The summit's objective is to provide education and exclusive networking opportunities for the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the India & SAARC region, to capture the regional security challenges that resonate with their current concerns. The India & SAARC editorial advisory board includes:
Conference Chair: Ashutosh Jain, CISO, IndusInd Bank
Conference Co-Chairs:
Advisory Board:
Enterprises across India and SAARC are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
The session will cover:
Various governments have been striving hard to build a future of cyberspace that is open, interoperable, secure and reliable. With significant improvement in cyber offense capabilities, the global cyberspace has become more vulnerable to attacks.
It’s time to bolster the cyber defense capabilities among government and enterprises. Experts say the cybersecurity establishment must think of countermeasures factoring in the cyber defense, offense and balance, especially when the nature of the attack gets more sophisticated. The keynote session will cover:
Today, the mobility of the modern workforce has empowered users and devices to connect anywhere. Employees and users have more control over the applications they use. These applications are no longer behind the firewall as users can connect directly to work applications over the internet using their own devices. The most significant risk of hybrid workforce for enterprises would be the risk of identity and user access.
The industry is abuzz with the concept of ‘zero trust’ being applied in securing the hybrid workforce in this perimeter less world, challenging the CISOs in securing the ecosystem.
The session will cover:
As organizations have already embarked on their digital transformation journey, moving to a ‘zero trust’ concept is a major step toward building your overall security architecture on the philosophy of challenging everything and ‘trust’ nothing.
The fundamental question for security leaders is why you need to launch a ‘zero trust’ initiative and make it your top priority. How does it secure your business environment amid the escalation threats and real-time system complexity?
The session will cover:
As organizations grapple with building security into their cloud applications to help thwart cyberthreats, experts recommend an intrinsic security approach that will help develop an easy and seamless path.
Since it would be difficult to defend what you don’t see, intrinsic security will provide a framework that has security built-in rather than bolted-on, helping to provide the most robust and scalable network and security platform.
The session will cover:
As organizations embark on their cloud journey, cloud security is getting more complex, yet it is still a constantly growing field. In addition, the unmanaged permissions are expanding the attack surface, increasing the challenges of visibility and control for security leaders.
The big questions before the CISOs now are how to restrict permissions for any identity or resource, and how to apply the least privilege principle to this layer of complex cloud infrastructure with increased attack surface.
The session will cover:
As a CISO or a key member of your organization's SecOps team, you've watched the attack surface expand over the last decade. The target field of endpoints has dramatically expanded to other attack vectors, forcing a shift from EDR (endpoint detection and response) to XDR (extended detection and response).
The session will cover:
Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program — the main reason why organizations often opt for a hybrid Active Directory approach. However, the other side of the coin to the hybrid AD approach is that your network perimeters disappear. Organizations can address this new challenge by building a unified security strategy with hybrid identity management at the center.
The session will cover:
The medical industry holds sensitive personal data along with other critical data. The healthcare industry, unlike financial institutions with stringent cybersecurity policies, lacks strong regulations around cybersecurity and privacy. This turns out to be a bottleneck for practitioners in adhering to certain best practices for data privacy.
The session will cover:
Most security leaders believe that they are not protecting technology but people. But can fraud, breach and privacy be viewed together? The fundamental questions that arise are ‘is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues’?
How much security is really required in an environment where openly shared data and research results fuel business? Where privacy and security matters are concerned, is a CISO more than just another corporate policy developer and technology evangelist? What role does a CISO play in operationalizing data protection and privacy regulations?
The session will cover:
Organization believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the ‘cloud-first’ strategy to optimize the IT spend and secure their hybrid work environment.
CISOs are tasked with building a cloud-first security strategy and mitigating the risks arising from this.
The session will cover:
India and SAARC region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were breached. The current approach is insufficient, and the deployed technologies do not provide the necessary intel to detect the blind spots.
It is imperative to assess the effectiveness of the cyberthreat intelligence program, and building a business case is essential in driving actionable threat intelligence.
The session will cover:
The Government of India has passed a regulation stating that every ‘State’ government needs to have a CISO to regulate the security procurement and controls, apart from appointing a security incident response team.
The fundamental question that arises is ‘whether the government needs a CISO and what should be the CISO’s role and responsibilities in protecting the critical infrastructure against growing threats’?
How do CISOs balance services with security and face the dichotomy, and what needs to change in their approach in the current hybrid cyberwar?
The session will cover:
The first question that provokes security practitioners is: How can they handle stealth and gain insights into how hackers plan their attacks even before contemplating which security solutions to deploy?
The key to strengthening cyber defense is to understand an attacker’s mind about how they conduct detailed reconnaissance activities and develop custom-tailored campaigns to penetrate the network to steal sensitive corporate data, intellectual property, business plans and personal information.
The session will cover:
India and SAARC region is making a headway in the cryptocurrency businesses and as a result, users could prove to be vulnerable to risks.
The government is working to regulate cryptocurrency exchanges in line with guidance from the intergovernmental Financial Action Task Force, which sets global standards for fighting money laundering and terrorist financing. The big challenges for security leaders are to assess risks, strengthen incidence response capabilities and employ defenses in addressing the challenges.
The session will cover:
Where does the journey to ‘zero trust’ begin, what are the typical entry points, and how can it unfold? Experts agree that ‘zero trust’ is based on the premise of ‘assume breach,’ and treat every asset as breached and all traffic as hostile.
The session will cover:
India is the third most cyber-attacked nation in the world, reports say. Enterprises need to comply with privacy regulations to protect their sensitive data.
Most security leaders have questions if the Indian cybersecurity companies are redefining cybersecurity and offering state-of-the-art technology and tools that help them protect their environment against threats. How have the indigenous cybersecurity technology partners supported enterprises in building a cyber-resilient enterprise?
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation? Is the CTO function aligned with security in driving innovation? Are the CTOs and CISOs meeting the expectations?
The session discusses how to get a CTO and the CISO to collaborate on a common goal to facilitate the continued success of their organization. Where is the disconnect?
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission critical for enterprise security.
As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?
Can you deploy suitable asset inventory methods and map the IT/OT risks?
This session will cover:
Cyberattacks are no longer about 'if' but 'when' you are breached. The daunting task for security leaders today is to build an effective business continuity plan to manage the breach incidents and to resolve the many issues that the incident ushers in.
Security teams are made accountable for reputational problems, disruption of business processes, and penalties for noncompliance with increasingly rigid data protection laws.
The session will cover:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Yet, the supply chain attack on a service provider cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks usher in the risk: Supplier vulnerabilities are the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will cover:
Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.
Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.
The session will cover:
This exclusive interactive session is specially curated for senior information security professionals of our premier global industry leader’s community as an extension of the opening keynote address by Lt General Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat, which will be taken up for a further deep dive with global perspectives on it.
This session will not be available on-demand. This is a CyberEdBoard exclusive session for members only. Existing members can access the on-demand session on the members' portal. Join the CyberEdBoard Community, by sending in your application here.
Contact the CyberEdBoard concierge team at the booth, to know more about joining the session.
The summit's objective is to provide education and exclusive networking opportunities for the participants with peers and subject matter experts. The program has been carefully designed with the support and guidance of the 'editorial advisory board,' including senior thought leaders from the India & SAARC region, to capture the regional security challenges that resonate with their current concerns. The India & SAARC editorial advisory board includes:
Conference Chair: Ashutosh Jain, CISO, IndusInd Bank
Conference Co-Chairs:
Advisory Board:
Enterprises across India and SAARC are encouraged to invest in the infrastructure needed to build a secure and robust platform for business transformation and support the digital economy.
The session will cover:
Various governments have been striving hard to build a future of cyberspace that is open, interoperable, secure and reliable. With significant improvement in cyber offense capabilities, the global cyberspace has become more vulnerable to attacks.
It’s time to bolster the cyber defense capabilities among government and enterprises. Experts say the cybersecurity establishment must think of countermeasures factoring in the cyber defense, offense and balance, especially when the nature of the attack gets more sophisticated. The keynote session will cover:
Today, the mobility of the modern workforce has empowered users and devices to connect anywhere. Employees and users have more control over the applications they use. These applications are no longer behind the firewall as users can connect directly to work applications over the internet using their own devices. The most significant risk of hybrid workforce for enterprises would be the risk of identity and user access.
The industry is abuzz with the concept of ‘zero trust’ being applied in securing the hybrid workforce in this perimeter less world, challenging the CISOs in securing the ecosystem.
The session will cover:
As organizations have already embarked on their digital transformation journey, moving to a ‘zero trust’ concept is a major step toward building your overall security architecture on the philosophy of challenging everything and ‘trust’ nothing.
The fundamental question for security leaders is why you need to launch a ‘zero trust’ initiative and make it your top priority. How does it secure your business environment amid the escalation threats and real-time system complexity?
The session will cover:
As organizations grapple with building security into their cloud applications to help thwart cyberthreats, experts recommend an intrinsic security approach that will help develop an easy and seamless path.
Since it would be difficult to defend what you don’t see, intrinsic security will provide a framework that has security built-in rather than bolted-on, helping to provide the most robust and scalable network and security platform.
The session will cover:
As organizations embark on their cloud journey, cloud security is getting more complex, yet it is still a constantly growing field. In addition, the unmanaged permissions are expanding the attack surface, increasing the challenges of visibility and control for security leaders.
The big questions before the CISOs now are how to restrict permissions for any identity or resource, and how to apply the least privilege principle to this layer of complex cloud infrastructure with increased attack surface.
The session will cover:
As a CISO or a key member of your organization's SecOps team, you've watched the attack surface expand over the last decade. The target field of endpoints has dramatically expanded to other attack vectors, forcing a shift from EDR (endpoint detection and response) to XDR (extended detection and response).
The session will cover:
Cloud adoption indeed boosts digital transformation for organizations embarking on a modernization program — the main reason why organizations often opt for a hybrid Active Directory approach. However, the other side of the coin to the hybrid AD approach is that your network perimeters disappear. Organizations can address this new challenge by building a unified security strategy with hybrid identity management at the center.
The session will cover:
The medical industry holds sensitive personal data along with other critical data. The healthcare industry, unlike financial institutions with stringent cybersecurity policies, lacks strong regulations around cybersecurity and privacy. This turns out to be a bottleneck for practitioners in adhering to certain best practices for data privacy.
The session will cover:
Most security leaders believe that they are not protecting technology but people. But can fraud, breach and privacy be viewed together? The fundamental questions that arise are ‘is privacy a CISO’s problem, and how to operationalize privacy in the context of security and data protection issues’?
How much security is really required in an environment where openly shared data and research results fuel business? Where privacy and security matters are concerned, is a CISO more than just another corporate policy developer and technology evangelist? What role does a CISO play in operationalizing data protection and privacy regulations?
The session will cover:
Organization believe that cloud computing brings a whole new level of autonomy and functionality, besides enhancing performance, agility, productivity and scalability. The pandemic has created the urgency for enterprises to move to cloud, and enterprises are in a race to adopt the ‘cloud-first’ strategy to optimize the IT spend and secure their hybrid work environment.
CISOs are tasked with building a cloud-first security strategy and mitigating the risks arising from this.
The session will cover:
India and SAARC region has witnessed the most prominent organizations hitting the headlines. It is beyond doubt that organizations have a huge staff and a myriad of cybersecurity tools to secure their environment; yet, they were breached. The current approach is insufficient, and the deployed technologies do not provide the necessary intel to detect the blind spots.
It is imperative to assess the effectiveness of the cyberthreat intelligence program, and building a business case is essential in driving actionable threat intelligence.
The session will cover:
The Government of India has passed a regulation stating that every ‘State’ government needs to have a CISO to regulate the security procurement and controls, apart from appointing a security incident response team.
The fundamental question that arises is ‘whether the government needs a CISO and what should be the CISO’s role and responsibilities in protecting the critical infrastructure against growing threats’?
How do CISOs balance services with security and face the dichotomy, and what needs to change in their approach in the current hybrid cyberwar?
The session will cover:
The first question that provokes security practitioners is: How can they handle stealth and gain insights into how hackers plan their attacks even before contemplating which security solutions to deploy?
The key to strengthening cyber defense is to understand an attacker’s mind about how they conduct detailed reconnaissance activities and develop custom-tailored campaigns to penetrate the network to steal sensitive corporate data, intellectual property, business plans and personal information.
The session will cover:
India and SAARC region is making a headway in the cryptocurrency businesses and as a result, users could prove to be vulnerable to risks.
The government is working to regulate cryptocurrency exchanges in line with guidance from the intergovernmental Financial Action Task Force, which sets global standards for fighting money laundering and terrorist financing. The big challenges for security leaders are to assess risks, strengthen incidence response capabilities and employ defenses in addressing the challenges.
The session will cover:
Where does the journey to ‘zero trust’ begin, what are the typical entry points, and how can it unfold? Experts agree that ‘zero trust’ is based on the premise of ‘assume breach,’ and treat every asset as breached and all traffic as hostile.
The session will cover:
India is the third most cyber-attacked nation in the world, reports say. Enterprises need to comply with privacy regulations to protect their sensitive data.
Most security leaders have questions if the Indian cybersecurity companies are redefining cybersecurity and offering state-of-the-art technology and tools that help them protect their environment against threats. How have the indigenous cybersecurity technology partners supported enterprises in building a cyber-resilient enterprise?
The session will cover:
Almost all CISOs across regions have a single most significant challenge of getting the necessary funding to support their cybersecurity programs. Are security leaders creating value for business and being a part of technology innovation? Is the CTO function aligned with security in driving innovation? Are the CTOs and CISOs meeting the expectations?
The session discusses how to get a CTO and the CISO to collaborate on a common goal to facilitate the continued success of their organization. Where is the disconnect?
Most OT systems are designed with very little consideration for security. With increased cyber risk in this new digital transformation era, any approach to bridge the IT and OT divide is mission critical for enterprise security.
As a CISO, can you reduce risk, security and risk management function silos to bridge the security gaps?
Can you deploy suitable asset inventory methods and map the IT/OT risks?
This session will cover:
Cyberattacks are no longer about 'if' but 'when' you are breached. The daunting task for security leaders today is to build an effective business continuity plan to manage the breach incidents and to resolve the many issues that the incident ushers in.
Security teams are made accountable for reputational problems, disruption of business processes, and penalties for noncompliance with increasingly rigid data protection laws.
The session will cover:
We typically think of supply chain attacks as stealthy attacks on hardware components, such as malware on laptops and network devices. Yet, the supply chain attack on a service provider cannot be ruled out as it is a significant intrusion of the entire ecosystem. The supply chain attacks usher in the risk: Supplier vulnerabilities are the common cause of compromise. Keeping a watchful eye on suppliers' security status – always knowing the risks they bring in – is an essential part of building resilience and response.
The session will cover:
Ransomware attacks continue to plague organizations at an alarming pace; the debate among the C-suite on the issue of paying the ransom or refusing to pay and dealing with the consequences is getting critical.
Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that the organization's risk calculations are no longer accurate. Another argument is that payment of extortion monies may encourage continued criminal activity.
The session will cover:
This exclusive interactive session is specially curated for senior information security professionals of our premier global industry leader’s community as an extension of the opening keynote address by Lt General Rajesh Pant, National Cyber Security Coordinator, National Security Council Secretariat, which will be taken up for a further deep dive with global perspectives on it.
This session will not be available on-demand. This is a CyberEdBoard exclusive session for members only. Existing members can access the on-demand session on the members' portal. Join the CyberEdBoard Community, by sending in your application here.
Contact the CyberEdBoard concierge team at the booth, to know more about joining the session.
May 17 - 18, 2022
India & SAARC Summit