Agenda Highlights
- Quantum Agility: A Cybersecurity Perspective
- AI Powered Cybersecurity: Advanced Threat Detection and Response
- Demystifying the DPDP Act
- Acquiring and Operationalizing Threat Intelligence
- Innovating and Thriving in a Digital Economy
As one of the world’s leading digital economies, India is witnessing significant investments in cybersecurity aimed at safeguarding its critical infrastructure, businesses and citizen data. The country’s cybersecurity landscape is characterized by rapid technological advancements, resulting in digital disruptions, and exposing it to cyberthreats and vulnerabilities.
CISOs have the daunting task of defending against the digital disruptions by applying three key principles to cybersecurity: refresh, redefine and reimagine.
Security leaders face a constant challenge in spearheading change to make security possible across the organization by exploring new ways of conducting business and establishing innovation and leadership.
To explore their innovation and experiential learning, ISMG Cybersecurity Summit: Mumbai will bring together leading cybersecurity digital experts and thought leaders to discuss digital resilience. The conference will cover various topics, including IoT risk, India’s cybersecurity initiatives, the Digital Personal Data Protection Act and its implications, decoding security, and critical infrastructure vulnerabilities, among other pressing issues. Security experts from technology partner organizations will share insights on the best practices for business transformation and protecting organizations against emerging threats.
You can earn CPE credits by attending ISMG’s Cybersecurity Summit.
Bandra Kurla Complex, Mumbai, Maharashtra – 400055
Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities, enabling attendees to apply the insights and learnings to their daily work.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
With terms such as “data protection” and “privacy” having multiple interpretations, policymakers find it difficult to establish an appropriate framework.
How is India’s data protection and privacy policy defining the compromise of critical systems and information, targeted scanning or probing of critical networks, data breach reporting, and establishing privacy while enabling a secure ecosystem?
The session will cover:
With cyber threats rampant, enterprise security leadership plays a crucial role, whether it gives the organization a cybersecurity advantage or puts it at risk.
The big focus across enterprises today is to build resiliency across and how effective is the leadership in guiding the organization in the right path. While the top leaders and management play a critical role, the security leadership is going to change the shape of the organization, as collaborative leaders promote cross-functional communication and cooperation, break down silos. What needs to change from our traditional forms of leadership and evolve as new leaders?
The keynote session will discuss:
It is a big concern for the professional to assess and automate the process of threat detection, anticipate its impact on the organization, and come up with simulation exercises.
Further to this, the daunting task for the CISOs to comply with the DPDP Act also enhances the challenge of understanding where and how to use AI in the threat intelligence action plan, given that the new identities throw up a huge concern.
Against the growing complexities of AI, it is critical to understand how the data is classified, how to protect identities and build continuous monitoring processes in developing a good threat intelligence modelling.
The session will discuss:
This challenge is particularly critical during the implementation stage of cloud applications, as integrating cloud-native platforms with existing infrastructure can be intricate. As cloud environments grow more dynamic and complex, establishing and maintaining visibility, control, robust security, compliance, effective cost management, and scalability becomes increasingly difficult. To address these challenges, security leaders need to develop a comprehensive, adaptable solution.
The session will cover:
The panelists will examine how AI-powered tools boost the effectiveness of cybersecurity defenses by predicting, identifying and mitigating threats in real time. The session will explore the integration of AI with existing cybersecurity frameworks, the challenges faced in deployment and the future outlook of AI in cybersecurity.
The session will cover:
These frameworks are designed to ensure AI is used ethically and transparently, devoid of bias, thoroughly tested and accurate. Today’s CISOs play a crucial role in ensuring their organizations adhere to their respective AI governance frameworks. They are also responsible for ensuring that the use of AI does not compromise data security and privacy, preventing unauthorized use, collection or disclosure of customer data and mitigating vulnerabilities that could expose networks to malicious attacks.
The session will cover:
This session covers the shift from a reactive defense to a proactive, breach-ready strategy. Discover how zero trust microsegmentation can reduce attack surfaces, contain threats in real time, and ensure agility and trust in a digital-first world. Join us to strengthen your enterprise against evolving threats.
The session will cover:
Security teams responsible for OT security and CISOs face difficulties in securing these networks, dealing with issues such as maintaining uptime, achieving visibility and asset discovery. Many of these networks use outdated operating systems and irreplaceable devices, complicating the task further.
The session will cover:
The reason for this is a lack of understanding of how OT, IoT and cybersecurity are structured and how the entire ecosystem is built.
Threat actors target not only internet-connected devices and applications but also industrial control systems and associated OT infrastructure, which are essential components of critical infrastructure sectors.
The key argument that most witness is about accountability and how the responsibilities are defined for OT, IoT and cybersecurity in assessing their true potential for business growth.
The fireside chat will help understand how the entire structure is evolving and how CISOs need to be responsible for assessing OT risks.
The session will cover:
Although APIs are important for accelerating product delivery and enhancing customer experience, they pose a challenge for security leaders. As APIs make headlines with extensive data breaches and leaks, API security has become a new battleground for CISOs.
Modern CISOs recognize the need to consolidate web applications and API security to safeguard customer data while fueling business innovation, but they often struggle to balance API security and innovation.
The session will cover:
As organizations build their AI strategies, they need to understand both its transformative potential and its practical implementation across the enterprise ecosystem.
The key challenge for business and security leaders lies in navigating these powerful new tools. How can they best understand AI’s capabilities and limitations? What strategies help mitigate algorithmic bias while ensuring positive outcomes? How can organizations balance innovation with security requirements?
This session explores real-world AI applications that have revolutionized business operations and strengthened cybersecurity defenses. Through practical examples, the session will examine how organizations are successfully leveraging AI to drive growth while maintaining robust security protocols.
The session will cover:
• How AI innovations deliver measurable business outcomes
• Building effective AI-powered security defenses and risk management systems
• Strategies for integrating AI to enhance both organizational growth and cybersecurity
Recent incidents, including the ransomware attack on Star Health, underscore the need for security leaders to re-establish organizational reputation amid significant damages.
It is critical for security leaders to be adept at managing post-breach response for when the inevitable occurs, balancing the need to protect organizational reputation with the obligation to safeguard customer data security and privacy.
The session will cover:
Progression into the new year of 2025 also calls for a renewed focus. Many factors could affect CISOs – including their role, leadership, priorities, investments, innovation and strategies.
This session includes a deep dive into understanding CISOs’ vision for 2025 and the technologies they can use to drive enterprise growth and foster cyber resilience.
*All prices are exclusive of GST
*Note – Full Conference pass is applicable to information security and IT practitioners. For profiles other than IT and IS practitioners, please get in touch with us apac.contact@ismg-events.com or contact our ISMG representative on +91 9819036179
*All prices are exclusive of GST
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
@ISMG_News
#ISMGSummits
RSVP here to attend our events. You can select for multiple or individual tickets.