Agenda Highlights
- Cyber Insurance and Risk
- Digital Personal Data Protection Act
- Supply Chain Attacks
- AI-Enabled Zero Trust Strategies
- Cloud Deployment Vulnerabilities
- Quantum Threats
In this fast-paced technology world, digital transformation has become a strategic need for businesses to stay relevant. Statista’s report forecasts global digital transformation spending to reach $3.4 trillion by 2026, while India aims to be a $1 trillion digital economy by the same year. Against this backdrop, practitioners believe that enterprises will explore the integration of cutting-edge technologies, with a renewed focus on cybersecurity and sustainability.  Â
Brought to you by ISMG, the one-day Cybersecurity Summit in Bengaluru will bring together technology partners and decision-makers from the IT and cybersecurity industry to explore ways to establish their leadership in becoming the beacon of change in the IT and cybersecurity domains. Attend this summit to delve into the varied aspects of new-age technologies such as generative AI, quantum risks, IoT, machine learning, 5G, augmented reality, privacy, continuous threat exposure, and cloud and networking security.
The summit will serve as a platform to share best practices, innovative solutions, and success stories with the cybersecurity fraternity and inspire future leaders.
Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.
ISMG Summits bring the leading thought leaders and educators in the security field to the stage, offering interactive workshops and networking events. Engage with the luminaries of cybersecurity, who are passionate about the latest tools and technologies for defending against threats.
Bengaluru
An internationally recognized cybersecurity mentor, Lt. Gen. Nair serves as the National Cyber Security Coordinator in the National Security Council Secretariat, Government of India. He is responsible for coordinating all activities across multiple sectors to ensure a secure and resilient cyberspace within the nation.
Gen. Nair was commissioned into the Corps of Signals of the Indian Army in 1984. He held several key appointments at all levels of military hierarchy, including multiple tenures in the Kashmir Valley and North East India. He has used technology for deriving operational benefits in areas of intelligence gathering and information systems. He also was instrumental in steering several projects on AI, quantum, cryptology and cyber operations, while serving with the armed forces.
These incidents weave together elements of social engineering, financial fraud and the challenges posed by emerging technological threats. AI has significantly impacted the landscape of cyber deception and deepfakes, presenting unique challenges for security practitioners who defend against malicious activities.
It is crucial to prepare your defenses to counter the threat caused by AI’s influence, which could prove disastrous.
The session will cover:
Prof. D Janakiram, Senior Professor, Dept. of CSE, IIT Madras
CISOs now serve as catalysts for digital transformation, holding greater responsibility and accountability for driving business growth. What are the obstacles they encounter in moving beyond their traditional roles, charting a course toward the coveted position of a business leader and warriors?
The keynote will offer a CEO’s perspective on the evolving role of CISOs, highlighting their transformation into growth enablers, addressing inherent shortcomings, and discussing how they are embracing leadership responsibilities.
Lt. Gen. M. Unnikrishnan Nair, National Cyber Security Coordinator, PMO, Govt. of India
However, supply chain attacks target service providers and cannot be ruled out as it is a significant intrusion of the entire ecosystem. Supply chain attacks pose the risk of supplier vulnerabilities, which is the common cause of compromise. Vigilantly monitoring suppliers’ security status – always knowing the risks they bring in – is an essential part of building resilience and response capabilities. Â
The session will cover: Â
Prasanna Raghavendra, Senior Director, R&D, JFrog, India
Combatting this growing risk requires a new approach that combines data security and data protection to architect cyber resilience strategies that not only reduce risk but also enhance readiness and ensure rapid response and recovery.Â
 The session will cover:Â
Aneesh Dhawan, Director – Enterprise & Public Sector Sales, India and SAARC, Commvault
How will an AI CISO address risks in the AI-centric era devoid of humans? How will risk functions operate in the age of AI? With AI poised to become the central pillar of cybersecurity developments, and as machines-human interactions intensify, the critical question arises: who takes control? Â
 The session is a thought-provoking debate between a CISO and CRO on: Â
Dr. Ram Kumar G, (CEB Member), Cyber Security and Risk Leader, Global Automotive Company
Sridhar Sidhu, (CEB Member), Managing Director and Head of Cybersecurity Services Group, Wells Fargo
Sreeni Venugopal, (CEB Member), CIO & CISO, Aster DM Healthcare, India
Cyber insurance has emerged as a vital tool to mitigate financial losses from data breaches, cyberattacks and other digital vulnerabilities. Â
The question on everyone’s mind is – to what extent is cyber insurance fueling ransomware attacks, or is it the best defense against paying ransomware? Â
The session will cover:Â Â
Kumar KV, (CEB Member), CIO & CISO, Narayana Health
Krishnamurthy Rajesh, (CEB Member), Director – Information Technology (Global), GreyOrange
Lt. Col. Raakesh Thayyil (Retd.), (CEB Member), Group Head of Security & Privacy, PropertyGuru Group
Malini Rao, CISO, DeepLearnCyber.ai
Organizations must have the right set of tools that will help regain control, enhance visibility and simplify network management. There is a need to consolidate all the application services and help businesses scale seamlessly without compromising security.Â
Security leaders believe that the connectivity cloud model will enable organizations to better control the IT environment across cloud-native platforms.Â
The session will cover:Â
Ben Munroe, Senior Director, Field Marketing, APJC, Cloudflare
Despite increased awareness and investment in cybersecurity measures, recent incidents, such as the XZ CVE and the PyPI exploit, serve as stark reminders of the persistent vulnerabilities and malicious code inherent in supply chains. Â
It is time to explore the complexities of modern supply chain security, and the underlying factors contributing to its continued vulnerability. Â
The session will cover: Â
Shilpa Raghunathan, Staff Partner Solutions Engineer, Snyk
Without clearly stated guidelines, it can be difficult to understand and define the responsibilities of customers and CSPs. The fallout is compromised security and privacy of data and applications.
Potential vulnerabilities in the cloud surface at the cloud service provider, data location, supply chain and the endpoints. As we see a greater momentum toward the cloud, security leaders are faced with questions: Who is responsible for what is in the cloud? How to navigate shared responsibility model? What role does data sovereignty and data localization play? What is the role of a CISO in navigating the risks? Â
 The session will cover:Â
Ratan Jyoti, (CEB Member), CISO, Ujjivan Small Finance Bank
Ramesh Kumar, (CEB Member), CISO, Biocon Group of Companies
Sapna Singh, Principal Cyber Security Architect, Honeywell
Prasanna Raghavendra, Senior Director, R&D, JFrog
Exploring the extent to which privacy should be a concern for CISOs is crucial. This includes operationalizing privacy within the realms of security and data protection and examining the interconnected aspects of fraud, breach, and privacy.
In an environment where openly shared data and research results drive business, the question of determining the necessary level of security arises. The session will delve into the CISO’s role in implementing data protection and privacy regulations, and explore the alignment of business, finance and IT with privacy considerations. Â Â
The session is a debate between a CISO, DPO, CRO and CIO on: Â Â
Ramakant Mohapatra, Director – Privacy and Data Protection, EdgeVerve
Lakshminarayanan RS, Enterprise Cybersecurity Strategy, Architecture and Regional CISO – Americas, Wipro
Amit Sharma, CIO & Head Partnerships and CSR, Cytecare Hospitals Pvt. Ltd.
Jagannath PV, Global Data Privacy Officer, LTIMindtree
Enterprises grapple with ensuring the accuracy of tracking the data to establish its location, manage access, and control user interactions. Another key challenge is gaining better visibility and context into the vast spread of data by enforcing zero trust controls and ensuring regulatory compliance, data governance, and intellectual property protection.Â
 The session will cover:Â
Thejo Murthy, Lead Systems Engineer, Forcepoint
Regulations and budget restraints pose challenges while thousands of applications and APIs grow in volume and sophistication. Today, organizations are moving toward a “shift everywhere” approach, driven by tight integrations throughout the SDLC and intelligent automation. Â
There is a need to implement consistent security policies to ensure access to the right tools and resources to secure software applications at scale. Security leaders believe that the adoption of application security posture management (ASPM) can provide the necessary wherewithal to secure the enterprise application portfolio.
The session will cover: Â
Girish K Nanappa, Senior Director and National Sales Head, Synopsys Inc.
It has been a challenge for most security practitioners to pre-empt an attack and take appropriate action. The herculean task of navigating these attack scenarios is stressful for security practitioners, and it requires an efficient threat detection process involving the integration of multiple antimalware engines for scanning, maximizing the detection rate of malicious content.Â
As a use case, the session will demonstrate the cause of such attacks and the attack process. It will also discuss how deploying a deep content disarm and reconstruction technology can protect organizations against ransomware and zero-day threats by eliminating embedded objects, which often serve as the primary attack vector in an attack chain.Â
Nandakumar Seshadri, Regional Sales Manager, OPSWAT
Practitioners are grappling with building visibility into data assets and establishing deep and continuous monitoring. Enterprises are striving to mitigate the risks arising from business expansion and growth and determining strategies to establish detection, protection, and response mechanisms; however, they often lack the necessary capabilities and techniques.
The session will cover:
Sivaramakrishnan Krishnamurthy, Technical Director – Pre-Sales, Quest Software
However, they are a potential threat to security systems since they increase the probability of classical cryptography algorithms getting broken.
What cyberthreat does quantum computing pose, and why is there a need for new cryptography techniques based on the paradigm of post-quantum cryptography? How prepared are enterprises to tackle the risks? Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm.
The session will cover:Â
Anish Koshy, (CEB Member), Vice President – Information and Cyber Security Risk Officer, Standard Chartered GBS
Security leaders acknowledge that AI/ML is a double-edged sword employed by both attackers and defenders. Defenders find it crucial to identify threats and vulnerabilities, adding to its significance in the cybersecurity landscape.
However, it is critical for security leaders to understand the limitations of AI and devise strategies to harness AI in the right sense, and consider that human expertise is still a critical component of their cybersecurity strategy.
The session will cover:
Firdosh Sheikh, Founder & CEO, DRIFE
Sailaja Vadlamudi, Vice President Security & Privacy, ERP Digital Supply Chain, SAP Labs India
Ankush Sabharwal, Founder & CEO, CoRover
Akshay Sivananda, (CEB Member), CISO, Saviynt
Kavitha Kadambi, CISO, Infosys
*All prices are exclusive of GST
*Note – Conference pass is applicable to information security and IT practitioners. (Not applicable for sales role/business development/consultant/security vendors/solution providers.)
For more information, email us at apac.contact@ismg-events.com or contact our ISMG representative on +91 9819036179
@ISMG_News
#ISMGSummits
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Upcoming ISMG Events