The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
Conference Chair: Anuprita Daga, President, Chief Information Security Officer, Yes Bank
Conference Co-Chair:
Advisory Members:
The state of security is challenged with enterprises fighting the most unprecedented battles in 2022 after witnessing a surge in attacks and breaches. While Indian enterprises and governments have put their best foot forward to build a technology-driven future - making India one of the fastest-growing markets for digital technologies - it has also increased the vulnerability to cyber risk.
Cybersecurity professionals and CISOs, in particular, have the daunting task of safeguarding their organizations and defending against attackers to deliver business value.
The session will cover:
Despite being a traditional industry, banking and financial services are constantly evolving. Technological innovations redefine how banks operate in this world of digital transformation. Contactless, bots, blockchain, biometrics, AI, and cloud are some digital innovations in the financial services industry.
This keynote session will deep dive into the changing nature of banking, including the risks and the security innovations, to support organizations in protecting the transactions ecosystem and establishing digital business and cyber resilience.
All organizations across verticals have embarked on their digital transformation journey, and the banking sector has always been way ahead in the game, which is only getting intense. As most security leaders argue, this digital transformation is facilitated by the emergence of easy-to-use cloud-native technologies. As they do this, security is constantly raised as a key concern but needs to be dealt with as a critical enabler.
One of the most exciting aspects is that in top banks, CISOs are spearheading the digital transformation initiative, going by the rule of thumb of "security by design" and evolving as transformation leaders.
The session will cover:
As organizations struggle to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed extended detection and response (XDR) - the next evolution in threat detection solutions - into their existing frameworks.
Unfortunately, practitioners need help finding a single definition widely accepted by analysts and vendors purporting to be knowledgeable on the subject.
It is imperative to understand what XDR is about, how it can benefit your organization, why I should consider the technology in my enterprise security stack, and what I should expect from vendors who claim to have built the perfect mousetrap. how to make a long-term XDR architecture to enhance threat detection capabilities and are CISOs seeing value.
Cybersecurity providers must constantly adapt and evolve with the variety of ways in which the blast radius of attacks has been expanding. Organizations have built their security strategy around the concept of 'zero trust,' which departs from the conventional perimeter and asset-centric protection models. Where does the journey to 'zero trust' begin, what are the typical entry points, and how can it unfold? Truly reaping the benefits of a 'zero trust' strategy requires a complete and robust understanding of an organization's data landscape and establishing a practical data access governance framework. Without this, many of the benefits of 'zero trust' are lost, rendering it more of a diluted version of conventional models.
The session will discuss:
As ransomware attacks continue to hold businesses hostage and prevent organizations from operating to the desired extent, the industry demands an innovative solution that uses advanced AI to detect unknown attacks.
The daunting task for CISOs is to be cognizant of the fact that it is only a matter of time before they get attacked and to decide whether to pay or not pay to gain their data or lose everything.
The session will cover:
The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of the unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is, ‘to what extent is cyber insurance fueling ransomware attacks?' What kind of questions do the CISOs need to be prepared for?
The session will also cover:
Will ransomware ultimately lead to the fall of cyber insurance companies?
How the cyber insurance industry must approach the problem of ransomware
Ways to address skill shortage in the industry and way forward for CISOs
Organized cybercrime syndicates are using extremely sophisticated methods to target financial institutions, payment firms and e-commerce merchants.
With the rise in organized financial crime, security and fraud teams are challenged with tackling cyber-enabled financial fraud and managing a growing strategic risk to their brand reputation.
It is imperative to understand the hacker’s modus operandi, the attack components being used, and how to take control and build defenses to prevent fraud. It is also critical to know how to read into the fraudster’s mind to understand motivated attacks from every angle, limiting the effectiveness of the best one-dimensional defenses.
The session will cover:
Ways to understand the architecture of financial fraud and attack components
New authentication methods to prevent fraud
Best defenses to fight fraud and scale
A recent report states that the worldwide blockchain market is estimated to reach $20 billion in 2024. Sixty-nine percent of banks are exploring different avenues regarding blockchain technology to make their services safer. The adoption of blockchain has brought many advantages. In recent years, blockchain security has become a crucial part of organizations’ processes to prevent devices from cyberattacks and malicious hacking attempts.
The session will cover:
Enhancing blockchain forensic capabilities for fraud detection
Challenges of implementing blockchain technology
A security strategy for blockchain
In the current threat environment, SOC teams continue to face the pressure of detecting an intrusion as quickly as possible before it becomes a significant security incident. With so many point products in use in a typical organization, it is often time-consuming and challenging for the SOC team to search through the noise to find important alerts that may indicate the presence of a threat in the environment.
SecOps is more difficult today vs. two years ago. Improvements are ongoing as teams adopt future-forward practices, including deploying XDR.
However, it is critical to understand what XDR is, what it is not, and how it’s increasing SecOps efficiency and enabling the SOC team to detect, respond and remediate threats across all attack channels in real time.
The session will cover:
SecOps challenge in tackling phased malware attacks
Advanced persistent threats and MITRE ATT&CK framework
Creating better SOC operating models in the attack kill chain process
Post the pandemic, along with protecting the organization from ever-changing cyberthreats, organizations are grappling with the newer challenges of hybrid workforce, rapid digital transformation and public cloud momentum.
While it is always desirable to grow the operations at speed and scale along with agility, it is equally important to balance the risks with the proper mitigation techniques. Most agree that, if implemented effectively, "zero trust" helps achieve this balance.
The session will cover:
CISOs are under constant pressure from the board to curb security costs, although a bigger budget isn’t always a solution. The aspect of doing more with less isn’t restricted to IT tasks alone; it also extends to security, particularly with rising security costs and amplified threats.
The questions that arise among CISOs are how to simplify the organization’s security landscape to reduce cost? What are the effective ways to consolidate vendor licensing costs? Can automation help to enhance and modernize security operations?
The session will cover:
Cybersecurity is too complex, too complicated, and changes too fast to be effectively managed by most organizations. The rise of ransomware brokers and the continued talent shortage mean defenders increasingly need security technology driven on their behalf. Automation is becoming the game's name as it holds the key to responding to incidents faster and possibly requiring fewer staff members on the security team. Most professionals say this is fuelling the phenomenon of 'Cybersecurity as a Service,' arguably going to be the future. The growth in MSSPs drives the trend by embedding technology into the overall fabric of enterprise technology and security architecture.
The session will discuss:
How Sophos will help build cyber resiliency with the cybersecurity-as-a-service?
How are CISOs embracing this service to contend with the threat actors?
Bridging the skill gap with the service
The drive toward digital transformation and cloud is putting immense pressure on CISOs to secure the cloud, identities, applications, operations system and hardware chip against rising malware intrusions.
As businesses are getting agile and moving Windows 11 operating systems, security practitioners raise concerns about risks associated with the new OS. Experts agree that the OS comes with new security features and includes "zero trust" capability, hardware-based isolation, encryption and malware prevention turned on by default. It is also designed to make it easier for users to have the option to go passwordless.
It’s time to dive deep into some areas to analyze how the principles of the "zero trust" security model help protect all the layers of the cloud embedded in Windows 11.
The session will cover:
The Parliament informed that 2.9 lakh digital banking and payments-related cyber security incidents happened in the recent past were driven by phishing, ransomware attacks, cyber espionage, DDoS, viruses, spoofing, website hacking, among others. Organizations need to ramp up their authentication efforts in light of a 70% increase in cashless transactions, which has led to increases in attempted fraud.
The movement to cashless transactions and the surge in e-commerce have led to new fraud patterns, including growth in digital skimming of payment information from online checkout functions and an increase in fraud perpetrated through creating fake UPI real-time payment IDs.
The session will discuss:
State of digital payments and security risks
New authentication standards
New tools and technologies used to mitigate and responding to risks
The Indian Computer Emergency Response Team (CERT-In) has issued directives under section 70B of the IT Act, 2000, that both government and private organizations in the country must inform the agency within six hours of discovering a cybersecurity incident. In case of non-compliance, the company is liable to pay a maximum penalty of about INR 1 lakh.
While the new guidelines are designed to tackle cybercrime effectively, they are likely to pose challenges to companies in terms of adhering to the six-hour rule. In addition, it has directed all service providers, intermediaries, data centers, corporate bodies and government organizations to retain the logs securely for a period of 180 days within the Indian jurisdiction.
What does this directive mean to the security practitioners, and what are the ways to comply with this? How are CISOs complying with this directive and where are the bottlenecks?
The session will cover:
With the evolution of IoT, enterprises are now riding on 5G security to achieve incredible speed, bringing in greater complexity. Experts say the high-bandwidth and low-latency 5G networks connect everything from health systems to self-driving vehicles and critical infrastructure. It is argued that the structure of 5G networks will be more complex than 2G, 3G or 4G, with the increased use of virtualization and software-defined networking. This will result in rising concerns around privacy and security challenges.
The session will cover:
What security challenges will 5G bring?
How to introduce 5G into security standards
How to protect the supply chain and establish third-party assurance of 5G network devices
Most organizations still use custom scripts, manual processes or legacy solutions to exchange information with customers, partners or other recipients. They do it despite the extra time, cost and challenges associated with maintaining these outdated methods, given the lack of flexibility and security it brings in.
Besides, the existing file transfer processes are rigid in accommodating your growing file transfer challenges.
The session will cover:
How to securely transfer files to and from cloud applications
Establishing centralized control, automation or security to accommodate multiple file servers
New encryption methods to comply with MAS/PCI DSS standards
As businesses scale up with agile development processes, cloud and DevOps, traditional security can no longer be the showstopper. Security must integrate with the DevOps process to ensure responsibility is shared and security is in-built.
Most agree that DevSecOps is about security enablement at every stage within the organization: the people, process and technology. To get started with the DevSecOps journey, it is important to enable and empower the technology teams to start thinking about secure design first.
While DevSecOps enables application security testing by the developer and by the tester into pre-production in a more automated fashion, experts argue that integrating DevOps and DevSecOps becomes crucial in establishing the secure development process.
The session will cover:
A "shift-left" strategy in DevSecOps to protect enterprises against attacks
Complying with regulatory mandates around secure coding
Applying automation to the application security testing process using DevSecOps
The average business often receives 10,000 alerts from various software tools used to monitor threats and malware intrusions. The stakes are indeed high. This trend has prompted security leaders to focus on artificial intelligence (AI) to find patterns in vast volume of data.
It’s critical to understand how technology vendors develop innovative AI approaches to detect malware, phishing campaigns, and other intrusions and how much CISOs align with this.
While CISOs are writing AI-based algorithms to detect attack patterns, they sometimes overlook that the AI tool itself can become a new attack vector.
The session will cover:
Use case for deploying AI to build a cyber defense plan
Using automation to bridge supply and demand gaps
Integrating AI with people, processes and technologies for better detection
The Indian government revoked the data protection and privacy bill years after it drew scrutiny from the tech industry over proposed governmental powers in accessing and managing personal data.
The government assured to propose a "comprehensive framework" for tech regulation that includes privacy.
Minister of State for Electronics and Information Technology Rajeev Chandrashekar said that the proposal grew in scope beyond data protection “and was creating degrees of complexity and increasing the burden of compliance on the small business.”
The bill, which would require most data about Indians to be stored domestically, was drafted by a 10-member committee of experts headed by Justice B.N. Srikrishna and released in 2019.
The two pertinent questions that arise are: What is next for security and privacy professionals now? What new regulations need to be embedded into the new framework?
This plenary session by Justice B.N. Srikrishna will provide insights on the way forward for security practitioners in protecting their data.
The enterprises across India are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
Are they able to align their strategy with the business priorities and rise to the expectations in 2023? What needs to change both tactically and strategically to build a cyber-resilient organization?
The C-suite panel comprising the CEO, CFO, CRO and CISO sets the goals for security in leveraging the right technologies, establishing the security culture and a collaborative strategy in accomplishing the task for 2023.
The summit's objective is to provide education and exclusive networking opportunities to the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the region, to capture the regional security challenges that resonate with their current concerns. The summit editorial advisory board includes:
Conference Chair: Anuprita Daga, President, Chief Information Security Officer, Yes Bank
Conference Co-Chair:
Advisory Members:
The state of security is challenged with enterprises fighting the most unprecedented battles in 2022 after witnessing a surge in attacks and breaches. While Indian enterprises and governments have put their best foot forward to build a technology-driven future - making India one of the fastest-growing markets for digital technologies - it has also increased the vulnerability to cyber risk.
Cybersecurity professionals and CISOs, in particular, have the daunting task of safeguarding their organizations and defending against attackers to deliver business value.
The session will cover:
Despite being a traditional industry, banking and financial services are constantly evolving. Technological innovations redefine how banks operate in this world of digital transformation. Contactless, bots, blockchain, biometrics, AI, and cloud are some digital innovations in the financial services industry.
This keynote session will deep dive into the changing nature of banking, including the risks and the security innovations, to support organizations in protecting the transactions ecosystem and establishing digital business and cyber resilience.
All organizations across verticals have embarked on their digital transformation journey, and the banking sector has always been way ahead in the game, which is only getting intense. As most security leaders argue, this digital transformation is facilitated by the emergence of easy-to-use cloud-native technologies. As they do this, security is constantly raised as a key concern but needs to be dealt with as a critical enabler.
One of the most exciting aspects is that in top banks, CISOs are spearheading the digital transformation initiative, going by the rule of thumb of "security by design" and evolving as transformation leaders.
The session will cover:
As organizations struggle to bridge the threat detection and response gap with enhanced budgets and innovative security technology solutions, CISOs are finding ways to embed extended detection and response (XDR) - the next evolution in threat detection solutions - into their existing frameworks.
Unfortunately, practitioners need help finding a single definition widely accepted by analysts and vendors purporting to be knowledgeable on the subject.
It is imperative to understand what XDR is about, how it can benefit your organization, why I should consider the technology in my enterprise security stack, and what I should expect from vendors who claim to have built the perfect mousetrap. how to make a long-term XDR architecture to enhance threat detection capabilities and are CISOs seeing value.
Cybersecurity providers must constantly adapt and evolve with the variety of ways in which the blast radius of attacks has been expanding. Organizations have built their security strategy around the concept of 'zero trust,' which departs from the conventional perimeter and asset-centric protection models. Where does the journey to 'zero trust' begin, what are the typical entry points, and how can it unfold? Truly reaping the benefits of a 'zero trust' strategy requires a complete and robust understanding of an organization's data landscape and establishing a practical data access governance framework. Without this, many of the benefits of 'zero trust' are lost, rendering it more of a diluted version of conventional models.
The session will discuss:
As ransomware attacks continue to hold businesses hostage and prevent organizations from operating to the desired extent, the industry demands an innovative solution that uses advanced AI to detect unknown attacks.
The daunting task for CISOs is to be cognizant of the fact that it is only a matter of time before they get attacked and to decide whether to pay or not pay to gain their data or lose everything.
The session will cover:
The cyber insurance industry has been challenged by the rising costs of cybercrime. The element of the unpredictability of the cybercrime world does not work well for the industry. New coverage and rising renewal rates are major concerns. Premiums are rising by 10- to 20-fold. Recent research reports show that 70% of cybersecurity professionals believe insurance payments to companies that have paid a ransom exacerbate the problem and cause more attacks. Moreover, cyber insurance companies are targets themselves. The question on everyone's mind is, ‘to what extent is cyber insurance fueling ransomware attacks?' What kind of questions do the CISOs need to be prepared for?
The session will also cover:
Will ransomware ultimately lead to the fall of cyber insurance companies?
How the cyber insurance industry must approach the problem of ransomware
Ways to address skill shortage in the industry and way forward for CISOs
Organized cybercrime syndicates are using extremely sophisticated methods to target financial institutions, payment firms and e-commerce merchants.
With the rise in organized financial crime, security and fraud teams are challenged with tackling cyber-enabled financial fraud and managing a growing strategic risk to their brand reputation.
It is imperative to understand the hacker’s modus operandi, the attack components being used, and how to take control and build defenses to prevent fraud. It is also critical to know how to read into the fraudster’s mind to understand motivated attacks from every angle, limiting the effectiveness of the best one-dimensional defenses.
The session will cover:
Ways to understand the architecture of financial fraud and attack components
New authentication methods to prevent fraud
Best defenses to fight fraud and scale
A recent report states that the worldwide blockchain market is estimated to reach $20 billion in 2024. Sixty-nine percent of banks are exploring different avenues regarding blockchain technology to make their services safer. The adoption of blockchain has brought many advantages. In recent years, blockchain security has become a crucial part of organizations’ processes to prevent devices from cyberattacks and malicious hacking attempts.
The session will cover:
Enhancing blockchain forensic capabilities for fraud detection
Challenges of implementing blockchain technology
A security strategy for blockchain
In the current threat environment, SOC teams continue to face the pressure of detecting an intrusion as quickly as possible before it becomes a significant security incident. With so many point products in use in a typical organization, it is often time-consuming and challenging for the SOC team to search through the noise to find important alerts that may indicate the presence of a threat in the environment.
SecOps is more difficult today vs. two years ago. Improvements are ongoing as teams adopt future-forward practices, including deploying XDR.
However, it is critical to understand what XDR is, what it is not, and how it’s increasing SecOps efficiency and enabling the SOC team to detect, respond and remediate threats across all attack channels in real time.
The session will cover:
SecOps challenge in tackling phased malware attacks
Advanced persistent threats and MITRE ATT&CK framework
Creating better SOC operating models in the attack kill chain process
Post the pandemic, along with protecting the organization from ever-changing cyberthreats, organizations are grappling with the newer challenges of hybrid workforce, rapid digital transformation and public cloud momentum.
While it is always desirable to grow the operations at speed and scale along with agility, it is equally important to balance the risks with the proper mitigation techniques. Most agree that, if implemented effectively, "zero trust" helps achieve this balance.
The session will cover:
CISOs are under constant pressure from the board to curb security costs, although a bigger budget isn’t always a solution. The aspect of doing more with less isn’t restricted to IT tasks alone; it also extends to security, particularly with rising security costs and amplified threats.
The questions that arise among CISOs are how to simplify the organization’s security landscape to reduce cost? What are the effective ways to consolidate vendor licensing costs? Can automation help to enhance and modernize security operations?
The session will cover:
Cybersecurity is too complex, too complicated, and changes too fast to be effectively managed by most organizations. The rise of ransomware brokers and the continued talent shortage mean defenders increasingly need security technology driven on their behalf. Automation is becoming the game's name as it holds the key to responding to incidents faster and possibly requiring fewer staff members on the security team. Most professionals say this is fuelling the phenomenon of 'Cybersecurity as a Service,' arguably going to be the future. The growth in MSSPs drives the trend by embedding technology into the overall fabric of enterprise technology and security architecture.
The session will discuss:
How Sophos will help build cyber resiliency with the cybersecurity-as-a-service?
How are CISOs embracing this service to contend with the threat actors?
Bridging the skill gap with the service
The drive toward digital transformation and cloud is putting immense pressure on CISOs to secure the cloud, identities, applications, operations system and hardware chip against rising malware intrusions.
As businesses are getting agile and moving Windows 11 operating systems, security practitioners raise concerns about risks associated with the new OS. Experts agree that the OS comes with new security features and includes "zero trust" capability, hardware-based isolation, encryption and malware prevention turned on by default. It is also designed to make it easier for users to have the option to go passwordless.
It’s time to dive deep into some areas to analyze how the principles of the "zero trust" security model help protect all the layers of the cloud embedded in Windows 11.
The session will cover:
The Parliament informed that 2.9 lakh digital banking and payments-related cyber security incidents happened in the recent past were driven by phishing, ransomware attacks, cyber espionage, DDoS, viruses, spoofing, website hacking, among others. Organizations need to ramp up their authentication efforts in light of a 70% increase in cashless transactions, which has led to increases in attempted fraud.
The movement to cashless transactions and the surge in e-commerce have led to new fraud patterns, including growth in digital skimming of payment information from online checkout functions and an increase in fraud perpetrated through creating fake UPI real-time payment IDs.
The session will discuss:
State of digital payments and security risks
New authentication standards
New tools and technologies used to mitigate and responding to risks
The Indian Computer Emergency Response Team (CERT-In) has issued directives under section 70B of the IT Act, 2000, that both government and private organizations in the country must inform the agency within six hours of discovering a cybersecurity incident. In case of non-compliance, the company is liable to pay a maximum penalty of about INR 1 lakh.
While the new guidelines are designed to tackle cybercrime effectively, they are likely to pose challenges to companies in terms of adhering to the six-hour rule. In addition, it has directed all service providers, intermediaries, data centers, corporate bodies and government organizations to retain the logs securely for a period of 180 days within the Indian jurisdiction.
What does this directive mean to the security practitioners, and what are the ways to comply with this? How are CISOs complying with this directive and where are the bottlenecks?
The session will cover:
With the evolution of IoT, enterprises are now riding on 5G security to achieve incredible speed, bringing in greater complexity. Experts say the high-bandwidth and low-latency 5G networks connect everything from health systems to self-driving vehicles and critical infrastructure. It is argued that the structure of 5G networks will be more complex than 2G, 3G or 4G, with the increased use of virtualization and software-defined networking. This will result in rising concerns around privacy and security challenges.
The session will cover:
What security challenges will 5G bring?
How to introduce 5G into security standards
How to protect the supply chain and establish third-party assurance of 5G network devices
Most organizations still use custom scripts, manual processes or legacy solutions to exchange information with customers, partners or other recipients. They do it despite the extra time, cost and challenges associated with maintaining these outdated methods, given the lack of flexibility and security it brings in.
Besides, the existing file transfer processes are rigid in accommodating your growing file transfer challenges.
The session will cover:
How to securely transfer files to and from cloud applications
Establishing centralized control, automation or security to accommodate multiple file servers
New encryption methods to comply with MAS/PCI DSS standards
As businesses scale up with agile development processes, cloud and DevOps, traditional security can no longer be the showstopper. Security must integrate with the DevOps process to ensure responsibility is shared and security is in-built.
Most agree that DevSecOps is about security enablement at every stage within the organization: the people, process and technology. To get started with the DevSecOps journey, it is important to enable and empower the technology teams to start thinking about secure design first.
While DevSecOps enables application security testing by the developer and by the tester into pre-production in a more automated fashion, experts argue that integrating DevOps and DevSecOps becomes crucial in establishing the secure development process.
The session will cover:
A "shift-left" strategy in DevSecOps to protect enterprises against attacks
Complying with regulatory mandates around secure coding
Applying automation to the application security testing process using DevSecOps
The average business often receives 10,000 alerts from various software tools used to monitor threats and malware intrusions. The stakes are indeed high. This trend has prompted security leaders to focus on artificial intelligence (AI) to find patterns in vast volume of data.
It’s critical to understand how technology vendors develop innovative AI approaches to detect malware, phishing campaigns, and other intrusions and how much CISOs align with this.
While CISOs are writing AI-based algorithms to detect attack patterns, they sometimes overlook that the AI tool itself can become a new attack vector.
The session will cover:
Use case for deploying AI to build a cyber defense plan
Using automation to bridge supply and demand gaps
Integrating AI with people, processes and technologies for better detection
The Indian government revoked the data protection and privacy bill years after it drew scrutiny from the tech industry over proposed governmental powers in accessing and managing personal data.
The government assured to propose a "comprehensive framework" for tech regulation that includes privacy.
Minister of State for Electronics and Information Technology Rajeev Chandrashekar said that the proposal grew in scope beyond data protection “and was creating degrees of complexity and increasing the burden of compliance on the small business.”
The bill, which would require most data about Indians to be stored domestically, was drafted by a 10-member committee of experts headed by Justice B.N. Srikrishna and released in 2019.
The two pertinent questions that arise are: What is next for security and privacy professionals now? What new regulations need to be embedded into the new framework?
This plenary session by Justice B.N. Srikrishna will provide insights on the way forward for security practitioners in protecting their data.
The enterprises across India are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
Are they able to align their strategy with the business priorities and rise to the expectations in 2023? What needs to change both tactically and strategically to build a cyber-resilient organization?
The C-suite panel comprising the CEO, CFO, CRO and CISO sets the goals for security in leveraging the right technologies, establishing the security culture and a collaborative strategy in accomplishing the task for 2023.
November 9 - 11, 2022
Cybersecurity Summit: Mumbai