ismg summit logo

April 16 - 24, 2025

Cybersecurity Week

Bengaluru | Mumbai | New Delhi

Event Overview

Rapid digitization across sectors brings unprecedented challenges for organizations with increased cyberthreats and malware risks. Enterprise security leaders must develop new strategies and frameworks to defend against these cyber invasions. There is a constant need to rethink, redefine and reimagine security strategies, along with continuous education.

ISMG is hosting a three-city road show under Cybersecurity week, a program designed to educate security professionals through its summit series across Bengaluru, Mumbai and New Delhi. The road show brings together thought leaders – CISOs, partner organizations and technology leaders – to exchange insights and knowledge and strengthen security leadership in building a cyber-resilient organization.

The summit features a concentration of expertise through panel discussions, roundtables, fireside chats, exclusive hands-on sessions and tabletop exercises, all designed to equip delegates with actionable strategies to shape their organization’s cybersecurity framework.

Thought leaders in these cities will discuss new strategies for tackling threats, navigating regulatory policies, analyzing disruptive technologies and implementing cutting-edge innovations that enable business growth.

Participants will gain actionable insights, engage in peer discussions and explore emerging technological evolutions while earning CPE credits, underscoring the event’s commitment to support continued professional growth and leadership in cybersecurity.

Mathan Babu Kasilingam (Conference Chair)

CISO, Vodafone Idea Limited

Chandan Pani (Conference Co-Chair)

CISO & Business Leader Cyber Security LTIMindtree

Kumar KV

Group CIO, Narayana Health

Dr. Ram Kumar G

Cyber Security & Risk Leader, Global Automotive Company

Anish Koshy

Vice President - Information and cyber security risk officer, Standard Chartered GBS

Suneel Akkineni

Director - Cyber Security, AT&T

Tanin Chakraborty

Global Data Privacy Officer (DPO), Biocon Biologics

Advisors

Guiding Insights From Industry Leaders

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Speakers

Thought Leaders Leading Deep-Dive Discussions on Stage

ISMG Summits bring the leading thought leaders and educators in the security field to the stage, offering interactive workshops and networking events. Engage with the luminaries of cybersecurity, who are passionate about the latest tools and technologies for defending against threats.

Lakshminarayanan RS

GM & Regional CISO (Americas) - Global Head Enterprise Cybersecurity Strategy, Arch & Cyber Risk Gov, Wipro

Sridhar Govardhan

Head-Information Security, CoinDCX

Sridhar Govardhan

Head-Information Security, CoinDCX

Soumya Datta

Director – Infrastructure & Cloud, London Stock Exchange Group

Utkarsh Sawant

Global Head of Cyber Strategy, Diageo

Kumar KV

Group CIO, Narayana Health

Agenda Highlights

  • Discuss IoT risks, AI threats, quantum security, and infrastructure vulnerabilities.
  • Gain insights into data protection laws and business impacts.
  • Build skills through workshops, case studies, and exercises.
  • Network with cybersecurity leaders and innovators.
  • Explore cutting-edge technologies and strategies for resilience.

Venue

JW Marriott Hotel, Bengaluru

Bengaluru

2024 Keynote Speaker

Lt. Gen. M Unnikrishnan Nair, National Cyber Security Coordinator, PMO, Govt. of India

An internationally recognized cybersecurity mentor, Lt. Gen. Nair serves as the National Cyber Security Coordinator in the National Security Council Secretariat, Government of India. He is responsible for coordinating all activities across multiple sectors to ensure a secure and resilient cyberspace within the nation.

Gen. Nair was commissioned into the Corps of Signals of the Indian Army in 1984. He held several key appointments at all levels of military hierarchy, including multiple tenures in the Kashmir Valley and North East India. He has used technology for deriving operational benefits in areas of intelligence gathering and information systems. He also was instrumental in steering several projects on AI, quantum, cryptology and cyber operations, while serving with the armed forces.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

Registration & Breakfast

8:00 am onward

Welcome and Opening Remarks

9:10 am – 9:30 am IST

The 2025 line-up will be announced soon. Stay tuned for updates

Plenary: DPDP Rules 2025 Demystified: What Are the Stakes for CISOs?

The DPDP Rules mark a pivotal moment in India’s regulatory landscape, setting stringent guidelines for handling personal data. These rules significantly elevate responsibilities for CISOs, focusing on data privacy, security and compliance. Non-compliance risks include significant financial penalties, loss of customer trust and operational disruptions, underscoring the critical need for proactive alignment with these regulations. 

The fundamental questions are: What challenges do these rules present and what changes must CISOs implement to comply with the Act’s clauses?  

The session will cover:  

  • The implications of the DPDP Rules on enterprise security; 
  • Imperative changes security leaders must implement for compliance; 
  • Evolving a new governance structure amid AI-driven innovations without compromising security; 
  • Critical clauses that help respond to breaches

Prof. D Janakiram, Senior Professor, Dept. of CSE, IIT Madras

The 2025 line-up will be announced soon. Stay tuned for updates

API Security: Fortifying the Battleground With Enhanced Security Posture

Organizations must prioritize API security by adopting a multi-layered security posture. This includes implementing robust authentication mechanisms, securing API endpoints, applying rate limiting and continuous monitoring. A proactive approach to API security ensures that businesses can leverage the benefits of seamless integration while minimizing the risk of exploitation, data breaches and system compromises. 

The session will cover:  

  • Growing complexity of API ecosystems in modern enterprises; 
  • API endpoint security: Best practices for access control and input validation; 
  • Building a zero trust architecture for APIs. 

Lt. Gen. M. Unnikrishnan Nair, National Cyber Security Coordinator, PMO, Govt. of India

The 2025 line-up will be announced soon. Stay tuned for updates

Keynote: Strengthening the Nation's Cyber Ecosystem With Right Policies and a Pragmatic Approach

This requires a collaborative approach involving the government, law enforcement and private sector to enhance network defenses, drive innovation and implement agile security solutions. Simultaneously, it is essential to ensure meaningful privacy protection and develop the right skills to effectively execute these policies and plans. 

The session will cover: 

  • Using the technological innovations to secure the ecosystem; 
  • Aligning with regulatory compliance and the nation’s cybersecurity policy; 
  • Building effective security governance structure within digital innovation; 
  • An effective framework for public-private partnership. 

Prasanna Raghavendra, Senior Director, R&D, JFrog, India

The 2025 line-up will be announced soon. Stay tuned for updates

Do You Need More Security for Cloud: The Right Way to Implement Cloud Security Frameworks

Most organizations have been deploying a zero trust security framework, automation and using AI-driven tools for real-time monitoring and threat detection. By embedding security into every stage of cloud adoption and management, organizations can safeguard their digital assets, maintain compliance and build trust in cloud infrastructure. 

The session will cover:  

  • Rising threats in multi-cloud and hybrid cloud environments; 
  • Implementing infrastructure as code or IaC for consistent security configurations; 
  • Real-time data encryption and advanced key management solutions; 
  • Additional strategies to secure cloud. 

Aneesh Dhawan, Director – Enterprise & Public Sector Sales, India and SAARC, Commvault

The 2025 line-up will be announced soon. Stay tuned for updates

Fireside Chat: How Does AI Continue to Change Cybersecurity: Insights From CISOs

It is critical to understand the evolution of AI-driven security measures that are built with algorithmic precision and human intervention to assess risks.  

CISOs must build effective processes to integrate AI into their cybersecurity operations and manage the AI sprawl to ensure governance structures meet stringent AI security and privacy regulations. 

The session will cover: 

  • Unique security risks that AI-powered applications introduce; 
  • Making AI ubiquitous for cyber resiliency; 
  • Redefining cybersecurity with the use of AI. 

Dr. Ram Kumar G, (CEB Member), Cyber Security and Risk Leader, Global Automotive Company
Sridhar Sidhu, (CEB Member), Managing Director and Head of Cybersecurity Services Group, Wells Fargo
Sreeni Venugopal, (CEB Member), CIO & CISO, Aster DM Healthcare, India

Networking Break

11:35 am to 11:50 am IST

The 2025 line-up will be announced soon. Stay tuned for updates

Panel: Evolution of Synthetic Identities: Are Security Leaders Able to Build Right Authentication Tools to Contain Fraud

Organizations may face challenges in effectively verifying user identities, potentially leading to data breaches and security vulnerabilities.  

These identities exploit gaps in traditional verification systems, enabling fraudsters to carry out financial scams, evade detection and compromise organizational systems. Security leaders must develop robust authentication tools, integrating AI-powered behavioral analytics, biometric verification and multi-layered identity-proofing mechanisms.  

The session will cover: 

  • The role of AI and machine learning in analyzing behavioral patterns; 
  • Implementing universal identity standards and interoperable systems; 
  • Adhering to data protection laws and privacy regulations.

Kumar KV, (CEB Member), CIO & CISO, Narayana Health
Krishnamurthy Rajesh, (CEB Member), Director – Information Technology (Global), GreyOrange
Lt. Col. Raakesh Thayyil (Retd.), (CEB Member), Group Head of Security & Privacy, PropertyGuru Group
Malini Rao, CISO, DeepLearnCyber.ai

The 2025 line-up will be announced soon. Stay tuned for updates

Future of Zero Trust: A Use Case in Perspective

Zero trust adoption continues to grow, enabling them to build granular policies for precise access control.

The session provides practical insights into how CISOs are applying the principles of zero trust, while developing the principle of least privilege, third-party access and defining policies around zero trust.

The session will cover: 

  • Building contextual security using zero trust; 
  • Implementing ZTNA in a hybrid or multi-cloud environment; 
  • Integrating ZTNA with SASE for streamlined security; 
  • Integrating AI with workflows and ZTNA for user authentication. 

Ben Munroe, Senior Director, Field Marketing, APJC, Cloudflare

The 2025 line-up will be announced soon. Stay tuned for updates

AI’s Role in Tackling Supply Chain Insecurities

AI’s ability to analyze large datasets in real-time and make data-driven decisions enables organizations to adapt quickly to challenges, minimize risks and build a more resilient supply chain ecosystem.

The session will cover: 

  • Monitoring and mitigating threats in IoT-enabled supply chains; 
  • Detecting and addressing anomalies in data flow across supply chain systems; 
  • Leveraging blockchain integrated with AI for end-to-end traceability.

Shilpa Raghunathan, Staff Partner Solutions Engineer, Snyk

The 2025 line-up will be announced soon. Stay tuned for updates

Fireside Chat: IoT Cyberattack Response Strategies

These attacks target vulnerabilities in devices, networks and their ecosystems – often leading to data breaches, operational disruptions or physical harm in critical infrastructure. Responding effectively to these attacks requires a logical and structured approach, combining real-time monitoring, swift incident management and proactive measures to prevent recurrence. By understanding the anatomy of IoT threats and implementing a step-by-step response plan, organizations can minimize their impact and strengthen their IoT security posture. 

The session will cover:  

  • Identifying vulnerabilities in IoT ecosystems; 
  • Leveraging AI and automation in IoT threat response; 
  • Building resilience against future IoT attacks.

Ratan Jyoti, (CEB Member), CISO, Ujjivan Small Finance Bank
Ramesh Kumar, (CEB Member), CISO, Biocon Group of Companies
Sapna Singh, Principal Cyber Security Architect, Honeywell
Prasanna Raghavendra, Senior Director, R&D, JFrog

Lunch

1:35 pm to 2:25 pm IST

The 2025 line-up will be announced soon. Stay tuned for updates

Fireside Chat: CRO and CISO Debate: Who Is Accountable for a Fraud?

These sophisticated attacks are difficult to detect due to the proliferation of AI tools being weaponized to create fake voices, content and profiles.

The fireside chat will explore how cyber perpetrators use AI and other tools to develop deepfakes, the means of detection and control mechanisms. It will also cover issues related to fraud accountability and remediation measures.

The session will cover:

  • How fraud detection systems will identify the anomalies in a fraud incident; 
  • The role of a CISO in managing the fraud situation; 
  • How to develop a proactive crisis response to address deepfakes and fraud; 
  • How to build a defense strategy against AI’s weaponization. 

Ramakant Mohapatra, Director – Privacy and Data Protection, EdgeVerve
Lakshminarayanan RS, Enterprise Cybersecurity Strategy, Architecture and Regional CISO – Americas, Wipro
Amit Sharma, CIO & Head Partnerships and CSR, Cytecare Hospitals Pvt. Ltd.
Jagannath PV, Global Data Privacy Officer, LTIMindtree

The 2025 line-up will be announced soon. Stay tuned for updates

IAM: Establishing a Strong Security Posture

Ambiguity exists in aligning these two functions to achieve key business objectives. Can security leaders effectively incorporate the best practices of IAM and clearly define policies for secure access? Are they able to integrate IAM policies with existing tools to enable smooth delivery of security solutions?

The session will cover: 

  • How to align IAM with zero trust to reduce the risk of unauthorized access; 
  • Use of multi-factor authentication to prevent synthetic identity fraud; 
  • Using IAM to automate workflows for enhanced security; 
  • Establishing user access management and control. 

Thejo Murthy, Lead Systems Engineer, Forcepoint

The 2025 line-up will be announced soon. Stay tuned for updates

SASE: CISOs’ Recipe to Establish Cyber Resilience

SASE can empower CISOs to meet security objectives, particularly when defending organizations with limited resources. 

As organizations continue to evolve, CISOs have embraced SASE to address modern security challenges, while fostering agility, scalability and user-centricity in the digital age.  

This session will provide insights into the journey of SASE adoption in the realm of enterprise security.  

The session will cover:  

  • Current state of SASE and its significance;  
  • Evolution of single-vendor SASE and its impact;  
  • Benefits of investing in SASE in establishing cyber resilience. 

Girish K Nanappa, Senior Director and National Sales Head, Synopsys Inc.

The 2025 line-up will be announced soon. Stay tuned for updates

Customer Fireside Chat: Technologies That Will Shape 2025 and Beyond

It is critical to dive deep into explaining how a particular technology helps in shaping the enterprise in building an effective defense strategy. 

This session will cover:  

  • Essential steps in developing a comprehensive view of security technologies shaping enterprise security in 2025;  
  • Establishing a cybersecure ecosystem;

Nandakumar Seshadri, Regional Sales Manager, OPSWAT

The 2025 line-up will be announced soon. Stay tuned for updates

CISO Circle: Panel: The Evolving Role of CISOs as Catalysts for Change

While CISOs are expected to serve the business by reducing risk, their role now extends beyond organizational boundaries to include supplier management and external data transmission oversight. What new elements of the CISO role are helping them become beacons of change? 

The session will cover: 

  • Key technical and business attributes driving the change; 
  • Redefining leadership; 
  • How CISOs are embedding security into organizational DNA. 

Sivaramakrishnan Krishnamurthy, Technical Director – Pre-Sales, Quest Software

The 2025 line-up will be announced soon. Stay tuned for updates

Quantum Threat to Security: How Prepared Are Enterprises?

However, they are a potential threat to security systems since they increase the probability of classical cryptography algorithms getting broken.

What cyberthreat does quantum computing pose, and why is there a need for new cryptography techniques based on the paradigm of post-quantum cryptography? How prepared are enterprises to tackle the risks? Experts say quantum-era cybersecurity will wield the power to detect and deflect quantum-era cyberattacks before they cause harm.

The session will cover: 

  • How potential threats to encrypted data from quantum computers pose a significant concern;
  • Why there is a need to plan quantum-safe migration of the existing security applications and networks;
  • Why adopting a quantum risk management approach and planning is preferable to facing the consequences of sensitive data loss;
  • How to build crypto agility and manage cryptographic environment better.

Anish Koshy, (CEB Member), Vice President – Information and Cyber Security Risk Officer, Standard Chartered GBS

The 2025 line-up will be announced soon. Stay tuned for updates

Deep Dive: Harnessing AI in Enterprise Security Leadership: A 360-Degree View

Security leaders acknowledge that AI/ML is a double-edged sword employed by both attackers and defenders. Defenders find it crucial to identify threats and vulnerabilities, adding to its significance in the cybersecurity landscape.

However, it is critical for security leaders to understand the limitations of AI and devise strategies to harness AI in the right sense, and consider that human expertise is still a critical component of their cybersecurity strategy.

The session will cover:

  • Use case of how AI is successfully integrated into an organization’s security operations;
  • Establishing privacy in securing AI-enabled systems and tools;
  • Risk mitigation plan with effective frameworks;
  • Building cyber resilience against threats from AI: investments in AI.

Firdosh Sheikh, Founder & CEO, DRIFE
Sailaja Vadlamudi, Vice President Security & Privacy, ERP Digital Supply Chain, SAP Labs India
Ankush Sabharwal, Founder & CEO, CoRover
Akshay Sivananda, (CEB Member), CISO, Saviynt
Kavitha Kadambi, CISO, Infosys

Closing Remarks

4:45 pm onwards

2025 Partners

Co-Presenting Partner

Diamond Partner

Association

Express Interest

Individual Pass

Single Issue Pass
16700
11,775
Super Early Bird (Till 23 Feb 2025)
  • 1 Full Conference Access Pass
  • 7 hours of CPE Credits
  • Access to Specialized Masterclasses
  • Participation in Interactive Workshops and Roundtables
  • Priority Seating at Keynote Sessions
  • Multiple Networking Opportunities with industry leaders and peers
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership
  • Professional Headshot
  • Exclusive Lunch and Cocktail Receptions
  • Access to Exhibitor Showcases and Product Demonstrations
  • Exclusive Lunch with Advisory and Speakers

Team Pass

Buy 3 Passes, Get 1 Complimentary
48100
36,075 Super Early Bird (Till 23 Feb 2025)
  • 3+1 Full Conference Access Pass
  • 7 Hours of CPE Credits per team member
  • Access to Specialized Masterclasses
  • Priority Seating at Keynote Sessions
  • Multiple Networking Opportunities with industry leaders and peers
  • On-Demand Access to Session Recordings
  • Complimentary 14-Day CyberEd.io Membership for Each Team Member
  • Professional Headshot
  • Exclusive Team Lunch and Cocktail Receptions
  • Access to Exhibitor Showcases and Product Demonstrations
  • Exclusive Lunch with Advisory and Speakers
Popular

Vendor Pass

Single Issue Pass
35,500
  • Full Day Access to the conference
  • Connect with senior cybersecurity professionals and decision-makers
  • Designed for BD, Sales, and Marketing professionals from cybersecurity and IT solution providers, consultants, and legal firms
  • 3+ Hours of Face-to-Face Networking
  • Networking Lunch with Industry Peers
  • Evening Reception
  • Evaluate Sponsorship Opportunities for 2025
  • Explore Emerging Trends and Solutions with Key Stakeholders
  • Access to Key Sessions Relevant to Your Business Interests
  • Exclusive Lunch with Advisory and Speakers

*All prices are exclusive of GST | *Terms and Conditions Apply

*Note – Full Conference pass is applicable to information security and IT practitioners. For profiles other than IT and IS practitioners, please get in touch with us apac.contact@ismg-events.com or contact our ISMG representative on  +91 9819036179

Fill Out the Form to Start Registration!

Don’t miss your chance to attend
this dynamic impactful event

@ISMG_News

#ISMGSummits

Past Attendees

The Summit Experience

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain