July 17, 2025

Cybersecurity Summit: New Delhi

The Leela Ambience, Gurugram​

Event Overview

India is spearheading rapid digital development, and its progressive policies will likely shape the cybersecurity trajectory in 2025. However, such digital advancements make the country susceptible to sophisticated cybercrime incidents.

Cybersecurity Summit: New Delhi will feature discussions on managing risk and preparing for the generative AI era, the impact of APIs on the future of business governance, building custom-built IT architectures, unlocking innovation through CISO leadership, and more.

Join us to gain insights on how leaders are spearheading excellence across technology implementations, crafting unique user experiences to drive innovative, secure and insightful business growth. You can also earn your CPE credits by attending the summit. 

Paparaju Buddhavarapu (Conference Chair)

Ex - CISO, ONGC Ltd

Abhishek Bansal (Conference Co-Chair)

Head Non Financial Risk & Chief Information Security Officer, Max Life Insurance Co. Ltd

Tanin Chakraborty

Senior Director - Global Data Privacy Officer, Biocon Biologics

Karan Kalra

Deputy CISO & DPO, National Housing Bank

Mohit Gupta

Group CISO, Motherson Group

Visagan Subburayalu

Vice President - Infrastructure and Cybersecurity, Target

Kaustav Neogi

Chief Risk Officer and National Finance Controller(Senior Vice President), Indus Towers Limited

Past Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

2024 Keynote Speaker

Lt. Gen. (Retd) M Unnikrishnan Nair, National Cyber Security Coordinator, National Security Council Secretariat, Government of India.

An internationally recognized cybersecurity mentor, Lt. Gen. Nair serves as the National Cyber Security Coordinator in the National Security Council Secretariat, Government of India. He is responsible for coordinating all activities across multiple sectors to ensure a secure and resilient cyberspace within the nation.

Gen. Nair was commissioned into the Corps of Signals of the Indian Army in 1984. He held several key appointments at all levels of military hierarchy, including multiple tenures in the Kashmir Valley and North East India. He has used technology for deriving operational benefits in areas of intelligence gathering and information systems. He also was instrumental in steering several projects on AI, quantum, cryptology and cyber operations, while serving with the armed forces.

Lt General Rajesh Pant

Former National Cyber Security Coordinator, National Security Council Secretariat

Sandeep Khanna

Director (Information Security) & CISO, UIDAI

Dr. Charru Malhotra

Professor (e-Governance and ICT), Indian Institute of Public Administration

Lt. Col. (Retd.) Harkamal Sidhu

VP -Strategic Projects-Cyber & AI, TM Systems Pvt Ltd

Some Nath Kundu

Senior Cybersecurity Officer (Greater India Zone) Governance, Schneider Electric

Baidyanath Kumar

CISO & Data Protection Officer, JK Lakshmi Cement Ltd.

Kanishk Gaur

Founder, India Future Foundation

Aditya Vardhan

CISO, Jindal Steel & Power Ltd.

Mohit Kalra

Chief Information Security Officer, ORIX Leasing and Financial Services

Samir Datt

Founder & CEO, Foundation Futuristic Technologies

Bithal Bhardwaj

Group CISO, GMR Group

Dr. Yusuf Hashmi

Group CISO, Jubilant Bhartia Group

Past Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the leading thought leaders and educators in the security field to the stage, offering interactive workshops and networking events. Engage with the luminaries of cybersecurity, who are passionate about the latest tools and technologies for defending against threats.

Agenda Highlights

  • DPDP Act: Are Enterprises Prepared to Comply?
  • Securing India’s Digital Ecosystem
  • Uncovering the Darkweb
  • Advanced IAM: Breaking the MFA Exploits
  • Tackling Deepfakes and Cyber Deception in a Generative AI World
  • Quantum Agility: How Are Enterprises Preparing for Q-Day

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

Registration & Breakfast

Welcome and Opening Remarks

Dr. Charru Malhotra

Professor (e-Governance and ICT), Indian Institute of Public Administration

Spotlight: AI in Cybercrime: Lowering the Barrier for Bad Actors

To adequately tackle this increasing risk, a new approach is required that integrates data security and data protection to create cyber resilience strategies. These strategies should not only mitigate risk but also improve preparedness to ensure rapid response and recovery. 

Attackers possessing advanced AI tools have emerged on cybercriminal forums, developing their versions of AI tools to bypass security

technologies currently in use. While AI has spurred the advancement of authentication controls such as anomaly detection and predictive modeling, it has also made voice cloning and video deepfakes more convincing. 

In this AI versus AI battle, it is important to understand how cybercriminals leverage generative AI tools such as ChatGPT to create more effective email attacks and how organizations can protect themselves. 

Discussion Points: 

  • Challenges cybersecurity leaders face due to AI advancements;
  • Evolution of AI-driven phishing and social engineering tactics;
  • Which platforms need to be secured first, and how to do it;
  • Types of AI-generated attacks, including real-world examples.

Dr. Charru Malhotra, Professor (e-Governance and ICT), Indian Institute of Public Administration

Ankit Wasnik

Security Solutions Architect, Qualys

Leveraging Cloud-Native Application Protection Platforms to Enhance Cloud Security and Operational Efficiency

This challenge is particularly critical during the implementation stage of cloud applications, which can be complex when integrating cloud-native application platforms with existing infrastructure. As cloud environments become more dynamic and complex, establishing and maintaining visibility, control, robust security, compliance, effective cost management, and scalability adds to the difficulty. To address these challenges, security leaders need to develop a comprehensive solution.

The session will cover:  

  • Using cloud-native application protection platforms to establish a smooth integration process;
  • Building a comprehensive framework around monitoring and analytics for better visibility;
  • Adopting the right approach to optimize performance;
  • Best practices to automate security and compliance processes for scalability and cost-effectiveness.

Ankit Wasnik, Security Solutions Architect, Qualys

Lt. Gen. (Retd.) M Unnikrishnan Nair

National Cyber Security Coordinator, National Security Council Secretariat, Government of India. 

Keynote: Our Nation’s Cybersecurity Is Strong: Securing India's Digital Ecosystem

India needs to implement a holistic approach to cybersecurity to combat the challenge posed by escalating cybercrime and financial fraud. 

At a macro level, India’s aspirations to become a $5 trillion economy are linked to its ability to withstand and mitigate cyberthreats that could potentially cripple the nation’s critical infrastructure. What steps should be taken to make the nation cybersecure? What frameworks can enhance accountability for protecting the national cyberspace? 

The session will cover:  

  • Effectiveness of the National Cybersecurity Reference Framework; 
  • Insight into national malware repository built by the government; 
  • Use of AI in both cyber defense and offence;
  • Technological innovations in enhancing the nation’s cyber power.

Lt. Gen. (Retd.) M Unnikrishnan Nair, National Cyber Security Coordinator, National Security Council Secretariat, Government of India. 

Networking & Exhibition Break

Mohit Kalra

Chief Information Security Officer, ORIX Leasing and Financial Services

Lt. Col. (Retd.) Harkamal Sidhu

VP - Strategic Projects-Cyber & IT, TM Systems

Sandeep Khanna

Director (Information Security) & CISO, UIDAI

Ashu Agrawal

Chief Information Security Officer, Raphe mPhibr

Panel: Tackling Deepfakes and Cyber Deception in a Generative AI World: Building a Resilience and Response Strategy

These incidents weave together elements of social engineering, financial fraud and the challenges posed by emerging technological threats. AI has significantly affected the landscape of cyber deception and deepfakes, presenting unique challenges for security practitioners to defend against malicious activities. Building a resilience and response strategy to combat these incidents has become an imperative for CISOs. 

Experts say every organization needs to establish a multifaceted strategy that combines technological innovation, regulatory frameworks, education, and a resilience and response road map. 

The session will cover:

  • Types of technological solutions organizations need to deploy to develop advanced threat detection algorithms;
  • How to build AI-driven authentication methods that are distinct from traditional tools;
  • Building a comprehensive framework to tackle deepfakes and cyber deception amid regulatory challenges.

Mohit Kalra, Chief Information Security Officer, ORIX Leasing and Financial Services
Lt. Col. (Retd.) Harkamal Sidhu, VP -Strategic Projects-Cyber & IT, TM Systems
Sandeep Khanna, Director (Information Security) & CISO, UIDAI
Ashu Agrawal, Chief Information Security Officer, Raphe mPhibr

Sujith Immanuel Pellican

Head of IT Security, ManageEngine

Leveraging Identity-First Approach to Establish Secure IAM Control

By prioritizing the diverse identities of users, IAM can become a powerful tool for enhancing security, personalization and inclusivity within an organization.

Exploring the integration of IAM into the various aspects of authentication mechanisms, access controls and identity governance in an enterprise is critical to demystify the identity-first approach and its relevance in modern IAM systems. It is vital to understand how this approach can provide positive outcomes, including enhanced user satisfaction, improved compliance with diversity and inclusion policies, and stronger security postures.

The session will cover: 

  • The complexity of managing diverse identity attributes and ensuring data privacy;
  • Aligning technological capabilities with diverse and evolving identities of users to establish secure access controls;
  • Fostering a more inclusive and empowering environment for all stakeholders.

Sujith Immanuel Pellican, Head of IT Security, ManageEngine

Kartik Dedhia

Staff Solutions Engineer, Snyk

Shifting Left: Enabling Risk Prioritization and Agile Security

There has been a compelling need to develop a cybersecurity strategy that incorporates agility, DevOps and IT as core elements in adopting a “shift left” approach. With the rise of AI applications, particularly in the software development life cycle (SDLC) process, organizations are reaping the benefits of achieving faster time to market. But they are equally challenged with emerging vulnerabilities and risks associated with AI adoption.
CISOs face the daunting tasks of managing newer risks, establishing a competitive advantage and enabling business growth amid the growing complexities associated with the traditional approaches to AppSec. This propels the need for building a robust and secure coding and DevOps platform.

The session will cover: 

  • Addressing vulnerabilities arising from the use of generative AI tools;
  • Establishing AI-enabled security and agility across the SDLC process;
  • Adopting a “shift left” strategy for security risk reduction and to establish the right business context.

Kartik Dedhia, Staff Solutions Engineer, Snyk

Lt. Gen. (Retd.) Rajesh Pant

Former National Cyber Security Coordinator, National Security Council Secretariat

Plenary: Building Cyber Resilience Amid Geopolitical Turmoil: Are Enterprises Adequately Armed?

According to recent reports, India has become a prominent target for nation-state cyberattacks. It accounts for 13% of cyberattacks in the Asia-Pacific region and ranks among the top three most-attacked countries by nation-state actors. While India was the second most-targeted country for transmission control protocol attacks last year, recent geopolitical shifts have seen it drop to fifth place. The report also highlights that an organization in India faced an average of 2,807 attacks per week, a 33% year-on-year increase, making it one of the most targeted nations worldwide.

Despite these threats, many organizations are poorly equipped to protect against geopolitically motivated cyberattacks. It is crucial to recognize these risks and proactively fortify defenses. 

CEOs and boards are now asking: Are we prepared to mitigate the escalating cyber risks associated with geopolitical tensions? Although cyberattacks have long been a part of geopolitical conflict, their frequency is increasing with the advancement of cyber weapons. What changes are needed, and are enterprises adequately equipped to build stronger cyber shields, which encourage the development of stronger cyber weapons? How are organizations building cyber resiliency?  

The session will cover: 

  • Readiness for risk and crisis management; 
  • Understanding threat scenarios and nation-state actors; 
  • Initiatives to enhance weaponization; 
  • Use of the right technologies, tools and tactics to fortify cyber defenses.

Lt. Gen. (Retd.) Rajesh Pant, Former National Cyber Security Coordinator, National Security Council Secretariat, Government of India

Lunch & Exhibition Break

Tanin Chakraborty

Senior Director - Global Data Privacy Officer, Biocon Biologics

Baidyanath Kumar

Chief Information Security Officer, JK Lakshmi Cement Ltd

Pavithra S Iyengar

Data Privacy Officer, Emirates NBD

Panel: Are Detection Technologies Encroaching on Privacy? The Balancing Act

Computer systems and applications require identity verification before allowing users access to organizational IT infrastructure. The question that arises would be whether new technologies for threat detection will encroach on privacy in an enterprise.

The session will cover:

  • Defining the privacy and technology landscape in 2024;
  • How increasing detection tools affects privacy;
  • A collaborative approach to fuel privacy and tech innovation.

Tanin Chakraborty, Senior Director – Global Data Privacy Officer, Biocon Biologics
Baidyanath Kumar, Chief Information Security Officer, JK Lakshmi Cement Ltd.
Pavithra S Iyengar, Data Privacy Officer, Emirates NBD

Lakshmi Narasimhan

CISO - Vice President, Intellect Design Arena Ltd

Preeti Singh

Director - Information Security & GRC, OSTTRA

Fireside Chat: Third-Party Suppliers and Cloud: Risks and Response

Potential vulnerabilities in the cloud may occur at the cloud service provider, data location, supply chain or third-party suppliers. As we see a greater momentum toward the cloud, security leaders are faced with questions such as: Who is responsible for what is in the cloud? How to navigate a shared responsibility model? What would be an ideal service-level agreement between third-party suppliers, cloud service providers and organizations? What is the role of a CISO in navigating the risks?

The session will cover:

  • How to assess risks associated with third-party suppliers and cloud service providers?
  • Who is accountable for service disruptions due to excessive reliance on third-party suppliers and cloud service providers;
  • Ways to build a robust response plan against risks from third-party suppliers and cloud service providers.

Lakshmi Narasimhan, CISO – Vice President, Intellect Design Arena Ltd
Preeti Singh, Director – Information Security & GRC, OSTTRA

Some Nath Kundu

Senior Cybersecurity Officer (Greater India Zone) Governance, Schneider Electric

Bithal Bhardwaj

Group CISO, GMR Group

Aditya Vardhan

Chief Information Security Officer, Jindal Steel & Power Ltd.

Subhash Chand

CISO, ICAR-Indian Agricultural Statistics Research Institute

Panel: Building a Holistic Defensive Architecture to Secure OT, IT, ICS and IoT Environments: A Pragmatic Approach

Securing the entire IT, OT and IoT infrastructure requires a high degree of obsolescence management, routine vulnerability monitoring, patch management, training the workforce on cybersecurity regulations and protocols, establishing a proactive security strategy, and mitigating human element in data breaches. 

This session will discuss the challenges security leaders need to confront to build a holistic security architecture. 

The session will cover: 

  • Mapping all endpoints and identifying risk across IT, OT and ICS environments;
  • Use cases related to developing a 360-degree enterprise security architecture;
  • Best practices on optimizing visibility and vulnerability management across diverse environments;
  • Establishing accountability toward protecting the environment.

Some Nath Kundu, Senior Cybersecurity Officer (Greater India Zone) Governance, Schneider Electric
Bithal Bhardwaj, Group CISO, GMR Group
Aditya Vardhan, Chief Information Security Officer, Jindal Steel & Power Ltd.
Subhash Chand, CISO, ICAR-Indian Agricultural Statistics Research Institute

Networking Break

Samir Datt

Founder & CEO, Foundation Futuristic Technologies

Spotlight: Uncovering the Darkweb: Security and Law Enforcement Challenges

Enterprises must strive to stay informed regarding the realities and misconceptions surrounding the darkweb.

Using the darkweb and cryptocurrencies, criminals have been able to run a very successful “crime-as-a-service” model. But, business and security agencies have not been able to do much in terms of disrupting such criminal operations. What steps can CISOs take to make their enterprises cybercrime resilient?

The session will cover: 

  • New techniques and approaches being used to combat security threats from the “darkweb”;
  • How is law enforcement adapting investigative processes and applying online technologies;
  • Strategies law enforcement agencies can use to infiltrate and monitor criminal networks on the darkweb

Samir Datt, Founder & CEO, Foundation Futuristic Technologies

Kanishk Gaur

Founder, India Future Foundation

Dr. Yusuf Hashmi

Group CISO, Jubilant Bhartia Group

Cdr Sanjeev Singh (Retd.)

CISO and Data Protection Officer, Birlasoft

Siddharth Vijay

AVP - Engineering, Baazi Games

Demo: From the Ransomware Files: Demo of the Modernization in Cyberattack Techniques: Revolutionizing Your Defense Strategy

CISOs must know how to track the movements of the enemy with smart systems and intentions. It is important for organizations to understand how attackers find their way through multiple lines of defense, and that survival – or what we call “resilience” in business and cyber terms – depends on having more lines of defense than an attacker can overcome.

The session will cover:

  • Attack patterns and new forms of exploits used by threat actors;
  • Strategies to build a counterstrike strategy;
  • Adopting a multi-layer defense-in-depth approach.

Kanishk Gaur, Founder, India Future Foundation
Dr. Yusuf Hashmi, Group CISO, Jubilant Bhartia Group
Siddharth Vijay, AVP- Engineering, Baazi Games
Cdr Sanjeev Singh (Retd.), CISO and Data Protection Officer, Birlasoft

Closing Remarks & Cocktail Reception

Masterclass: Cyber Warriors of Tomorrow: Cybersecurity Lessons from the Trenches

An interactive session with leading passionate security practitioners making efforts to build competencies and skills to enable their organizations to put the right foot forward in responding to threats and attacks. As the cyber warriors of tomorrow, the practitioners need to understand the skill gaps that exist in the cybersecurity industry and how to bridge them in building the right resources, be it around soft skills, technological skills, and building an ethical approach towards the right decision making.

They need to understand the changing regulatory dynamics from the regulatory bodies across sectors and compliance demands in meeting their technological and organizational cybersecurity objectives, in the path towards building cyber resiliency.

Another valuable lesson would be around preparation for complying with the DPDP Act and understanding the consequences of non-compliance and consequences. 

The session will delve into:

  • Capacity Building: Bridging the skill gap in implementing niche technologies
  • Impact of IT and Cybersecurity Regulatory changes on Cybersecurity
  • DPDP Act: A new approach to cybersecurity-what needs to change?

Kapil Jaiswal, Senior Director-Research (InfoSec&AIML), and CISO, Govt of India.

Venue

The Leela Ambience, Gurugram

National Highway 8, Ambience Island, DLF Phase 3,

Sector 24, Gurugram, Haryana 122002

Note: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity

Past Partners

Express Interest

Individual Pass

Single Issue Pass
12,500
  • 1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

Team Pass

Buy 4 Passes, Get 1 Complimentary
63000
50,000
  • 4+1 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot
Popular

Enterprise Pass

Buy 7 Passes, Get 2 Complimentary
90000
87,500
  • 7+2 Full Conference Access Pass
  • Multiple Networking Opportunities
  • Session Recording On-Demand
  • 7 hours of CPE Credits
  • Complimentary CyberEd.io Membership for 14 Days
  • Professional Headshot

*All prices are exclusive of GST

*Note – Full Conference pass is applicable to information security and IT practitioners. For profiles other than IT and IS practitioners, please get in touch with us apac.contact@ismg-events.com or contact our ISMG representative on  +91 9819036179

Submit Contact Details

Past Speakers

Kaustabh Dabral

Global CIO, Dabur India Ltd.

Cdr Aditya Varma (Retd)

Former Director Networks and Cybersecurity, Indian Navy, Government of India

Vinit Sinha

Director - Cybersecurity SME, Mastercard

Vinod Sivarama Krishnan

Chief Information Officer, Indus Towers Ltd.

Abhinav Sinha

Co-founder, Eko India Financial Services Pvt. Ltd.

Umesh Kumar

Head - Cyber Security, Godfrey Phillips India Ltd.

Rakesh Maheshwari

Former Sr. Director and Gp Coordinator, Cyber Laws and Data Governance, Ministry of Electronics & Information Technology (MeitY)

Paparaju Buddhavarapu

Executive Director & CISO, ONGC Ltd

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025