Cybersecurity Summit: Bengaluru
Hybrid Summit July 7 - 8, 2022
With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Name :
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Akhil Verma (Advisory Member)
CISO
Paytm Money
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Srinivas Poosarla (Advisory Member)
Chief Privacy Officer & DPO (Worldwide)
Infosys
Prashant Kadloor (Advisory Member)
Head Of Research Group, Cybersecurity
Siemens Technology
S Srikanth (Advisory Member)
CISO
Tata Electronics
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Sarkar is the group CISO at Biocon. He is leading a panel to write a standard on cyber resilience for the Bureau of Indian Standards. He has 30 years of experience as an auditor, board advisor, consultant, business leader, and...
Devender Kumar
CISO
ITC Infotech
Kumar is the chief information security officer at ITC Infotech. He has 27 years of experience in cybersecurity, business continuity, risk management, security compliance, and privacy. Prior to joining ITC Infotech, he worked for several IT organizations such as TMF...
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...
S Srikanth (Advisory Member)
CISO
Tata Electronics
Dr. Mahesh Kalyanaraman
President
ISACA Chennai
Dr. Kalyanaraman is the associate vice president, risk and compliance, at HCL Technologies. He has over 25 years of experience in security governance, policy management, GRC, compliance, risk assessment, third-party risk management, and technical security assurance. Prior to joining HCL,...
Prakash Padariya
Senior Vice President & Global CISO
OYO
Padariya is the head of information security at GE's India Technology Center. He has over 15 years of core information, cybersecurity, and technology experience with Fortune 100 companies such as Royal Bank of Scotland, IBM, and Accenture, with professional experience...
Kumar K V
Group CIO & CISO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Diwakar Dayal
Managing Director & Country Manager
SentinelOne
Dayal is the managing director at SentinelOne. He is responsible for developing and executing EDR leader’s growth strategy for India and SAARC region. He has over 25 years of experience in cybersecurity and has held leadership positions at Cisco, Juniper,...
Harish Sekar
Senior Technical Evangelist
ManageEngine
Sekar is a senior technology evangelist at ManageEngine, a division of Zoho Corp. He specializes in guiding IT administrators and security professionals across the globe to better administer their hybrid Active Directory and offers ways to strengthen their organizations' security.
Pooja Agrawalla
Global Head –IAM
NXP Semiconductors
Agrawalla is the head of identity and access management (cybersecurity) at NXP Semiconductors, where she leads IAM products and solutions. She has about 20 years of experience in identity and cybersecurity and is also currently associated with CSA (Cloud Security...
Narasimhan Elangovan
Partner
KEN & Co.
Elangovan is a partner at KEN & Co., and sr. advisor for digital security services at Crowe Advisory Services (India) LLP. His areas of expertise include data analytics, risk-based audit, privacy impact assessments, information systems assurance, SOX compliance, and SOC...
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Reddy is a distinguished fellow in the EastWest Institute in the U.S. and the Observer Research Foundation in India. As a former deputy national security advisor of India, she was responsible for cybersecurity and internal and external security issues. She...
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Pendyala is a partner - cybersecurity at Ernst & Young. He has over 25 years of experience in proactive, predictive, and reactive domains of information and cybersecurity. Prior to EY, he held leadership roles in PwC, TCS, and the Ministry...
Santhosh Kumar Kempaiah
Director-Information Security & CISO
Visteon Corporation
Kempaiah is CISO and director of information security at Visteon Corp. He has over 18 years of experience in information security. Prior to joining Visteon, he held leadership roles at multiple organizations, including Alfanar, Philips, and Volvo.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.
Ashish Gopal Saxena
Chief Information & Digital Officer
Jana Small Finance Bank Ltd
Saxena is the chief information and digital officer at Jana Small Finance Bank. He has over 23 years of experience in designing, evaluating, and implementing technology solutions for BFSI domain. Prior to Jana, he held leadership roles at UGRO Capital,...
Brijesh Miglani
SSE Security Strategist
Forcepoint
Miglani is the SSE Security Strategist at Forcepoint, where he leads strategic transformation focus for SASE and ZTNA technologies. He has over 18 years of enterprise cybersecurity experience and has worked across industry verticals including banking, telecommunication, manufacturing, and IT/ITES.
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
Director, Strategic Studies Programme
Takshashila Institution, Bangalore
Menon is the director, strategic studies programme, Takshashila Institution; professor emeritus, Trans Disciplinary University; and adjunct professor at the National Institute of Advanced Studies (NIAS), Bangalore. Prior to this, he served in the Indian Army for 40 years.
Geetha Nandikotkur
Managing Editor-Asia & Middle East
Information Security Media Group
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Lt Gen Rajesh Pant
National Cyber Security Coordinator
National Security Council Secretariat
Pant is presently holding the prestigious appointment of National Cyber Security Coordinator in the National Security Council Secretariat of India. He is responsible for coordinating all activities across multiple sectors to ensure secure and resilient cyberspace within the nation.
Jacxine Fernandez
VP - Information Security
Bangalore International Airport Ltd
Fernandez is the vice president, information security, at Bangalore International Airport. He is a risk management, information security, and business continuity professional with experience in managing risk and security operations and business continuity within complex working environments.
Parag Deodhar
Managing Director - Internal Audit, Global IT Audit Lead
Large IT Services Company
Deodhar is the managing director of internal audit at Accenture. He is a seasoned cybersecurity professional with over 22 years of experience in enterprise risk management, operational risk, and fraud risk management. Prior to joining Accenture, he held leadership roles...
Harish Sathyan
Senior Group Manager-Privacy and Data Protection
Infosys
Sathyan is the senior group manager at Infosys’ Data Privacy office, where he leads data privacy compliance. He is also leading a global strategic program at Infosys that helps embed privacy by design into the culture and DNA of the...
Vikas Malhotra
Country Manager
LastPass
Malhotra is the country manager at LastPass, where he is responsible for building and leading the business in India and SAARC. He has over 20 years of IT industry experience and also held leadership positions at Wipro, Symantec, Oracle, and...
Venugopal S Arcot
Senior Director – Solution Consulting
ServiceNow
Arcot is the senior director, solution consulting, at ServiceNow for India and SAARC region. He works closely with leadership boards to inspire innovations that drive business. He has over 25 years of experience in various domains and has held leadership...
Ajay Kumar Dubey
Channel Director
Forcepoint
Dubey is the channel director at Forcepoint, where he is responsible for managing the mid-market business in India and the channels for India and SAARC. He is a cybersecurity expert with over 24 years of experience in the IT industry....
View Agenda
Welcome to ISMG's Cybersecurity Summit Bengaluru

The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
 

Conference Chair:  Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace 
Conference Co-ChairSethu Raman, Senior Vice President and Chief Risk Officer, Mphasis 

Advisory Members: 

  • Akhil Verma, CISO, Paytm Money
  • S Srikanth, CISO, Tata Electronics
  • Devender Kumar, CISO, ITC Infotech
  • Srinivas Poosarla, Chief Privacy Officer and DPO (Worldwide), Infosys
  • Prashant Kadloor, Head of Research Group, Cybersecurity, Siemens Technology India
  • Krishna Sastry Pendyala, Partner, Cyber Security, Ernst & Young 
  • Agnidipta Sarkar, Group CISO, Biocon  
  • 08:30 AM
  • 08:59 AM
Opening Remarks: An Insight Into the Summit Sessions
Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Geetha Nandikotkur
Latha  Reddy (Conference Chair)
  • 09:00 AM
  • 09:14 AM
Plenary Session: The Future of Threat Landscape: Defending Against the Quasi-Kinetic Cyberwar
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM, Director, Strategic Studies Programme, Takshashila Institution, Bangalore

The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups? 

The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure. 

The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.  

Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
  • 09:15 AM
  • 09:34 AM
Keynote: Securing Indian Cyberspace: Government and Industry Initiatives
Lt Gen Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat

India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.

The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.  

A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.  

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?   

The keynote will cover:  

  • Comprehensive cybersecurity legislation for various industries  
  • Governance and security framework for securing the digital enterprise  
  • Recent initiatives by the government to bolster cyber defenses against growing threats
Lt Gen Rajesh Pant
  • 09:40 AM
  • 10:09 AM
The Business and Cybersecurity Disconnect: Mounting Pressure on IT Leaders
Harish Sekar, Senior Technical Evangelist, ManageEngine

Cybercrime continues to surge rapidly as the dependence on digital technologies increases. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever — swiftly adapting new technologies, tailoring their attacks using novel methods, and cooperating closely with each other. As organizations combat cybercrimes and go through this digital transformation journey, they are finding new ways to adapt, such as implementing “zero trust,” to secure the modern processes and build a resilient enterprise. CISOs now have a daunting task to align with different functions in applying these principles to secure their hybrid work environment and also balance innovation and security.

The session will cover:

  • Can the “zero trust” concept establish a cyber secure ecosystem?
  • Effective ways to collaborate with your C-suite to establish frictionless security
  • Bridging the silos with an effective orchestration strategy
Harish Sekar
  • 10:15 AM
  • 10:44 AM
Unlocking the Value of Quantum Computing: A Cybersecurity Perspective
Dr. Jai Ganesh, Chief Product Officer, VP & GM - Technology, HARMAN DTS

Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.  

Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm. 

Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome. 

The session will cover: 

  • Evolving a standardized process to address risks with the use of quantum 
  • How to build crypto agility and manage cryptographic environment better 
  • A tactical and strategic approach to mitigating quantum risks 
Dr. Jai Ganesh
  • 10:50 AM
  • 11:19 AM
Secure Your Business With Password Management
Vikas Malhotra, Country Manager, LastPass

Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately. 

Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link? 

 The session covers: 

  • How does password management fit into your cybersecurity strategy? 
  • How can businesses reduce the risk of human behaviors? 
  • Why going beyond SSO and MFA will help enhance your cybersecurity posture and productivity.
Vikas Malhotra
  • 11:25 AM
  • 11:54 AM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 12:00 PM
  • 12:14 PM
Identity Theft: Understanding the Hacker’s Moves
Pooja Agrawalla, Global Head –IAM, NXP Semiconductors

Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial. 

For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.  

It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.   

The session will cover: 

  • Establishing digital trust with customer identity and risk assessment 
  • Use of behavioral analytics as a tool to prevent data breaches 
  • Managing privileges “just in time” and in a multi-cloud environment
Pooja  Agrawalla
  • 12:15 PM
  • 12:34 PM
You’ve Been Breached — Now What?
Diwakar Dayal, Managing Director & Country Manager, SentinelOne

Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?

The session will cover:

  • The blueprint with use cases on the best strategies to fight breaches and an effective rollback plan
  • Adoption of autonomous cybersecurity to protect your environment
  • How to prevent breach attempts through incident response, even before attackers gain entry
Diwakar Dayal
  • 12:40 PM
  • 01:09 PM
Fireside Chat: Are Detection Technologies Playing Harder on Privacy?: The Balancing Act
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Kumar K V, Group CIO & CISO, Narayana Health

Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity  for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy? 

The session will cover: 

  • Defining privacy and technology landscape in 2022 
  • Impact of increasing detection tools on privacy 
  • A collaborative approach to fuel privacy and tech innovation
Latha  Reddy (Conference Chair)
Kumar K V
  • 01:15 PM
  • 01:34 PM
Lunch & Networking Break
  • 01:35 PM
  • 02:14 PM
Panel Discussion: Building a Cyber-Resilient Enterprise: Is the C-Suite on the Same Track? Where Is the Disconnect.
Devender Kumar, CISO, ITC Infotech
Dr. Mahesh Kalyanaraman, President, ISACA Chennai
Santhosh Kumar Kempaiah, Director-Information Security & CISO, Visteon Corporation
Venugopal S Arcot, Senior Director – Solution Consulting, ServiceNow

Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations. 

The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect? 

Devender  Kumar
Dr. Mahesh  Kalyanaraman
Santhosh Kumar Kempaiah
Venugopal  S Arcot
  • 02:15 PM
  • 02:44 PM
Simplified Approach to Solving Modern Security Complexities
Brijesh Miglani, SSE Security Strategist , Forcepoint
Ajay Kumar Dubey, Channel Director, Forcepoint

Organizations that depended upon traditional, centralized networks and designated offices found themselves suddenly in a highly distributed world, with employees working from anywhere. Application migration to the cloud in the form of SaaS from third-party providers or as a private cloud with AWS or Azure became the new norm — with data traversing extensively. The primitive way of managing information by IT and security in this perimeter-less environment has fallen short of the expected results.   

Against the growing complexities, the new approach will help solve the challenges of securing your remote workforce and overcome the shortcomings of a traditional method. 

The session will cover:  

  • How to protect remote workers on the web and cloud with continuous monitoring 
  • How to control access to cloud and private apps without VPNs 
  • How to implement “zero trust” content delivery to establish a 100% malware-free environment and protect distributed data 
Brijesh Miglani
Ajay Kumar Dubey
  • 02:50 PM
  • 03:04 PM
Panel Discussion: Privacy by Design: A Reality Check
S Srikanth (Advisory Member), CISO, Tata Electronics
Narasimhan Elangovan, Partner, KEN & Co.
Prakash Padariya, Senior Vice President & Global CISO, OYO
Harish Sathyan, Senior Group Manager-Privacy and Data Protection, Infosys

Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?   

Some experts say anything new that gets integrated into the organization  any new system, technology, or vendor onboarding  must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.  

Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models? 

Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure? 

The session will cover: 

  • Implementing the privacy policy at the design stage 
  • Essential steps to rebuild the architecture or the platform 
  • Use-case scenario in how privacy is embedded into the design of products or solutions
S  Srikanth (Advisory Member)
Narasimhan  Elangovan
Prakash  Padariya
Harish Sathyan
  • 03:10 PM
  • 03:39 PM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 03:40 PM
  • 03:49 PM
Deploying XDR: A CISO’s Approach
Agnidipta Sarkar (Advisory Member), Group CISO, Biocon Ltd.

Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks. 

As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks. 

It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities. 

The session will cover: 

  • Popular myths and realities about XDR 
  • How to embed XDR into the existing threat detection framework 
  • Understanding the critical pieces of the XDR puzzle, like required technologies and integrations
Agnidipta  Sarkar (Advisory Member)
  • 03:50 PM
  • 04:19 PM
Cyber Insurance’s Response to Rising Ransomware Attacks: Is It Killing Cyber Insurance?
Jacxine Fernandez, VP - Information Security, Bangalore International Airport Ltd

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?       

The session will also cover:  

  • Will ransomware ultimately lead to the fall of cyber insurance companies?  
  • How cyber insurance industry must approach the problem of ransomware  
  • Ways to address skill shortage in the industry
Jacxine Fernandez
  • 04:25 PM
  • 04:39 PM
Panel Discussion: To Pay or Not to Pay Ransom: The C-Suite Debate
Parag Deodhar, Managing Director - Internal Audit, Global IT Audit Lead, Large IT Services Company
Krishna Sastry Pendyala (Advisory Member), Partner, Cyber Security, Ernst & Young
Ashish Gopal Saxena, Chief Information & Digital Officer, Jana Small Finance Bank Ltd

Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.   

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.  

The session will cover:  

  • What should be the C-suite's approach in case of a ransomware attack  
  • How to engage with the law enforcement before taking the decision  
  • Prepare now or pay later — CISO's take
Parag  Deodhar
Krishna Sastry Pendyala (Advisory Member)
Ashish Gopal Saxena
  • 05:00 PM
  • 05:29 PM

With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Name :
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008

Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Akhil Verma (Advisory Member)
CISO
Paytm Money
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Srinivas Poosarla (Advisory Member)
Chief Privacy Officer & DPO (Worldwide)
Infosys
Prashant Kadloor (Advisory Member)
Head Of Research Group, Cybersecurity
Siemens Technology
S Srikanth (Advisory Member)
CISO
Tata Electronics
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace

Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Sarkar is the group CISO at Biocon. He is leading a panel to write a standard on cyber resilience for the Bureau of Indian Standards. He has 30 years of experience as an auditor, board advisor, consultant, business leader, and...
Devender Kumar
CISO
ITC Infotech
Kumar is the chief information security officer at ITC Infotech. He has 27 years of experience in cybersecurity, business continuity, risk management, security compliance, and privacy. Prior to joining ITC Infotech, he worked for several IT organizations such as TMF...
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...
S Srikanth (Advisory Member)
CISO
Tata Electronics
Dr. Mahesh Kalyanaraman
President
ISACA Chennai
Dr. Kalyanaraman is the associate vice president, risk and compliance, at HCL Technologies. He has over 25 years of experience in security governance, policy management, GRC, compliance, risk assessment, third-party risk management, and technical security assurance. Prior to joining HCL,...
Prakash Padariya
Senior Vice President & Global CISO
OYO
Padariya is the head of information security at GE's India Technology Center. He has over 15 years of core information, cybersecurity, and technology experience with Fortune 100 companies such as Royal Bank of Scotland, IBM, and Accenture, with professional experience...
Kumar K V
Group CIO & CISO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Diwakar Dayal
Managing Director & Country Manager
SentinelOne
Dayal is the managing director at SentinelOne. He is responsible for developing and executing EDR leader’s growth strategy for India and SAARC region. He has over 25 years of experience in cybersecurity and has held leadership positions at Cisco, Juniper,...
Harish Sekar
Senior Technical Evangelist
ManageEngine
Sekar is a senior technology evangelist at ManageEngine, a division of Zoho Corp. He specializes in guiding IT administrators and security professionals across the globe to better administer their hybrid Active Directory and offers ways to strengthen their organizations' security.
Pooja Agrawalla
Global Head –IAM
NXP Semiconductors
Agrawalla is the head of identity and access management (cybersecurity) at NXP Semiconductors, where she leads IAM products and solutions. She has about 20 years of experience in identity and cybersecurity and is also currently associated with CSA (Cloud Security...
Narasimhan Elangovan
Partner
KEN & Co.
Elangovan is a partner at KEN & Co., and sr. advisor for digital security services at Crowe Advisory Services (India) LLP. His areas of expertise include data analytics, risk-based audit, privacy impact assessments, information systems assurance, SOX compliance, and SOC...
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Reddy is a distinguished fellow in the EastWest Institute in the U.S. and the Observer Research Foundation in India. As a former deputy national security advisor of India, she was responsible for cybersecurity and internal and external security issues. She...
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Pendyala is a partner - cybersecurity at Ernst & Young. He has over 25 years of experience in proactive, predictive, and reactive domains of information and cybersecurity. Prior to EY, he held leadership roles in PwC, TCS, and the Ministry...
Santhosh Kumar Kempaiah
Director-Information Security & CISO
Visteon Corporation
Kempaiah is CISO and director of information security at Visteon Corp. He has over 18 years of experience in information security. Prior to joining Visteon, he held leadership roles at multiple organizations, including Alfanar, Philips, and Volvo.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.
Ashish Gopal Saxena
Chief Information & Digital Officer
Jana Small Finance Bank Ltd
Saxena is the chief information and digital officer at Jana Small Finance Bank. He has over 23 years of experience in designing, evaluating, and implementing technology solutions for BFSI domain. Prior to Jana, he held leadership roles at UGRO Capital,...
Brijesh Miglani
SSE Security Strategist
Forcepoint
Miglani is the SSE Security Strategist at Forcepoint, where he leads strategic transformation focus for SASE and ZTNA technologies. He has over 18 years of enterprise cybersecurity experience and has worked across industry verticals including banking, telecommunication, manufacturing, and IT/ITES.
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
Director, Strategic Studies Programme
Takshashila Institution, Bangalore
Menon is the director, strategic studies programme, Takshashila Institution; professor emeritus, Trans Disciplinary University; and adjunct professor at the National Institute of Advanced Studies (NIAS), Bangalore. Prior to this, he served in the Indian Army for 40 years.
Geetha Nandikotkur
Managing Editor-Asia & Middle East
Information Security Media Group
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Lt Gen Rajesh Pant
National Cyber Security Coordinator
National Security Council Secretariat
Pant is presently holding the prestigious appointment of National Cyber Security Coordinator in the National Security Council Secretariat of India. He is responsible for coordinating all activities across multiple sectors to ensure secure and resilient cyberspace within the nation.
Jacxine Fernandez
VP - Information Security
Bangalore International Airport Ltd
Fernandez is the vice president, information security, at Bangalore International Airport. He is a risk management, information security, and business continuity professional with experience in managing risk and security operations and business continuity within complex working environments.
Parag Deodhar
Managing Director - Internal Audit, Global IT Audit Lead
Large IT Services Company
Deodhar is the managing director of internal audit at Accenture. He is a seasoned cybersecurity professional with over 22 years of experience in enterprise risk management, operational risk, and fraud risk management. Prior to joining Accenture, he held leadership roles...
Harish Sathyan
Senior Group Manager-Privacy and Data Protection
Infosys
Sathyan is the senior group manager at Infosys’ Data Privacy office, where he leads data privacy compliance. He is also leading a global strategic program at Infosys that helps embed privacy by design into the culture and DNA of the...
Vikas Malhotra
Country Manager
LastPass
Malhotra is the country manager at LastPass, where he is responsible for building and leading the business in India and SAARC. He has over 20 years of IT industry experience and also held leadership positions at Wipro, Symantec, Oracle, and...
Venugopal S Arcot
Senior Director – Solution Consulting
ServiceNow
Arcot is the senior director, solution consulting, at ServiceNow for India and SAARC region. He works closely with leadership boards to inspire innovations that drive business. He has over 25 years of experience in various domains and has held leadership...
Ajay Kumar Dubey
Channel Director
Forcepoint
Dubey is the channel director at Forcepoint, where he is responsible for managing the mid-market business in India and the channels for India and SAARC. He is a cybersecurity expert with over 24 years of experience in the IT industry....

View Agenda
Welcome to ISMG's Cybersecurity Summit Bengaluru

The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
 

Conference Chair:  Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace 
Conference Co-ChairSethu Raman, Senior Vice President and Chief Risk Officer, Mphasis 

Advisory Members: 

  • Akhil Verma, CISO, Paytm Money
  • S Srikanth, CISO, Tata Electronics
  • Devender Kumar, CISO, ITC Infotech
  • Srinivas Poosarla, Chief Privacy Officer and DPO (Worldwide), Infosys
  • Prashant Kadloor, Head of Research Group, Cybersecurity, Siemens Technology India
  • Krishna Sastry Pendyala, Partner, Cyber Security, Ernst & Young 
  • Agnidipta Sarkar, Group CISO, Biocon  
  • 08:30 AM
  • 08:59 AM
Opening Remarks: An Insight Into the Summit Sessions
Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Geetha Nandikotkur
Latha  Reddy (Conference Chair)
  • 09:00 AM
  • 09:14 AM
Plenary Session: The Future of Threat Landscape: Defending Against the Quasi-Kinetic Cyberwar
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM, Director, Strategic Studies Programme, Takshashila Institution, Bangalore

The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups? 

The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure. 

The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.  

Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
  • 09:15 AM
  • 09:34 AM
Keynote: Securing Indian Cyberspace: Government and Industry Initiatives
Lt Gen Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat

India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.

The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.  

A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.  

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?   

The keynote will cover:  

  • Comprehensive cybersecurity legislation for various industries  
  • Governance and security framework for securing the digital enterprise  
  • Recent initiatives by the government to bolster cyber defenses against growing threats
Lt Gen Rajesh Pant
  • 09:40 AM
  • 10:09 AM
The Business and Cybersecurity Disconnect: Mounting Pressure on IT Leaders
Harish Sekar, Senior Technical Evangelist, ManageEngine

Cybercrime continues to surge rapidly as the dependence on digital technologies increases. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever — swiftly adapting new technologies, tailoring their attacks using novel methods, and cooperating closely with each other. As organizations combat cybercrimes and go through this digital transformation journey, they are finding new ways to adapt, such as implementing “zero trust,” to secure the modern processes and build a resilient enterprise. CISOs now have a daunting task to align with different functions in applying these principles to secure their hybrid work environment and also balance innovation and security.

The session will cover:

  • Can the “zero trust” concept establish a cyber secure ecosystem?
  • Effective ways to collaborate with your C-suite to establish frictionless security
  • Bridging the silos with an effective orchestration strategy
Harish Sekar
  • 10:15 AM
  • 10:44 AM
Unlocking the Value of Quantum Computing: A Cybersecurity Perspective
Dr. Jai Ganesh, Chief Product Officer, VP & GM - Technology, HARMAN DTS

Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.  

Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm. 

Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome. 

The session will cover: 

  • Evolving a standardized process to address risks with the use of quantum 
  • How to build crypto agility and manage cryptographic environment better 
  • A tactical and strategic approach to mitigating quantum risks 
Dr. Jai Ganesh
  • 10:50 AM
  • 11:19 AM
Secure Your Business With Password Management
Vikas Malhotra, Country Manager, LastPass

Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately. 

Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link? 

 The session covers: 

  • How does password management fit into your cybersecurity strategy? 
  • How can businesses reduce the risk of human behaviors? 
  • Why going beyond SSO and MFA will help enhance your cybersecurity posture and productivity.
Vikas Malhotra
  • 11:25 AM
  • 11:54 AM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 12:00 PM
  • 12:14 PM
Identity Theft: Understanding the Hacker’s Moves
Pooja Agrawalla, Global Head –IAM, NXP Semiconductors

Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial. 

For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.  

It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.   

The session will cover: 

  • Establishing digital trust with customer identity and risk assessment 
  • Use of behavioral analytics as a tool to prevent data breaches 
  • Managing privileges “just in time” and in a multi-cloud environment
Pooja  Agrawalla
  • 12:15 PM
  • 12:34 PM
You’ve Been Breached — Now What?
Diwakar Dayal, Managing Director & Country Manager, SentinelOne

Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?

The session will cover:

  • The blueprint with use cases on the best strategies to fight breaches and an effective rollback plan
  • Adoption of autonomous cybersecurity to protect your environment
  • How to prevent breach attempts through incident response, even before attackers gain entry
Diwakar Dayal
  • 12:40 PM
  • 01:09 PM
Fireside Chat: Are Detection Technologies Playing Harder on Privacy?: The Balancing Act
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Kumar K V, Group CIO & CISO, Narayana Health

Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity  for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy? 

The session will cover: 

  • Defining privacy and technology landscape in 2022 
  • Impact of increasing detection tools on privacy 
  • A collaborative approach to fuel privacy and tech innovation
Latha  Reddy (Conference Chair)
Kumar K V
  • 01:15 PM
  • 01:34 PM
Lunch & Networking Break
  • 01:35 PM
  • 02:14 PM
Panel Discussion: Building a Cyber-Resilient Enterprise: Is the C-Suite on the Same Track? Where Is the Disconnect.
Devender Kumar, CISO, ITC Infotech
Dr. Mahesh Kalyanaraman, President, ISACA Chennai
Santhosh Kumar Kempaiah, Director-Information Security & CISO, Visteon Corporation
Venugopal S Arcot, Senior Director – Solution Consulting, ServiceNow

Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations. 

The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect? 

Devender  Kumar
Dr. Mahesh  Kalyanaraman
Santhosh Kumar Kempaiah
Venugopal  S Arcot
  • 02:15 PM
  • 02:44 PM
Simplified Approach to Solving Modern Security Complexities
Brijesh Miglani, SSE Security Strategist , Forcepoint
Ajay Kumar Dubey, Channel Director, Forcepoint

Organizations that depended upon traditional, centralized networks and designated offices found themselves suddenly in a highly distributed world, with employees working from anywhere. Application migration to the cloud in the form of SaaS from third-party providers or as a private cloud with AWS or Azure became the new norm — with data traversing extensively. The primitive way of managing information by IT and security in this perimeter-less environment has fallen short of the expected results.   

Against the growing complexities, the new approach will help solve the challenges of securing your remote workforce and overcome the shortcomings of a traditional method. 

The session will cover:  

  • How to protect remote workers on the web and cloud with continuous monitoring 
  • How to control access to cloud and private apps without VPNs 
  • How to implement “zero trust” content delivery to establish a 100% malware-free environment and protect distributed data 
Brijesh Miglani
Ajay Kumar Dubey
  • 02:50 PM
  • 03:04 PM
Panel Discussion: Privacy by Design: A Reality Check
S Srikanth (Advisory Member), CISO, Tata Electronics
Narasimhan Elangovan, Partner, KEN & Co.
Prakash Padariya, Senior Vice President & Global CISO, OYO
Harish Sathyan, Senior Group Manager-Privacy and Data Protection, Infosys

Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?   

Some experts say anything new that gets integrated into the organization  any new system, technology, or vendor onboarding  must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.  

Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models? 

Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure? 

The session will cover: 

  • Implementing the privacy policy at the design stage 
  • Essential steps to rebuild the architecture or the platform 
  • Use-case scenario in how privacy is embedded into the design of products or solutions
S  Srikanth (Advisory Member)
Narasimhan  Elangovan
Prakash  Padariya
Harish Sathyan
  • 03:10 PM
  • 03:39 PM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 03:40 PM
  • 03:49 PM
Deploying XDR: A CISO’s Approach
Agnidipta Sarkar (Advisory Member), Group CISO, Biocon Ltd.

Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks. 

As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks. 

It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities. 

The session will cover: 

  • Popular myths and realities about XDR 
  • How to embed XDR into the existing threat detection framework 
  • Understanding the critical pieces of the XDR puzzle, like required technologies and integrations
Agnidipta  Sarkar (Advisory Member)
  • 03:50 PM
  • 04:19 PM
Cyber Insurance’s Response to Rising Ransomware Attacks: Is It Killing Cyber Insurance?
Jacxine Fernandez, VP - Information Security, Bangalore International Airport Ltd

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?       

The session will also cover:  

  • Will ransomware ultimately lead to the fall of cyber insurance companies?  
  • How cyber insurance industry must approach the problem of ransomware  
  • Ways to address skill shortage in the industry
Jacxine Fernandez
  • 04:25 PM
  • 04:39 PM
Panel Discussion: To Pay or Not to Pay Ransom: The C-Suite Debate
Parag Deodhar, Managing Director - Internal Audit, Global IT Audit Lead, Large IT Services Company
Krishna Sastry Pendyala (Advisory Member), Partner, Cyber Security, Ernst & Young
Ashish Gopal Saxena, Chief Information & Digital Officer, Jana Small Finance Bank Ltd

Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.   

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.  

The session will cover:  

  • What should be the C-suite's approach in case of a ransomware attack  
  • How to engage with the law enforcement before taking the decision  
  • Prepare now or pay later — CISO's take
Parag  Deodhar
Krishna Sastry Pendyala (Advisory Member)
Ashish Gopal Saxena
  • 05:00 PM
  • 05:29 PM

Speaker Interviews

July 7 - 8, 2022

Cybersecurity Summit: Bengaluru