November 1, 2023

Cybersecurity Summit: Mumbai

8:30 AM - 6:30 PM IST

Event Overview

Digital technologies are enabling businesses to achieve feats like never before. While technologies, such as Web 3.0, blockchain, metaverse and cloud, expand the scope of enterprise business, they also pose certain security risks. This has necessitated CISOs to establish enterprise resilience. Inadequate cyber defenses can hold back organizations from digital innovation as threat actors are constantly looking for vulnerabilities to exploit with new technology deployments. Only a cyber-resilient enterprise that knows how to endure and contain attacks can innovate and thrive in a digital economy. This requires CISOs to align their strategies with business priorities, move from a defense to an offense mindset, and collaborate to ensure cybersecurity delivers business value. While organizations must leverage strategies and tool sets for threat intelligence and threat hunting, robust risk management, incident response and business continuity plans are equally crucial. Ultimately, leadership plays a pivotal role in driving resilience. 

The ISMG Cybersecurity Summit: Mumbai brings together digital experts, innovators and thought leaders to discuss digital resilience, security, growth and business transformation.  

The conference will include discussions on topics such as establishing trust with the board, how to thrive in a digital economy with the right defences, what does cross-border data movement entails, multi-vendor management challenges, cyber insurance, quantum readiness, zero trust, SD-WAN, and reducing operational friction with XDR. Security experts from the large enterprises and technology partner organizations will share insights and learnings on the best practices to transform businesses and protect against emerging threats.  

You can earn CPE credits by attending ISMG’s Cybersecurity Summit. 

Venue

JW Marriot, Sahar

Mumbai

Highlight Topics

  • Enhancing Your Security Posture
  • Third Party Risk Management
  • Cyber Governance
  • 5G Network Security and Business Opportunities
  • Zero Trust

Agenda

Mumbai Summit

Registration & Breakfast

Name

Designation, Company

Opening Remarks

Speaker Full Name

Job Title, Company Name

Plenary: Establishing Trust with the Board: Essential Steps

Effective communication and collaboration between cybersecurity professionals and the board are crucial for developing a robust cybersecurity strategy. The plenary session titled Establishing Trust With the Board: Essential Steps aims to provide insights into the vital steps required to foster trust, understanding and alignment between cybersecurity experts and the board. 

This session will cover: 

  • Importance of board involvement;  
  • Bridging the knowledge gap; 
  • Effective risk communication; 
  • Aligning cybersecurity with business goals; 
  • Reporting mechanisms. 

Speaker Full Name

Job Title, Company Name

Keynote: Innovating and Thriving in a Digital Economy: Do Security Leaders have the Right Defenses?

However, this digital transformation comes with a heightened risk of cyber threats that can disrupt operations, compromise sensitive data, and damage reputation. The keynote address titled “Innovating and Thriving in a Digital Economy: Do Security Leaders have the Right Defenses?” aims to explore the crucial intersection between innovation, business success, and cybersecurity preparedness. 

 This keynote address will address the following objectives: 

  • Highlight the Digital Transformation Landscape 
  • Examine the Cybersecurity Challenge 
  • Evaluate Security Leaders’ Role:  
  • Explore Adaptive Defense Strategies 
  • Illustrate Success Stories 

Speaker Full Name

Job Title, Company Name

Multi-vendor Management: Challenges and Opportunities for Enterprise Security

This approach involves harnessing specialized solutions from diverse providers to fortify their digital defenses. This dynamic shift introduces a spectrum of challenges and exceptional opportunities. As a key stakeholder, your proficiency holds paramount importance in navigating this evolving terrain. Our forthcoming session, titled Navigating Multi-Vendor Management: Unraveling Challenges and Unveiling Opportunities in Enterprise Security is designed to delve into this phenomenon, spotlighting how your solutions can seamlessly integrate into comprehensive cybersecurity strategies. 

 This session will cover: 

  • Shining light on the multi-vendor surge;  
  • Untangling integration complexities; 
  • Harmonizing vendor collaborations; 
  • Crafting resilient risk mitigation. 

Networking & Exhibition Break

Track A

Speaker Name

Desg, Company

Fireside Chat: Cyber Insurance and Risk: What to Expect

Cyber insurance has emerged as a vital tool to mitigate financial losses from data breaches, cyberattacks and other digital vulnerabilities. The session titled Cyber Insurance and Risk: What to Expect will delve into the intricate realm of cyber insurance, providing attendees with a comprehensive understanding of its role, benefits and challenges. 

The session will cover: 

  • Demystifying cyber insurance; 
  • Exploring coverage scenarios; 
  • Discussing policy considerations; 
  • Analyzing claims process; 
  • Examining the future landscape. 

Track B

Speaker Name

Desg, Company

Fireside Chat: Designing Custom-Built IT and Security Infrastructures: How Effective Is It?

Organizations are not only dealing with unique problems, but also complex data sets and processing needs, which require more customization. That’s one of the reasons why the spending on MSPs is rising substantially.  

The session will cover: 

  • How can organizations augment their mobile, telecom and cloud infrastructure to support their processing needs?  
  • What challenges organizations are faced with in in making the infrastructure dynamic; 
  • How technologies are customized; 
  • The requirements from systems integrators and partners 

Track c

Speake Name

Desg, Company

Fireside Chat: Post-Quantum Readiness: Are CISOs Ready to Play the Defense?

Quantum computing also offers the processing power required by AI systems.  

The age of post-quantum cryptography – 2030 or later – is still a few years away, but we should start planning for it today.  

The session will cover:  

  • How CISOs should prepare for the post-quantum era;  
  • The current state of readiness to adopt this technology to strengthen security; 
  • The perceived threats posed to cybersecurity.

Track A

Speaker Name

Desg, Company

Cyber Risk Quantification: Going Beyond Technology and Automation

But putting a monetary value to cyber risk has always been a challenge for CISOs.  

Cyber risk quantification moves beyond technology and automation. It is a way for organizations to drive alignment between security strategy and business objectives.  

The session will cover: 

  • Challenges in quantifying cyber risk;  
  • How to quantify a cyber risk in business-relevant terms;  
  • Metrics to consider while quantifying cyber risks.

Track B

Speaker Name

Desg, Company

Supply chain 4.0 – Establishing a Resilient Security Posture With Infrastructure and Application Modernization: The Way Forward

Technologies like IoT sensors, advanced robotics, GPS, advanced warehouse, edge cloud, and predictive analytics have made supply chains smarter, agile and highly responsive. This makes for, just in time inventory, warehouse efficiencies, and faster deliveries, and happier customers.  

From inventory and reporting systems, supply chain management solutions have evolved to provide advanced planning processes, such as analytical demand planning, and integrated sales and operations planning. 

The session will cover: 

  • Building resiliency into supply chains; 
  • Supply chain security; 
  • Improving supply chain visibility with data analytics; 
  • Emerging digital supply chain models. 

Track C

Speaker Name

Desg, Company

DevSecOps: Distributing Security Decisions at Speed and Scale

Security needs to be integrated with the DevOps process to ensure responsibility is shared and security is built in. 

DevSecOps enables application security testing by the developer and by the tester all the way into pre-production -whether it is static, dynamic or software composition analysis in a more automated fashion to help you shift security left without slowing down your development teams. 

The session will cover: 

  • How to maintain velocity, agility and compliance during the development process; 
  • How can security teams work on aligning their incentives with operations and developers; 
  • Implementing policy-as-a-code across your SDLC process; 
  • Enabling applications to communicate with each other. 

Track A

Speaker Name

Desg, Company

How Generative AI Models Are Disrupting the Security Ecosystem

Security information and event management systems raise tens of thousands of alerts. It’s impossible for a human to examine each of these alerts and prioritize threats. This is placing a lot of burden on SOC analysts and CISOs.  

The tedium of this work can be transferred to generative AI tools, which can typically handle voluminous tasks and complete these at a faster rate. New generative AI tools can help write and scan code, supplement understaffed teams, analyze threats in real time, and perform a wide range of other functions to help make security teams more accurate, efficient and productive. 

The session will cover: 

  • Current challenges with security; 
  • How gen AI tools and models can harden security;  
  • Limitations of gen AI tools and models. 

Track B

Speaker Name

Desg, Company

Passwordless Authentication: Understanding the Mechanics​

Passwordless authentication presents an innovative paradigm shift by eliminating the reliance on static passwords and introducing dynamic, multifactor methods to verify user identities. 

The session will cover: 

  • Reinforcement of the significance of understanding passwordless authentication mechanics; 
  • Emphasis on the role of passwordless methods in revolutionizing cybersecurity; 
  • Best practices to enable passwordless authentication; 
  • The importance of focusing on the user experience while enhancing security. 

Track C

Speaker Name

Desg, Company

Relevance of Exposure Management in Prioritizing Threats

This will help determine which of its assets are at risk. A proactive approach will help it identify risks and vulnerabilities, so that the organization can take action before these vulnerabilities can be exploited by attackers. Exposure management plays an important part in the organization’s proactive security operations, as it provides visibility to reduce cyber risks. 

The session will cover: 

  • Steps for building an exposure management program; 
  • Evaluating the effectiveness of your exposure management; 
  • How to use exposure management to prioritize threats. 

Track A

Speaker Name

Desg, Company

IT/OT Convergence: Bridging the Silos

However, they struggle to integrate legacy machinery, powered by operational technology with information technology. IT and OT stacks are siloed, posing a stumbling block to digital transformation, more so with IT infrastructure from on-premises to the cloud. This provides challenges in visibility into OT infrastructure performance. 

The convergence of IT and OT presents numerous opportunities. It can accelerate digital transformation resulting in new digitally enabled processes for manufacturing. It presents significant benefits such as converting real-time data from plant machinery into actionable insights.  

In this session, business leaders from the manufacturing sector will share experiences from their IT/OT integration and will speak about the challenges.   

The session will cover: 

  • Obstacles to convergence; 
  • Countering challenges with legacy plant machinery; 
  • IIoT use cases in manufacturing; 
  • Integrating plant data with IT systems such as ERP. 

Track B

Speaker Name

Desg, Company

Fireside: Incident Reporting Requirements and Cyberthreat Information Sharing: A Debate Between the CISO and CFO

How can an organization prepare for incident reporting requirements?  

Cyberthreat information exchange is crucial for maintaining situational awareness and to safeguard community against cyberattacks.  

How can organizations, the private sector, governments and nations build trust and enhance near-real-time information sharing to build a cyber-resilient community? What are the key steps for security leaders to prepare for the CERT-In proposed rule for cybersecurity risk management, strategy, governance and incident disclosure? 

The session will cover: 

  • Mechanisms and effectiveness of sharing operational, strategic and enriched tactical threat intelligence; 
  • Techniques to collect, correlate, enrich, contextualize and analyze tags and exchange of cyberthreat information; 
  • The mechanics of incident reporting with filing incidents. 

Track C

Speaker Name

Desg, Company

Fireside chat: Is Your IAM Policy Adequate? Perils of Overprovisioning

But are they adequate? Are you taking a piecemeal approach that does not help in compliance (access certification and governance, separation of duties, the right access for right people, etc.) 

Any written IAM policies that can’t be enforced become ineffective. 

The session will cover: 

  • Writing a comprehensive IAM program to protect and transform your enterprise; 
  • Managing user access, authentication and compliance. Use of AI and data analytics to identify risk –patterns. 

Track A

Speaker Name

Desg, Company

Business Email Compromise: Why Is It Hard to Detect? Modern CISO’s Detection Techniques

Costing organizations billions of dollars annually, BEC has become a top-of-mind concern for CISOs.    

Evolving from simple phishing attempts to highly sophisticated tactics such as social engineering, domain spoofing and impersonation, the growing complexity of BEC attacks has made detection harder. These attacks bypass traditional security measures and often remain unnoticed until it’s too late.   

In a landscape where BEC attacks continue to evolve, CISOs need advanced detection techniques built on AI and analytics. ML algorithms can aid proactive threat identification by analyzing communication patterns, detecting anomalies and flagging suspicious activities.   

The session will cover:   

  • Inherent challenges in detecting BEC attacks;  
  • Role of data analytics and AI in BEC detection;  
  • Importance of continuous user training and awareness programs;  
  • Incident response and recovery strategies specific to BEC attacks.

Track B

Speaker Name

Desg, Company

Cloud-Based Endpoint Management: Establishing Control and Scalability

The role of cloud-based EPM has become even more critical in facilitating the integration, management and security of non-traditional endpoints, including IoT devices, such as security cameras, medical devices, PoS machines, etc.   

The session will explore how organizations can achieve control and scalability while effectively managing security, compliance and user experience across endpoints.   

The session will cover:   

  • How to achieve scalability and establish control in cloud-based EPM;  
  • Optimizing the balance between cost and performance in cloud-based EPM;  
  • Navigating security risks, data privacy concerns and compliance requirements;  
  • AI-enabled predictive analytics and anomaly detection;  
  • Integration with edge computing for managing endpoints at the edge to reduce latency and increase response time.

Track C

Speaker Name

Desg, Company

Transforming SecOps Using AI for Enhanced Performance

With unprecedented scalability, automation and enhanced performance, AI-powered SecOps can help organizations detect and respond to threats faster and more efficiently and reduce the cost of security operations. 

By helping build an adaptive security posture that is continuously learning from emerging threats and adjusting the defenses accordingly, AI is transforming SecOps to proactively address security challenges and stay ahead of cyber adversaries in an ever-evolving landscape of cyberthreats. 

It is imperative for organizations to address the need for large amounts of data, complexity of AI algorithms and the risk of bias to optimize the AI-driven scalability of SecOps. 

The session will cover: 

  • Scaling SecOps cost effectively with AI; 
  • AI-driven automation of threat detection and incident response; 
  • Data privacy challenges and considerations; 
  • Optimizing the allocation of security resources; 
  • Human-AI collaboration; 
  • Right KPIs to determine RoI.

Lunch & Exhibition Break

Track A

Name

Designation, Company

Panel Discussion: Zero Trust Security: Is It a Deep Dive or Just Tipping Your Toes?

Different industries are struggling to implement the various technologies under zero trust. Microsegmentation and access management are not easy to deploy. What works for one industry might not work for another as zero trust is not a monolithic approach. For many, zero trust architecture has become complex. Given this, are CISOs just tipping their toes? How can they get more granular in their approach?   

This session will cover:  

  •  Business imperatives driving the implementation of zero trust;  
  •  How to decide on the low-hanging fruits;  
  • How to handle microsegmentation and zero trust in the cloud. 

Track B

Name

Designation, Company

Panel: To Pay or Not to Pay: The C-Suite Debate on Tackling Cyber Extortion

Some experts say that paying the ransom makes an organization vulnerable to reputational risk. This also means that an organization’s risk calculations are going awry. Another argument would be that extortion payment may encourage continued criminal activity. 

The session will cover: 

  • The C-suite approach to a ransomware attack; 
  • How to engage with the law enforcement before taking the decision; 
  • Prepare now or pay later – A CISO’s take and the role of board and top management in dealing with extortion crisis. 

Track C

Name

Designation, Company

Culture Change: How to Instill a Mindset of a Responsible Defense

Businesses can become more resilient to attacks with a culture of security ownership. 

This requires fostering a security culture that prioritizes robust defense mechanisms and ethical considerations, as well as organization’s ethos. Push from top leadership alone is not enough. It is equally important to establish an environment of continuous learning and awareness at each level. 

The session will explore the synergies between robust defense strategies, ethical considerations, and organizational values, and how to integrate them into the decision-making process. It will further delve into the strategies to initiate and sustain this cultural transformation that embraces responsible defense practices and the role of leadership, communication and employee engagement. 

The session will cover: 

  

  • The significance and implications of a responsible defense culture in a modern threat landscape; 
  • Elements for building and sustaining the culture and addressing the challenges involved; 
  • The role of different stakeholders – leadership, employees and regulatory; 
  • How do employee engagement and education intersect with responsible defense culture; 
  • KPIs to measure the success of cultural transformation efforts; 
  • The importance of continuous monitoring.

Track A

Name

Designation, Company

Building Next-Gen SIEM: Establishing a Behavior-Based Approach for Threat Detection

This approach is not effective against zero-day attacks. Behavior-based threat detection aims to address this limitation by focusing on the actions and behaviors of software or users. Industries globally are relying on behavior-based threat detection leading to proactive mitigation of potential threats. 

The session will cover: 

  • SIEM modernization for better security and productivity;
  • How to know the right fit for your organization;
  • Privacy implications of behavior-based threat detection.

Track B

Name

Designation, Company

Establishing Mobile Apps and Device Security: Who Is Accountable?

As both public and private organizations rely more on mobile applications, ensuring that they are reasonably free from vulnerabilities and defects becomes paramount.  

Mobile apps continue to provide unprecedented support for facilitating organizational objectives.  

Despite their utility, these apps can pose serious security risks to an organization and its users due to vulnerabilities that may exist within their software. IT and security leaders need to build a modern AppSec strategy designed to support demanding development cycles while also ensuring application security. 

The session will cover: 

  • Top application security threats to watch out for; 
  • Why application security maturity is more important today than ever. 

Track c

Name

Designation, Company

XDR: Removing Operational Friction Within SOC

By reducing operational friction within a SOC by consolidating and correlating data from multiple sources, and centralizing data collection it gives security analysts a better holistic view of an organization’s security posture.

This session will also discuss: 

  •  How XDR can help improve SOC’s performance 
  • How XDR can reduce time to resolve identity disputes 
  • How can XDR ingest security telemetry from multiple security controls to identify and isolate threats 

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Establishing a FinOps Culture in Cloud: CIO and CISO Manifestations

But CFOs seek upfront visibility on cloud spends. Moving from capex to opex presents tremendous cost savings. However, organizations can save further on cloud costs by opting for the right service plans, and predicting cloud costs upfront. The lack of visibility into cloud spending can inflate cloud costs. Gartner predicts that organizations that lack cost optimization processes will average 40% overspend in public cloud. Spending must be monitored and controlled on an ongoing basis due to the dynamic nature of the cloud. 

What leads to unforeseen spending, and can this be predicted in advance? The session will delve into the strategies, best practices and cloud management tools that CIOs use to monitor and control cloud spending. Cloud governance regulates usage of cloud resources and optimizes resource utilization, leading to cost optimization.  

The session will cover: 

  • Why cloud financial governance is critical;  
  • The unforeseen costs that inflate cloud billing; 
  • Predicting and controlling cloud costs; 
  • Strategies for effective governance in the cloud.

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Data Localization Vs. Cross Border Data Movement: Complying with DPDP Act Regulation

Security leaders agreed to the idea of data sovereignty required for the growth of the country and to preserve the data appropriately and in a secure manner within the country. 

However, contradicting the earlier judgment by the cabinet, the current DPDP 2023 Bill, passed by both houses of the Parliament, allows the transfer of personal data outside India, except to countries restricted by the central government through notification. 

Against this backdrop, there have been several questions raised by the data privacy and security proponents around the adequate protection provisions for the data residing outside the country. 

The session will cover: 

  • Pros and cons of the cross-border transfer of data;
  • Data localization vs. free data movement –challenges;
  • Ways to protect data outside of the country;
  • Who is accountable for breaches?

Track C

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Juxtaposing AI and Automation – Is AIOps a Game -Changer for IT Operations?

One area where AI could be applied is IT operations. Modern enterprise applications have numerous dependencies so manually triaging events to identify and troubleshoot system errors is a humongous task. An intelligent AI-enabled system could determine the root cause of an anomaly and even suggest how to fix it.  

In this session, the speaker will discuss the challenges of managing enterprise IT systems, and how these could be overcome through automation. They will also highlight current trends in IT operations and how AI might transform IT ops in future. 

The session will cover: 

  • Current challenges with IT operations; 
  • Where traditional monitoring tools fall short; 
  • Automating SecOps; 
  • How AI and automation could transform IT operations.

Track A

Name

Designation, Company

Outlook 2024: Are You Equipped and on the Right Track to Confront the Cyber Catastrophe

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Name

Designation, Company

SASE: Enterprise Security Journey so Far

Secure access service edge, SASE, has emerged as a transformative approach, integrating network security and wide-area networking into a single cloud-based service. SASE’s journey within the enterprise security landscape reflects a strategic shift toward cloud-based, integrated security solutions. As organizations continue to evolve, embracing SASE positions them to address modern security challenges, while fostering agility, scalability and user-centricity in the digital age. This session will provide insights into the journey of SASE adoption in the realm of enterprise security. 

The session will cover: 

  • Current state of SASE and its significance; 
  • Evolution of single-vendor SASE and its impact; 
  • Benefits of investing in SASE. 

Track C

Name

Designation, Company

Accelerating Your SD-WAN Journey: Establishing Zero Risk Environment

Forecasts show that by 2020, the worldwide SD-WAN market for infrastructure and services will exceed $6 billion. Digital transformation and cloud computing have necessitated a significant reassessment of the WAN. For enabling an enterprise-grade SD-WAN architecture, there’s no ‘one size fits all’ approach. Enterprises must navigate many complex decisions around their design, migration and operation. 

The session will also discuss:

  • How SD-WAN provides better application performance and network flexibility
  • Overcoming the challenges of dealing with multiple service providers 
  • How cloud services are being fully integrated into WAN architectures 

Networking Break

Speaker Full Name

Job Title, Company Name

Spotlight Session: Rethinking Cybersecurity: Establishing Secure and Frictionless Banking

As a result, security leaders need to rethink cybersecurity to establish secure and frictionless banking. As banks continue to face a rising tide of cyberthreats, security leaders need to redefine banking to enable millisecond response time for querying, dashboarding and alerting, and enhancing customer onboarding. 

The changing nature of banking, along with the risks and innovations in security, is actively disrupting the banking security ecosystem in a major way, creating the need to integrate real-time controls to futurize operations at bank with effective risk management and resilient techniques. 

 The spotlight session will cover: 

  • The next big evolution in the banking sector; 
  • Adopting a defense-in-depth approach enabling multiple layers of security controls, endpoint protection and network segmentation;  
  • How risks are converging with user behavior patterns in discovering the anomalies in the system to establish frictionless banking. 

Speaker Full Name

Job Title, Company Name

Panel: A 360-Degree View of Security: Top Technologies That Will Shape Your Enterprise in 2024

Gartner predicts that by 2024, at least 50% of organizations will use AI-driven security operations centers to detect cyberattacks more quickly than traditional methods. As attackers have been increasingly using AI techniques to disrupt enterprises’ security ecosystem, CISOs must stay ahead of them and invest in advanced technologies to understand the attackers’ mindset. India’s Digital Personal Data Protection Act, 2023, has ensured accountability on CISOs and organizations for breach incidents. 

Hence, it is essential to take a 360 view of security by spotting the top technologies and trends that can shape the enterprise in 2024 and help in establishing a cybersecure ecosystem. 

Networking & Exhibition Break

Our Sponsors

Association

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Makesh Chandramohan

Chief Information Security Officer, Aditya Birla Capital

Bijender Kumar Mishra

Sr. General Manager & Chief Information Security Officer, Alkem Laboratories

Girish Dixit

CISO, Kotak Securities

Prasad Patkar

CISO, India First Life

Vijay Kumar Verma

Head Cyber Security Engineering, Jio Platforms

Shailendra Kothavale

Chief Compliance and Risk Officer, Aditya Birla Sun Life Insurance

Sammit Potdar

Global CISO, Lupin Ltd.

Dilip Panjwani

Principal Director - Chief Information Security Officer (CISO) & IT Controller, LTIMindtree

Anbu Sagaya Raj David

CISO, Holicim

Hiral Shah

CISO, Dhani

Sumeet Kokhani

Vice President, Jio Platforms Ltd

Sameer Ratolikar

Executive Vice President& CISO HDFC Bank

Dr. Bhimaraya Metri

Director, IIM Nagpur

Satyavrat Mishra

VP & Head Corporate IT Godrej Industries Ltd

Nilesh Gade

Global CISO, Bekaert

Steve D'Souza

CISO, ICICI Lombard

Mathan Babu. K

CTSO & DPO, Vodafone

Rupesh Nirgude

Chief Information and Digital Officer, Prism Johnson Limited

Nilesh Gade

Global CISO, Bekaert

Steve D'Souza

CISO, ICICI Lombard

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Advisors

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Sreeji Gopinathan (Conference Chair)

Global CIO, Lupin

Nandakumar Saravade (Conference Chair)

Former Member, RBI Academy Advisory Council Chairman of the Board of directors, Protean InfoSec (formerly NSDL InfoSec) Services Pvt Ltd

Nikhil Malhotra (Conference Co-Chair)

Chief Innovation Officer, Tech Mahindra Ltd.

Murli Nambiar

SBI

Atanu Roy

Group CIO,Biocon Group

Sachin Seth

CEO and MD, BSE Ebix Insurance Broking (BSE Ebix)

Deepak Sharma

President & Chief Digital Officer, Kotak Mahindra Bank Ltd.

Mayuresh Purandare

Head IT - Infrastructure & Security, Marico Limited

Mihirr P Thaker

Chief Information Security Officer (CISO), AllCargo Logistics

The Summit Experience