive and integrated approach with threat monitoring, threat intelligence, and end-to-end managed services.  

  

That's where cyber resilience comes in. It is not an afterthought, but needs to be built by design. 

  

The panel will discuss:   

    

  • The importance of cyber resilience in today's context, and how do you achieve it in your organization 

  • Cyber resilience versus cybersecurity 

  • How to create a bullet-proof incident response plan 

  • The need for cyber resilience solutions and frameworks 

  • 02:35 PM
  • 02:59 PM
Track A
Securing Industry Control Systems: The Design Challenges

The increasing attacks on ICS networks are a threat the industry can no longer ignore. Organizations in the industrial sector, particularly manufacturing, need to re-evaluate and strategize on how they protect ICS, especially industrial controllers.  

  

The panel will discuss:  

   

  • Typical attack forms on the ICS (OT-IT convergence, increased/accelerated digitalization, digital twin) 

  • Traditional approaches to securing ICS networks (like air gapping) - and why they are inadequate for protection in a converged world of OT and IT 

  • New approaches and best practices to securing ICS networks 

  • 02:35 PM
  • 02:59 PM
Track B
Passwordless Authentication: What Needs to Change in 2023

Passwordless has become the holy grail for user authentication. But there are different interpretations of what passwordless is and is not. Passwords are less common than ever, but they are still used around the world.  Since weak passwords are often the primary reason behind cyberattacks, companies are increasingly investing in biometrics and adaptive authentication.  

 

The session will cover: 

  • How open identity management is evolving 

  • How identity can cater to various risk profiles 

  • What needs to change in 2023? 

Networking Break
  • 03:00 PM
  • 03:14 PM
Fireside Chat: Payments Fraud: How to Stop Cyber Perpetrators

More than 90% of consumers around the world rely on online payments, according to a research study. This, however, brings with it an increase in transaction fraud. Fraudsters are relying on synthetic IDs to carry out various card-related frauds. 

 

Social engineering is also increasingly becoming a deceptive tactic to trick people into divulging information. With so much going on, how can the payment industry tackle the new-age methods to reduce fraud? 

  

The session will cover: 

  

•            The new forms of fraud tactics 

•            The shortcomings of the current defensive approach 

•            What needs to change in 2023 

  • 03:20 PM
  • 03:49 PM
Panel Discussion: Establishing Cybersecurity in the VUCA World: CISOs’ Stakes

We are living in a VUCA world – a world that is volatile, uncertain, complex and ambiguous.  As per India’s policymakers, VUCA is nothing but the  AAJA world - Asthirata, which means volatility or a high rate of change; Anishchita, which means uncertainty and lack of clarity about the present and the future; Jatilata, which means complexity concerning multiple factors that impact critical decisions; and Aspashtata, which means ambiguity about the unprecedented and challenging times in the industry.  

  

We are into 2023, and are witnessing growing chaos in the cybersecurity domain with multiple forms of attacks targeting enterprises.  

  

What kind of conversations do the security teams need to have, what should be their strategies and what is their focus area?  

  

The panel will discuss:  

  

  • Cybersecurity lessons learned from economic uncertainty  

  • New forms of security defenses enterprises have adopted in 2023  

  • What’s top of mind for CISOs in tackling this situation 

  • 03:55 PM
  • 04:29 PM
Closing Remarks
  • 04:30 PM
  • 04:44 PM

With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity Summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

S Srikanth (Advisory Member)
CISO
Tata Electronics
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace

Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Reddy is a distinguished fellow in the EastWest Institute in the U.S. and the Observer Research Foundation in India. As a former deputy national security advisor of India, she was responsible for cybersecurity and internal and external security issues. She...
Kumar K V
Group CIO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Prakash Padariya
Senior VP & Global CISO
OYO
Padariya is the head of information security at GE's India Technology Center. He has over 15 years of core information, cybersecurity, and technology experience with Fortune 100 companies such as Royal Bank of Scotland, IBM, and Accenture, with professional experience...
Jacxine Fernandez
Vice President - Information Security
Bangalore International Airport Ltd.
Fernandez is the vice president, information security, at Bangalore International Airport. He is a risk management, information security, and business continuity professional with experience in managing risk and security operations and business continuity within complex working environments.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.

View Agenda
Welcome and Opening Remarks - ISMG
  • 09:15 AM
  • 09:29 AM
Keynote: Macroeconomic Uncertainty: Impact on Cybersecurity and Innovations in Cyber Defenses

The macroeconomic uncertainty has put pressure on security practitioners with the daunting task of protecting critical infrastructures from ransomware attacks and managing the cybersecurity programs to support business growth, besides building innovations and counter strategies to fight evolving threats. 


The keynote will cover: 

  • Challenges and opportunities for enterprise security during the economic uncertainty 

  • New lessons for the CISOs based on past and new strategies to respond to the challenges 

  • New technologies to bolster cyber defenses 

  • 09:30 AM
  • 09:59 AM
Plenary: Dark Web and Threat Intelligence: Understanding Your Enemy

The big challenge impacting enterprise security today is the dark web - a seemingly ungovernable subset of the internet where you can browse and communicate with complete anonymity. Through the use of the dark web and cryptocurrencies, criminals have been able to successfully run the “crime-as-a-service" model. However, businesses and the security agencies have been able to make very little, if any, impact. 

 

How can you make your enterprises cybercrime-resilient, and how should law enforcement respond to this menace? How do security practitioners leverage threat intelligence capabilities to navigate through the dark web? 

  

The session will cover:   

  • Challenges posed by the dark web and cryptocurrencies for enterprise security   

  • How is law enforcement responding to the investigation process and building technical capabilities?  

  • New techniques and approaches used to combat security threats from the dark web   

  • Actionable threat intelligence capabilities in understanding the enemy 

  • 10:05 AM
  • 10:34 AM
Spotlight: Cloud Momentum: Are CISOs Making the Right Moves?

Statistics say over 90% of organizations have migrated to cloud, and this voluminous momentum has led to new risks with the challenge of limited visibility. This has made it more difficult for security and network operations to detect and respond to security threats. The public cloud providers also offer limited security controls, making it easier for threat actors to find and exploit vulnerabilities. 

 

Application insecurity continues to pose risks to organizations around the world, especially those that use weak credentials or do not patch vulnerabilities immediately. 

 

What should be the right move to secure applications and critical assets on cloud that has less visibility? Are CISOs and cloud service providers on the same track in deploying the right tools? 

 

The session will cover:  

  • Building a comprehensive security strategy that includes security controls, monitoring and incident response capabilities 

  • How to fix cloud misconfigurations, which is the primary cause of a data breach? 

  • Building visibility into the hybrid and multi-cloud environment

  • 10:40 AM
  • 11:09 AM
Networking Break
  • 11:10 AM
  • 11:29 AM
  • 11:30 AM
  • 11:49 AM
Track A
Moving Beyond SIEM: Readying Yourself to SOAR

As automation and cloud adoption become priorities, security teams are modernizing their security operations center. Legacy and outdated technologies like SIEM are being replaced with security orchestration, automation and response or SOAR. 

The two technologies share some common components but serve different purposes. What are the key things to consider before adopting SOAR? 

  

The session will cover: 

 

  • Has SIEM really lost its relevance? 

  • Can SIEM and SOAR coexist in a hybrid cloud environment? 

  • How can cloud adoption help in better SOAR adoption?

  • 11:30 AM
  • 11:49 AM
Track B
Cyber Insurance’s Response to Rising Ransomware Attacks: The Latest Hurdles

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of the unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are significant concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks.  Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is, “to what extent is cyber insurance fueling ransomware attacks”?   

    

The session will also cover:   

  •  Will ransomware ultimately lead to the fall of cyber insurance companies?   

  •  How the cyber insurance industry must approach the problem of ransomware   

  •  The growing influence of insurers on the security programs for enterprises 

  • 11:55 AM
  • 12:24 PM
Track A
Cutting Through the Reality Distortion Field of ChatGPT

ChatGPT and other transformative and generative models have awakened the business world to the realities of intelligent machine-human interfaces.  Advances in natural language processing will help machines understand human intent, thus providing better customer insights and experiences, for instance. These models will become more powerful and accurate with reinforced learning. 

  

The speaker will discuss what to expect with regard to ChatGPT’s potential, limitations and business use cases. 

  • 11:55 AM
  • 12:24 PM
Track B
EDR to XDR: A CISO’s Journey

Cybersecurity has evolved from securing siloed endpoint devices with EDR solutions to securing users, devices and workloads in a perimeter-less world. With employees working from multiple locations and workloads on multicloud, visibility has become a core challenge for CISOs. From EDR, we moved to managed detection and response to manage tens of thousands of endpoints, which helped in the face of cybersecurity skill shortages.  

 

The increased rate and sophistication of threats call for a more proactive approach with continuous monitoring, threat prioritization, and threat hunting. There is a need for threat response, immediate remediation and preventing breaches from spreading laterally. And this is what an XDR platform can offer.   

 

The session will cover: 

 

  • How to make a transition from EDR to XDR - the challenges 

  • Aligning XDR with the existing detection tools - use case 

  • Leveraging XDR to its fullest capabilities  

  • 12:25 PM
  • 12:44 PM
Track A
Operationalizing Zero Trust to Win Your Cyber War

The primary challenge with zero trust is keeping it simple, operationally efficient and easy to understand, with predictably positive outcomes.  This is achieved across various systems, not with different solutions, policies, and technologies, but with an effective strategy to ensure minimal friction.  

 

Operationalizing zero trust is critical for adding a layer of agility to modern networks that otherwise seems impossible in traditional network designs.  

 

Zero trust is said to deliver a security strategy that helps secure access in a way that frustrates attackers, not users.  

  

The session will cover:  

  • How zero trust will transform your network security and function as a business enabler by focusing on the top business objectives   

  • How to achieve tactical and operational goals with zero trust  

  • How to measure the success metrics of zero trust implementation 

  • 12:25 PM
  • 12:44 PM
Track B
Cybersecurity Mesh Architecture: Establishing a Collaborative Defense

The rapid evolution and sophistication of cyberattacks, and the migration of assets to hybrid multicloud, are creating a complete storm. It’s time to move past siloed security to a more collaborative and flexible approach to security. Organizations are trying cybersecurity mesh architecture designed to make security more composable and scalable by modularizing security functions and enabling them to interoperate through a set of supportive layers.  Like zero trust, the cybersecurity web is focused on reimagining the boundaries of the identity layer and bringing together disparate security tools into a single, interoperable ecosystem.  

The session will cover: 

  • How to secure more with less 

  • Establishing intelligent security by design 

  • Enhancing security collaboration and integration 

  • 12:50 PM
  • 01:14 PM
Track A
Data Privacy vs. Information Security: Being on the Same Track

A debate between a data privacy officer and a CISO on how to juxtapose privacy and security to achieve total compliance. 

 

The session will cover: 

 

  • Establishing compliance with complex regulations along with privacy and security 

  • Privacy by design in security controls 

  • Privacy journey from legacy to controls 

  • 12:50 PM
  • 01:14 PM
Track B
IoT Security: The Good, the Bad and the Ugly

Over the years, organizations have been building new tech and smart devices to autonomously optimize work. However, the increasing use of these connected devices often leads to a broader attack surface and ends up becoming the weakest links for cybercriminals to penetrate inside an organization’s network. 

 

IT leaders are securing more endpoints than ever. The proliferation of IoT devices brings numerous risks, but it also brings new business benefits. The threat is real for operators and manufacturers of connected devices.  

  

The session will cover:    

   

  • IoT risks and who is impacted by them   

  • A reality check of the security-by-design model in IoT   

  • How do malware developers and hackers plan an attack against IoT devices? 

Lunch Break
  • 01:15 PM
  • 01:59 PM
  • 02:00 PM
  • 02:29 PM
Track A
Panel Discussion: Are Digital Currencies the Future? The Security Debate

The Reserve Bank of India has been holding discussions to understand the scope of cryptocurrency in the Indian economy and to formulate regulations and a proper system to govern this. It is also warning cryptocurrency users and traders about the risks associated with the system.  

   

However, experts say bitcoin usage by Indian companies is gaining momentum, and cryptocurrency now has more than five million users in the country.  

 

Reports say over 3,000 investments in India were being done with bitcoin daily.    

   

The panel will discuss:  

   

  • Assessing the risks associated with the use of bitcoin  

  • Are security leaders prepared for the bitcoin regime?  

  • Establishing secure transactions using bitcoin   

  • 02:00 PM
  • 02:29 PM
Track B
Panel Discussion: Building Cyber Resiliency by Design: Effective Frameworks

As organizations embrace (and accelerate) digitalization to offer new and innovative services, the vulnerabilities associated with data and technology will increase. According to research, cybercrime damage is expected to reach $8 trillion in 2023. Almost every organization will be impacted by a cyberattack this year, and it is crucial for businesses to rethink their risk management and incident response strategies.  

  

In the face of an increasing threat landscape, with the growing volume and sophistication of attacks, companies need more than a security solution or governance policy to be prepared for these attacks.  

  

They need a proactive and integrated approach with threat monitoring, threat intelligence, and end-to-end managed services.  

  

That's where cyber resilience comes in. It is not an afterthought, but needs to be built by design. 

  

The panel will discuss:   

    

  • The importance of cyber resilience in today's context, and how do you achieve it in your organization 

  • Cyber resilience versus cybersecurity 

  • How to create a bullet-proof incident response plan 

  • The need for cyber resilience solutions and frameworks 

  • 02:35 PM
  • 02:59 PM
Track A
Securing Industry Control Systems: The Design Challenges

The increasing attacks on ICS networks are a threat the industry can no longer ignore. Organizations in the industrial sector, particularly manufacturing, need to re-evaluate and strategize on how they protect ICS, especially industrial controllers.  

  

The panel will discuss:  

   

  • Typical attack forms on the ICS (OT-IT convergence, increased/accelerated digitalization, digital twin) 

  • Traditional approaches to securing ICS networks (like air gapping) - and why they are inadequate for protection in a converged world of OT and IT 

  • New approaches and best practices to securing ICS networks 

  • 02:35 PM
  • 02:59 PM
Track B
Passwordless Authentication: What Needs to Change in 2023

Passwordless has become the holy grail for user authentication. But there are different interpretations of what passwordless is and is not. Passwords are less common than ever, but they are still used around the world.  Since weak passwords are often the primary reason behind cyberattacks, companies are increasingly investing in biometrics and adaptive authentication.  

 

The session will cover: 

  • How open identity management is evolving 

  • How identity can cater to various risk profiles 

  • What needs to change in 2023? 

Networking Break
  • 03:00 PM
  • 03:14 PM
Fireside Chat: Payments Fraud: How to Stop Cyber Perpetrators

More than 90% of consumers around the world rely on online payments, according to a research study. This, however, brings with it an increase in transaction fraud. Fraudsters are relying on synthetic IDs to carry out various card-related frauds. 

 

Social engineering is also increasingly becoming a deceptive tactic to trick people into divulging information. With so much going on, how can the payment industry tackle the new-age methods to reduce fraud? 

  

The session will cover: 

  

•            The new forms of fraud tactics 

•            The shortcomings of the current defensive approach 

•            What needs to change in 2023 

  • 03:20 PM
  • 03:49 PM
Panel Discussion: Establishing Cybersecurity in the VUCA World: CISOs’ Stakes

We are living in a VUCA world – a world that is volatile, uncertain, complex and ambiguous.  As per India’s policymakers, VUCA is nothing but the  AAJA world - Asthirata, which means volatility or a high rate of change; Anishchita, which means uncertainty and lack of clarity about the present and the future; Jatilata, which means complexity concerning multiple factors that impact critical decisions; and Aspashtata, which means ambiguity about the unprecedented and challenging times in the industry.  

  

We are into 2023, and are witnessing growing chaos in the cybersecurity domain with multiple forms of attacks targeting enterprises.  

  

What kind of conversations do the security teams need to have, what should be their strategies and what is their focus area?  

  

The panel will discuss:  

  

  • Cybersecurity lessons learned from economic uncertainty  

  • New forms of security defenses enterprises have adopted in 2023  

  • What’s top of mind for CISOs in tackling this situation 

  • 03:55 PM
  • 04:29 PM
Closing Remarks
  • 04:30 PM
  • 04:44 PM

Speaker Interviews

April 12 - 13, 2023

Cybersecurity Summit: Bengaluru