Cybersecurity Summit: Bengaluru
Hybrid Summit July 7 - 8, 2022
With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Name :
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Sarkar is the group CISO at Biocon. He is leading a panel to write a standard on cyber resilience for the Bureau of Indian Standards. He has 30 years of experience as an auditor, board advisor, consultant, business leader, and...
Devender Kumar
CISO
ITC Infotech
Kumar is the chief information security officer at ITC Infotech. He has 27 years of experience in cybersecurity, business continuity, risk management, security compliance, and privacy. Prior to joining ITC Infotech, he worked for several IT organizations such as TMF...
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...
S Srikanth (Advisory Member)
CISO
Tata Electronics
Dr. Mahesh Kalyanaraman
President
ISACA Chennai
Dr. Kalyanaraman is the associate vice president, risk and compliance, at HCL Technologies. He has over 25 years of experience in security governance, policy management, GRC, compliance, risk assessment, third-party risk management, and technical security assurance. Prior to joining HCL,...
Prakash Padariya
Senior Vice President & Global CISO
OYO
Kumar K V
Group CIO & CISO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Diwakar Dayal
Managing Director & Country Manager
SentinelOne
Pooja Agrawalla
Global Head –IAM
NXP Semiconductors
Agrawalla is the head of identity and access management (cybersecurity) at NXP Semiconductors, where she leads IAM products and solutions. She has about 20 years of experience in identity and cybersecurity and is also currently associated with CSA (Cloud Security...
Narasimhan Elangovan
Partner
KEN & Co.
Elangovan is a partner at KEN & Co., and sr. advisor for digital security services at Crowe Advisory Services (India) LLP. His areas of expertise include data analytics, risk-based audit, privacy impact assessments, information systems assurance, SOX compliance, and SOC...
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Pendyala is a partner - cybersecurity at Ernst & Young. He has over 25 years of experience in proactive, predictive, and reactive domains of information and cybersecurity. Prior to EY, he held leadership roles in PwC, TCS, and the Ministry...
Santhosh Kumar Kempaiah
Director-Information Security & CISO
Visteon Corporation
Kempaiah is CISO and director of information security at Visteon Corp. He has over 18 years of experience in information security. Prior to joining Visteon, he held leadership roles at multiple organizations, including Alfanar, Philips, and Volvo.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.
Ashish Gopal Saxena
Chief Information & Digital Officer
Jana Small Finance Bank Ltd
Harish Sekar
Senior Technical Evangelist
ManageEngine
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
Director-Strategic Studies
Takshashila Institution, Bangalore
Menon is the director, strategic studies programme, Takshashila Institution; professor emeritus, Trans Disciplinary University; and adjunct professor at the National Institute of Advanced Studies (NIAS), Bangalore. Prior to this, he served in the Indian Army for 40 years.
Geetha Nandikotkur
Managing Editor-Asia & Middle East
Information Security Media Group
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Lt Gen Rajesh Pant
National Cyber Security Coordinator
National Security Council Secretariat
Pant is presently holding the prestigious appointment of National Cyber Security Coordinator in the National Security Council Secretariat of India. He is responsible for coordinating all activities across multiple sectors to ensure secure and resilient cyberspace within the nation.
Jacxine Fernandez
VP - Information Security
Bangalore International Airport Ltd
Parag Deodhar
Managing Director - Internal Audit, Global IT Audit Lead
Large IT Services Company
Deodhar is the managing director of internal audit at Accenture. He is a seasoned cybersecurity professional with over 22 years of experience in enterprise risk management, operational risk, and fraud risk management. Prior to joining Accenture, he held leadership roles...
Harish Sathyan
Senior Group Manager-Privacy and Data Protection
Infosys
Vikas Malhotra
Country Manager
LastPass
Venugopal S Arcot
Senior Director – Solution Consulting
ServiceNow
View Agenda
Welcome to ISMG's Cybersecurity Summit Bengaluru

The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
 

Conference Chair:  Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace 
Conference Co-ChairSethu Raman, Senior Vice President and Chief Risk Officer, Mphasis 

Advisory Members: 

  • Akhil Verma, CISO, Paytm Money
  • S Srikanth, CISO, Tata Electronics
  • Devender Kumar, CISO, ITC Infotech
  • Srinivas Poosarla, Chief Privacy Officer and DPO (Worldwide), Infosys
  • Prashant Kadloor, Head of Research Group, Cybersecurity, Siemens Technology India
  • Krishna Sastry Pendyala, Partner, Cyber Security, Ernst & Young 
  • Agnidipta Sarkar, Group CISO, Biocon  
  • 08:30 AM
  • 08:59 AM
Opening Remarks: An Insight Into the Summit Sessions
Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Geetha Nandikotkur
Latha  Reddy (Conference Chair)
  • 09:00 AM
  • 09:14 AM
Plenary Session: The Future of Threat Landscape: Defending Against the Quasi-Kinetic Cyberwar
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM, Director-Strategic Studies, Takshashila Institution, Bangalore

The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups? 

The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure. 

The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.  

Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
  • 09:15 AM
  • 09:34 AM
Keynote: Securing Indian Cyberspace: Government and Industry Initiatives
Lt Gen Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat

India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.

The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.  

A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.  

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?   

The keynote will cover:  

  • Comprehensive cybersecurity legislation for various industries  
  • Governance and security framework for securing the digital enterprise  
  • Recent initiatives by the government to bolster cyber defenses against growing threats
Lt Gen Rajesh Pant
  • 09:40 AM
  • 10:09 AM
India's Digital Ecosystem: How Secure Are Enterprises?

India has leaped forward in adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that 'India is leapfrogging into the Fourth Industrial Revolution.' 

The cyber security market in India is expected to grow to USD 3.05 billion by 2022, driven by investments by organizations to safeguard against cyber threats. Moving into 2022, cybercriminals will almost certainly continue to take advantage of any human or technical flaws, and the hybrid work era's more complicated IT requirements. 

A report says, we are likely to see an increase in the number of internet users by about 40 percent to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million by 2023.

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward? 

  • 10:15 AM
  • 10:44 AM
Unlocking the Value of Quantum Computing: A Cybersecurity Perspective
Dr. Jai Ganesh, Chief Product Officer, VP & GM - Technology, HARMAN DTS

Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.  

Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm. 

Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome. 

The session will cover: 

  • Evolving a standardized process to address risks with the use of quantum 
  • How to build crypto agility and manage cryptographic environment better 
  • A tactical and strategic approach to mitigating quantum risks 
Dr. Jai Ganesh
  • 10:50 AM
  • 11:19 AM
Secure Your Business With Password Management
Vikas Malhotra, Country Manager, LastPass

Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately. 

Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link? 

 The session covers: 

  • How does password management fit into your cybersecurity strategy? 
  • How can businesses reduce the risk of human behaviors? 
  • Why going beyond SSO and MFA will help enhance your cybersecurity posture and productivity.
Vikas Malhotra
  • 11:25 AM
  • 11:54 AM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 12:00 PM
  • 12:14 PM
Identity Theft: Understanding the Hacker’s Moves
Pooja Agrawalla, Global Head –IAM, NXP Semiconductors

Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial. 

For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.  

It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.   

The session will cover: 

  • Establishing digital trust with customer identity and risk assessment 
  • Use of behavioral analytics as a tool to prevent data breaches 
  • Managing privileges “just in time” and in a multi-cloud environment
Pooja  Agrawalla
  • 12:15 PM
  • 12:34 PM
You’ve Been Breached — Now What?
Diwakar Dayal, Managing Director & Country Manager, SentinelOne

Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?

The session will cover:

  • The blueprint with use cases on the best strategies to fight breaches and an effective rollback plan
  • Adoption of autonomous cybersecurity to protect your environment
  • How to prevent breach attempts through incident response, even before attackers gain entry
Diwakar Dayal
  • 12:40 PM
  • 01:09 PM
Fireside Chat: Are Detection Technologies Playing Harder on Privacy?: The Balancing Act
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Kumar K V, Group CIO & CISO, Narayana Health

Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity  for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy? 

The session will cover: 

  • Defining privacy and technology landscape in 2022 
  • Impact of increasing detection tools on privacy 
  • A collaborative approach to fuel privacy and tech innovation
Latha  Reddy (Conference Chair)
Kumar K V
  • 01:15 PM
  • 01:34 PM
Lunch & Networking Break
  • 01:35 PM
  • 02:14 PM
Panel Discussion: Building a Cyber-Resilient Enterprise: Is the C-Suite on the Same Track? Where Is the Disconnect.
Devender Kumar, CISO, ITC Infotech
Dr. Mahesh Kalyanaraman, President, ISACA Chennai
Santhosh Kumar Kempaiah, Director-Information Security & CISO, Visteon Corporation
Venugopal S Arcot, Senior Director – Solution Consulting, ServiceNow

Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations. 

The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect? 

Devender  Kumar
Dr. Mahesh  Kalyanaraman
Santhosh Kumar Kempaiah
Venugopal  S Arcot
  • 02:15 PM
  • 02:44 PM
The Future of Secure Digital Payments: Response to Risks

The Parliament informed that 2.9 lakh digital banking and payment-related cybersecurity incidents that happened in the recent past were driven by phishing, ransomware attacks, cyber espionage, DDoS, viruses, spoofing, and website hacking, among others. Organizations need to ramp up their authentication efforts in light of a 70% increase in cashless transactions, which has led to increases in attempted fraud. 

The movement to cashless transactions and the surge in e-commerce have led to new fraud patterns, including growth in digital skimming of payment information from online checkout functions and an increase in fraud perpetrated through creating fake UPI real-time payment IDs. 

The daunting task for the security leaders has been to secure the future of digital payments. 

The session will cover:   

  • Innovations in security and compliance standards in securing payment transactions
  • Data-centric strategies for payment data protection in applications and new forms of payment authentication
  • How end-to-end encryption and tokenization can mitigate data breach risks
  • 02:50 PM
  • 03:04 PM
Panel Discussion: Privacy by Design: A Reality Check
S Srikanth (Advisory Member), CISO, Tata Electronics
Narasimhan Elangovan, Partner, KEN & Co.
Prakash Padariya, Senior Vice President & Global CISO, OYO
Harish Sathyan, Senior Group Manager-Privacy and Data Protection, Infosys

Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?   

Some experts say anything new that gets integrated into the organization  any new system, technology, or vendor onboarding  must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.  

Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models? 

Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure? 

The session will cover: 

  • Implementing the privacy policy at the design stage 
  • Essential steps to rebuild the architecture or the platform 
  • Use-case scenario in how privacy is embedded into the design of products or solutions
S  Srikanth (Advisory Member)
Narasimhan  Elangovan
Prakash  Padariya
Harish Sathyan
  • 03:10 PM
  • 03:39 PM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 03:40 PM
  • 03:49 PM
Deploying XDR: A CISO’s Approach
Agnidipta Sarkar (Advisory Member), Group CISO, Biocon Ltd.

Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks. 

As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks. 

It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities. 

The session will cover: 

  • Popular myths and realities about XDR 
  • How to embed XDR into the existing threat detection framework 
  • Understanding the critical pieces of the XDR puzzle, like required technologies and integrations
Agnidipta  Sarkar (Advisory Member)
  • 03:50 PM
  • 04:19 PM
Cyber Insurance’s Response to Rising Ransomware Attacks: Is It Killing Cyber Insurance?
Jacxine Fernandez, VP - Information Security, Bangalore International Airport Ltd

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?       

The session will also cover:  

  • Will ransomware ultimately lead to the fall of cyber insurance companies?  
  • How cyber insurance industry must approach the problem of ransomware  
  • Ways to address skill shortage in the industry
Jacxine Fernandez
  • 04:25 PM
  • 04:54 PM
Panel Discussion: To Pay or Not to Pay Ransom: The C-Suite Debate
Parag Deodhar, Managing Director - Internal Audit, Global IT Audit Lead, Large IT Services Company
Krishna Sastry Pendyala (Advisory Member), Partner, Cyber Security, Ernst & Young
Ashish Gopal Saxena, Chief Information & Digital Officer, Jana Small Finance Bank Ltd

Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.   

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.  

The session will cover:  

  • What should be the C-suite's approach in case of a ransomware attack  
  • How to engage with the law enforcement before taking the decision  
  • Prepare now or pay later — CISO's take
Parag  Deodhar
Krishna Sastry Pendyala (Advisory Member)
Ashish Gopal Saxena
  • 05:00 PM
  • 05:29 PM

With the ongoing global quasi-kinetic cyberwar, enterprises in India are revisiting their state of cybersecurity readiness in gearing up to the new challenges by exploring new ways to fortify their enterprises. The CISOs have the daunting task of unlocking new strategies to fight emerging threats and constantly understand the hacker's moves. In addition, the emergence of IoT has increased the challenges of the inter-connected world, keeping the security leaders on their toes. The virtual world has exposed them to the 'crime-as-a-service' model by which cybercriminals can successfully invade the organizations, making it hard for security teams to respond in real time. Attend ISMG's hybrid cybersecurity summit to gain insights from global and regional cybersecurity thought leaders on ways to address security challenges and the use of the right technology and frameworks. The summit will cover critical aspects of XDR, data privacy and encryption, dark web, cloud security, IoT, OT security, ransomware, the relevance of quantum computing in cybersecurity, cyber insurance, and many more.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Name :
Conrad Bengaluru, 25/3, Kensington Rd, Ulsoor, Bengaluru, 560008

Agnidipta Sarkar (Advisory Member)
Group CISO
Biocon Ltd.
Sarkar is the group CISO at Biocon. He is leading a panel to write a standard on cyber resilience for the Bureau of Indian Standards. He has 30 years of experience as an auditor, board advisor, consultant, business leader, and...
Devender Kumar
CISO
ITC Infotech
Kumar is the chief information security officer at ITC Infotech. He has 27 years of experience in cybersecurity, business continuity, risk management, security compliance, and privacy. Prior to joining ITC Infotech, he worked for several IT organizations such as TMF...
Suparna Goswami
Associate Editor
ISMG
Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she...
S Srikanth (Advisory Member)
CISO
Tata Electronics
Dr. Mahesh Kalyanaraman
President
ISACA Chennai
Dr. Kalyanaraman is the associate vice president, risk and compliance, at HCL Technologies. He has over 25 years of experience in security governance, policy management, GRC, compliance, risk assessment, third-party risk management, and technical security assurance. Prior to joining HCL,...
Prakash Padariya
Senior Vice President & Global CISO
OYO
Kumar K V
Group CIO & CISO
Narayana Health
Kumar is the group CIO of Narayana Health. As a senior technology and security leader with more than two decades of experience, his expertise lies in digital strategy, systems design and development, enterprise architecture, and information security and privacy.
Diwakar Dayal
Managing Director & Country Manager
SentinelOne
Pooja Agrawalla
Global Head –IAM
NXP Semiconductors
Agrawalla is the head of identity and access management (cybersecurity) at NXP Semiconductors, where she leads IAM products and solutions. She has about 20 years of experience in identity and cybersecurity and is also currently associated with CSA (Cloud Security...
Narasimhan Elangovan
Partner
KEN & Co.
Elangovan is a partner at KEN & Co., and sr. advisor for digital security services at Crowe Advisory Services (India) LLP. His areas of expertise include data analytics, risk-based audit, privacy impact assessments, information systems assurance, SOX compliance, and SOC...
Latha Reddy (Conference Chair)
Co-Chairman
Global Commission on Stability in Cyberspace
Sethu Raman (Conference Co-Chair)
Senior Vice President & Chief Risk Officer
Mphasis
Krishna Sastry Pendyala (Advisory Member)
Partner, Cyber Security
Ernst & Young
Pendyala is a partner - cybersecurity at Ernst & Young. He has over 25 years of experience in proactive, predictive, and reactive domains of information and cybersecurity. Prior to EY, he held leadership roles in PwC, TCS, and the Ministry...
Santhosh Kumar Kempaiah
Director-Information Security & CISO
Visteon Corporation
Kempaiah is CISO and director of information security at Visteon Corp. He has over 18 years of experience in information security. Prior to joining Visteon, he held leadership roles at multiple organizations, including Alfanar, Philips, and Volvo.
Dr. Jai Ganesh
Chief Product Officer, VP & GM - Technology
HARMAN DTS
Dr. Ganesh is the chief product officer at HARMAN International. He is an award-winning digital transformation and innovation leader with expertise in leading technology strategy, organizational innovation, research and development, and new product and service innovations.
Ashish Gopal Saxena
Chief Information & Digital Officer
Jana Small Finance Bank Ltd
Harish Sekar
Senior Technical Evangelist
ManageEngine
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
Director-Strategic Studies
Takshashila Institution, Bangalore
Menon is the director, strategic studies programme, Takshashila Institution; professor emeritus, Trans Disciplinary University; and adjunct professor at the National Institute of Advanced Studies (NIAS), Bangalore. Prior to this, he served in the Indian Army for 40 years.
Geetha Nandikotkur
Managing Editor-Asia & Middle East
Information Security Media Group
Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs...
Lt Gen Rajesh Pant
National Cyber Security Coordinator
National Security Council Secretariat
Pant is presently holding the prestigious appointment of National Cyber Security Coordinator in the National Security Council Secretariat of India. He is responsible for coordinating all activities across multiple sectors to ensure secure and resilient cyberspace within the nation.
Jacxine Fernandez
VP - Information Security
Bangalore International Airport Ltd
Parag Deodhar
Managing Director - Internal Audit, Global IT Audit Lead
Large IT Services Company
Deodhar is the managing director of internal audit at Accenture. He is a seasoned cybersecurity professional with over 22 years of experience in enterprise risk management, operational risk, and fraud risk management. Prior to joining Accenture, he held leadership roles...
Harish Sathyan
Senior Group Manager-Privacy and Data Protection
Infosys
Vikas Malhotra
Country Manager
LastPass
Venugopal S Arcot
Senior Director – Solution Consulting
ServiceNow

View Agenda
Welcome to ISMG's Cybersecurity Summit Bengaluru

The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
 

Conference Chair:  Latha Reddy, Co-Chairman, Global Commission on Stability in Cyberspace 
Conference Co-ChairSethu Raman, Senior Vice President and Chief Risk Officer, Mphasis 

Advisory Members: 

  • Akhil Verma, CISO, Paytm Money
  • S Srikanth, CISO, Tata Electronics
  • Devender Kumar, CISO, ITC Infotech
  • Srinivas Poosarla, Chief Privacy Officer and DPO (Worldwide), Infosys
  • Prashant Kadloor, Head of Research Group, Cybersecurity, Siemens Technology India
  • Krishna Sastry Pendyala, Partner, Cyber Security, Ernst & Young 
  • Agnidipta Sarkar, Group CISO, Biocon  
  • 08:30 AM
  • 08:59 AM
Opening Remarks: An Insight Into the Summit Sessions
Geetha Nandikotkur, Managing Editor-Asia & Middle East, Information Security Media Group
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Geetha Nandikotkur
Latha  Reddy (Conference Chair)
  • 09:00 AM
  • 09:14 AM
Plenary Session: The Future of Threat Landscape: Defending Against the Quasi-Kinetic Cyberwar
Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM, Director-Strategic Studies, Takshashila Institution, Bangalore

The importance of operating in and protecting the cyber domain has gained much attention during this quasi-kinetic cyberwar. It’s obvious that cyberattacks on various geographies and government systems severely impact the global economy and the ability to execute in modern, network-centric warfare. The effort has led to much debate about the question: is cyber deterrence possible given the sophistication of cyberattacks and the extensive offensive nature of the adversary groups? 

The countries have witnessed a cyber spillover from the Ukraine and Russia conflict — DDoS, ransomware, wiper malware, and other attacks against critical infrastructure. 

The keynote will cover how enterprises should defend against the quasi-kinetic cyberwar and how the future threat landscape will evolve.  

Lt Gen (Dr.) Prakash Menon, PVSM, AVSM, VSM
  • 09:15 AM
  • 09:34 AM
Keynote: Securing Indian Cyberspace: Government and Industry Initiatives
Lt Gen Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat

India is adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that “India is leapfrogging into the Fourth Industrial Revolution”.

The cybersecurity market in India is expected to grow to $3.05 billion by 2022, driven by investments by organizations to safeguard against cyberthreats. Through 2022, cybercriminals will undeniably continue to take advantage of human errors, technical flaws, and the hybrid work era's more complicated IT requirements.  

A report says, by 2023, we are likely to see an increase in the number of internet users by about 40% to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million.  

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward?   

The keynote will cover:  

  • Comprehensive cybersecurity legislation for various industries  
  • Governance and security framework for securing the digital enterprise  
  • Recent initiatives by the government to bolster cyber defenses against growing threats
Lt Gen Rajesh Pant
  • 09:40 AM
  • 10:09 AM
India's Digital Ecosystem: How Secure Are Enterprises?

India has leaped forward in adopting new technological innovations and driving digital transformation faster than other nations. Global researchers at Harvard University have categorically stated that 'India is leapfrogging into the Fourth Industrial Revolution.' 

The cyber security market in India is expected to grow to USD 3.05 billion by 2022, driven by investments by organizations to safeguard against cyber threats. Moving into 2022, cybercriminals will almost certainly continue to take advantage of any human or technical flaws, and the hybrid work era's more complicated IT requirements. 

A report says, we are likely to see an increase in the number of internet users by about 40 percent to between 750 million and 800 million and a doubling of smartphones to between 650 million and 700 million by 2023.

Given the expansion in the digital footprint across industry verticals, are enterprises secure and prepared to have their counter defenses in place? What needs to change from an enterprise security perspective moving forward? 

  • 10:15 AM
  • 10:44 AM
Unlocking the Value of Quantum Computing: A Cybersecurity Perspective
Dr. Jai Ganesh, Chief Product Officer, VP & GM - Technology, HARMAN DTS

Large enterprises have started exploring quantum computing as a driver for business transformation and intelligent change because it allows organizations to accelerate digital transformation.  

Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm. 

Security leaders say to unlock the value of quantum computing, two systemic risks — tech governance and cybersecurity — need to be overcome. 

The session will cover: 

  • Evolving a standardized process to address risks with the use of quantum 
  • How to build crypto agility and manage cryptographic environment better 
  • A tactical and strategic approach to mitigating quantum risks 
Dr. Jai Ganesh
  • 10:50 AM
  • 11:19 AM
Secure Your Business With Password Management
Vikas Malhotra, Country Manager, LastPass

Today, passwords are essentially the keys to the digital kingdom. They allow employees, partners, and sometimes customers to access a broad range of tools and systems that enable them to work, collaborate, and transact. Passwords are also notoriously weak as a security tool, and their problems remain at an all-time high unless we take the proper steps to manage and protect them adequately. 

Statistics from reports such as the 2022 annual Verizon DBIR show that approximately 80% of breaches are related to credential theft. Against this backdrop, a pertinent question is how do you manage your passwords and reduce human behavior risk, given that humans are the weakest link? 

 The session covers: 

  • How does password management fit into your cybersecurity strategy? 
  • How can businesses reduce the risk of human behaviors? 
  • Why going beyond SSO and MFA will help enhance your cybersecurity posture and productivity.
Vikas Malhotra
  • 11:25 AM
  • 11:54 AM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 12:00 PM
  • 12:14 PM
Identity Theft: Understanding the Hacker’s Moves
Pooja Agrawalla, Global Head –IAM, NXP Semiconductors

Managing identity theft effectively has been a challenge for security leaders, and to address this, an in-depth understanding of the hacker’s moves becomes crucial. 

For victims of identity theft, life can seem surreal, and organizations entrusted with protecting customer assets have to tackle the incident by preempting the hacker’s movements.  

It becomes imperative for CISOs to understand the use of digital technologies and the role of threat intelligence from the darkweb.   

The session will cover: 

  • Establishing digital trust with customer identity and risk assessment 
  • Use of behavioral analytics as a tool to prevent data breaches 
  • Managing privileges “just in time” and in a multi-cloud environment
Pooja  Agrawalla
  • 12:15 PM
  • 12:34 PM
You’ve Been Breached — Now What?
Diwakar Dayal, Managing Director & Country Manager, SentinelOne

Today, cyberattackers are adapting and moving faster than the pace at which organizations are establishing cybersecurity defense. What happens when the threat actors manage to breach your defense? What options do you really have? When it comes to cyber incident response, it is not only about what you know but also who all know. Are there any common gaps in updated and tested plans, and where are they?

The session will cover:

  • The blueprint with use cases on the best strategies to fight breaches and an effective rollback plan
  • Adoption of autonomous cybersecurity to protect your environment
  • How to prevent breach attempts through incident response, even before attackers gain entry
Diwakar Dayal
  • 12:40 PM
  • 01:09 PM
Fireside Chat: Are Detection Technologies Playing Harder on Privacy?: The Balancing Act
Latha Reddy (Conference Chair), Co-Chairman, Global Commission on Stability in Cyberspace
Kumar K V, Group CIO & CISO, Narayana Health

Some experts say technology can promote accountability and anonymity. The computer systems and applications require ‘proof’ of identity  for every function within an organization— before allowing access to the user. The question it raises is whether the newly deployed technologies for threat detection in an enterprise will play hard on privacy? 

The session will cover: 

  • Defining privacy and technology landscape in 2022 
  • Impact of increasing detection tools on privacy 
  • A collaborative approach to fuel privacy and tech innovation
Latha  Reddy (Conference Chair)
Kumar K V
  • 01:15 PM
  • 01:34 PM
Lunch & Networking Break
  • 01:35 PM
  • 02:14 PM
Panel Discussion: Building a Cyber-Resilient Enterprise: Is the C-Suite on the Same Track? Where Is the Disconnect.
Devender Kumar, CISO, ITC Infotech
Dr. Mahesh Kalyanaraman, President, ISACA Chennai
Santhosh Kumar Kempaiah, Director-Information Security & CISO, Visteon Corporation
Venugopal S Arcot, Senior Director – Solution Consulting, ServiceNow

Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation in building a cyber-resilient enterprise? The question arises if the C-suite is aligned in achieving the desired goal and meeting the security expectations. 

The session discusses how the CTO, CISO, CEO, and CFO collaborate to facilitate the continued success of their organization, and if there is a disconnect? 

Devender  Kumar
Dr. Mahesh  Kalyanaraman
Santhosh Kumar Kempaiah
Venugopal  S Arcot
  • 02:15 PM
  • 02:44 PM
The Future of Secure Digital Payments: Response to Risks

The Parliament informed that 2.9 lakh digital banking and payment-related cybersecurity incidents that happened in the recent past were driven by phishing, ransomware attacks, cyber espionage, DDoS, viruses, spoofing, and website hacking, among others. Organizations need to ramp up their authentication efforts in light of a 70% increase in cashless transactions, which has led to increases in attempted fraud. 

The movement to cashless transactions and the surge in e-commerce have led to new fraud patterns, including growth in digital skimming of payment information from online checkout functions and an increase in fraud perpetrated through creating fake UPI real-time payment IDs. 

The daunting task for the security leaders has been to secure the future of digital payments. 

The session will cover:   

  • Innovations in security and compliance standards in securing payment transactions
  • Data-centric strategies for payment data protection in applications and new forms of payment authentication
  • How end-to-end encryption and tokenization can mitigate data breach risks
  • 02:50 PM
  • 03:04 PM
Panel Discussion: Privacy by Design: A Reality Check
S Srikanth (Advisory Member), CISO, Tata Electronics
Narasimhan Elangovan, Partner, KEN & Co.
Prakash Padariya, Senior Vice President & Global CISO, OYO
Harish Sathyan, Senior Group Manager-Privacy and Data Protection, Infosys

Most security leaders believe that they are not protecting technology but people. The fundamental questions that arise are: Is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues?   

Some experts say anything new that gets integrated into the organization  any new system, technology, or vendor onboarding  must go through a review process to check for any risks. This will ensure the risks are identified at the initial design phase so that the finished product has all the mechanisms built in by default to comply with GDPR.  

Many organizations fail to understand the intersection between security and privacy. How are privacy-by-design strategies meeting the legal mandates while promoting a free flow of data that powers digital business models? 

Against this, how are organizations trying to apply privacy principles by design in its true sense? How is security and privacy being built in and not bolted on, and what should be the standard operating procedure? 

The session will cover: 

  • Implementing the privacy policy at the design stage 
  • Essential steps to rebuild the architecture or the platform 
  • Use-case scenario in how privacy is embedded into the design of products or solutions
S  Srikanth (Advisory Member)
Narasimhan  Elangovan
Prakash  Padariya
Harish Sathyan
  • 03:10 PM
  • 03:39 PM
Exhibits and Networking Break

Enhance your summit experience by visiting the sponsors’ interactive booths. Chat with representatives at each booth, access valuable resources, schedule a demo, and more!

  • 03:40 PM
  • 03:49 PM
Deploying XDR: A CISO’s Approach
Agnidipta Sarkar (Advisory Member), Group CISO, Biocon Ltd.

Traditional threat monitoring has evolved into advanced detection and response services against a backdrop of digital transformation and skyrocketing corporate cyberattacks. 

As organizations are scrambling to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed XDR, the next evolution in threat detection solutions, into their existing frameworks. 

It is imperative to understand what XDR is all about, how it can benefit your organization, and how to build a long-term XDR architecture to enhance threat detection capabilities. 

The session will cover: 

  • Popular myths and realities about XDR 
  • How to embed XDR into the existing threat detection framework 
  • Understanding the critical pieces of the XDR puzzle, like required technologies and integrations
Agnidipta  Sarkar (Advisory Member)
  • 03:50 PM
  • 04:19 PM
Cyber Insurance’s Response to Rising Ransomware Attacks: Is It Killing Cyber Insurance?
Jacxine Fernandez, VP - Information Security, Bangalore International Airport Ltd

The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is ‘to what extent is cyber insurance fueling ransomware attacks’?       

The session will also cover:  

  • Will ransomware ultimately lead to the fall of cyber insurance companies?  
  • How cyber insurance industry must approach the problem of ransomware  
  • Ways to address skill shortage in the industry
Jacxine Fernandez
  • 04:25 PM
  • 04:54 PM
Panel Discussion: To Pay or Not to Pay Ransom: The C-Suite Debate
Parag Deodhar, Managing Director - Internal Audit, Global IT Audit Lead, Large IT Services Company
Krishna Sastry Pendyala (Advisory Member), Partner, Cyber Security, Ernst & Young
Ashish Gopal Saxena, Chief Information & Digital Officer, Jana Small Finance Bank Ltd

Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.   

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.  

The session will cover:  

  • What should be the C-suite's approach in case of a ransomware attack  
  • How to engage with the law enforcement before taking the decision  
  • Prepare now or pay later — CISO's take
Parag  Deodhar
Krishna Sastry Pendyala (Advisory Member)
Ashish Gopal Saxena
  • 05:00 PM
  • 05:29 PM

Speaker Interviews

July 7 - 8, 2022

Cybersecurity Summit: Bengaluru