The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
Conference Chair: Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace
Conference Co-Chair: Sethu Raman, Senior Vice President and Chief Risk Officer, Mphasis
Advisory Members:
The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups?
The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure.
The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.
India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.
The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.
A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.
Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?
The keynote will cover:
Cybercrime continues to surge rapidly as the dependence on digital technologies increases. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever — swiftly adapting new technologies, tailoring their attacks using novel methods, and cooperating closely with each other. As organizations combat cybercrimes and go through this digital transformation journey, they are finding new ways to adapt, such as implementing “zero trust,” to secure the modern processes and build a resilient enterprise. CISOs now have a daunting task to align with different functions in applying these principles to secure their hybrid work environment and also balance innovation and security.
The session will cover:
Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.
Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm.
Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome.
The session will cover:
Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately.
Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link?
The session covers:
Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!
Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial.
For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.
It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.
The session will cover:
Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?
The session will cover:
Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity — for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy?
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations.
The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect?
Organizations that depended upon traditional, centralized networks and designated offices found themselves suddenly in a highly distributed world, with employees working from anywhere. Application migration to the cloud in the form of SaaS from third-party providers or as a private cloud with AWS or Azure became the new norm — with data traversing extensively. The primitive way of managing information by IT and security in this perimeter-less environment has fallen short of the expected results.
Against the growing complexities, the new approach will help solve the challenges of securing your remote workforce and overcome the shortcomings of a traditional method.
The session will cover:
Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?
Some experts say anything new that gets integrated into the organization — any new system, technology, or vendor onboarding — must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.
Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models?
Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure?
The session will cover:
Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!
Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks.
As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks.
It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities.
The session will cover:
The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?
The session will also cover:
Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.
Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.
The session will cover:
The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
Conference Chair: Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace
Conference Co-Chair: Sethu Raman, Senior Vice President and Chief Risk Officer, Mphasis
Advisory Members:
The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups?
The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure.
The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.
India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.
The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.
A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.
Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?
The keynote will cover:
Cybercrime continues to surge rapidly as the dependence on digital technologies increases. Cybercriminals are seizing every opportunity to exploit vulnerabilities against people and organizations through technology. They are more agile than ever — swiftly adapting new technologies, tailoring their attacks using novel methods, and cooperating closely with each other. As organizations combat cybercrimes and go through this digital transformation journey, they are finding new ways to adapt, such as implementing “zero trust,” to secure the modern processes and build a resilient enterprise. CISOs now have a daunting task to align with different functions in applying these principles to secure their hybrid work environment and also balance innovation and security.
The session will cover:
Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.
Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm.
Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome.
The session will cover:
Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately.
Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link?
The session covers:
Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!
Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial.
For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.
It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.
The session will cover:
Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?
The session will cover:
Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity — for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy?
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations.
The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect?
Organizations that depended upon traditional, centralized networks and designated offices found themselves suddenly in a highly distributed world, with employees working from anywhere. Application migration to the cloud in the form of SaaS from third-party providers or as a private cloud with AWS or Azure became the new norm — with data traversing extensively. The primitive way of managing information by IT and security in this perimeter-less environment has fallen short of the expected results.
Against the growing complexities, the new approach will help solve the challenges of securing your remote workforce and overcome the shortcomings of a traditional method.
The session will cover:
Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?
Some experts say anything new that gets integrated into the organization — any new system, technology, or vendor onboarding — must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.
Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models?
Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure?
The session will cover:
Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!
Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks.
As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks.
It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities.
The session will cover:
The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?
The session will also cover:
Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.
Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.
The session will cover:
July 7 - 8, 2022
Cybersecurity Summit: Bengaluru