August 23, 2023

Cybersecurity Summit: Delhi

9:00 AM - 5:00 PM IST

Event Overview

As the world’s fifth-largest economy, India is spearheading rapid digital development that will intricately shape the cybersecurity trajectory in 2024. Against evolving cyberthreats, economic shifts, and regulatory frameworks that have contributed to disparity and concerns, security leaders have a three-pronged agenda in the year – innovation, investments and intelligence – to enhance their threat detection capabilities. Deploying the right tools, technologies and best practices will be essential to effectively combat new and evolving cybersecurity challenges.

ISMG’s Cybersecurity Summit: New Delhi will usher in discussions on topics ranging from managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CISO leadership, responding to ransomware attacks, developing risk mitigation strategies, AI, quantum computing, OT/IT – infrastructure security vis-à-vis automotive cybersecurity, and endpoint security. 

Join us to gain insights into how leaders are spearheading excellence across technology implementations, crafting unique user experiences to drive innovative, security and insightful business growth.

You can also earn your CPE credits by attending the summit. ISMG’s agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

Paparaju Buddhavarapu

Executive Director & CISO, ONGC Ltd

Kaustav Neogi

Chief Risk Officer and National Finance Controller(Senior Vice President), Indus Towers Limited

Tanin Chakraborty

Senior Director - Global Data Privacy Officer, Biocon Biologics

Karan Kalra

Deputy CISO & DPO, National Housing Bank

Mohit Gupta

Group CISO, Motherson Group

Abhishek Bansal

Head Non Financial Risk & Chief Information Security Officer, Max Life Insurance Co. Ltd

Visagan Subburayalu

Vice President - Infrastructure and Cybersecurity, Target

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Agenda Highlights

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Past Speakers

Kaustabh Dabral

Global CIO, Dabur India Ltd.

Cdr Aditya Varma (Retd)

Former Director Networks and Cybersecurity, Indian Navy, Government of India

Vinit Sinha

Director - Cybersecurity SME, Mastercard

Vinod Sivarama Krishnan

Chief Information Officer, Indus Towers Ltd.

Abhinav Sinha

Co-founder, Eko India Financial Services Pvt. Ltd.

Umesh Kumar

Head - Cyber Security, Godfrey Phillips India Ltd.

Rakesh Maheshwari

Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)

Paparaju Buddhavarapu

Executive Director & CISO, ONGC Ltd

Agenda

Registration and Exhibition Browsing

Welcome and Opening Remarks

Cdr Aditya Varma (Retd)

Former Director Networks and Cybersecurity, Indian Navy, Government of India

Plenary Session: Building Effective Cybersecurity Defenses in 2023 and Beyond: Are CISOs Making the Right Moves?

The plenary session sets the goals for security in leveraging the right technologies, establishing the security culture, and implementing a collaborative strategy to accomplish the task, with the C-suite and board riding on the same track. 
   
The session will cover: 

  • Are CISOs able to align their strategy with the business priorities and rise to the expectations? 
  • What does digital innovation mean to security, and where is the disconnect? 
  • What needs to change, both tactically and strategically, to build a cyber-resilient organization?  

Cdr Aditya Varma (Retd), Former Director Networks and Cybersecurity, Indian Navy, Government of India

Abhinav Sinha

Co-Founder, Eko India Financial Services Pvt. Ltd.

Geetha Nandikotkur

Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)

Establishing a Resilient Enterprise: Are CIOs and CISOs Thinking Outside the Box?

The C-suite, especially the CIOs and CISOs, must be beacons of change and think outside the box to build resiliency. 

The convergence of IT and security is expected to power business efficiency, where leadership strikes the balance in employing the formula of connecting, collaborating and strategizing in driving transformative outcomes. 

The keynote will set the stage in underpinning the need for demonstrating inclusive leadership skills that drive innovation and strategic thinking in establishing resiliency and protecting the organization from cyberattacks. How should CIOs and CISOs raise the bar in exhibiting leadership skills? 

 The session will cover: 

  • How should the C-suite align its strategy with business priorities and rise to the expectations in sizing up the business risks? 
  • A comprehensive checklist for CIOs and CISOs to foster resilience within their enterprises: What needs to change? 
  • Should the C-suite and board look through the lens of risk management, cybersecurity and resilience? 

Abhinav Sinha, Co-Founder, Eko India Financial Services Pvt. Ltd.
Geetha Nandikotkur, Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)

Speaker Name

Title, Company

Establishing an Accelerated and Proactive Threat Detection: The Way Forward

Organizations have been struggling with challenges around building scalability and managing security across cloud, hybrid, and traditional environments. 

Ascertaining visibility across the infrastructure restricts teams from establishing accelerated and proactive threat detection and response. Hence, there is a need for strategic thinking and developing a comprehensive set of capabilities that give you visibility and an in-depth understanding of threat vectors and attack mechanisms. 

The session will cover: 

  • Understanding the changing nature of threats and knowing what you need to be ready for. 
  • Key considerations for effective threat detection, investigation and response capabilities. 
  • A platform-centric approach to establish visibility and in-depth protection across every layer of your digital assets. 

Suroop Chandran, Executive Director – Product Management, SonicWall

Speaker Name

Title, Company

Modernizing threat detection and incident response in your SOC

Most security leaders believe that there is a compelling need to defend against threats with complete visibility and rapid response and minimize the likelihood of a breach with enhanced threat detection and response capabilities. 

One way to do this, experts say, is to rapidly identify and limit the exposure through continuous monitoring, detection and modernization of these tools in the SOC environment.  

The session will cover:  

  • How can you use the network traffic to support threat detection and response; 
  • Use of security tools and technologies to perform the network traffic analysis; 
  • Understanding the concept of user behavior through analysis of SOC components.

Anandh Palanisamy, Senior Technical Evangelist, ManageEngine

Networking & Exhibition Break

Speaker Name

Title, Company

Speaker Name

Title, Company

Speaker Name

Title, Company

Guardian's Gauntlet: Conquering First-Party Software Supply Chain Risks

The digital era is enabling organizations to develop its software to run the business. First-party or proprietary software often lacks the discipline in vulnerability and configuration management practices used for third-party software, which has a high risk of exposure. The challenge for security teams is to establish accountability for checking malicious codes in their supply chain, strengthen capabilities to assess and manage risks and vulnerabilities at the source code level generated by the first party, and possess a robust security architecture to respond to software or open-source supply chain threats.  

The session will cover: 

  • A uniform platform approach for seamless integration of proprietary assessment and commercial tools. 
  • Building signatures for faster detection and remediation across third-party applications. 
  • Establishing comprehensive visibility of the risk profile.

Ankit Wasnik, Solutions Architect, Qualys
Ambarish Bhalekar, Solutions Architect, Qualys

Speaker Name

Title, Company

Speaker Name

Title, Company

Speaker Name

Title, Company

Assessing the Effectiveness of Security Posture: Understanding the New Realities of Cyber Hygiene

The siloes between security and non-security professionals can expose your organization to external vulnerabilities, such as data loss, zero-day exploits, data compromises, etc., which could be detrimental to the organization’s growth. History has proven that most real-world incidents still stem from a lack of basic cyber hygiene, often challenging the CISOs to establish an effective cyber hygiene score.   

The session will discuss: 

  • How to establish a comprehensive, actionable, and continuous cyber hygiene reporting. 
  • Why incomplete visibility is all too common. 
  • Establishing and assessing your security posture in a systematic and structured manner.

Nuno Guerreiro, Director of Product, Oryxlabs

Baidyanath Kumar

CISO and Data Protection Officer, JK Lakshmi Cement

Kaustabh Dabral

Global CIO, Dabur India Ltd.

Suparma Goswami

Associate Editor, Information Security Media Group

Geetha Nandikotkur

Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)

Fireside Chat: Innovation vs. Cybersecurity: Bridging the Gap Between CTO and CISO

Are security leaders creating value for business and being a part of technology innovation? Is the CTO function aligned with security in driving innovation? Are the CTOs and CISOs meeting the expectations?   

The session will cover how to get a CTO and the CISO to collaborate on a common goal to facilitate the continued success of their organization and find the disconnect. 

Baidyanath Kumar, CISO and Data Protection Officer, JK Lakshmi Cement.
Kaustabh Dabral, Global CIO, Dabur India Ltd.
Suparma Goswami, Associate Editor, Information Security Media Group (Moderator)

Sanjay Kaushal

Global CIO & CISO, ISPL Pvt. Ltd

Ashok Kumar

Director-Access Services, Department of Telecom, Ministry of Communications.

Geetha Nandikotkur

Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group

Fireside Chat: Should CISOs Think Like Hackers?

But in reality, are security leaders putting on a red hat and understanding the motivations, expectations, behaviors and goals of bad actors and making it part of their cyber-resiliency plan? 

Are CISOs using the right threat intel, security frameworks and red team skills to think like hackers and use that insight to shape their security strategies and evolve a defense-in-depth security framework?  

The session will cover: 

  • How to build a threat-driven security strategy; 
  • How to apply technology and tools to understand the enemy’s mindset; 
  • What will change in building disruptive cybersecurity. 

Sanjay Kaushal, Global CIO & CISO, ISPL Pvt. Ltd 
Ashok Kumar, Director-Access Services, Department of Telecom, Ministry of Communications.
Geetha Nandikotkur, Vice President-Conferences, Asia, Middle East and Africa, Information Security Media Group (Moderator)

Lunch & Exhibition Break

Umesh Kumar

Head - Cyber Security, Godfrey Phillips India Ltd.

Nishant Gupta

Head of Cloud and DevSecOps, ZebPay

Vinit Sinha

Director - Cybersecurity SME, Mastercard.

R Shakya

Director General, Department of Telecom, Government of India

Panel: API Security: The New Security Battleground for CISOs

Experts say learning the API attack techniques that hackers use to achieve their targets is critical. 

If the tactical goal is credential access, the attacker may use brute force attacks or man-in-the-middle attacks as their techniques. As organizations are modernizing their applications and infrastructure as part of their cloud strategy, the use of third-party software and APIs is immense to integrate with older applications and data stores. Protecting your APIs against vulnerabilities and malicious actors looking to gain access to your valuable data is crucial. There is a need to repurpose part of the budget from other layers of the technology stack to API security. 

 The session will cover: 

  • Managing API attack surface; Understanding and quantifying top API risks; 
  • Who owns API security in the organization and what to look for in an API security solution.

Umesh Kumar, Head – Cyber Security, Godfrey Phillips India Ltd. (Moderator)
Nishant Gupta, Head of Cloud and DevSecOps, ZebPay
Vinit Sinha, Director – Cybersecurity SME, Mastercard.
R Shakya, Director General, Department of Telecom, Government of India

Speaker Name

Title, Company

Establishing a Proactive Security in the Digital Identity Protection: Impact of the DPDP Act.

The sub-section (5) of Section 8 A of the Act, which prescribes the obligation of Data Fiduciary to take reasonable security safeguards and be responsible for the protection of data and being accountable for any breach has compelled them to establish proactive security within the organization. Under the new Act, security practitioners are expected to establish themselves as business enablers and custodians of protection of the crown jewels, while retaining integrity and data sovereignty.  

The session will discuss:  

  • How to build a proactive security defense mechanism to comply with the sections of the Act.
  • Getting the board’s buy-in in complying with the provisions of the Act.
  • Use of the right technologies and tools to enhance the security posture.

Rajan Pant, Business Head-SAARC, Resecurity

Parna Ghosh

President & Group CIO, Uno Minda Ltd.

Vinod Sivarama Krishnan

Chief Information Officer, Indus Towers Ltd.

Shipra Malhotra

Managing Editor, Information Security Media Group

Enterprise 5G: Impactful Use Cases and Security Considerations

As organizations increasingly incorporate 5G for their digital initiatives, it is crucial to understand the potential use cases and address the security considerations associated with this technology.  

The session will cover: 

  • Leveraging the power of 5G while ensuring robust security measures; 
  • Exploring the impactful use cases of enterprise 5G; 
  • Best practices and mitigation strategies. 

Parna Ghosh, President & Group CIO, Uno Minda Ltd.
Vinod Sivarama Krishnan, Chief Information Officer, Indus Towers Ltd.
Shipra Malhotra, Managing Editor, Information Security Media Group

Networking & Exhibition Break

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Panel: To Pay or Not to Pay: The C-Suite Debate on Tackling Cyber Extortion

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that an organization’s risk calculations are going awry. Another argument would be that extortion payment may encourage continued criminal activity. 

  • The session will cover: The C-suite approach to a ransomware attack; 
  • How to engage with the law enforcement before taking the decision; 
  • Prepare now or pay later – A CISO’s take and the role of Board and Top Management in dealing with extortion crisis. 

Rishi Diwan, Chief Operating Officer, TVS Supply Chain Solutions
Amit Dubey, Member, Police Technology Mission
Anuj Tewari, Chief Information Security Officer, TMF Group
Ashutosh Bahuguna, Lead – Cyber Security Assurance & Additional Director/Scientist, Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics & Information Technology (Moderator)

B Paparaju

Executive Director & CISO, ONGC Ltd.

Pavan Duggal

Founder, Pavan Duggal Associates (Moderator)

Panel: Incident Reporting Requirements and Cyberthreat Information Sharing

How can an organization prepare for incident reporting requirements? Cyberthreat information exchange is crucial for maintaining situational awareness and to safeguard community against cyberattacks. How can organizations, the private sector, governments and nations build trust and enhance near-real-time information sharing to build a cyber-resilient community? What are the key steps for security leaders to prepare for the CERT-in proposed rule for cybersecurity risk management, strategy, governance and incident disclosure? 

The session will cover: 

  • Mechanisms and effectiveness of sharing of operational, strategic and enriched tactical threat intelligence;  
  • Techniques to collect, correlate, enrich, contextualize and analyze tags and exchange of cyberthreat information exchange; 
  • The mechanics of incident reporting with filing incidents. 

V V Rao, Scientist & Additional Director, Indian Computer Emergency Response Team (CERT-In), Ministry of Electronics & Information Technology,
B Paparaju, Executive Director & CISO, ONGC Ltd
Rajiv Sharma, Vice President, ISACA
Pavan Duggal, Founder, Pavan Duggal Associates (Moderator)

Rakesh Maheshwari

Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)

Kanishk Gaur

CEO, India Future Foundation

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Establishing Privacy and Data Protection in the Digital Era: Stakes for CISOs

The terms “data protection” and “privacy” have a multitude of interpretations, making it difficult to build an appropriate framework.  

  

How is India’s data protection and privacy policy defining the compromise of critical systems and information, targeted scanning or probing of critical networks, data breach reporting, and establishing privacy while enabling a secure ecosystem?  

The session will cover:  

  • Changes in the data protection and privacy frameworks in this digitization era.
  • Digitization, data protection and privacy – balancing security and convenience,
  • How are CISOs bridging the data protection and privacy gaps?

Rakesh Maheshwari, Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)
Kanishk Gaur, CEO, India Future Foundation

Closing Comments

Venue

Pullman Aerocity, New Delhi

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Our Sponsors

Presenting Partner

Gold Sponsors

Association

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025