ismg summit logo

February 15, 2024

DynamicCISO Excellence Awards and Conference

10th Edition

9:00 AM - 5:00 PM IST

Event Overview

The 10th edition of the DynamicCISO Excellence Awards and Conference, an ISMG initiative, will honor innovation and dedication of cybersecurity leaders.

The theme “Cybersecurity Leadership: CISOs’ Corporate Strategy and DNA” explores redefining security leadership, fortifying defenses and harnessing technologies such as artificial intelligence. Security leaders will delve into Web 4.0, automation, IoT integration with 5G, state-sponsored cyber warfare, automotive hacking prevention, mitigating social engineering attacks, and fraud prevention with multifactor authentication. Thought leaders will also share their insights on data protection, regulatory compliance and driving innovation in an evolving digital landscape.

The conference will culminate in a prestigious awards ceremony to acknowledge the indispensable role CISOs play in safeguarding our digital ecosystem. All nominations will be assessed objectively by a designated jury of subject matter experts.

The annual conference serves as a platform to share best practices, innovative solutions, and success stories within the cybersecurity community, and inspire future leaders.

Earn your CPE credits by attending the awards and conference. 

Why Participate?

excellence (2)

Celebrate Excellence

Join us in celebrating the extraordinary achievements of CISOs across diverse industries, highlighting their pivotal role in safeguarding digital ecosystems. 

networking 2

Networking Edge

Connect with cybersecurity experts and industry leaders to boost your career and business. 

educational 2

Educational Platform

Our conference is a knowledge-sharing hub, offering profound insights from cybersecurity thought leaders, helping you stay ahead of the curve. 

insights 2

Cutting-Edge Insights

Gain access to in-depth discussions on cutting-edge technologies, game-changing strategies, and progressive trends that are shaping the future of enterprise security. 

Dr. Reem Faraj AlShammari

Founding Partner and Board member, Women in CyberSecurity Middle East (WiCSME)

Leonard Ong

Director, Policy, Risk Management & Capability Development (Cyber Defense Group), Synapxe

Kumar KV

Group CIO, Narayana Health

Sameer Ratolikar

Senior Executive Vice President & CISO, HDFC Bank

Sanjeev Kaushik

Head Cybersecurity - CISO, Adani Airport Holdings Ltd

Brijesh Datta

Executive Vice President & CISO, Reliance Jio

Anish Koshy

Vice President - Information and Cybersecurity Risk Officer, Standard Chartered GBS

Sridhar Sidhu

Senior Vice President and Head of Information Security Services Group, Wells Fargo

Shivangi Nadkarni

CEO and Co-Founder, Arrka

Jury

Thought Leaders on Stage and Leading Deep Dive Discussions

Our impartial and esteemed jury panel consists of subject matter experts with deep knowledge and experience in the cybersecurity field. They ensure that the awards are assessed objectively, maintaining the highest standards of fairness and credibility.

Wall of Fame - Winners 2023

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

Our Summit Advisory Committee comprises industry visionaries who guide the conference’s content, ensuring that it remains relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities.

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Venue

Madison Avenue

Madison Avenue, New York, NY 10017, USA

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Agenda

Registration & Breakfast

Speaker Full Name

Job Title, Company Name

Plenary Session: How are CISOs Shaping Their Enterprise Security in 2024: The AI Saga

It is always an intriguing subject to understand how CISOs are shaping their enterprise security in 2024 and building cybersecurity resilience across the enterprise to protect digital assets and operations. 

 It would be exciting to understand how CISOs are exploting the potential of  artificial intelligence in witnessing the risk, opportunity, and potential prosperity in the adoption of machine learning for threat detection. 

 The session will discuss:  

  • Do CISOs consider AI to be the central pillar of cybersecurity developments for the foreseeable future; 
  • The AI journey of a CISO on tactics strategies and resource priorities; 
  • Leveraging AI to be out of the race between attackers and defenders

Speaker Full Name

Job Title, Company Name

Keynote: Preparing for 2024 and Beyond: Cybersecurity Strategy Road Map for Enterprises

It is always an intriguing subject to understand how CISOs are shaping their enterprise security in 2024 and building cybersecurity resilience across the enterprise to protect digital assets and operations. 

 It would be exciting to understand how CISOs are exploting the potential of  artificial intelligence in witnessing the risk, opportunity, and potential prosperity in the adoption of machine learning for threat detection. 

 The session will discuss:  

  • Do CISOs consider AI to be the central pillar of cybersecurity developments for the foreseeable future; 
  • The AI journey of a CISO on tactics strategies and resource priorities; 
  • Leveraging AI to be out of the race between attackers and defenders

Speaker Full Name

Job Title, Company Name

Sponsor: A Platform-centric Approach to Building Cyber Resiliency: A Blueprint

Some security practitioners say that deploying a platform-centric security framework will help navigate through the challenges of the three pillars of people, process, technology and data and information in the current scenario to meet the goal to establish CIA of the information security model. 

Experts say a data-centric approach would be ideal in building the resiliency across platform to address key elements.   

The session will discuss: 

  • Assessing data protection and security measures and protocols;
  • Building a well-orchestrated strategy to bolster defences; 
  • Navigating the metrics maze, while articulating value of cyber resilience to the business Leadership

Speaker Full Name

Job Title, Company Name

Exclusive: Bridging the IAM Vulnerabilities in the Cloud: CISO's Approach to the Right Policy Prescription

The focal point is on formulating the right policy prescription that effectively bridges IAM vulnerabilities in the cloud. CISOs need to include CloudIAM as part of their overall identity management strategy and integrate with existing on premises applications and legacy system, aligned with investments and resources to develop robust policies, ensuring secure access controls and authentication mechanisms. 

 The session will discuss:  

  • Navigating through the IAM cloud Challenges and CISO’s Prescription for effective policy and authentication methods;
  • Establishing an identity-first security;
  • What constitutes an ideal IAM program for cloud security.

Networking & Exhibition Break

Speaker Full Name

Job Title, Company Name

Fireside Chat: Navigating Through the Cybercrime Shift: A Security Counterstrike

The focal point is on formulating the right policy prescription that effectively bridges IAM vulnerabilities in the cloud. CISOs need to include CloudIAM as part of their overall identity management strategy and integrate with existing on premises applications and legacy system, aligned with investments and resources to develop robust policies, ensuring secure access controls and authentication mechanisms. 

 The session will discuss:  

  • Navigating through the IAM cloud Challenges and CISO’s Prescription for effective policy and authentication methods;
  • Establishing an identity-first security;
  • What constitutes an ideal IAM program for cloud security.

Speaker Full Name

Job Title, Company Name

Sponsor: Insecure APIs: How to establish the Right Authentication and Authorization Standards

This session delves into the critical realm of addressing insecure APIs, emphasizing the establishment of robust authentication and authorization standards. Recognizing the pivotal role APIs play in accessing systems, the mechanism for programmer access is dissected to underscore its importance in the broader cybersecurity landscape.   

The session will discuss: 

  • How are CISOs building the foundational principles for data protection and secure system interactions to secure APIs?
  • New authentication mechanisms for API security
  • Building the right authentication and authorization configurations for user access and control.

Speaker Full Name

Job Title, Company Name

Panel: Is Ransomware Taking a Dark Turn? What Should be Best Footforward for the Security Leaders in Containing It

Lunch & Exhibition Break

Speaker Full Name

Job Title, Company Name

Fireside chat- Establishing a DevSecOps Culture: The C-suite Debate

Speaker Full Name

Job Title, Company Name

Speaker Full Name

Job Title, Company Name

Spotlight: Future of Payments Security and Risks: Navigating Through the New Methods of Authentication

As technological advancements continue to revolutionize the way transactions are conducted, the shift towards innovative authentication methods introduces a spectrum of potential risks. The payments organizations have been putting their best foot forward in fortifying their payment gateways and investing in secure technologies and new digital authentication frameworks to support the card-not-present ecosystem.    

  • Evolving regulatory frameworks and compliance standards governing payment security;  
  • Adopting a risk-based authentication system for securing payments.  
  • Exploring the role of AI and machine learning algorithms in bolstering fraud detection and prevention

Speaker Full Name

Job Title, Company Name

Masterclass- Security Leadership: Making Security Your Corporate DNA by applying unique tactics and procedures

Speaker Full Name

Job Title, Company Name

Masterclass- Security Leadership: Making Security Your Corporate DNA by applying unique tactics and procedures

Closing remarks followed by cocktails and Networking

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speaker Name

Title, company name

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

Prepare to be enlightened by a lineup of renowned conference speakers who are at the forefront of cybersecurity. These thought leaders will share their expertise, experiences, and insights to empower you with the knowledge needed to navigate the evolving landscape of cybersecurity. 

Closing Comments

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Our Sponsors

The Summit Experience

CPE Credits

Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

Upcoming ISMG Events

February 15, 2024

Dynamic CISO Summit & Excellence Awards, 10th Ed.

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

February 13, 2024

Fraud, Security & Risk Management Summit: New York