Explore the picture perfect moments from BPM 2019

Download Pictures
shape1
shape2
shape3
shape4
Event Overview

Best Practices Meet 2019

The eleventh edition of the DSCI Best Practices Meet has been conceptualised keeping in view the new paradigm of Security that has arrived and is transforming the way Security is being thought of and is being implemented across organizations. In the context of extreme digitization, rich content delivery, rapid innovation, device superiority, high speed exchanges and intent to have maximum utilization of infra, it becomes imperative to address the inevitable question- Can Security keep a pace?

Security must keep a pace with new paradigms including, but not limited to, context, data and granularity and has to process all of these and take a decision in minimal amount of time. Security Thinking as well as Security Operations will undergo a massive overhaul. Taking cue from some of the media streaming organizations and some of the other potent platforms, it would be fair to state that consumers of Security solution are now becoming developers of Security solution, thanks to the open source architecture.

The eleventh edition of the DSCI Best Practices Meet has been conceptualised keeping in view the new paradigm of Security that has arrived and is transforming the way Security is being thought of and is being implemented across organizations. In the context of extreme digitization, rich content delivery, rapid innovation, device superiority, high speed exchanges and intent to have maximum utilization of infra, it becomes imperative to address the inevitable question- Can Security keep a pace?

Security must keep a pace with new paradigms including, but not limited to, context, data and granularity and has to process all of these and take a decision in minimal amount of time. Security Thinking as well as Security Operations will undergo a massive overhaul. Taking cue from some of the media streaming organizations and some of the other potent platforms, it would be fair to state that consumers of Security solution are now becoming developers of Security solution, thanks to the open source architecture.

This new paradigm shall warrant enterprises to think through on the aspects of the leadership, operations, sourcing, automation and last but not the least, the skills required. In terms of capabilities, it would require hardware, programming power, large scale data handling and processing, architectural capabilities and a completely different level of monitoring and incident response

Best Practices Meet has been acting as one of the leading fully technology focussed conferences in Cyber Security and has been facilitating congregation of core technologists, practitioners and users of Security technologies. The two day conference shall entail engaging deep dive deliberations on some of the aforementioned facets of Security at Scale and shall also have adequate focus on building capacities in the area of security technologies, data protection on cloud, next gen network security, malware analysis and APT defence, digital investigation and advance forensics.

image image
Security at Scale

Key Themes

Microservice Architecture

Inclusive Security Thinking

Data Management & Processing

Performance of Security

Security Orchestration

Changing Security Paradigm

Open Source Architecture

Digitization & Innovation

Who Should Attend

Security & Privacy Fraternity

Heads of Information Security
Chief Information Security Officers
Chief Technology Officers
Security & Intelligence Assessors
Privacy Architects
Forensics Experts
Data Scientists
Solution Architects

01

Policy Makers & Influencers

Public Policy Makers
Think Tanks
Regulators
Government Officers




02

Academia & Research

Security Researchers
Academic Leaders
Institutional Heads
Scholars





03

Industry Participation

BFSI

Financial Technology Providers

NBFCs

GICs

Prepaid Payment Instruments

Payment Card Providers

IT/ITeS

End User Organizations

2018 Highlights

04
Industry Workshop
01
Luncheon
02
Hands-on Workshop
01
Breakfast Session
27
Sessions
02
Roundtable Discussions
60
Speakers
280+
Delegates
11
Sponsors, Partners
& Exhibitors

Sponsorship Benefits

Associate with Largest Industry Event on Security

Gain mindshare of Security Community & professionals

Make your Brand Visible & promote your Key Messages

Meet Security Leaders of various Industry Sectors

Engage with Policy Makers & Security Thinkers

Network with Decision Makers & Influencers

Demonstrate your capabilities & solutions

Join Engineering & Architectural Discussions

Develop Business Opportunity & Relationship

Event Schedule

shape1
shape2
shape3
shape4
Know about the Event Speakers

Who's Speaking

Speakers
Shri. Gaurav Gupta, IAS

Shri. Gaurav Gupta, IAS

Principal Secretary to the Government
Dept. of Information Technology, Biotechnology and Science & Technology, Government of Karnataka
Aarti Bindra

Aarti Bindra

Co-Founder, ACPL
Dr. Aditya Mukherjee

Dr. Aditya Mukherjee

Security Leader, Accenture
Akshat Jain

Akshat Jain

Co-Founder & CTO, Cyware
Ambuj Bhalla

Ambuj Bhalla

Director-IT Security, CISO, Indigo
Anand Pande

Anand Pande

CISO, GSTN
Anuva Ambastha

Anuva Ambastha

Associate Principal Architect,
Red Hat India
Arindam Roy

Arindam Roy

Director-India, SANS
Aseem Ahmed

Aseem Ahmed

Senior Product Manager, Cloud Security- Asia Pacific and Japan, Akamai Technologies
Avkash Kathiriya

Avkash Kathiriya

VP - Research and Innovation, Cyware Labs
Bhairav Acharya

Bhairav Acharya

Public Policy Manager, Facebook
Brenda Bjerke

Brenda Bjerke

Senior Director, Information Risk Management, Target
Britto Sidhan

Britto Sidhan

Cybersecurity, Principal Architect – Schneider Electric
Deepak Talwar

Deepak Talwar

National Security Officer, Microsoft India
Gupta Boda

Gupta Boda

Head, IT & Digital, Brigade Group
Imran Iraqi

Imran Iraqi

Principal Technology Advisor, CtrlS
Jeyandran Venugopal

Jeyandran Venugopal

SVP, Product and Engineering (Consumer Shopping Experience, Applied Science and Technology), Flipkart
Manish Jain

Manish Jain

Lead Manager, Information
Security, Infosys
Monnappa K A

Monnappa K A

Information Security Investigator, Cisco Systems
Narendra Nath

Narendra Nath

Joint Secretary, NSCS, Govt. of India
Nidhi Agarwal

Nidhi Agarwal

Senior Engineering Manager,
Target
Pankaj Dikshit

Pankaj Dikshit

Sr. Vice President (IT & IT Security), GSTN
Ravi Sogi

Ravi Sogi

Head - HSDP Product Security and Privacy
Rivi Varghese

Rivi Varghese

CEO, CustomerXPs
Dr. Rizwan Ahmed

Dr. Rizwan Ahmed

CTO, delaPlex Software
Dr. S D Sudarsan

Dr. S D Sudarsan

Group Manager, ABB Corporate Research
S S Sarma

S S Sarma

Associate Director, CERT-In
Sakshi Vidur

Sakshi Vidur

Cyber Security Leader - KFC APAC, YUM! Restaurants International
Sameer Ahirrao

Sameer Ahirrao

Founder and CEO, Ardent Security
Sameer Ratolikar

Sameer Ratolikar

Executive Vice President & CISO, HDFC Bank
Shishir Kumar Singh

Shishir Kumar Singh

Security Compliance Strategist, GrabTaxi Holdings PTE LTD
Shobha Jagathpal

Shobha Jagathpal

Sr. Engineering Manager, WalmartLabs India
Suganya Annadurai

Suganya Annadurai

Scientist at SETS
Tapati Bandopadhyay

Tapati Bandopadhyay

Vice President - Research, HFS Research
Tim Crothers

Tim Crothers

Vice President Security Solutions, Target
Vikram Mehta

Vikram Mehta

Associate Director - Information Security, MakeMyTrip.com
Vinay Kesari

Vinay Kesari

General Counsel – SETU
Vipin Surelia

Vipin Surelia

Chief Risk Officer, VISA
Visagan Subburayalu

Visagan Subburayalu

Director Technology – Information Security, Target
Vishal Gautam

Vishal Gautam

Director of Engineering, India Operations, Zscaler Softech India Pvt. Ltd.
Vivek Attri

Vivek Attri

Assistant Vice President, Genpact
Check Who Makes This Event Possible!

Our Event Sponsors

Our Event Partners

Our Event Exhibitors

BUY YOUR TICKET AND REGISTER

REGISTRATIONS

REGISTRATIONS

Regular Fee

6000
  • Fees is all Inclusive of Taxes and Internet Charges
  • On Cancellation Only 50% Refund Till 10th July. No Refund On Cancellation From 10th July Onwards.
Register Now

Hands-on Workshop

12000
  • Workshop topic
    Malware Investigation Using Memory Forensics
  • Workshop author
    Monnappa KA
    Information Security Investigator,
    Cisco Systems
  • Fees is all Inclusive of Taxes and Internet Charges
  • On Cancellation Only 50% Refund Till 10th July. No Refund On Cancellation From 10th July Onwards.
Register Now

Hands-on Workshop + Conference

16000
  • Workshop topic
    Malware Investigation Using Memory Forensics
  • Workshop author
    Monnappa KA
    Information Security Investigator,
    Cisco Systems
  • Fees is all Inclusive of Taxes and Internet Charges
  • On Cancellation Only 50% Refund Till 10th July. No Refund On Cancellation From 10th July Onwards.
Register Now

Group Registrations

4500
  • Avail 25% discount on Regular Fee till 20 July 2019
  • Applicable for group of 3+ delegates.
  • Fees is all Inclusive of Taxes and Internet Charges
  • On Cancellation Only 50% Refund Till 10th July. No Refund On Cancellation From 10th July Onwards.
Register Now

Women in Technology & Cyber Security

4500
  • Only women professionals in Technology and Cyber security space are eligible for this discount
  • Avail 25% discount on Regular Fee till 20 July, 2019
  • Fees is all Inclusive of Taxes and Internet Charges
  • On Cancellation Only 50% Refund Till 10th July. No Refund On Cancellation From 10th July Onwards.
Register Now

Have Questions?

Send us a Message

By submitting the form, you consent to us processing your data for a better user experience. Please read our Terms of Service and Privacy Policy for more information.
SOCIAL

To stay updated, follow #BPM2019