ismg summit logo

November 13, 2024

Cybersecurity Summit: Mumbai

8:30 AM - 6:30 PM IST

Event Overview

As one of the world’s leading digital economies, India is witnessing significant investments in cybersecurity aimed at safeguarding its critical infrastructure, businesses and citizen data. The country’s cybersecurity landscape is characterized by rapid technological advancements, resulting in digital disruptions, and exposing it to cyberthreats and vulnerabilities.

CISOs have the daunting task of defending against the digital disruptions by applying three key principles to cybersecurity: refresh, redefine and reimagine.

Security leaders face a constant challenge in spearheading change to make security possible across the organization by exploring new ways of conducting business and establishing innovation and leadership.

To explore their innovation and experiential learning, ISMG Cybersecurity Summit: Mumbai will bring together leading cybersecurity digital experts and thought leaders to discuss digital resilience. The conference will cover various topics, including IoT risk, India’s cybersecurity initiatives, the Digital Personal Data Protection Act and its implications, decoding security, and critical infrastructure vulnerabilities, among other pressing issues. Security experts from technology partner organizations will share insights on the best practices for business transformation and protecting organizations against emerging threats.

You can earn CPE credits by attending ISMG’s Cybersecurity Summit. 

Venue

Mumbai

Mumbai, Maharashtra, IN

Advisors

Thought Leaders Leading Deep-Dive Discussions on Stage

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, at interactive workshops and networking events. Learn from the who’s who in the cybersecurity industry, passionate about the latest tools and technology to defend against threats.

Shivangi Nadkarni

Co-founder & CEO, Arrka

Mathan Babu Kasilingam

CISO, Vodafone Idea Limited

Balaji Venkateshwar

CISO, Bombay Stock Exchange Limited

Puneet Bhasin

Founder, Cyberjure Legal Consulting

Preet Paramjit Singh

Group Chief Information Security & Privacy Officer, Avenue Supermarts Ltd

Agenda Highlights

  • Quantum Agility: A Cybersecurity Perspective
  • AI Powered Cybersecurity: Advanced Threat Detection and Response
  • Demystifying the DPDP Act
  • Acquiring and Operationalizing Threat Intelligence
  • Innovating and Thriving in a Digital Economy

Sameer Ratolikar

Senior Executive Vice President & CISO, HDFC Bank Ltd.

Dr. Bhimaraya Metri

Director, IIM Nagpur

Dilip Panjwani

Global Head - Cybersecurity Practice and CoE , LTIMindtree

Girish Dixit

CISO, Kotak Securities

Puneet Bhasin

Cyber Law Expert - Proprietor/Founder, Cyberjure Legal Consulting

Steve Dsouza

Vice President - Enterprise Risk Management & CISO, ICICI Lombard

Mathan Babu K.

CTSO & DPO, Vodafone

Sambasivan G

CFO, Tata Play Ltd.

Dr. N Rajendran

Chief Digital Officer (CDO), Multi Commodity Exchange of India Ltd.

Kalpesh Doshi

Group CISO, HDFC Life

Apurva Dalal

Chief Information Officer, Adani Green Energy Ltd.

Satyavrat Mishra

VP & Head Corporate IT, Godrej Industries Ltd.

Pawan Chawla

SVP and CISO, Tata AIA Life Insurance

Amol Deshpande

Group Chief Digital Officer and Head of Innovation, RPG Group

Kalpesh Doshi

Group Chief Information Security Officer, HDFC Life

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Agenda

Registration & Breakfast

Welcome and Opening Remarks

Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Plenary: Demystifying the DPDP Act: A Walkthrough of How Enterprises Need to Comply

With terms such as “data protection” and “privacy” having multiple interpretations, policymakers find it difficult to establish an appropriate framework.

How is India’s data protection and privacy policy defining the compromise of critical systems and information, targeted scanning or probing of critical networks, data breach reporting, and establishing privacy while enabling a secure ecosystem?

The session will cover:

  • Changes in data protection and privacy frameworks in this digitization era;
  • The importance of balancing security and convenience while ensuring data protection and privacy;
  • What does the DPDP Act mean for CISOs, and how ready are they to comply?
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Keynote: Have you Taken the Right Path to Winning the Cyber War in the Digitally Disruptive Era? What Needs to Change as Your Proactive Defense?

In cyberwar, adversaries aim to cripple critical infrastructure, disseminate disinformation and damage economies, which is no less than physical warfare. Considering that the goal of attackers is to disrupt critical systems, steal sensitive data, and destroy the very structures that support the most modern economic enterprise ecosystem, CISOs must develop tailored strategies to emerge victorious when engaging with cyberattackers.

The session will cover:

  • How to integrate cyberattacks with conventional military tactics in building defenses;
  • Redefining security leadership as part of establishing a proactive defense;
  • The importance of using the right defense architecture in protecting critical assets.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Protecting with Passkeys: Is it Next Evolution in MFA?

They offer a significant improvement over traditional password-based authentication by using advanced cryptographic techniques and modern authentication frameworks.


The session will cover:

  • The importance of passkeys for organizations;
  • The role of passkeys in preventing phishing;
  • A walkthrough of how passkeys can be used as a new form of MFA.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Fireside Chat: Acquiring and Operationalizing Threat Intelligence in OT Environment

Security teams responsible for OT security and CISOs face difficulties in securing these networks, dealing with issues such as maintaining uptime, achieving visibility and asset discovery. Many of these networks use outdated operating systems and irreplaceable devices, complicating the task further.

The session will cover:

  • The nuances of gathering threat intelligence for OT environments and the availability of specialist feeds;
  • Effective use of intelligence, linking cybersecurity concerns to business context and OT devices;
  • Challenges in implementing threat intelligence-based mitigations in OT settings

Networking Break

Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Panel: AI Powered Cybersecurity: Advanced Threat Detection and Response

The panelists will examine how AI-powered tools boost the

effectiveness of cybersecurity defenses by predicting, identifying and mitigating threats in real time. The session will explore the integration of AI with existing cybersecurity frameworks, the challenges faced in deployment and the future outlook of AI in cybersecurity.

The session will cover:

  • The effectiveness of AI algorithms in detecting sophisticated cyberthreats;
  • How the integration of AI with traditional cybersecurity measures can enhance protection;
  • Future trends and potential challenges in AI-driven cybersecurity.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

How LLMs Are Influencing AppSec? Are Security Leaders Tuned In?

Integrating LLMs into security practices offers significant opportunities to enhance application security. But LLMs also introduce new risks and challenges. Security leaders must navigate the complexities of these tools, which includes understanding their limitations, ensuring ethical use and mitigating potential biases in their algorithms. By exploring the influence of LLMs on application security, security leaders can learn how to implement and manage these tools effectively.

The session will cover:

  • How LLMs affect security task and process automation;
  • Identifying and mitigating risks associated with LLM integration in AppSec;
  • Best practices for security leaders in the LLM-driven security landscape.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Building Supply Chain Resilience: A Systematic Approach to Security

This has created a need to build resilience within the supply chain using a systematic security approach, prioritizing risk assessment.

The key component is understanding the importance of collaborating with suppliers and implementing robust security measures to ensure continuity and integrity.

The session will cover:

  • Strategies for supply chain risk assessment and mitigation;
  • Effective steps for collaboration and communication with suppliers for security;
  • The importance of implementing comprehensive security measures to safeguard the supply chain.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Future Proof Cloud Security: Security Leadership’s Preparedness

To future-proof cloud security, security practitioners must be aware of the associated challenges and strategies, stay abreast of the latest advancements in cloud security

technologies, implement processes to ensure continuous monitoring, and understand the role of security leadership in adapting to emerging threats and regulatory changes.

The session will cover:

  • Incident response and recovery planning strategies for cloud environments;
  • Vendor risk management in cloud security;
  • Zero trust architecture in the cloud environment.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Fireside: Quantum Agility: A Cybersecurity Perspective

But these algorithms pose a potential threat to classical cryptography algorithms, increasing the risk of security breaches.

This raises several questions: What cyberthreats does quantum computing pose? Why do we need new cryptography techniques based on post-quantum cryptography? How prepared are enterprises to tackle the risks?

Experts say quantum-era cybersecurity will detect and deflect quantum-era cyberattacks before they cause harm.

The session will cover:

  • Potential threats to encrypted data from quantum computers;
  • The need for the quantum-safe migration of existing security applications and networks;
  • Why adopting a quantum risk management approach is better than facing the consequences of losing sensitive data;
  • How to build crypto agility and better manage cryptographic environments.

 

Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Panel: How to Build a holistic Defense Architecture to Secure OT, IOT and IT environments: A Pragmatic Approach

To secure the entire IT, OT, and IoT infrastructure, enterprises must ensure obsolescence management, routine vulnerability monitoring, patch management, and workforce training on cybersecurity regulations and protocols. They must also adopt a proactive security strategy and mitigate the human element in data breaches.

The session will cover:

  • Mapping all endpoints and identifying risk across IT, OT and ICS environments;
  • Use cases for developing a 360-degree enterprise security architecture;
  • Best practices for optimizing visibility and vulnerability management across diverse environments;
  • Establishing accountability toward protecting the environment;
  • The challenges security leaders face in building a holistic security architecture.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Containerization: Establishing Scalability, Agility and Security

IT and security leaders must bridge the silos between functions – developers, operations, production and applications – to enhance efficiency, reduce costs and mitigate risks.

Do security and IT practitioners have the right tools to enhance productivity across teams, secure software development life cycle and enhance computing power using resource optimization? What challenges do security leaders face when scaling or moving their software across diverse and distributed environments? Enterprises must establish the right framework to digitize business models and processes at a reliable pace.

The session will cover:

  • How container technology can be used to bridge the gap between software development and operations;
  • How IT leaders can use Kubernetes to orchestrate workload balance for better efficiency;
  • The importance of securing production and development environments using containers;
  • How fostering a DevOps culture will likely improve efficiency for businesses.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

SASE: A CISO’s Perspective on Licensing Cloud-Based Model for Better Security

Experts say that CISOs no longer need to procure individual discrete security solutions and integrate them into the network security layer. CISOs can now source security solutions from one logical place using the SASE security model.

While most organizations have understood the importance of SASE, many lack clarity on its implementation.

The session will cover:

  • Factors security teams must evaluate when considering SASE adoption;
  • How SASE architecture can safely connect users to data, applications and resources;
  • How a subscription-based model can help improve security.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

API Security: The New Security Battleground for CISOs. Can we Combat?

Although APIs are important for accelerating product delivery and enhancing customer experience, they pose a challenge for security leaders. As APIs make headlines with extensive data breaches and leaks, API security has become a new battleground for CISOs.

 

Modern CISOs recognize the need to consolidate web applications and API security to safeguard customer data while fueling business innovation, but they often struggle to balance API security and innovation.

The session will cover:

  • Use cases related to how APIs can be vulnerable to breaches;
  • Why attackers view APIs as easier targets and how to enhance API management;
  • Methods to secure APIs and establish resiliency.
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Spotlight: Innovating and Thriving in a Digital Economy: How to Think Strategically?

But this digital transformation brings a heightened risk of cyberthreats that can disrupt operations, compromise sensitive data and damage reputations.

Security and IT leaders must understand the intersection between innovation, business success and cybersecurity preparedness to drive business growth.

The session will cover:

  • The current digital transformation landscape;
  • Examining the cybersecurity challenges amid the buzz around AI;
  • The role of a security leader in balancing innovation and business growth;
    Adaptive defense strategies organizations must use;
Note: The 2024 line-up will be announced soon. Stay tuned for updates.

CISO Circle: A Deep Dive - CISOs’ Vision for 2025: Technologies That Shape Enterprises

Progression into the new year of 2025 also calls for a renewed focus. Many factors could affect CISOs – including their role, leadership, priorities, investments, innovation and strategies.

This session includes a deep dive into understanding CISOs’ vision for 2025 and the technologies they can use to drive enterprise growth and foster cyber resilience.

Note: The 2024 line-up will be announced soon. Stay tuned for updates.

Celebrity speaker— Exclusive Plenary

The Microsoft and CrowdStrike outage fiasco has shaken the cybersecurity industry. Security leaders must drive health check-up campaigns and accelerate security innovation to keep pace. Businesses now face an urgent need to build cyber

fault tolerance amid rapid technological evolution, deepfake concerns and increasing IT outages.

How are CISOs handling the uncertainties and fears during these chaotic times? What is the ideal response mechanism? How does one adopt and establish key aspects of the CIA triad – confidentiality, integrity and availability?

The session will cover:

  • How security leadership takes control when a calamity strikes?
  • How businesses can build redundancy to avoid the effects of uncertain scenarios;
  • The importance of demonstrating leadership skills to stand up to the situation.

Closing Remarks & Cocktail Reception

Our Partners

Diamond Partner

Platinum Partner

Gold Partners

Silver Partners

Supporting Associations

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Express Interest

Individual Practitioner
Pass

Single Issue Pass
18300
15,700
  • 1 Full Conference Access Pass
  • Multiple Networking Opportunities with industry leaders and peers
  • 7 hours of CPE Credits
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership
  • Professional Headshot
  • Access to Specialized Masterclasses
  • Exclusive Lunch and Cocktail Receptions
  • Participation in Interactive Workshops and Roundtables
  • Priority Seating at Keynote Sessions
  • Access to Exhibitor Showcases and Product Demonstrations
Super Early

Team Practitioner
Pass

Buy 4 Passes, Get 1 Complimentary
91500
62,800
  • 4+1 Full Conference Access Pass
  • Multiple Networking Opportunities with industry leaders and peers
  • 7 Hours of CPE Credits per team member
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership for Each Team Member
  • Access to Specialized Masterclasses
  • Exclusive Team Lunch and Cocktail Receptions
  • Priority Seating at Keynote Sessions
  • Access to Exhibitor Showcases and Product Demonstrations
  • Custom/Tailored Packages Available at Discounted Rates
Super Early

Vendor/Commercial/Business
Pass

Single Issue Pass
54900
40,000
  • Full Day Access to the conference
  • Designed for BD, Sales, and Marketing professionals from cybersecurity and IT solution providers, consultants, and legal firms
  • Connect with senior cybersecurity professionals and decision-makers
  • 3+ Hours of Face-to-Face Networking
  • Networking Lunch with Industry Peers
  • Evening Reception
  • Evaluate Sponsorship Opportunities for 2025
  • Explore Emerging Trends and Solutions with Key Stakeholders
  • Access to Key Sessions Relevant to Your Business Interests
  •  

*All prices are exclusive of GST

*Note – Full Conference pass is applicable to information security and IT practitioners. For profiles other than IT and IS practitioners, please get in touch with us apac.contact@ismg-events.com or contact our ISMG representative on  +91 9819036179

Submit Contact Details

The Summit Experience

Express Interest

Individual Pass

Single Issue Pass
12,500
  • 1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

Team Pass

Buy 4 Passes, Get 1 Complimentary
63000
50,000
  • 4+1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot
Popular

Enterprise Pass

Buy 7 Passes, Get 2 Complimentary
90000
87,500
  • 7+2 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

*All prices are exclusive of GST

Please get in touch with us apac.contact@ismg-events.com
or contact our ISMG representative on  +91 9819036179

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

October 1, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East