Cybersecurity Summit: Bangalore
Hybrid Summit July 6 - 7, 2022
This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Sridhar Sidhu
Senior Vice President and Head of Information Security Services Group
Wells Fargo
Sidhu leads the Information and Cyber Security Services Group at Wells Fargo India reporting in to the Global Chief Information Security Officer. Sidhu joined Wells Fargo in 2014. Prior to joining Wells Fargo, Sidhu served as “Risk Management Fellow (Banking...
Justice B N Srikrishna
Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee
Supreme Court of India
Yask Sharma
CISO
Indian Oil Corporation 
As CISO, Sharma is responsible for the maintenance of cybersecurity operations, infrastructure, and governance at a national critical infrastructure organization. He has more than two decades of experience and holds a master's degree in cyber law and cybersecurity from NLU,...
Srinivas Poosarla
Chief Privacy Officer & DPO (Worldwide)
Infosys Technologies
Suparna Goswami
Associate Editor
ISMG
Dr. Pavan Duggal
Advocate
Supreme Court of India New Delhi
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG
View Agenda
Keynote Session: Enterprise Security in an Adaptive Era

As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon. Are enterprises geared up to respond the growing nation-state attacks and other cyber espionage? Should CISOs start making tough decisions and what should they prioritize and how ruthless they need to be in responding to threats?

Automation also helps in promptly resolving newly identified risks with vendors and enables addressing risks on repeatable processes, allowing humans to focus on the most significant threats.

This session will discuss:

  • Responding to nation-state threat with a right strategy;
  • Prioritizing and re-calibrating governance and compliance;
  • Setting security priorities with a clear understanding of critical business risks;
  • Harnessing new technologies.
  • 09:00 AM
  • 09:29 AM
Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.

The session will discuss:

  • How to respond to software-associated supply chain attacks?;
  • Intersection of DevOps and security;
  • Security by design approach to secure software applications and evaluating the third-party products.
  • 09:30 AM
  • 09:59 AM
Implementing "Zero Trust": A Practitioner's Approach

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

This session will also discuss:

  • Improved privileged access management using 'zero trust';
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • A five-step methodology to implementing 'zero trust' and stakeholder engagement.
  • 10:00 AM
  • 10:29 AM

This hybrid summit's agenda will cover Zero Trust, IAM, Ransomware, Privacy, Fraud, Payments, IoT, Cryptocurrency, End Point Protection, Cloud Security and more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Sridhar Sidhu
Senior Vice President and Head of Information Security Services Group
Wells Fargo
Sidhu leads the Information and Cyber Security Services Group at Wells Fargo India reporting in to the Global Chief Information Security Officer. Sidhu joined Wells Fargo in 2014. Prior to joining Wells Fargo, Sidhu served as “Risk Management Fellow (Banking...
Justice B N Srikrishna
Former Judge, Supreme Court of India, and Chairman of the Data Protection Committee
Supreme Court of India
Yask Sharma
CISO
Indian Oil Corporation 
As CISO, Sharma is responsible for the maintenance of cybersecurity operations, infrastructure, and governance at a national critical infrastructure organization. He has more than two decades of experience and holds a master's degree in cyber law and cybersecurity from NLU,...
Srinivas Poosarla
Chief Privacy Officer & DPO (Worldwide)
Infosys Technologies
Suparna Goswami
Associate Editor
ISMG
Dr. Pavan Duggal
Advocate
Supreme Court of India New Delhi
Geetha Nandikotkur
Managing Editor & Conference Chair, Asia & Middle East
ISMG

View Agenda
Keynote Session: Enterprise Security in an Adaptive Era

As analysts say, after feeling so defenseless in the face of calamity, enterprises are moving to an adaptive era. With the distributed workforce will come the inevitable discomfort of potentially exposing organizations to cyberattacks if the right precautions are not taken to adapt to this new phenomenon. Are enterprises geared up to respond the growing nation-state attacks and other cyber espionage? Should CISOs start making tough decisions and what should they prioritize and how ruthless they need to be in responding to threats?

Automation also helps in promptly resolving newly identified risks with vendors and enables addressing risks on repeatable processes, allowing humans to focus on the most significant threats.

This session will discuss:

  • Responding to nation-state threat with a right strategy;
  • Prioritizing and re-calibrating governance and compliance;
  • Setting security priorities with a clear understanding of critical business risks;
  • Harnessing new technologies.
  • 09:00 AM
  • 09:29 AM
Supply Chain Attacks: Are Enterprises Able to Detect and Respond?

We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Still, the supply chain attack was an attack on a service provider that cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks ushers in the risk: supplier vulnerabilities which the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.

The session will discuss:

  • How to respond to software-associated supply chain attacks?;
  • Intersection of DevOps and security;
  • Security by design approach to secure software applications and evaluating the third-party products.
  • 09:30 AM
  • 09:59 AM
Implementing "Zero Trust": A Practitioner's Approach

The biggest challenge for practitioners today is to enable greater flexibility for a remote workforce while being fully compliant and secure. The "zero trust" model can play a critical role, but implementing it is a daunting task, and there's no "one size fits all" approach to making the transition to a zero trust architecture. This session provides a practical approach to adopting zero trust, outlining the strategy, the possibilities for leveraging existing investments and the need for new investments.

This session will also discuss:

  • Improved privileged access management using 'zero trust';
  • Limiting exposure of sensitive data in light of the remote workforce and targeted attacks and new cybercrime scams;
  • A five-step methodology to implementing 'zero trust' and stakeholder engagement.
  • 10:00 AM
  • 10:29 AM

Speaker Interviews

July 6 - 7, 2022

Cybersecurity Summit: Bangalore