Agenda Highlights
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
As the world’s fifth-largest economy, India is spearheading rapid digital development that will intricately shape the cybersecurity trajectory in 2024. Against evolving cyberthreats, economic shifts, and regulatory frameworks that have contributed to disparity and concerns, security leaders have a three-pronged agenda in the year – innovation, investments and intelligence – to enhance their threat detection capabilities. Deploying the right tools, technologies and best practices will be essential to effectively combat new and evolving cybersecurity challenges.
ISMG’s Cybersecurity Summit: New Delhi will usher in discussions on topics ranging from managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CISO leadership, responding to ransomware attacks, developing risk mitigation strategies, AI, quantum computing, OT/IT – infrastructure security vis-à-vis automotive cybersecurity, and endpoint security.
Join us to gain insights into how leaders are spearheading excellence across technology implementations, crafting unique user experiences to drive innovative, security and insightful business growth.
You can also earn your CPE credits by attending the summit. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
The plenary session sets the goals for security in leveraging the right technologies, establishing the security culture, and implementing a collaborative strategy to accomplish the task, with the C-suite and board riding on the same track.
The session will cover:
Cdr Aditya Varma (Retd), Former Director Networks and Cybersecurity, Indian Navy, Government of India
The C-suite, especially the CIOs and CISOs, must be beacons of change and think outside the box to build resiliency.
The convergence of IT and security is expected to power business efficiency, where leadership strikes the balance in employing the formula of connecting, collaborating and strategizing in driving transformative outcomes.
The keynote will set the stage in underpinning the need for demonstrating inclusive leadership skills that drive innovation and strategic thinking in establishing resiliency and protecting the organization from cyberattacks. How should CIOs and CISOs raise the bar in exhibiting leadership skills?
The session will cover:
Abhinav Sinha, Co-Founder, Eko India Financial Services Pvt. Ltd.
Geetha Nandikotkur, Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)
Organizations have been struggling with challenges around building scalability and managing security across cloud, hybrid, and traditional environments.
Ascertaining visibility across the infrastructure restricts teams from establishing accelerated and proactive threat detection and response. Hence, there is a need for strategic thinking and developing a comprehensive set of capabilities that give you visibility and an in-depth understanding of threat vectors and attack mechanisms.
The session will cover:
Suroop Chandran, Executive Director – Product Management, SonicWall
Most security leaders believe that there is a compelling need to defend against threats with complete visibility and rapid response and minimize the likelihood of a breach with enhanced threat detection and response capabilities.
One way to do this, experts say, is to rapidly identify and limit the exposure through continuous monitoring, detection and modernization of these tools in the SOC environment.
The session will cover:
Anandh Palanisamy, Senior Technical Evangelist, ManageEngine
The digital era is enabling organizations to develop its software to run the business. First-party or proprietary software often lacks the discipline in vulnerability and configuration management practices used for third-party software, which has a high risk of exposure. The challenge for security teams is to establish accountability for checking malicious codes in their supply chain, strengthen capabilities to assess and manage risks and vulnerabilities at the source code level generated by the first party, and possess a robust security architecture to respond to software or open-source supply chain threats.
The session will cover:
Ankit Wasnik, Solutions Architect, Qualys
Ambarish Bhalekar, Solutions Architect, Qualys
The siloes between security and non-security professionals can expose your organization to external vulnerabilities, such as data loss, zero-day exploits, data compromises, etc., which could be detrimental to the organization’s growth. History has proven that most real-world incidents still stem from a lack of basic cyber hygiene, often challenging the CISOs to establish an effective cyber hygiene score.
The session will discuss:
Nuno Guerreiro, Director of Product, Oryxlabs
Are security leaders creating value for business and being a part of technology innovation? Is the CTO function aligned with security in driving innovation? Are the CTOs and CISOs meeting the expectations?
The session will cover how to get a CTO and the CISO to collaborate on a common goal to facilitate the continued success of their organization and find the disconnect.
Baidyanath Kumar, CISO and Data Protection Officer, JK Lakshmi Cement.
Kaustabh Dabral, Global CIO, Dabur India Ltd.
Suparma Goswami, Associate Editor, Information Security Media Group (Moderator)
But in reality, are security leaders putting on a red hat and understanding the motivations, expectations, behaviors and goals of bad actors and making it part of their cyber-resiliency plan?
Are CISOs using the right threat intel, security frameworks and red team skills to think like hackers and use that insight to shape their security strategies and evolve a defense-in-depth security framework?
The session will cover:
Sanjay Kaushal, Global CIO & CISO, ISPL Pvt. Ltd
Ashok Kumar, Director-Access Services, Department of Telecom, Ministry of Communications.
Geetha Nandikotkur, Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)
Experts say learning the API attack techniques that hackers use to achieve their targets is critical.
If the tactical goal is credential access, the attacker may use brute force attacks or man-in-the-middle attacks as their techniques. As organizations are modernizing their applications and infrastructure as part of their cloud strategy, the use of third-party software and APIs is immense to integrate with older applications and data stores. Protecting your APIs against vulnerabilities and malicious actors looking to gain access to your valuable data is crucial. There is a need to repurpose part of the budget from other layers of the technology stack to API security.
The session will cover:
Umesh Kumar, Head – Cyber Security, Godfrey Phillips India Ltd. (Moderator)
Nishant Gupta, Head of Cloud and DevSecOps, ZebPay
Vinit Sinha, Director – Cybersecurity SME, Mastercard.
R Shakya, Director General, Department of Telecom, Government of India
The sub-section (5) of Section 8 A of the Act, which prescribes the obligation of Data Fiduciary to take reasonable security safeguards and be responsible for the protection of data and being accountable for any breach has compelled them to establish proactive security within the organization. Under the new Act, security practitioners are expected to establish themselves as business enablers and custodians of protection of the crown jewels, while retaining integrity and data sovereignty.
The session will discuss:
Rajan Pant, Business Head-SAARC, Resecurity
As organizations increasingly incorporate 5G for their digital initiatives, it is crucial to understand the potential use cases and address the security considerations associated with this technology.
The session will cover:
Parna Ghosh, President & Group CIO, Uno Minda Ltd.
Vinod Sivarama Krishnan, Chief Information Officer, Indus Towers Ltd.
Shipra Malhotra, Managing Editor, Information Security Media Group
Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that an organization’s risk calculations are going awry. Another argument would be that extortion payment may encourage continued criminal activity.
Rishi Diwan, Chief Operating Officer, TVS Supply Chain Solutions
Amit Dubey, Member, Police Technology Mission
Anuj Tewari, Chief Information Security Officer, TMF Group
Ashutosh Bahuguna, Lead – Cyber Security Assurance & Additional Director/Scientist, Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics & Information Technology (Moderator)
How can an organization prepare for incident reporting requirements? Cyberthreat information exchange is crucial for maintaining situational awareness and to safeguard community against cyberattacks. How can organizations, the private sector, governments and nations build trust and enhance near-real-time information sharing to build a cyber-resilient community? What are the key steps for security leaders to prepare for the CERT-in proposed rule for cybersecurity risk management, strategy, governance and incident disclosure?
The session will cover:
V V Rao, Scientist & Additional Director, Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics & Information Technology,
B Paparaju, Executive Director & CISO, ONGC Ltd
Rajiv Sharma, Vice President, ISACA
Pavan Duggal, Founder, Pavan Duggal Associates (Moderator)
The terms “data protection” and “privacy” have a multitude of interpretations, making it difficult to build an appropriate framework.
How is India’s data protection and privacy policy defining the compromise of critical systems and information, targeted scanning or probing of critical networks, data breach reporting, and establishing privacy while enabling a secure ecosystem?
The session will cover:
Rakesh Maheshwari, Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)
Kanishk Gaur, CEO, India Future Foundation
#ISMGSummit
@ISMG_News
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Upcoming ISMG Events
Upcoming ISMG Events