August 8, 2024

Cybersecurity Summit: New Delhi

8:00 AM - 5:00 PM IST

Event Overview

As the world’s fifth-largest economy, India is spearheading rapid digital development that will shape the cybersecurity trajectory in 2024. Against evolving cyberthreats, economic shifts, and regulatory frameworks, security leaders have a three-pronged agenda to enhance their threat detection capabilities: innovation, investments and intelligence. 

ISMG’s Cybersecurity Summit: New Delhi will offer insights on topics ranging from managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, developing risk mitigation strategies, OT/IT – infrastructure security vis-à-vis automotive cybersecurity, and endpoint security. 

Join us to learn how leaders drive technology implementations, craft user experiences, and foster business growth. 

You can also earn your CPE credits by attending the summit. 

Paparaju Buddhavarapu

Executive Director & CISO, ONGC Ltd

Kaustav Neogi

Chief Risk Officer and National Finance Controller(Senior Vice President), Indus Towers Limited

Tanin Chakraborty

Senior Director - Global Data Privacy Officer, Biocon Biologics

Karan Kalra

Deputy CISO & DPO, National Housing Bank

Mohit Gupta

Group CISO, Motherson Group

Abhishek Bansal

Head Non Financial Risk & Chief Information Security Officer, Max Life Insurance Co. Ltd

Visagan Subburayalu

Vice President - Infrastructure and Cybersecurity, Target

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Lt General Rajesh Pant

Former National Cyber Security Coordinator, National Security Council Secretariat

Sandeep Khanna

Director (Information Security) & CISO, UIDAI

Satyanandan Atyam

Chief Risk Officer, Tata AIG General Insurance Company Limited

Some Nath Kundu

Senior Cybersecurity Officer (Greater India Zone) Governance, Schneider Electric

Dr. Yask

CISO, IOCL

Agenda Highlights

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Past Speakers

Kaustabh Dabral

Global CIO, Dabur India Ltd.

Cdr Aditya Varma (Retd)

Former Director Networks and Cybersecurity, Indian Navy, Government of India

Vinit Sinha

Director - Cybersecurity SME, Mastercard

Vinod Sivarama Krishnan

Chief Information Officer, Indus Towers Ltd.

Abhinav Sinha

Co-founder, Eko India Financial Services Pvt. Ltd.

Umesh Kumar

Head - Cyber Security, Godfrey Phillips India Ltd.

Rakesh Maheshwari

Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)

Paparaju Buddhavarapu

Executive Director & CISO, ONGC Ltd

Agenda

Registration & Breakfast

Speaker Name

Title, Company

OT and IT Convergence: Measuring the Security Risks

As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?  Can you deploy suitable asset inventory methods and map the IT/OT risks? 

This session will cover:  

  • Building complete visibility and monitoring your IT and OT assets with the right access control 
  • Integrating OT threat monitoring into SoC for threat detection
  • Implementing essential steps to establish OT security

Speaker Name

Title, Company

Role of Zero Trust in Establishing Cyber Resilience: A CISO’s Pragmatic Approach

The question that arises is: Are CISOs using the “zero trust” concept to establish cyber resiliency to improve their defenses in fighting threats?

The session will cover:  

  • How has the approach toward security changed as security perimeters disappear?
  • How to assess the maturity of the “zero trust” state with a realistic look at security and its dependencies on other functions in securing the future work environment?

Networking & Exhibition Break

Speaker Name

Title, Company

Speaker Name

Title, Company

Speaker Name

Title, Company

Panel Discussion: Protecting Your Legacy Applications in Cloud and Building a Risk Management Program

The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the “cloud-first” strategy to optimize the IT spend and secure their hybrid work environment. However, the major challenge is to tackle the risk associated with moving legacy applications to the cloud and find ways to build a risk management program to protect these applications. 

The session will cover:  

  • Risks of moving legacy applications to the cloud 
  • Building an effective risk management program 
  • A holistic approach to protect cloud applications

Lunch & Exhibition Break

Speaker Name

Title, Company

Culture Change: How to Instill a Mindset of Responsible Defense

It’s called “Responsible Defense,” and Katie Jenkins, EVP and CISO of Liberty Mutual Insurance, addresses it in this exclusive keynote. Beyond this cultural shift, she discusses:

  • Partnering with her new CIO to support a tech strategy of “Safeguarding Business Operations”
  • Dealing with the shifting threat landscape and expanded attack surface
  • Addressing the talent gap by championing women, military veterans and other under-represented groups

Speaker Name

Title, Company

Cloud Account Takeover: How Do You Prevent Cyber Perpetrators?

In a cloud account compromise, attackers gain control over the legitimate user’s cloud-based email or collaboration service account that gives access to the data and contacts. They can persuade users and business partners to wire money or damage an organization’s reputation. As more business assets move to cloud, attackers follow close behind.  

The session will cover: 

  • The anatomy of cloud account takeover; 
  • The extent of harm cybercriminals can inflict with a compromised cloud account; 
  • How to protect your organization from cloud account compromise and takeover. 
Toggle Content

Speaker Name

Title, Company

Speaker Name

Title, Company

CIO and CISO: Collaborate to Defend

As organizations undergo more digital transformation, there is a greater focus on digitalizing processes and improving customer experiences. Consequently, the roles of CIOs and CISOs are evolving to new archetypes such as business enabler, digital enabler and value enabler. 

Partnerships with the CIO and other business heads are imperative to drive business goals. The CIO and CISO are now partners in a mission to drive business enablement and to defend the organization from threats. 

In this fireside chat, the participants will discuss: 

  • Evolving roles and business-facing responsibilities; 
  • Supporting other business heads; 
  • Cybersecurity – from a cost center to business enabler. 

Speaker Name

Title, Company

Speaker Name

Title, Company

Speaker Name

Title, Company

Zero Trust Security: Is It a Deep Dive or Just Tipping Your Toes?

Different industries are struggling to implement the various technologies under zero trust. Microsegmentation and access management are not easy to deploy. What works for one industry might not work for another as zero trust is not a monolithic approach. For many, zero trust architecture has become complex. Given this, are CISOs just tipping their toes? How must they get more granular in their approach?

This session will cover: 

  • Business imperatives driving the implementation of zero trust;
  • How to decide on the low-hanging fruits;
  • How to handle microsegmentation and zero trust in the cloud.

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Resetting Cybersecurity Plans in 2023: CISOs’ Rebalancing Practices

Besides, CISOs are compelled to force relationships with business functions and become evangelists for cybersecurity within the organization to gain the board’s attention. CISOs must adorn multiple hats of a leader, defender and offender during a cyber war to be resilient enough to stay on top of emerging threats and rebalance their skills to meet the changing demand. 

The panel will discuss: 

  • Maintaining the pace by harnessing new concepts and automation; 
  • Building an offensive strategy to make the enterprise resilient; 
  • Establishing accountability across all functions by weaving a cybersecurity story in all functions. 

 

Closing Comments

Venue

Delhi

Delhi

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Our Sponsors

Presenting Partner

Gold Sponsors

Association

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration